701 research outputs found

    Careers in Academia and Industry: Transitions and Challenges

    Get PDF
    Start the career planning process with self-discovery and feedback from mentors. Understand the setting, culture, organizational structure, and leadership of the organizations under consideration for one’s career. Understand the expectations of potential career paths. For personal development beyond hard knowledge and skills, acquire excellent people skills and a strong network. Careers are dynamic. Maintain flexibility. Moving between environments (academia vs. industry) can be challenging, but those who successfully navigate this do so with extensive planning

    Multi Factor Authentication and IP Address Restriction based Question Paper Delivery System for Indian Universities

    Get PDF
    The traditional question paper delivery (QPD) procedure in Indian institutions is discussed in this paper with a focus on its downsides, including complexity, time requirements, security issues, environmental impact, and cost. This method is manual, which makes it prone to mistakes, rigid, and open to leaks and tampering, especially when it comes to the security of the exam questions. It also looks at security issues involving question paper leaks, highlighting ongoing difficulties in preserving the integrity and confidentiality of the Indian educational system. These occurrences highlight the requirement for a more reliable and secure QPD system.  In this paper workflow of the cloud-based software system is described in detail, with examples showing how it makes it easier to distribute safe exam papers and assures stakeholder accountability. Barcodes are integrated into the system, and their improved tracking, processing, and distribution of exam papers is highlighted. A cutting-edge cloud-based Question Paper Delivery System (OQPDS), which automates and streamlines the process of generating, distributing, and giving exams for Indian colleges, is the suggested cure. Modern security elements are used by the system, including two-step authentication, barcode-based data storage, data encryption during data transfer, IP address-based access restrictions, and time-based content delivery. The incorporation of these security elements enhances the overall security and efficiency of the QPD system. The proposed system's workflow is discussed in detail along with examples that demonstrate how it facilitates the distribution of secure exam papers and ensures stakeholder responsibility. The system incorporates barcodes, and its better distribution, processing, and tracking of exam papers is praised. The system's capacity to limit access based on IP addresses is described, along with how it might help with traceability and prevent unwanted access.  Additionally, the paper proposes watermarking to label test papers with the IP address of the testing facility, offering benefits including improved security, tamper detection, and traceability. It is highlighted that encryption is a key security tool for preserving data integrity, maintaining secrecy, and protecting against online dangers. Finally, the cloud-based Question Paper Delivery System is a solution to the security issues and inefficiencies of the current QPD system. This system intends to transform the examination procedure in Indian institutions by offering a more safe, effective, and transparent approach to question paper administration. It does this through contemporary security provisions and cutting-edge technology. This paper also discusses comparative analysis between traditional and proposed automated Question paper delivery system with respect to efficiency, security, cost reduction and flexibility

    Juvenile Idiopathic Arthritis (JIA) : Disease Review and Ayurvedic Management

    Get PDF
    Juvenile idiopathic arthritis (JIA) is the most common disease and frequently found in childhood. JIA is the collective term to denote large group of conditions with variable manifestations. Acute and chronic inflammation of multiple target organs especially musculoskeletal system. During the course of a disease the number of involvement of joints, type of joints involved will decide the type of JIA according to ILAR classification. As the etiology of the disease is complex, it has involvement of genetic factor as well as auto immune pathology. Management of the disease requires a team work including medical therapy with anti-inflammatory drugs, psychological counseling, physiotherapy and rehabilitation. Ayurvedic management can improve quality of life of a patient. Shodhana therapy with Snehan with medicated oil, Nadi Swedan, Valuka Pottali Swedan and Mridu Virechan shows great improvement in the symptoms. It will also decrease the progression of disease. Immunomodulator drugs has great role in the treatment. Rasayan is indicated in Samhitas that helps in preventing deformities and support physical and mental strength of a child

    Design and Implementation of Position Estimator Algorithm on Voice Coil Motor

    Get PDF
    Voice Coil Motors (VCMs) have been an inevitable element in the mechanisms that have been used for precise positioning in the applications like 3D printing., micro-stereolithography., etc. These voice coil motors translate in a linear direction and require a high accuracy position sensor that amounts for a major part in the budget. In this research work., an effort has been made to design and implement an algorithm that would predict the displacement of VCM and eliminate the need of high cost sensors. VCM was integrated with dSPACE DS1104 R&D controller via linear current amplifier (LCAM) which acts as a driver circuit for VCM. Sine input was given to VCM with various amplitude and frequency and the corresponding displacement is measured by using linear variable differential transformer (LVDT). The position estimator algorithm is also implemented at the same time on VCM and its output is compared with that of LVDT. It is observed that there is 97.8 % accuracy in between algorithm output and LVDT output. Further., PID controller is used in integration with the novel algorithm to minimize the error. The estimator algorithm is tested for various amplitudes and frequencies and it is found that it has a very good agreement of 99.2% with the actual displacement measured with the help of LVDT

    Replacing Mineral Oil with Vegetable Oil to Improve the Transformer’s Performance

