422 research outputs found
The 11th Dimensional super power man from the short story Lion's Tail
Dr. C.S. Lakshmi uses the pen name Ambai for publishing Tamil fiction. Ambai, a Sahitya Akademi Award winner in 2021, has written works with feminist themes. A skilled short story writer. It is only possible for a few writers to mix science and novel short stories. Embedding modern scientific theories in the short story, Ambay has created a short story called "Lion's Tail" without compromising his literary taste. This short story gives an understanding of the eleventh dimension related to physics theories such as the Theory of Everything, M Theory, and String Theory. Are we still alive after the death of Mr. Haror, a Germany-based Sri Lankan writer named Rajshiva, on Facebook in 2014? Ambai's narration has helped with the article posted under the title. This article was reposted the same year by Saravana Dev in the Ekara Tamil Repository. The earth we live on has three dimensions. Scientists like Einstein confirmed the fourth dimension of spacetime. His Theory of Everything was followed by String Theory and M Theory. Physicists believe that eleven dimensions are the final result of all these theories. They suggest that life may exist in this first dimension and that they may have different energies than humans living on Earth. A cyborg is a combination of man, animal, and machine. It can also be considered a ghost. The aim of the article is to show that the story of "Lion's Tail" is written with the hypothesis that a creature in the eleventh dimension might be like a cyborg. In this short story, concepts and details about the eleventh dimension, the nature of the creatures living there, and the morphology, character, and power of the character Achyuth, who is a cyborg, are explained. M theory and string theory rank as nominal theories. In this short story, concepts and details about the eleventh dimension, the nature of the creatures living there, and the characters are explored. The power of the character Achyut, who is a cyborg, is explained. M theory and string theory rank as nominal theories. Mythical characters inherit concepts of birth and death, and concepts of female space are also seen. The short story is an analogy that takes science and combines it with traditional ideas
A SURVEY ON PRIVACY PRESERVING TECHNIQUES FOR SOCIAL NETWORK DATA
In this era of 20th century, online social network like Facebook, twitter, etc. plays a very important role in everyone's life. Social network data, regarding any individual organization can be published online at any time, in which there is a risk of information leakage of anyone's personal data. So preserving the privacy of individual organizations and companies are needed before data is published online. Therefore the research was carried out in this area for many years and it is still going on. There have been various existing techniques that provide the solutions for preserving privacy to tabular data called as relational data and also social network data represented in graphs. Different techniques exists for tabular data but you can't apply directly to the structured complex graph  data,which consists of vertices represented as individuals and edges representing some kind of connection or relationship between the nodes. Various techniques like K-anonymity, L-diversity, and T-closeness exist to provide privacy to nodes and techniques like edge perturbation, edge randomization are there to provide privacy to edges in social graphs. Development of new techniques by Integration to exiting techniques like K-anonymity ,edge perturbation, edge randomization, L-Diversity are still going on to provide more privacy to relational data and social network data are ongoingin the best possible manner.Â
A hybrid combination of substitution and transposition ciphers for efficient encryption using graph labeling
In this study, we conceptualise a hybrid approach of plaintext encryption by making use of Substitution and Transposition cipher technique namely Playfair Cipher and Simple Columnar Transposition. Both the Ciphers are Symmetric Encryption Technique and the need for developing such a hybrid is to inherit the positive traits as well as restrict certain limitations of both the techniques to a considerable extent. The resulting hybrid text is further subjected to Graph Labeling Technique as the receiver receives the ciphertext in the form of a Graph structure together with a clue to determine the type of labeling used and the ciphertext sequence. Here we adopt two varied labeling techniques namely Simply Sequentially Additive labeling and Distance two labeling for some Tree related Graphs and the corresponding Decryption of the Cipher Graph yields the desired plaintext.Publisher's Versio
Potential of Silver Craft Product Through to Community-Based for Tourism Sustainability in Celuk Village
Celuk village has been known as a center of silver industry. In its current development of tourism, the purchasing power of tourists has decreased. The development of tourism trends with the changing mindset to do traveling was given some impact on it. Tourist reduced interest in buying silver, so the economy of Celuk villagers was weakening. Tourist more interested in interacting and directly involved tourism activities in an area where they visited especially in terms of unique social and cultural. From the research results obtained the tourism potential that can be developed in the Celuk village as a center of silver industry quite a lot and there also can develop supporting facilities for tourism activities as a tourist attraction. The potential of tourism products can be developed in Celuk village such as special interest tourism through to silver craft class by handmade process, educational tourism with a tour around the process how to make silver craft by hand (traditional) or by modern machine (silver process print), visiting the gallery/art shop to see the results of silver handicrafts and in the same time can bought directly, Celuk Jewelry Festival held every year on a particular month, accommodation (homestay) at craftsmen house with simple concept according to the daily silver craftsman life's especially for tourists who want to learn to make silver crafts more than a day
