19 research outputs found

    A STABILITY STUDY OF AYURVEDIC LAXATIVE FORMULATION - CONSTAC GRANULATION

    Get PDF
    Nowadays herbal medicines are accepted all over the world. The major weakness is consistency in the quality of the product over a range of time. So stability testing is necessary to ensure the quality of herbal products which is an evidence for the quality of the finished product. The present study was conducted to evaluate accelerated stability (Temperature: 40 °C ± 2, Relative Humidity (RH): 75% ± 5) and real time stability (Temperature: 25 °C ± 2, Relative Humidity (RH): 60% ± 5) of Constac granulation. A study was conducted as per ICH guideline Q1A (R2). The variation in the organoleptic, physico-chemical and microbial load constants of the Constac granulation (fine granulation) was observed during 0 (initial), 1st, 3rd and 6th month. Results of different physico-chemical parameters were taken into consideration to evaluate intercept and slope. It was found that there was no change in color, odour and taste of Constac granulation up to storage of 6 months at accelerated condition. Constac granulation was suitable at accelerated condition up to 6month storage. It can be extrapolated that shelf life of Constac granulation is 23.02 months. The real time stability data of Constac granulation showed very good stability up to 1 year

    Software Piracy Root Detection Framework Using SVM Based On Watermarking

    Get PDF
    Software root piracy detection is tool to use for detect the owner of java software project or unauthorized copy of jar file. Existing system content the licensing mechanism for protecting our software from piracy but by skipping license or cracking that key piracy is done. The proposed system java based piracy detection software tool to overcome from this problem of piracy and find the offender. Proposed system use ‘Watermarking’ is a technique which attempts to protect the software by adding copyright notices or unique identifiers into software to prove ownership. We evaluate the existing Java watermarking systems and algorithms by using them to watermark byte code files. We develop the piracy root detection mechanism in this system. The advantage of this technique is that software watermarking is handled as the knowledge embedded into support vector machine and is closely associated with the program logic. It makes watermark more impossible to be destroyed and removed. We have to apply the watermarking content to the jar files of java software in this system the invisible watermarking is use. The results of the experiment further indicate that the proposed technique is a lightweight and effective software watermarking scheme

    A Survey on Fruit Quality Inspection Using K-Means Segmentation

    Get PDF
    In recent era, the Agricultural production (ex. Fruits) has increased rapidly .So it become very dif?cult to detect the Quality of Fruit. This leads towards a need of scalable solution. As to satisfy today's requirement, we are proposing a system which gives better result for detection of Fruits quality efficiently. Serialized Database is used to store the image features. The different database is a used to store different types of images according to system requirement .It is also able to analysethe another disease related to detected disease. This approach provides solution for defect segmentation of fruit. Proposed approach will improves defect segmentation quality related to precision and computational time

    Blockchain technology for enhancing sustainable food systems: a consumer perspective

    Get PDF
    This paper explores the potential of blockchain technology (BCT) in promoting sustainable food production and consumption (SFPC) from a consumer perspective. India, a significant global food producer, faces challenges related to affordability and food logistics due to transport and labour constraints. Food safety concerns, that is, foodborne illnesses and quality issues, alongside unexpected events like COVID-19 and geopolitical conflicts, threaten SFPC. In recent times, consumer focus has shifted a lot towards food safety and security. The study adopted exploratory factor analysis (EFA) to identify the factors strengthening consumer trust through BCT. The EFA helped classify the items into five factors, that is, reliability, sustainability, impact on health, trust and switching intentions. The results reveal that these factors are the most significant reasons consumers are willing to accept a blockchain-enabled food system over a traditional system. The study findings will benefit organisations willing to introduce blockchain within their operations to improve the consumer base. It will also prove to be helpful for researchers and academicians to understand consumer perspectives towards BCT for SFPC

    Determinants of online shopping among tertiary students in Ghana: An extended technology acceptance model

