443 research outputs found

    Mobile Cloud IoT for Resource Allocation with Scheduling in Device- Device Communication and Optimization based on 5G Networks

    Get PDF
    Internet of Things (IoT) is revolutionising technical environment of traditional methods as well as has applications in smart cities, smart industries, etc. Additionally, IoT enabled models' application areas are resource-constrained as well as demand quick answers, low latencies, and high bandwidth, all of which are outside of their capabilities. The above-mentioned issues are addressed by cloud computing (CC), which is viewed as a resource-rich solution. However, excessive latency of CC prevents it from being practical. The performance of IoT-based smart systems suffers from longer delay. CC is an affordable, emergent dispersed computing pattern that features extensive assembly of diverse autonomous methods. This research propose novel technique resource allocation and task scheduling for device-device communication in mobile Cloud IoT environment based on 5G networks. Here the resource allocation has been carried out using virtual machine based markov model infused wavelength division multiplexing. Task scheduling is carried out using meta-heuristic moath flame optimization with chaotic maps. So, by scheduling tasks in a smaller search space, system resources are conserved. We run simulation tests on benchmark issues and real-world situations to confirm the effectiveness of our suggested approach. The parameters measured here are resource utilization of 95%, response time of 89%, computational cost of 35%, power consumption of 38%, QoS of 85%

    A RANDOMIZED CONTROLLED CLINICAL STUDY OF CHANDRASHOORPAYAS (GARDEN CRESS SEED PORRIDGE) AS DIETARY SUPPLEMENT FOR LACTATING MOTHERS

    Get PDF
    In India many dietary supplements are given to lactating mothers for sustained and ample milk to nourish their baby. Chandrashoora Payas (Garden cress seeds porridge) is one such recipe given to nursing mothers to increase lactation. Objective: This study is planned to assess the role of Chandrashoor Payas as a dietary supplement in lactation deficiency (Stanyakshaya), taking control group of Shatavari Powder and milk to ascertain which is better. Shatavari powder is taken as a control group since it is a clinically proven galactagogue medicine in Ayurveda. Material and Methods: Total 64 lactating mothers diagnosed with lactation deficiency were screened for clinical trial, out of which 60 patients fulfilled the inclusion criteria and included in the trial. Selected patients were divided randomly in two groups by a simple random method. Study group was administered Chandrashoora Payas 100ml in morning; and the control group was with 5gm Shatavari powder with 100ml milk for 45 days. Follow up visit was on every 15th day. Estimation of milk production and infant weight gain were assessed by comparing difference in grades. Observations and Results: Study revealed that both Chandrashoorapayas and Shatavari and milk produced significant improvement p< 0.001 in most of the variables and were comparable in reliving all the symptoms of lactation deficiency. On comparison both the drugs show similar effect. Conclusion: No adverse effects were observed in the trial group, as safety parameters were within normal limit during the study and overall compliance to the treatment was good. Both the interventions were comprehensively effective in management of lack of lactation. Chandrashoorapayas is a dietary supplement which gives similar results as Shatvari which is a medicine

    Ultra-Efficient Cascaded Buck-Boost Converter

    Get PDF
    This thesis presents various techniques to achieve ultra-high-efficiency for Cascaded-Buck-Boost converter. A rigorous loss model with component non linearity is developed and validated experimentally. An adaptive-switching-frequency control is discussed to optimize weighted efficiency. Some soft-switching techniques are discussed. A low-profile planar-nanocrystalline inductor is developed and various design aspects of core and copper design are discussed. Finite-element-method is used to examine and visualize the inductor design. By implementing the above, a peak efficiency of over 99.2 % is achieved with a power density of 6 kW/L and a maximum profile height of 7 mm is reported. This converter finds many applications because of its versatility: allowing bidirectional power flow and the ability to step-up or step-down voltages in either direction

    Effect of Cold Orifice Diameter and Geometry of Hot end Valves on Performance of Converging Type Ranque Hilsch Vortex Tube

    Get PDF
    AbstractRefrigeration by vortex tube works on the principle of heat transfer between two layers moving opposite to each other. Various experiments have been performed and has revealed two different approaches one for attaining high cold mass fraction and the other for attaining cold end temperature. The geometry requirement is different for the two approaches. The need is to have a tube to produce higher mass of cold air coming out at low temperature. For this purpose converging type of vortex tube is experimented and the results are promising. The results show increase in cold mass fraction as well as cold end temperature. The overall change in cold end temperature drop was 63% and the COP of the converging tube as compared to straight divergent tube increased by 102%. For conical valve angle of 45° air supply pressure of 5 bars and cold orifice diameter as 7mm the lowest temperature observed was 5°C producing cold mass fraction of about 0.9

