422 research outputs found

    The 11th Dimensional super power man from the short story Lion's Tail

    Get PDF
    Dr. C.S. Lakshmi uses the pen name Ambai for publishing Tamil fiction. Ambai, a Sahitya Akademi Award winner in 2021, has written works with feminist themes. A skilled short story writer. It is only possible for a few writers to mix science and novel short stories. Embedding modern scientific theories in the short story, Ambay has created a short story called "Lion's Tail" without compromising his literary taste. This short story gives an understanding of the eleventh dimension related to physics theories such as the Theory of Everything, M Theory, and String Theory. Are we still alive after the death of Mr. Haror, a Germany-based Sri Lankan writer named Rajshiva, on Facebook in 2014? Ambai's narration has helped with the article posted under the title. This article was reposted the same year by Saravana Dev in the Ekara Tamil Repository. The earth we live on has three dimensions. Scientists like Einstein confirmed the fourth dimension of spacetime. His Theory of Everything was followed by String Theory and M Theory. Physicists believe that eleven dimensions are the final result of all these theories. They suggest that life may exist in this first dimension and that they may have different energies than humans living on Earth. A cyborg is a combination of man, animal, and machine. It can also be considered a ghost. The aim of the article is to show that the story of "Lion's Tail" is written with the hypothesis that a creature in the eleventh dimension might be like a cyborg. In this short story, concepts and details about the eleventh dimension, the nature of the creatures living there, and the morphology, character, and power of the character Achyuth, who is a cyborg, are explained. M theory and string theory rank as nominal theories. In this short story, concepts and details about the eleventh dimension, the nature of the creatures living there, and the characters are explored. The power of the character Achyut, who is a cyborg, is explained. M theory and string theory rank as nominal theories. Mythical characters inherit concepts of birth and death, and concepts of female space are also seen. The short story is an analogy that takes science and combines it with traditional ideas

    A SURVEY ON PRIVACY PRESERVING TECHNIQUES FOR SOCIAL NETWORK DATA

    Get PDF
    In this era of 20th century, online social network like Facebook, twitter, etc. plays a very important role in everyone's life. Social network data, regarding any individual organization can be published online at any time, in which there is a risk of information leakage of anyone's personal data. So preserving the privacy of individual organizations and companies are needed before data is published online. Therefore the research was carried out in this area for many years and it is still going on. There have been various existing techniques that provide the solutions for preserving privacy to tabular data called as relational data and also social network data represented in graphs. Different techniques exists for tabular data but you can't apply directly to the structured complex graph  data,which consists of vertices represented as individuals and edges representing some kind of connection or relationship between the nodes. Various techniques like K-anonymity, L-diversity, and T-closeness exist to provide privacy to nodes and techniques like edge perturbation, edge randomization are there to provide privacy to edges in social graphs. Development of new techniques by  Integration to exiting techniques like K-anonymity ,edge perturbation, edge randomization, L-Diversity are still going on to provide more privacy to relational data and social network data are ongoingin the best possible manner.Â

    A hybrid combination of substitution and transposition ciphers for efficient encryption using graph labeling

    Get PDF
    In this study, we conceptualise a hybrid approach of plaintext encryption by making use of Substitution and Transposition cipher technique namely Playfair Cipher and Simple Columnar Transposition. Both the Ciphers are Symmetric Encryption Technique and the need for developing such a hybrid is to inherit the positive traits as well as restrict certain limitations of both the techniques to a considerable extent. The resulting hybrid text is further subjected to Graph Labeling Technique as the receiver receives the ciphertext in the form of a Graph structure together with a clue to determine the type of labeling used and the ciphertext sequence. Here we adopt two varied labeling techniques namely Simply Sequentially Additive labeling and Distance two labeling for some Tree related Graphs and the corresponding Decryption of the Cipher Graph yields the desired plaintext.Publisher's Versio

    Potential of Silver Craft Product Through to Community-Based for Tourism Sustainability in Celuk Village

    Get PDF
    Celuk village has been known as a center of silver industry. In its current development of tourism, the purchasing power of tourists has decreased. The development of tourism trends with the changing mindset to do traveling was given some impact on it. Tourist reduced interest in buying silver, so the economy of Celuk villagers was weakening. Tourist more interested in interacting and directly involved tourism activities in an area where they visited especially in terms of unique social and cultural. From the research results obtained the tourism potential that can be developed in the Celuk village as a center of silver industry quite a lot and there also can develop supporting facilities for tourism activities as a tourist attraction. The potential of tourism products can be developed in Celuk village such as special interest tourism through  to  silver craft class by handmade process, educational tourism with a tour around the process how to make silver craft by hand (traditional) or by modern machine (silver process print), visiting the gallery/art shop to see the results of silver handicrafts and in  the same time can bought directly, Celuk Jewelry Festival held every year on a particular month, accommodation (homestay) at craftsmen house with simple concept according to the daily silver craftsman life's especially for tourists who want to learn to make silver crafts more than a day

