1,166 research outputs found

    Naladiyar's Individualism Theory

    Get PDF
    Literature is a book that expresses the greatness of society. Ethics have been stated with the intention of instructing. In Naladiyar the characteristics of the individual are explained in detail. It has been advised to live in the public interest without selfishness. It has been taught to live with the ethics of the elderly. Education is necessary for a man to live in society by analyzing the principles of having patience in actions and living with maturity, the depth of friendship to live in companionship, and the virtue of living in harmony and harmony during the course of his life. The merits of education have also been mentioned. Naladiyar is a book of justice belonging to the genre of pathinenkilkanakku. It is made up of venpas with four lines. It is a collection of 400 individual songs composed by Jain sages and is known as Naladi Nanooru and Agricultural Veda. Naladiyar is unique in using the simple meaning of life as a parable and imparting justice

    QUALITATIVE ANALYSIS OF INORGANIC ACID, BASIC RADICALS, AND ESTIMATION OF BIOMOLECULES IN THE FLOWER EXTRACT OF BUTEA SUPERBA ROXB.

    Get PDF
    Objective: Medicinal plants have different chemicals in their roots, stem, leaves, flowers, and fruits. In human history, medicinal plants play a vital role in the traditional medicine because of herbal plants have a great nutritive value, and some of them are also used in medicine. The efficacy of medicinal plants is mainly allied with their components such as secondary metabolites and inorganic acid, and basic radicals considered that prolonged intake can cause health problems if the heavy metals such as mercury, cadmium, and other impurities are the threshold concentrations.Methods: In the present study, the flower extract of Butea superba was analyzed for the inorganic acid and basic radicals and the estimation of total saponins, terpenoids, and alkaloids. The above protocols were done using standard methods.Results: The flower extract of B. superba revealed that the inorganic acid radicals such as chromate, phosphate, and sulfate and the basic radicals such as lead, arsenic, and ferrous showed that positive results. The percentage of total saponins, terpenoids, and alkaloids were compared in the following order, saponins<terpenoids<alkaloids as 4.181±0.017%<79.833±0.351%<107.823±0.105%, respectively.Conclusion: The present study revealed that the inorganic acid and basic elements of B. superba flower extract. The estimation of secondary metabolites such as total saponins, terpenoids, and alkaloids proved that the flower extract of B. superba is used to treat many diseases

    A High-Performance Reconfigurable Four Element Multiband MIMO Antenna for UWB Communications

    Get PDF
    For 5G applications, a 4-element orthogonal multi-input, multi-output antenna with an H-slot is advised. This antenna's CPW power source has four elements with better isolation. For this proposed antenna, the dimensions are reduced to , and the band obstruction with a parameter less than -10dB that is from 2.2GHz to 20GHz and it notches vary from 3.4GHz to 4.3GHz in the frequency range of 8.2GHz to 8.7GHz. In order to support WiMAX (3.3GHz–3.7GHz) and band ranges from 8.2GHz–8.7GHz in military/radar applications, notched filters will be used. The proposed antenna proved successful in achieving mutual coupling at less than -19 dB. The antenna's ECC level is 0.019 and its directivity gain is almost 10 db, making it a very good antenna. Except at the notches, the peak gain and radiation efficacy are 5.8 dB and 82%, respectively. This suggested antenna can be used for UWB applications such location monitoring, communications, military/radar applications, and biomedical systems as a prepared option or recommendation

    An Approach of AlexNet CNN Algorithm Model for Lung Cancer Detection and Classification

    Get PDF
    As a reliable tool for identifying and classifying different illnesses, including lung cancer, deep learning has grown significantly in  popularity. It is crucial to quickly and accurately diagnose lung cancer because different treatment options depend on the type and stage of the  disease. Deep learning algorithms (DLA) are used to speed up the critical process of lung cancer detection and lessen the burden on medical  professionals. In this study, the feasibility of employing deep learning algorithms for the early detection of lung cancer is explored, using data  from the Lung Imaging Database Consortium (LIDC) database. The study introduces the VGG-16 and AlexNet models specifically to identify  the presence of cancer in lung images. The AlexNet model is chosen for additional classification tasks based on performance. The suggested  technique displays considerable increases in both the prediction and classification accuracy of cancer. The results from using the AlexNet model  show the highest levels of accuracy, with classification accuracy of 97.76% and prediction accuracy of 97.02%, both verified using a 5-fold  cross-validation method. Moreover, when classifying the forms of cancer, the model gets a remarkable area under the curve (AUC) value of 1  for the Adenocarcinoma class, signaling extraordinary performance. Notably, the proposed model achieves an accuracy exceeding 90% across  all classes

    An Effective Authentication Scheme for Distributed Mobile Cloud Computing Services using a Single Private Key

    Get PDF
    Mobile cloud computing comprises of cloud computing, mobile computing and wireless network. Providing secure and convenience for the mobile users to access multiple cloud computing services is essential. This paper furnish an effective way of providing the authentication for the mobile users to access multiple cloud computing services. The proposed scheme outfit a secure and expediency for mobile users to access several cloud computing services from multiple service providers using a single private key. Our proposed scheme is based on bilinear pairing cryptosystem. In addition, the scheme also supports mutual authentication, key exchange, user anonymity. To overcome the vulnerabilities of traditional methods, from system implementation point of view, the proposed scheme eliminates the usage of verification tables that are required to store the user credentials(user ID and password) which are the part of smart card generator service and cloud computing service provider
    • …
    corecore