    Get PDF
    The increasing penetration rate of the internet and technology in the world is quickly promoting online shopping. This has been fueled by growing innovations in the telecommunication and financial sector in an attempt to depeen financial inclusion. Innovations such as mobile money payments systems by mobile telephony companies have contributed to the continuous growth in online shopping amidst and the new generation of consumers who desire richer experiences. This study sought to identify the determinants of online shopping behaviour among tertiary students through the lens of the Technology Acceptance Model (TAM). The study proposed a revised TAM that integrated perceived cost and perceived risk to investigate what determined students online shopping intention and actual use. The survey involved a sample of 580 undergraduate students. The statistical technique used was Structural Equation Modelling-Partial Least Squares (SEM-PLS). The results showed that effect of ease of use on usefulness was very significant as same has been predicted by the Technology Acceptance Model. Among the independent variables, perceived cost (PC) was found to be the most significant factor affecting actual use (AU) of online shopping among students, nonetheless, perceived cost (PC) had no significant effect on purchase intention (PI). Perceived risk (PR) had no significant effect on actual use (AU) however, had a significant effect on purchase intention (PI). The study recommends online sellers to make online shopping efficient and less costive with assured safety and security of transactions as well as the product itself. A set of shopping platform could even be created specifically to give discounts and other offers to students. It also recommends future studies to employ additional determining factors such as the type of product/service, convenience and personal/demographic and geographic factors as influential to students’ online purchasing behaviour. © 2019, © 2019 The Author(s). This open access article is distributed under a Creative Commons Attribution (CC-BY) 4.0 license

    SURVEY ON “AUTOMATIC CURSOR MOVEMENT WITH EYE GAZE TRACKING

    No full text
    The eye has a lot of communicative power. Eye tracking is a process for measuring eye position and movement, and gaze tracking is used to estimate a user’s point of regard. These techniques have been widely used in human–computer interaction. Eye tracking system is a communication and control system for people with physical disabilities. It is a technique that acquires and analyzes the eye movements and use it to determine where user’s attention is focused through his eyes which can be used to manipulate the cursor position relative to the position of the user’s eye on the screen. Eye movement tracking is used in navigating the computer screen without the need for mouse or keyboard input. In this paper, provide an introduction to eye tracking technology and gaze estimation approaches. We also discuss and key features of different eye tracking systems to find the best system for each task

    Soil Fertility Detection and Crop Prediction using IoT and Machine Learning

    No full text
    India has huge agriculture heritage. This is the major source of livelihood for most Indian families. Farmers are seen to use fertilizers in inappropriate proportion to enhance crop yield which results in infertile land. To overcome this issue, to check the fertility level of the soil, environment conditions and predicting suitable crop and fertilizers required is need of hour. Soil fertility depends on nutrients like Nitrogen (N), Phosphorous (P), and Potassium (K). It is also affected by environmental factors such as temperature, moisture, humidity, etc. The proposed system provides a cost-effective solution using   IoT and Machine Learning based approach to check the NPK concentration present in the soil. Based on which, user can predict the soil suitable crop. The technique used comprises an integrated light transmission and detection system which consists of three LEDs with different wavelengths. Photodiode (LDR sensor module) is used for light detection purposes. The output obtained from the photodiode is handled using a Arduino UNO microcontroller. Based on the inputs received from LDR module, NPK concentration can be evaluated. The model is trained with the Crop Prediction dataset to predict the crop using LightGBM algorithm. The proportion of NPK nutrients and the predicted crop is sent to the user as a text message through the GSM module and ThingSpeak cloud platform

    EFFICIENT TWO-SERVER PASSWORD-ONLY AUTHENTICATED KEY EXCHANGE

    No full text
    Password-authenticated key exchange (PAKE) is placed in between client and a main server, which is used to share a password and authentication of password and in parallel establish a cryptographic key by exchanging messages. While doing these settings the entire password are stored in mainframe server. If the server is hacked or even malfunction happens due to internal system password stored will be open to hacker. This paper is written for consideration a two main servers operate in hand shake mode and one of them is hacked or malfunctioning. The advantage of this system even if one system is hacked, the hacker will not be able to see anyone’s password or any other information. The proposed system proposes two servers, using password-authenticated key exchange(PAKE). In this case two servers will operate in handshake mode, and contribute to a generation of one key for authentication. Proposed system presents a symmetric solution for two server by using PAK, where client will get access to two different servers using cryptographic keys. The protocol develops runs in parallel operation to save time, and it is found that it is more secure and efficient than existing system
    corecore