    Get PDF
    In this paper, the replacement of mineral oil by vegetable oil for better performance of transformer was studied. This paper reveals benefits of vegetable oil over mineral oil based on their electrical characteristic, expectation, requirement , suitability, aging, environmental impact, safety, evaluation and dielectric properties of vegetable oil. Mineral oil was traditionally used to provide isolation, but vegetable oil has become increasingly popular in the last few years, and it is presently used in the range of small- to medium-size transformers. The application of transformer is expressly accreted. The competent electric transformer division in recent years has normally been immersed in mineral oil that acts as a medium insulating the energy supply of electric equipment. This paper provides information on the key environmental and fire resistance properties and associated values for natural vegetable oil transformers. Transformers filled with such fluids are generated in general. This work motivates the transformer performance to be determined by using natural dielectric vegetable fluid in comparison with ideal mineral oil. In also to estimate the degradation of both the oils the dissolved gas analysis is carried out. However, the dielectric dissipation factor of the mineral oil was about 77 times lower than that of natural oil [1]. The application of these liquids in transformers guarantees better life span. In transformer applications, vegetable isolating oils are now commercially available as replacements for mineral- based oils. In future, the vegetable oil will be the best replacement for mineral oil

    Efficient Multi - Keyword Ranked Search over Encrypted Cloud Computing

    Get PDF
    Cloud computing allow customer to store their data on remote site so it reduce burden on local complex data storing. But before storing sensitive data it can encrypted and this can overcome plaintext keyword search.AS large number of user and data on cloud and for search on that data allow multi keyword search also provide result similarity ranking for effective retrieval of data. From number of multi-keyword semantics to identify similarity between search query and data highly efficient rule of coordinate matching, i.e., as many matches as possible, and then use inner data similarity for quantitatively similarity measure. In this system, we define and solve the challenging problem of privacy-preserving multi-keyword ranked search over encrypted cloud data (MRSE),and establish a set of strict privacy requirements for such a secure cloud data utilization system to be implemented in real. We first propose basic idea of different privacy preserving multi-keyword search technique along with search on data that store on cloud in encrypted form and maintaining the integrity of rank order in search result and the cloud server is untrusted. .By hiding the user’s identity, the confidentiality of user’s data is maintaine

    A Survey of Intrusion Detection Techniques in Computer Network

    Get PDF
    As advances in the networking technology help to connect distant corners of the globe and as the Internet continues to expand its influence as a medium for communication, the threat from attackers and criminal enterprises has also grown accordingly. The increasing occurrence of network attacks is a very big issue to the network services. So, Intrusion Detection System has become a necessary component of network security. It is used for detection of many known and unknown network vulnerabilities in wired networks. While the Internet service for any purpose is used, normally who are attacking on the computer network is not known by us. Those network attacks can cause network services slow, temporarily unavailable, or down for a long period of time. The concern on this work is to perusal various methods of networking attacks detection and compare them against these methods by considering their pros and cons

    Design, Development and Implementation of the Position Estimator Algorithm for Harmonic Motion on the XY Flexural Mechanism for High Precision Positioning

    Get PDF
    This article presents a novel concept of the position estimator algorithm for voice coil actuators used in precision scanning applications. Here, a voice coil motor was used as an actuator and a sensor using the position estimator algorithm, which was derived from an electro-mechanical model of a voice coil motor. According to the proposed algorithm, the position of coil relative to the fixed magnet position depends on the current drawn, voltage across coil and motor constant of the voice coil motor. This eliminates the use of a sensor that is an integral part of all feedback control systems. Proposed position estimator was experimentally validated for the voice coil actuator in integration with electro-mechanical modeling of the flexural mechanism. The experimental setup consisted of the flexural mechanism, voice coil actuator, current and voltage monitoring circuitry and its interfacing with PC via a dSPACE DS1104 R&D microcontroller board. Theoretical and experimental results revealed successful implementation of the proposed novel algorithm in the feedback control system with positioning resolution of less than ±5 microns at the scanning speed of more than 5 mm/s. Further, proportional-integral-derivative (PID) control strategy was implemented along with developed algorithm to minimize the error. The position determined by the position estimator algorithm has an accuracy of 99.4% for single direction motion with the experimentally observed position at those instantaneous states

    Formulation and evaluation of antimicrobial gel of cow urine distillate

    Get PDF
    In India, medicines based on herbal origin have been the basis of treatment and cure for various diseases. The Indian Cow, Bos indicus, is a most veneered and valuable animal in religious scriptures. Cow urine has found therapeutic applications since days of yore. Cow urine based preparations have powerful antimicrobial, antiviral, anti allergic, and antioxidant activity. So the current research is mainly centered on the exploration of the antimicrobial powers of cow urine and incorporation of cow urine into gel formulation. The gels were prepared by using carbopol 940, propylene glycol, glycerin, triethanolamine, distilled water along with cow urine distillate and Azadirachta indica extract. The prepared gels were evaluated for physical appearance, spreadability, pH, Homogeneity and viscosity. The present study analyzes the antibacterial and antifungal activity of Cow Urine Distillate against the clinical pathogenic microorganisms such as Bacillus subtilis and Staphalococcus aureus. Maximum antibacterial activity was observed in Bacillus subtilis than Staphalococcus aureus. Antifungal activity of cow urine distillate was analysed against Aspergillus niger. The result revealed optimum characteristics features of gel formulation and confirm antimicrobial potential of prepared gel
    • …
    corecore