913 research outputs found

    Humanitarian Scenes in Malaipadukadam

    Get PDF
    Sangha literature is written based on human consciousness. That is why they are so vivid even after thousands of years, because they are not only for the Tamil community but also written for the whole world. The poets of Sangam era had composed poems based on their own life experience and especially about humanity. These books are still considered to be great and good. In that way, the purpose of this article is to point out the humanitarian scenes found in Malaipadukadam, which is included in the collection of Pattupaatu

    On Epsilon-MSCR Codes for Two Erasures

    Full text link
    Cooperative regenerating codes are regenerating codes designed to tradeoff storage for repair bandwidth in case of multiple node failures. Minimum storage cooperative regenerating (MSCR) codes are a class of cooperative regenerating codes which achieve the minimum storage point of the tradeoff. Recently, these codes have been constructed for all possible parameters (n,k,d,h)(n,k,d,h), where hh erasures are repaired by contacting any dd surviving nodes. However, these constructions have very large sub-packetization. ϵ\epsilon-MSR codes are a class of codes introduced to tradeoff subpacketization level for a slight increase in the repair bandwidth for the case of single node failures. We introduce the framework of ϵ\epsilon-MSCR codes which allow for a similar tradeoff for the case of multiple node failures. We present a construction of ϵ\epsilon-MSCR codes, which can recover from two node failures, by concatenating a class of MSCR codes and scalar linear codes. We give a repair procedure to repair the ϵ\epsilon-MSCR codes in the event of two node failures and calculate the repair bandwidth for the same. We characterize the increase in repair bandwidth incurred by the method in comparison with the optimal repair bandwidth given by the cut-set bound. Finally, we show the subpacketization level of ϵ\epsilon-MSCR codes scales logarithmically in the number of nodes.Comment: 14 pages, Keywords: Cooperative repair, MSCR Codes, Subpacketizatio

    Development of Normalized Cdna Library from Fusarium Wilt Infected Roots of a Tolerant Banana Genotype 'Calcutta-4' Musa acuminata ssp. burmannicoides

    Get PDF
    Management of the most devasting disease, Fusarium wilt of banana, caused by the fungus Fusarium oxysporum f. sp., cubense, is a challenge to the plant pathologist and the banana grower. Currently, genomics is providing the way for understanding plant defense mechanism, having acquired an important place in crop improvement. To identify the relevant genes and to understand the defense mechanism induced during Fusarium wilt infection, a normalized cDNA library was constructed from infected root samples of a tolerant banana genotype, Musa acuminata spp. burmannicoides 'Calcutta-4', by duplex specific nuclease (DSN) based normalization, using the SMART (switching mechanism at 5' end of RNA transcript) full-length cDNA construction method. Sequencing and analysis of 600 clones revealed 392 non-redundant clones. In all, of 88% of the sequences were annotated using Musa genome database, and the remaining 12% were identified as novel loci not annotated. We observed several resistance genes, ROS scavenging genes and genes involved in ubiquitin-proteosome pathway in this study. These genes may have a possible role against Foc infection. These sequences would enrich the EST data developed against specific stress, which is an indispensable tool for predicting functional genes and understanding the defense mechanism

    Effect of religious belief on informal reasoning about biotechnology issues

    Get PDF
    The advances of modern biotechnology provide teachers with a number of opportunities to explore socioscientific issues, and in doing so to enhance students' reasoning skills. Although some attempt has been made to understand cultural differences in students' informal reasoning across international and regional boundaries, there is limited research about the differences that exist between students who identify with a Christian worldview and those students who do not. To investigate the role that students' religious beliefs played in their informal reasoning about biotechnology issues regarding genetically modified food, genetic screening, therapeutic cloning and reproductive cloning, the written responses of 101 students identified as accepting a Christian worldview was compared with 21 students who did not identify with a Christian worldview. Using a qualitative approach, the students' responses to these issues were analysed to identify the modes of informal reasoning incorporated in the justification of their views about the technology. It was shown that students with a higher degree of religious belief demonstrated less use of rational reasoning and a greater reliance on intuitive reasoning in their responses to socioscientific issues when compared with their less-religious peers. The findings highlight the need for initiatives that will develop students' rational and emotive reasoning and encourage them to acknowledge the presuppositions of their belief system and how these influence their attitudes towards controversial issues in science