Micro Sp-Open Sets in Micro Topological Spaces
In this paper, a new class of open sets called Micro Sp- Open sets in Micro topological spaces are introduced and its fundamental properties are analyzed. Also, some operations on Micro Sp-open sets are investigated
New Characterization Of (1,2)S_P-Kernel In Bitopological Spaces
Let J(G)=(V,E) be a jump graph. Let D be a nominal prevailing (dominating) set in a jump graph J(G). If V-D contains a prevailing set D\primeof J(G), then D\prime is called an inverse prevailing set with respect to D. The nominal cardinality of an inverse prevailing set of a jump graph J(G) is called inverse domination number of J(G). In this paper, we computed some interconnections betwixt inverse domination number of jump graph for some graphs
Intelligent Intrusion Detection System using Enhanced Arithmetic Optimization Algorithm with Deep Learning Model
The widespread use of interoperability and interconnectivity of computing systems is becoming indispensable for enhancing our day-to-day actions. The susceptibilities deem cyber-security systems necessary for assuming communication interchanges. Secure transmission needs security measures for combating the threats and required developments to security measures that counter evolving security risks. Though firewalls were devised to secure networks, in real-time they cannot detect intrusions. Hence, destructive cyber-attacks put forward severe security complexities, requiring reliable and adaptable intrusion detection systems (IDS) that could monitor unauthorized access, policy violations, and malicious activity practically. Conventional machine learning (ML) techniques were revealed for identifying data patterns and detecting cyber-attacks IDSs successfully. Currently, deep learning (DL) methods are useful for designing accurate and effective IDS methods. In this aspect, this study develops an intelligent IDS using enhanced arithmetic optimization algorithm with deep learning (IIDS-EAOADL) method. The presented IIDS-EAOADL model performs data standardization process to normalize the input data. Besides, equilibrium optimizer based feature selection (EOFS) approach is developed to elect an optimal subset of features. For intrusion detection, deep wavelet autoencoder (DWAE) classifier is applied. Since the proper tuning of parameters of the DWNN is highly important, EAOA algorithm is used to tune them. For assuring the simulation results of the IIDS-EAOADL technique, a widespread simulation analysis takes place using a benchmark dataset. The experimentation outcomes demonstrate the improvements of the IIDS-EAOADL model over other existing technique
Analysis of various types of ectopic pregnancies: a five-year review
Background: Ectopic pregnancy (EP) is a common, life threatening emergency during the first trimester and a significant cause for maternal morbidity and mortality. In any woman of reproductive age presenting with abdominal pain and vaginal bleeding, ectopic pregnancy should be considered. The objectives of the present study is to determine the incidence, risk factors, clinical presentation, type of ectopic pregnancy, treatment, morbidity and mortality.Methods: Retrospective analysis of case sheets of patients admitted with ectopic pregnancy at PSGIMSR, Coimbatore during the period July 2011 to June 2016 was done. The details noted were age, parity, risk factors {previous abortion, previous EP, previous pelvic surgery, intrauterine contraceptive device, tubectomy, history of pelvic inflammatory disease}, treatment for infertility, clinical presentation, ultrasound findings, investigations including beta HCG value and hemoglobin level, treatment offered, need for blood transfusion, operative findings and morbidity.Results: During the five year, there were 12,407 deliveries at our hospitals and 88 cases of ectopic pregnancies were managed. The incidence is 6.6/1000 deliveries. Among them 44% belonged to the age group of 25-30 years and multi gravida were 73.8%. Most common risk factors were previous abortion (23.8%) and previous surgeries including caesarean section, tubectomy, appendicectomy, tubal microsurgery (23.8%). Most common presentation was pain abdomen (85.2%). Out of the 88 cases, 73 patients were managed surgically (82.9%) and 11 cases were managed successfully with methotrexate (12.5%). Three of them underwent conservative management and one had Uterine Artery Embolization.Conclusions: Early diagnosis based on risk factors and timely intervention plays a main role in reducing morbidity and mortality associated with ectopic pregnancy
Relationship between caries status (caries and caries free group), salivary flow rate, buffering capacity, salivary mutans streptococcus count and sugar intake among 3-5 year old preschool children
INTRODUCTION :
In a period marked by brilliant achievements in the prevention and
treatment of disease, dental caries still remains one of the most widespread
affliction in modern man. Dental caries is a slowly progressing disease that
manifests as a result of mineral imbalance between the tooth and the
environment. It is something of a paradox that teeth can be destroyed relatively
rapidly in vivo and are almost indestructible postmortem. While it is true that
diseases of teeth do not normally kill humans, they certainly affect the person’s
efficiency and they can, if neglected, provoke serious conditions elsewhere in
the body. Their contribution to the general fund of human misery is legendary.
