226 research outputs found

    Comparing the personal oral hygiene practices among Government and Private school children of Mahabubnagar, Telangana state - A cross sectional study

    Get PDF
    Introduction: Oral health is fundamental to general health and well-being. A healthy mouth enables an individual to talk, eat, and socialize without experiencing active disease, discomfort, or embarrassment. Objectives: To assess the knowledge and oral hygiene practices of school children from both Government and Private schools in Mahabubnagar district. Materials and Methods: A total of 150 children aged 11–15 years were randomly selected from six Private and six Government schools. A questionnaire related to their personal and oral hygiene practices was distributed to the school children. Results: The results of this study showed thatmost respondents had a good knowledge of basic hygiene measures and positive attitude towards oral hygiene. The students of both schools exhibited poor oral hygiene practices but were significantly reported more in the Government school than in the Private schools (p<0.005). Majority of the respondents (91.3%) used a commercial toothbrush and toothpaste and half of them (50%) reported brushing twice a day. Two-third of the respondents (75%), had never visited a dental clinic. Conclusion: The results of the present study showed that the knowledge and oral hygiene practices of Government school children were less satisfactory in someaspects when compared to private school children.&nbsp

    Elastic behavior of neodymium based manganites

    Get PDF
    a b s t r a c t With a view to investigate the elastic behavior of Nd 0.67 A 0.33 MnO 3 (where A = Ca, Sr, Ba, Pb) manganite system, the samples were prepared by the sol gel method. After characterizing the samples structurally, a systematic investigation of ultrasonic longitudinal and transverse sound velocities of all the samples was undertaken by pulse transmission technique in the temperature range, 100-300 K. It has been found that all the elasticity parameters, including Debye temperature, are found to increase continuously with increasing ionic radii of the dopant ion. All the samples are also found to exhibit anomalies in both the longitudinal and transverse velocities near their ferro to para magnetic transition (T C ) temperatures. Apart from this, Nd 0.67 Ca 0.33 MnO 3 sample is also found to exhibit, a transition at its charge ordering temperature (T co ). An explanation for the observed elastic anomalies based on a mean field theory has been given

    Secure data sharing in cloud computing: a comprehensive review

    Get PDF
    Cloud Computing is an emerging technology, which relies on sharing computing resources. Sharing of data in the group is not secure as the cloud provider cannot be trusted. The fundamental difficulties in distributed computing of cloud suppliers is Data Security, Sharing, Resource scheduling and Energy consumption. Key-Aggregate cryptosystem used to secure private/public data in the cloud. This key is consistent size aggregate for adaptable decisions of ciphertext in cloud storage. Virtual Machines (VMs) provisioning is effectively empowered the cloud suppliers to effectively use their accessible resources and get higher benefits. The most effective method to share information resources among the individuals from the group in distributed storage is secure, flexible and efficient. Any data stored in different cloud data centers are corrupted, recovery using regenerative coding. Security is provided many techniques like Forward security, backward security, Key-Aggregate cryptosystem, Encryption and Re-encryption etc. The energy is reduced using Energy-Efficient Virtual Machines Scheduling in Multi-Tenant Data Centers

    Quantitative profile Analysis of Mulberry Silkworm Bombyx mori. L (CSR 2 XCSR 4 )

    Get PDF
    ABSTRACT Bombyx mori. L. (CSR 2 XCSR 4 ) is a bivolitne crossbreed that produces high quantity of silk. The weights of worms and glands are directly related to the yield of silk, higher larval weights leads to higher silk production. In the present study, quantitative parameters of 5 th instar and pupal stages of silkworm larvae were observed. The analysis of quantitative estimation showed that the maximum weights and lengths of silk gland and silk worm were recorded on 7 th day of 5 th instar larval stage. The day dependent variation in protein concentration was observed in total silk gland 5 th instar larval and pupal stages

    Development of a RP-HPLC method for evaluation of in vitro permeability of voriconazole in the presence of enhancers through rat skin

    Get PDF
    AbstractAn isocratic RP-HPLC–UV method for the analysis of voriconazole in skin diffusate samples has been developed and validated. Experimental design was employed to optimize the method. The method was validated as per ICH guidelines. Linearity was observed over the concentration range of 2–100μgmL−1 (r2=0.999). Limits of detection and quantification were 0.6 and 2μgmL−1, respectively. Intra-day and inter-day precision (% RSD) was within the ICH limits (⩽2%). The method was successfully used to analyze skin diffusate samples, and the effectiveness of different permeation enhancers was compared with respect to flux and permeability coefficient

    Secure Data Sharing in Cloud Computing: A Comprehensive Review

    Get PDF
    Cloud Computing is an emerging technology, which relies on sharing computing resources. Sharing of data in the group is not secure as the cloud provider cannot be trusted. The fundamental difficulties in distributed computing of cloud suppliers is Data Security, Sharing, Resource scheduling and Energy consumption. Key-Aggregate cryptosystem used to secure private/public data in the cloud. This key is consistent size aggregate for adaptable decisions of ciphertext in cloud storage. Virtual Machines (VMs) provisioning is effectively empowered the cloud suppliers to effectively use their accessible resources and get higher benefits. The most effective method to share information resources among the individuals from the group in distributed storage is secure, flexible and efficient. Any data stored in different cloud data centers are corrupted, recovery using regenerative coding. Security is provided many techniques like Forward security, backward security, Key-Aggregate cryptosystem, Encryption and Re-encryption etc. The energy is reduced using Energy-Efficient Virtual Machines Scheduling in Multi-Tenant Data Centers

    Resource allocation in the cloud for video-on-demand applications using multiple cloud service providers

    Get PDF
    Abstract Video-on-demand (VoD) applications have become extensively used nowadays. YouTube is one of the most extensively used VoD application. These applications are used for various purposes like entertainment, education, media, etc., of all age groups. Earlier, these applications were supported by private data centers and application servers. Sufficient infrastructure had to be bought and maintained, to support the demand even during unexpected peak times. This approach caused huge loss of resources when the demand is normal as a large portion of the resources remained idle. To overcome this, VoD application providers moved to the cloud, to host their video content’s. This approach reduced the wastage of resources and the maintenance cost of the VoD application provider. The problem is to determine the number of resources to handle the demand while maintaining QoS for every instance. We have designed two algorithms in this paper, namely the multiple cloud resource allocation (MCRA) algorithm and the hybrid MCRA algorithm. Most of the cloud service providers (CSPs) basically provide two types of resource allocation schemes: (i) the reservation scheme and (ii) the on-demand scheme. The reservation scheme provides time-based tariff prices, where the discount is provided for the resources depending on their quantity and reservation time. This scheme is used in the MCRA algorithm to reduce the cost of the VoD application provider. In Hybrid MCRA algorithm both the reservation scheme and on-demand scheme are implemented, to overcome the drawbacks of the MCRA algorithm which are under-subscription and over-subscription. We have analyzed both the algorithms in terms of cost and allocation of resources. These algorithms can help allocate resources in of cloud for VoD applications in a cost-effective way and at the same time not compromise on the QoS of the video content
    corecore