1,530 research outputs found
A Facile Spectrophotometric Method for the Determination of Iodate in Table Salt using New Chromogenic Reagents
A simple spectrophotometric method has been developed for the determination of iodate in table salt samples using thionin or azure B. The method is based on the reaction of iodate with potassium iodide in an acid medium to liberate iodine. The liberated iodine bleaches the violet colour of thionin or azure B, which are measured at 600 and 644 nm, respectively. This decrease in absorbance is directly proportional to the initial iodate concentration and obeys Beer’s law in the range of 1–12 μg mL–1 of iodate with thionin and 0.2–16 μg mL–1 of iodate with azure B. The molar absorptivity and Sandell’s sensitivity of using thionin and azure B were found to be 2.7×104 L mol–11 cm–1, 7.9×10–2 μg cm–2 and2.0 6 × 104 L mol–1 cm–1, 0.85×10–2 μg cm–2, respectively. The proposed method has been successfully used for the determination of iodate in table salt samples.KEYWORDS: Iodate determination, spectrophotometry, thionin, azure B
Internal herniation of bowel through the mesodiverticular band in adults - rare presentation - managed by laparoscopy: report of a case
Meckel’s diverticulam is the most common congenital anomaly of gastrointestinal tract. Reporting a case of small bowel obstruction due to internal herniation though the mesodiverticular band, which is a very rare presentation in adults- managed by laparoscopic division of mesodiverticular band. A 35 year old patient, presented to the emergency department with intestinal obstruction. Investigations are suggestive of small bowel obstruction. Diagnostic laparoscopy was done. A meckel’s diverticulum with herniation of small bowel through the mesodiverticular band is found. The mesodiverticular band is divided. As the meckel’s diverticulam was wide mouthed directiculectomy was not done. It can be managed safely by laparoscopy and with less incidence of complications. Morbidity is minimal and rapid return of intestinal function can be achieved
Investigation of Phishing Attacks and Means to Utilize Anti Phishing Techniques
Advancement of technology have both positive and negative impacts. Some of the negative impacts are cyber crimes. Cyber crimes have become more dangerous. Phishing is one of the cyber crime which results in exploitation of data. There are many phishing attacks which are identified every day. There are different techniques in phishing attacks. We have to reduce those attacks by employing suitable anti-phishing techniques. Some of the anti-phishing techniques and algorithms are discussed in this paper. History of phishing and the lifecycle are also discussed in this paper. People should be aware of all such phishing and the anti-phishing techniques. They have to be careful while checking their mails and should not click on any links or downloadable malware files
An Emerging Role of Chatbot in Businesses as a Novel Interactive Tool
Chatbot enables the business people to reach their target customers using popular messenger apps like Facebook, Whatsapp etc. Chatbots are not handled by humans directly. Nowadays, Chatbots are becoming very popular especially in business sector by reducing the human efforts and automated customer service. It is a software which interacts with user using natural language processing, Machine Language and Artificial Intelligence. They allow users to simply ask questions which would simulate interaction with the humans. The popular and well known chatbots are Alex and Siri. This paper focus on review of chatbot, history of chatbot and its implementation along with applications
Comparative Study of Popular Data Mining Algorithms
Data Science is an appealing field , in the present world due to advancement of science as there is huge assortment of data which exist in numerous forms . Such data must be handled with care and store safely so that it can be retrieved as per needs. Some of the popular or commonly used algorithms are Apriori algorithm, K Means Clustering, Support Vector machines(SVM) and Association Rule Mining algorithms. This paper focus on the above mentioned algorithms and a comparison is made in terms of Technique, Time Utilization Software taking real time data examples
Medication Reminders through Alarms using Fingerprint Sensors and IFTTT Application
In today’s world most of the people are suffering from some or the other illness. Everyone is so busy with their lives that they forget taking medicines on time. They had to take the respective medicine time to time but ends up not taking it properly on time which may lead to dementia, means forgetting things of their daily routine (short time memory loss). Most importantly old people who cannot remember to take medicines leads to high illness which is not advisable, sometimes even the caretaker couldn’t remember to make the patient to take medicines. So, the suggested model for this issue is a medication box that would insist the patient or caretaker around to take the medicines without failure. It is an alarm based device that helps in reminding patients about their medication. The uses of Internet of Things (IoT) applications make diagnosis easier and convenient for the patients. This device helps in maintaining one-time medication to the patients, and helps increasing the life expectancy
Content Based Image Retrieval Based on Shape, Color and Structure of the Image
In the recent era, as technology is growing rapidly the usage of social media is also increasing as a result large databases are required for storing the images. With the advancements in the technology, the storage of these images in computers has become possible. But retrieving the images is becoming a big task. We need to store them in a sequential manner and retrieve them when required. This paper details retrieval of images by considering the features related to content like shape, color, texture is called CBIR (content based image retrieval). As it is very difficult to extract the pictures in such huge data bases so we chose this technique which aim at high efficiency
Artificial Neural Networks for Soil Quality and Crop Yield Prediction using Machine Learning
Agriculture is the main stream on which farmers depend. Many surveys have proved that suicide rate of farmers is proliferate over years. The main reasons for the increase in suicide rate are weather conditions, debts, lack of details about the soil. In some remote areas farmers lack information about soil quality, soil nutrients, soil composition and may choose wrong crop to sow which results in less yield. So as to overcome the issues faced by farmers we are trying to implement a model using Artificial Neural Networks (ANN) which predicts the soil quality taking input as several important parameters related to soil. This paper mainly focuses on predicting the crop yield using the ANN which is completely a software solution and also recommends suitable fertilizers to gain high yield of crops
Ransomware- Its Prevention and Exclusion using Assorted Tools
Ransomware is similar to cyclone that creates data instability. The securely holded user data will be abducted. This has emerged as a malware through which user data is locked or encrypted till the ransom is paid. It is one of the fast evolving malware. Gaining income is the main motive of this ransomware. This paper focuses on various preventive measures to counter malice and can aid in eradicating ransomware. The paper also emphasize on various techniques and tools that can stamp out ransomware
- …