The disease progression can be stopped if the factors responsible are
nullified in the initial stage. It is thus important to identify high caries risk
markers as well as individuals to implement preventive and interceptive
procedures.
Dental caries is a multifactorial disease in which there is interplay of
three principle factors; the host (primarily the saliva and teeth), the microflora,
and the substrate or diet. In evaluating the caries risk of a patient a number of
factors must be taken into consideration. Salivary counts of mutants
streptococcus combined with the measurement of salivary flow rate and buffer
effect and sugar consumption are frequently used for diagnostic and predictive
purpose in cariology.
AIMS AND OBJECTIVES :
1. To study the relation between caries status, salivary flow rate, salivary
buffering capacity, mutans streptococcus count, and sugar intake among
3-5 year old pre school children.
2. To correlate the frequency of sugar intake with caries experience of the
individual.
3. To determine the relation between salivary flow rate and salivary
buffering capacity with caries experience.
4. To compare the levels of s.mutans with the caries experience of the
individual.
5. To evaluate the relationship, if any between microbial parameter and
sugar index.
6. To evaluate the relationship, if any between microbial parameter and
salivary parameters.
7. To identify the caries risk group and to implement preventive strategies
on the primary dentition so as to prevent the transmission of an infection
from the primary to permanent dentition, subsequently interfering with
or delaying the occurrence of decay.
MATERIALS & METHODOLOGY :
The present study comprised of 100 healthy children in the age group of
3-5 years from local nursery schools in Chennai. All children were in the
primary dentition stage. A proforma was prepared to record the data.
Children with the history of antibiotic consumption within last 3 months
or were receiving any other antimicrobial agents concurrent with this study
period, fluoride use or living in fluoridated area, any prior dental treatment
were not included in the study. This was possible to study the natural
occurrence of dental decay that was unclouded by the effects of treatment and
preventive measures 7.
MATERIALS :
Materials used for the study were given below.
Interview :
Questionnaires in English.
Oral examination :
1. Hand gloves.
2. Mouth mask.
3. Mouth mirror.
4. Explorer or Ash’s number 54 probe.
5. 2x2 gauze piece.
Biochemical study
1. Sugarless chewing gums.
2. Sterile disposable saliva collecting cups.
3. Pipette.
4. Stop watch.
5. pH indicator paper strips with colour coded chart.
Microbiological study :
1. Inoculating loops.
2. Pipette.
3. Conical flasks.
4. Sterilizer.
5. Distilled water.
6. Sterile Petri dish.
7. Refrigerator.
8. Incubator.
9. Candle jar.
10. Hand magnifying lens.
11. Microscope.
12. Microscopic glass slide.
Chemicals and solutions :
1. Mitis salivarius bacitracin agar medium.
2. Saline.
3. Gention violet
4. Gram’s iodine.
5. Absolute alcohol.
6. Dilute carbon fusion
7. Sorbitol.
8. Mannitol.
9. Starch.
RESULTS :
The present study was carried out to evaluate the relation between caries
experience and sugar intake, salivary flow rate, salivary buffering capacity,
salivary mutans streptococcus count and the possible inter relationship between
these variables in 50 caries and 50 caries free, 3 – 5 years old preschool
children.
CONCLUSION :
The present study was undertaken in the local nursery schools of
Chennai among 3 – 5 year old preschool children to evaluate the sugar intake,
the microbial and nonmicrobial parameters and its relation with the caries
experience and if any interrelationship between these variables.
The following conclusion were drawn from the study:
1. There was a highly significant relation between frequency of sugar
consumption and caries experience. (P < 0.001)
2. There was a inverse relation between salivary parameters (salivary flow
rate, buffering capacity) and the caries experience. (P < 0.001)
3. There was a direct relation between microbial parameter (salivary
mutans streptococcus count) and the caries experience. (P < 0.001)
4. There was a strong relation between salivary parameters (salivary flow
rate, buffering capacity) and the streptococcus mutans count. (P < 0.001)
5. There was a weak relation between frequency of sugar consumption and
the streptococcus mutans count. (P = 0.07)
6. There was a direct relation between salivary flow rate and salivary
buffering capacity. (P < 0.001)
The need to search for risk indicators for dental caries in order to target
risk groups has been one of the subjects of a recent conference on the
assessment of risk group in dentistry. These parameters evaluated in the
current study could be used to discriminate highly infected subjects from non
infected subjects and therefore may be indicators of an increased or reduced
risk for dental decay. After an initial diagnosis of risk indicators, the high risk
groups are identified and therapy should be directed to preventive strategies
such as the use of fluorides, sealants and other antimicrobial supplements.
Further research is needed to identify the other possible risk indicators and its
relation with the caries experience
- …