    Formal Semantic Approach to Detect Smart Contract Vulnerabilities Using KEVM

    Get PDF
    Smart contracts are self-executing programs that run on blockchain platforms. While smart contracts offer a range of benefits, such as immutability and transparency, they are not immune to vulnerabilities. Malicious actors can exploit smart contract vulnerabilities to execute unintended actions or access sensitive data[1]. One approach to mitigating smart contract vulnerabilities is formal verification. Formal verification is a method of verifying the correctness of software using mathematical techniques. It involves mathematically proving that a program conforms to a set of specifications. Formal verification can help detect and eliminate vulnerabilities in smart contracts before they are deployed on the blockchain. KEVM (K Framework-based EVM) is a framework that allows for formal verification of smart contracts on the Ethereum Virtual Machine (EVM). KEVM uses the K Framework, a formal semantics framework, to specify the behavior of the EVM. With KEVM, smart contract developers can verify the correctness of their contracts before deployment, reducing the risk of vulnerabilities. In this paper, we have studied smart contract vulnerabilities such as Over usage of Gas, Signature Replay attack, and misuse of fallback function. We have also written the formal specification for these vulnerabilities and executed it using KEVM

    Human Immunodeficiency Virus Type-1 Infection of Human Myeloid Cells

    Get PDF
    Infection with human immunodeficiency virus type 1 (HIV-1) results in a wide range of immunologic and hematopoietic abnormalities. The overall goal of this dissertation was directed toward obtaining a better understanding of the interactions of HIV-1 and myeloid cells in relation to the pathogenesis of AIDS. The human myelomonocytic cell line, HL-60, was used as a model system to determine if HIV-1 infects myeloid progenitor cells and subsequently, if infection affects their differentiation. HL-60 cells and the human prototypic T cell line, H9 were infected with three different HIV-l isolates (IIIB, PM213, and NL4-3) which are known to infect T cells. All three isolates productively infected both H9 and HL-60 cells; however, HIV-1 antigen expression and cytopathicity was delayed by approximately 15 days in infected HL-60 cells compared H9 cells. To examine the effect of HIV-l infection on myeloid differentiation, chronically infected HL-60 cells and clonal lines derived from them were induced to differentiate into either granulocytes by treatment with dimethyl formamide (DMF) or into monocytes by treatment with phorbol l2-myristate 13 acetate (PMA). By both cellular morphology and function, approximately the same percentage of treated, HIV-infected HL-60 cells differentiated into either granulocytes or monocytes as treated, control HL-60 cells. Taken together, these results indicate that HIV-1 infection does not affect the morphological or functional differentiation of HL-60 cells. In an effort to understand the differences in the regulation of HIV-l infection in myeloid versus T cells, the life cycle of NL4-3 was examined in HL-60 cells and H9 cells. Initially, NL4-3 replication was restricted in HL-60 cells compared to H9 cells. This restriction was overcome 15 days after infection by the generation of a viral isolate, NL4-3(M). NL4-3(M), harvested during the lytic phase of NL4-3 infection of HL-60 cells, caused cell death approximately 8 days after infection in both H9 and HL-60 cells. Although measurements of viral entry kinetics demonstrated that the timing of entry of NL4-3 and NL4-3(M) in HL-60 cells and NL4-3 in H9 cells was similar, a quantitative polymerase chain reaction (PCR) analysis of newly reverse transcribed NL4-3 DNA in H9 and HL-60 cells revealed that NL4-3 infected H9 cells and NL4-3(M) infected HL-60 cells contain consistently higher amounts of newly reverse transcribed DNA than NL4-3 infected HL-60 cells. The delay in NL4-3 replication in HL-60 cells was further amplified by inefficient spread of the virus throughout the HL-60 culture as measured by RNA production and DNA integration suggesting that another step in the viral life cycle after reverse transcription was also restricted. These results suggest that the efficiency of NL43 replication in HL-60 cells is restricted at several steps in the viral life cycle. Further, these restrictions are overcome by the generation of a viral variant, NL4-3(M), which efficiently replicates in myeloid cells. The tropism of NL4-3(M) was further characterized by testing its growth in monocyte-derived macrophages (MDM). Unlike NL4-3, NL4-3(M) productively infected MDM cultures. The ability of NL4-3(M) to infect macrophages was conferred by the envelope gene. This was demonstrated by the ability of the recombinant virus, NL4-3envA, which contains the envelope of NL4-3(M) in the context of the NL4-3 genome, to infect and replicate in MDM cultures. The envelope gene of NL4-3(M), however, did not confer ability to rapidly kill HL-60 cells. Together, these findings demonstrate that viral determinants controlling entry into MDM are different trom the determinants controlling the cytopathic phenotype in HL-60 cells

