2,310 research outputs found

    Life in Literature

    Get PDF
    Earlier primitive man wandered around as a nomad. As time and day passed by he began to live permanently in one place. Then customs and civilizations emerged. After some time he formed and lived in a group. Later those groups became his families. Then families as communities and caste groups. Thus came domesticity. Domesticity and asceticism are two eyes for ancient Tamil people. Tamil literature has recorded that one should engage in engage domesticity if one wants to get rid of selfishness and seek the welfare of others. In that way, this article is a way to reveal the good news of domesticity in the home life shown by the Tamil literature. In this article life in Tolkappiyam, life in Kurunthogai, life in Akananuru, life in Natrinai, life in Purananuru, living in the twenty-first century are explored

    Akasa Veedu Novel from Psychological Perspective

    Get PDF
    Psychology is the explanation of the states and functions of the human soul. It is psychology that paves the way for the development and elevation of the inner life of man and is related to the subconscious mind of man and its functioning. Psychology is a study of human behavior in a scientific manner. It also sum totals the behavior and thoughts of an individual. And psychology deals with the mental activities of an individual. It has evolved and grown into many branches today. The main story of Akasa Veedu novel is explored in this article under the sub-topics of introduction, definition of psychology, literature and psychology, psychology of novelty, characters like Lalitha the peak of patience, Rukumani who speaks philosophy, Saroja the peak of poverty and ends with a conclusion

    Isolation and identification of fungal communities from vegetable wastes composts,

    Get PDF
    Compost preparation was carried out at Department of Botany, Bangalore University Bangalore during 2013 and 2014 by using Cabbage, tomato fresh cow dung and mixed vegetable waste. The experiments were laid down in a completely replicated randomized block design with three replication for each treatment. The qualitative and quantitative composition of individual vegetable composts (Tomato waste, Cabbage waste and mixed vegetable waste) were used for the isolation. The fungi were isolated on Potato Dextrose Agar (PDA) and at different temperature 50-55°C. Substantially qualitative differences in the species composition of different vegetables composts were observed. A total of 11 entities were isolated 3 from tomato waste compost, 2 from cabbage waste compost and 4 from mixed vegetable waste at 50°C and 3 at 55°C respectively. This report demonstrates that the qualitative and quantitative characterization of individual composts and fungal communities essential for best industrial application

    Sensation and entertainment in Nedunalvaadai

    Get PDF
    All the actions of man are based on his moods and feelings, but the emotion that emerges from the human being arises from the mind. Based on the time and environment emotion appears and it results as a person's behaviour. It is said that emotions are the actions that appear and perform not only for the human species, but the living things that appeared in the world also emotional feelings and emotions are manifested according to the weather and climate. Focusing on emotions, this article explains the feeling of animals, the feeling of worship, the feeling of the time, the loneliness of the heroine, the sense of duty and the sense of personality of the hero

    SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS

    Get PDF
    With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.AbstractWith the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios. Keywords:Cryptography; Encryption; Decryption; Key Management; Optimization algorithm

    Bioremediation of pesticides in surface soil treatment unit using microbial consortia

    Get PDF
    The manufacturing and use of pesticides has been rising tremendously in India. The waste generated by the pesticide industry has become an environmental problem due to the present insufficient and ineffective waste treatment technology involving physico-chemical and biological treatment. The available data indicates that pesticide residues remain in surface soil, leading to toxicity in the soilwater environment. The recent advances in bioremediation technology using microbial consortium has been found effective for treatment of pesticides in soil. In the present study, a Surface Soil Treatment Unit has been designed wherein bioremediation of commonly used pesticides namely chlorpyrifos, cypermethrin, fenvalerate, and trichlopyr butoxyethyl ester at varying concentration viz. 25, 50 and 100 mg/kg have been carried out using cow-dung microbial consortia under simulated environmental conditions. The bioremediation conditions have been monitored and maintained during the study. The investigation has been extended till the parent compound was converted into intermediates and/or less harmful compounds. These then will further mineralize, from part of the microbial food chain and/or become integrated into the humic fractions. The results presented here highlight the potential of cowdung slurry consortia for bioremediation of soil contaminated with pesticides in surface soil treatment unit.Key words: Bioremediation, surface soil treatment unit, pesticides, cow-dung, microbial consortia

    o-Mercaptoacetamidobenzoic Acid as a Gravimetric Reagent for Zr(IV)

    Get PDF
    994-99

    SERVICE LIFE PREDICTION FOR CONCRETE COMPOSITE WITH CARBON FIBRES FOR MARINE ENVIRONMENT

    Get PDF
    As construction technologies are improved and as we go for advanced technologies in construction of infrastructure facilities the importance of concrete technology is also more demanding. The field of concrete technology has many new admixtures which improves the properties of concrete. Durability and performance of structures are the main focus now. In view of this, apart from just proportioning a concrete mix, researchers are now interested in testing the performance of the material in varied environmental conditions. Service life prediction is the evaluation of the performance of the structure over a period of time. The prediction involves knowledge of materials science, laboratory testing and data from structures that are in service. It is a complex area where interpretation of correct data has been used and it involves systematic approaches. Researchers have used numerous methodologies and mathematical formulae that are used for the service life prediction. Accelerated laboratory tests forms the basis for these kinds of predictions. This paper deals with proportioning of concrete composite that can be used in aggressive marine environment, subject to severe exposure and the service life prediction of the material in such environment. Admixtures play a major role in making concrete durable. This paper discusses the properties of concrete composite that has been customized with silica fume, fly ash and copper slag for improving the strength of concrete. Carbon fibres have been added to resist the impact of sea waves and also to improve the flexural toughness of concrete. As there are various factors that have been considered in proportioning this particular concrete mix, experimental trials have been designed with reference to central composite design of Response Surface methodology using Design Expert software. The trials were cast using these design mixes and tests were conducted for strength properties and durability parameters. The experimental results have been analyzed for ANOVA to test the accuracy of results. Multiple optimizations have been done to get the best mix with maximum strength and minimum durability issues

    Detection of SYBIL Attack using Neighbour Nodes in Static WSN

    Get PDF
    As wireless sensor network is an emerging technology nowadays, it is prone to many attacks like denial of service, wormhole, clone, Sybil etc. Sybil attack is a harmful attack which affects the sensor network in routing the information. It is a malicious device that it takes multiple fake identities. This malicious device make the sensor node into Sybil node and get the information from other sensor node and send the different information to receiver or it keep the information with itself and delay the information to reach the receiver. To detect the Sybil node, we proposed a TIME-TO- TIME MESSAGE (TTM) model to detect the Sybil attack in wireless sensor network. In this method, each and every node in the sensor network will maintain an observation table for storing node id and location which is useful to detect the Sybil attack. The approach is simulated in a sensor network and the result shows a very good detection rate comparing with other existing algorithms. DOI: 10.17762/ijritcc2321-8169.160414
    corecore