    Micro Sp-Open Sets in Micro Topological Spaces

    Get PDF
    In this paper, a new class of open sets called Micro Sp- Open sets in Micro topological spaces are introduced and its fundamental properties are analyzed. Also, some operations on Micro Sp-open sets are investigated

    New Characterization Of (1,2)S_P-Kernel In Bitopological Spaces

    Get PDF
    Let J(G)=(V,E) be a jump graph. Let D be a nominal prevailing (dominating) set in a jump graph J(G). If V-D contains a prevailing set D\primeof J(G), then D\prime is called an inverse prevailing set with respect to D. The nominal cardinality of an inverse prevailing set of a jump graph J(G) is called inverse domination number of J(G). In this paper, we computed some interconnections betwixt inverse domination number of jump graph for some graphs

    Intelligent Intrusion Detection System using Enhanced Arithmetic Optimization Algorithm with Deep Learning Model

    Get PDF
    The widespread use of interoperability and interconnectivity of computing systems is becoming indispensable for enhancing our day-to-day actions. The susceptibilities deem cyber-security systems necessary for assuming communication interchanges. Secure transmission needs security measures for combating the threats and required developments to security measures that counter evolving security risks. Though firewalls were devised to secure networks, in real-time they cannot detect intrusions. Hence, destructive cyber-attacks put forward severe security complexities, requiring reliable and adaptable intrusion detection systems (IDS) that could monitor unauthorized access, policy violations, and malicious activity practically. Conventional machine learning (ML) techniques were revealed for identifying data patterns and detecting cyber-attacks IDSs successfully. Currently, deep learning (DL) methods are useful for designing accurate and effective IDS methods. In this aspect, this study develops an intelligent IDS using enhanced arithmetic optimization algorithm with deep learning (IIDS-EAOADL) method. The presented IIDS-EAOADL model performs data standardization process to normalize the input data. Besides, equilibrium optimizer based feature selection (EOFS) approach is developed to elect an optimal subset of features. For intrusion detection, deep wavelet autoencoder (DWAE) classifier is applied. Since the proper tuning of parameters of the DWNN is highly important, EAOA algorithm is used to tune them. For assuring the simulation results of the IIDS-EAOADL technique, a widespread simulation analysis takes place using a benchmark dataset. The experimentation outcomes demonstrate the improvements of the IIDS-EAOADL model over other existing technique

    Analysis of various types of ectopic pregnancies: a five-year review

    Get PDF
    Background: Ectopic pregnancy (EP) is a common, life threatening emergency during the first trimester and a significant cause for maternal morbidity and mortality. In any woman of reproductive age presenting with abdominal pain and vaginal bleeding, ectopic pregnancy should be considered. The objectives of the present study is to determine the incidence, risk factors, clinical presentation, type of ectopic pregnancy, treatment, morbidity and mortality.Methods: Retrospective analysis of case sheets of patients admitted with ectopic pregnancy at PSGIMSR, Coimbatore during the period July 2011 to June 2016 was done. The details noted were age, parity, risk factors {previous abortion, previous EP, previous pelvic surgery, intrauterine contraceptive device, tubectomy, history of pelvic inflammatory disease}, treatment for infertility, clinical presentation, ultrasound findings, investigations including beta HCG value and hemoglobin level, treatment offered, need for blood transfusion, operative findings and morbidity.Results: During the five year, there were 12,407 deliveries at our hospitals and 88 cases of ectopic pregnancies were managed. The incidence is 6.6/1000 deliveries. Among them 44% belonged to the age group of 25-30 years and multi gravida were 73.8%. Most common risk factors were previous abortion (23.8%) and previous surgeries including caesarean section, tubectomy, appendicectomy, tubal microsurgery (23.8%). Most common presentation was pain abdomen (85.2%). Out of the 88 cases, 73 patients were managed surgically (82.9%) and 11 cases were managed successfully with methotrexate (12.5%). Three of them underwent conservative management and one had Uterine Artery Embolization.Conclusions: Early diagnosis based on risk factors and timely intervention plays a main role in reducing morbidity and mortality associated with ectopic pregnancy

    Relationship between caries status (caries and caries free group), salivary flow rate, buffering capacity, salivary mutans streptococcus count and sugar intake among 3-5 year old preschool children