    Application of Data Mining in Telecommunication Industry

    Get PDF
    Data Mining is a logical procedure intended to investigate data (normally a lot of data - commonly business or market related - otherwise called "enormous data") looking for predictable examples as well as methodical connections amongst factors, and after that to approve the discoveries by applying the recognized examples to new subsets of data. The telecommunications industry inside the division of data and correspondence technology is comprised of all Telecommunications/telephone companies and web access suppliers and assumes the urgent part in the development of versatile interchanges and the data society. Customary telephone calls keep on being the industry's greatest income generator, yet because of advances in arrange technology, Telecom today is less about voice and progressively about content (informing, email) and pictures (e.g. video gushing). Fast web access for PC based data applications, for example, broadband data administrations and intelligent stimulation , is unavoidable. Digital Subscriber Line (DSL) is the primary broadband telecom technology. The quickest development originates from (esteem included) administrations conveyed over portable systems

    A Review: Data Extraction from multiple web databases

    Get PDF
    Web databases produce question result pages in view of a client's inquiry. The goal of proposed framework is to concentrate organized information which are the pages containing arrangements of information records from a gathering of pages from various web information bases and adjust them in one configuration, so client can get more significant information. Consequently extricating the information from these inquiry result pages is vital for some applications, for example, information combination, which need to coordinate with various web databases. For this, information extraction and arrangement strategy are proposed. For extraction, CTVS that consolidates both label and esteem comparability strategies are utilized to extricate the information from various web databases. For Alignment, re-positioning routines are proposed which utilizes semantic comparability to enhance the nature of list items. Bring the top N results returned via internet searcher, and use semantic similitudes between the applicant and the inquiry to re-rank the outcomes. To start with proselyte the positioning position to a significance score for every applicant. At that point consolidate the semantic closeness score with this introductory significance score lastly get the new positions. Utilizing the significance score for every website page framework figure out the pertinence of information. At last adjust the information in dropping request from that score

    Prescribing pattern of antibiotics in pedodontics OPD of tertiary care dental hospital in Dhule district

    Get PDF
    Background: Antibiotics are prescribed in dental practice for prophylactic and therapeutic reasons. Prophylactic antibiotics are prescribed to prevent diseases caused by members of the oral flora introduced to distant sites in a host at risk or introduced to a local compromised site in a host at risk. Although a number of studies on antibiotic use have been carried out, controversies still exist in areas such as prophylaxis, interactions and their use after both minor and intermediate oral surgical procedures. These controversies lead to inappropriate and unnecessary antibiotic use in humans. The objective of this study was to study prescribing frequency of antimicrobial agents and to study prescribing frequency of particular brand of antibiotic agent.Methods: A descriptive study was conducted in outpatient department of pedodontics of a tertiary care teaching hospital. Three hundred prescriptions were randomly collected over a period of 30 days. The data was then analysed to find out the prescribing pattern.Results: In the present study, 67% of the total prescriptions had at least one antibiotic and amoxicillin is the most frequently prescribed antibiotic while co-amoxyclav is the most frequently prescribed fixed dose combination. Amongst fixed dose combination of amoxycillin and clavulanic acid, megamox CV (55%) is the most frequently prescribed brand followed by moxclav kid (34%). For amoxycillin, novamox (60%) is the most frequently prescribed brand followed by moxkid (31%) and megamox (8%).Conclusions: Most reports on antibiotic use in dentistry show amoxicillin or other penicillin-based drugs to be the most commonly used. This trend is based on the established efficacy of penicillin based drugs on bacteria involved in odontogenic infections. Increasingly resistant strains are being reported in odontogenic infections, hence the need for constant antibiotic pharmacovigilance
    • …
    corecore