    Optimal Framework for Level Based Access Control for VM Auditing on Cloud

    Get PDF
    The growth in the cloud computing have motivated and enable lot of application developer to deploy the applications on cloud. The major challenge of hosting on cloud is the service provider or the application provider must comply to a good number of rules. These compliance reports are time to time validated and checked by external auditors. The auditing process for the cloud services are critical and the access controls must be enabled. Due to the higher complexity and less flexibility of the virtual machines, most of the cases this access control mechanism is compromised. This work proposes four algorithms to identify and enhance the LBAC mechanism for cloud services with access updates based on time variant characteristics analysis and predictive analysis with selective cryptographic methods. The proposed model produces significantly improved results to overcome three major issues in the cloud service management as selective LBAC, static privileges and open access control for the auditors.  &nbsp

    Rifampicin-induced renal toxicity during retreatment of patients with pulmonary tuberculosis

    Get PDF
    Rifampicin is a crucial component of treatment regimens for tuberculosis and has been in use since the early 1970’s. It is usually considered safe. Rarely life-threatening complications like acute renal failure or acute thrombocytopaenia may manifest during treatment with rifampicin. In our experience at the Tuberculosis Research Centre of treating more than 8000 pulmonary and extrapulmonary tuberculosis patients with rifampicin-containing regimens over the last 30 years, we are reporting 3 cases of probably rifampicininduced acute renal failure. Despite extreme therapeutic safety of this drug the clinician must be aware of this rare complication, which if detected early is completely reversible

    SSI Routing Scheme for Heterogeneous MANETs

    Full text link
    Studies towards heterogeneous Mobile Adhoc Network (MANET) as well as inter-domain routing is still in much infancy stage. After reviewing the existing literaturs, it was found that problems associated with scalability, interoperability, and security is not defined up to the mark as it should be part of pervasive computing in future networks. Moreover, it was found that existing studies do not consider the complexities associated with heterogeneous MANET to a large extent leading to narrowed research scope. Hence, this paper introduces a novel scheme called as Secure, Scalable and Interoperable (SSI )routing, where a joint algorithm is designed, developed, and implemented. The outcome exhibits the correctness of this scheme by simulation assisted by analysis for inter-domain routing

    Foreground algorithms for detection and extraction of an object in multimedia

    Get PDF
    Background Subtraction of a foreground object in multimedia is one of the major preprocessing steps involved in many vision-based applications. The main logic for detecting moving objects from the video is difference of the current frame and a reference frame which is called “background image” and this method is known as frame differencing method. Background Subtraction is widely used for real-time motion gesture recognition to be used in gesture enabled items like vehicles or automated gadgets. It is also used in content-based video coding, traffic monitoring, object tracking, digital forensics and human-computer interaction. Now-a-days due to advent in technology it is noticed that most of the conferences, meetings and interviews are done on video calls. It’s quite obvious that a conference room like atmosphere is not always readily available at any point of time. To eradicate this issue, an efficient algorithm for foreground extraction in a multimedia on video calls is very much needed. This paper is not to just build Background Subtraction application for Mobile Platform but to optimize the existing OpenCV algorithm to work on limited resources on mobile platform without reducing the performance. In this paper, comparison of various foreground detection, extraction and feature detection algorithms are done on mobile platform using OpenCV. The set of experiments were conducted to appraise the efficiency of each algorithm over the other. The overall performances of these algorithms were compared on the basis of execution time, resolution and resources required
    corecore