    Get PDF
    INTRODUCTION : In a period marked by brilliant achievements in the prevention and treatment of disease, dental caries still remains one of the most widespread affliction in modern man. Dental caries is a slowly progressing disease that manifests as a result of mineral imbalance between the tooth and the environment. It is something of a paradox that teeth can be destroyed relatively rapidly in vivo and are almost indestructible postmortem. While it is true that diseases of teeth do not normally kill humans, they certainly affect the person’s efficiency and they can, if neglected, provoke serious conditions elsewhere in the body. Their contribution to the general fund of human misery is legendary. The disease progression can be stopped if the factors responsible are nullified in the initial stage. It is thus important to identify high caries risk markers as well as individuals to implement preventive and interceptive procedures. Dental caries is a multifactorial disease in which there is interplay of three principle factors; the host (primarily the saliva and teeth), the microflora, and the substrate or diet. In evaluating the caries risk of a patient a number of factors must be taken into consideration. Salivary counts of mutants streptococcus combined with the measurement of salivary flow rate and buffer effect and sugar consumption are frequently used for diagnostic and predictive purpose in cariology. AIMS AND OBJECTIVES : 1. To study the relation between caries status, salivary flow rate, salivary buffering capacity, mutans streptococcus count, and sugar intake among 3-5 year old pre school children. 2. To correlate the frequency of sugar intake with caries experience of the individual. 3. To determine the relation between salivary flow rate and salivary buffering capacity with caries experience. 4. To compare the levels of s.mutans with the caries experience of the individual. 5. To evaluate the relationship, if any between microbial parameter and sugar index. 6. To evaluate the relationship, if any between microbial parameter and salivary parameters. 7. To identify the caries risk group and to implement preventive strategies on the primary dentition so as to prevent the transmission of an infection from the primary to permanent dentition, subsequently interfering with or delaying the occurrence of decay. MATERIALS & METHODOLOGY : The present study comprised of 100 healthy children in the age group of 3-5 years from local nursery schools in Chennai. All children were in the primary dentition stage. A proforma was prepared to record the data. Children with the history of antibiotic consumption within last 3 months or were receiving any other antimicrobial agents concurrent with this study period, fluoride use or living in fluoridated area, any prior dental treatment were not included in the study. This was possible to study the natural occurrence of dental decay that was unclouded by the effects of treatment and preventive measures 7. MATERIALS : Materials used for the study were given below. Interview : Questionnaires in English. Oral examination : 1. Hand gloves. 2. Mouth mask. 3. Mouth mirror. 4. Explorer or Ash’s number 54 probe. 5. 2x2 gauze piece. Biochemical study 1. Sugarless chewing gums. 2. Sterile disposable saliva collecting cups. 3. Pipette. 4. Stop watch. 5. pH indicator paper strips with colour coded chart. Microbiological study : 1. Inoculating loops. 2. Pipette. 3. Conical flasks. 4. Sterilizer. 5. Distilled water. 6. Sterile Petri dish. 7. Refrigerator. 8. Incubator. 9. Candle jar. 10. Hand magnifying lens. 11. Microscope. 12. Microscopic glass slide. Chemicals and solutions : 1. Mitis salivarius bacitracin agar medium. 2. Saline. 3. Gention violet 4. Gram’s iodine. 5. Absolute alcohol. 6. Dilute carbon fusion 7. Sorbitol. 8. Mannitol. 9. Starch. RESULTS : The present study was carried out to evaluate the relation between caries experience and sugar intake, salivary flow rate, salivary buffering capacity, salivary mutans streptococcus count and the possible inter relationship between these variables in 50 caries and 50 caries free, 3 – 5 years old preschool children. CONCLUSION : The present study was undertaken in the local nursery schools of Chennai among 3 – 5 year old preschool children to evaluate the sugar intake, the microbial and nonmicrobial parameters and its relation with the caries experience and if any interrelationship between these variables. The following conclusion were drawn from the study: 1. There was a highly significant relation between frequency of sugar consumption and caries experience. (P < 0.001) 2. There was a inverse relation between salivary parameters (salivary flow rate, buffering capacity) and the caries experience. (P < 0.001) 3. There was a direct relation between microbial parameter (salivary mutans streptococcus count) and the caries experience. (P < 0.001) 4. There was a strong relation between salivary parameters (salivary flow rate, buffering capacity) and the streptococcus mutans count. (P < 0.001) 5. There was a weak relation between frequency of sugar consumption and the streptococcus mutans count. (P = 0.07) 6. There was a direct relation between salivary flow rate and salivary buffering capacity. (P < 0.001) The need to search for risk indicators for dental caries in order to target risk groups has been one of the subjects of a recent conference on the assessment of risk group in dentistry. These parameters evaluated in the current study could be used to discriminate highly infected subjects from non infected subjects and therefore may be indicators of an increased or reduced risk for dental decay. After an initial diagnosis of risk indicators, the high risk groups are identified and therapy should be directed to preventive strategies such as the use of fluorides, sealants and other antimicrobial supplements. Further research is needed to identify the other possible risk indicators and its relation with the caries experience
    • …
    corecore