458 research outputs found

    The 11th Dimensional super power man from the short story Lion's Tail

    Get PDF
    Dr. C.S. Lakshmi uses the pen name Ambai for publishing Tamil fiction. Ambai, a Sahitya Akademi Award winner in 2021, has written works with feminist themes. A skilled short story writer. It is only possible for a few writers to mix science and novel short stories. Embedding modern scientific theories in the short story, Ambay has created a short story called "Lion's Tail" without compromising his literary taste. This short story gives an understanding of the eleventh dimension related to physics theories such as the Theory of Everything, M Theory, and String Theory. Are we still alive after the death of Mr. Haror, a Germany-based Sri Lankan writer named Rajshiva, on Facebook in 2014? Ambai's narration has helped with the article posted under the title. This article was reposted the same year by Saravana Dev in the Ekara Tamil Repository. The earth we live on has three dimensions. Scientists like Einstein confirmed the fourth dimension of spacetime. His Theory of Everything was followed by String Theory and M Theory. Physicists believe that eleven dimensions are the final result of all these theories. They suggest that life may exist in this first dimension and that they may have different energies than humans living on Earth. A cyborg is a combination of man, animal, and machine. It can also be considered a ghost. The aim of the article is to show that the story of "Lion's Tail" is written with the hypothesis that a creature in the eleventh dimension might be like a cyborg. In this short story, concepts and details about the eleventh dimension, the nature of the creatures living there, and the morphology, character, and power of the character Achyuth, who is a cyborg, are explained. M theory and string theory rank as nominal theories. In this short story, concepts and details about the eleventh dimension, the nature of the creatures living there, and the characters are explored. The power of the character Achyut, who is a cyborg, is explained. M theory and string theory rank as nominal theories. Mythical characters inherit concepts of birth and death, and concepts of female space are also seen. The short story is an analogy that takes science and combines it with traditional ideas

    A Study of Socio Economic Status in Relation to Employability of Engineers in India

    Get PDF
    India is very rich in diversity which even extends to the engineering graduates across states. Technical education, during the last decade, was extended through 1000s of Engineering colleges spread across the length and breadth of the country producing over half a million Engineering graduates annually. The objectives of this study are to find out the relationship between socio-economic status and employability skills among the engineering graduates in India, particularly in Tamil Nadu. As reported in Times of India dated Jan.30, 2016, Tamil Nadu may be known for its massive number of engineering colleges, but the graduates they produce do not top in employability. The students in most of the engineering colleges are from different socio-economic status/background coming from different places. The socioeconomic status of the family plays an important role in personality development of the students. The present study tries to find the extent to which the socio- economic status is a barrier in being employable and it also aims at providing means to overcome the present day menace of unemployability

    A SURVEY ON PRIVACY PRESERVING TECHNIQUES FOR SOCIAL NETWORK DATA

    Get PDF
    In this era of 20th century, online social network like Facebook, twitter, etc. plays a very important role in everyone's life. Social network data, regarding any individual organization can be published online at any time, in which there is a risk of information leakage of anyone's personal data. So preserving the privacy of individual organizations and companies are needed before data is published online. Therefore the research was carried out in this area for many years and it is still going on. There have been various existing techniques that provide the solutions for preserving privacy to tabular data called as relational data and also social network data represented in graphs. Different techniques exists for tabular data but you can't apply directly to the structured complex graph  data,which consists of vertices represented as individuals and edges representing some kind of connection or relationship between the nodes. Various techniques like K-anonymity, L-diversity, and T-closeness exist to provide privacy to nodes and techniques like edge perturbation, edge randomization are there to provide privacy to edges in social graphs. Development of new techniques by  Integration to exiting techniques like K-anonymity ,edge perturbation, edge randomization, L-Diversity are still going on to provide more privacy to relational data and social network data are ongoingin the best possible manner.Â

    A hybrid combination of substitution and transposition ciphers for efficient encryption using graph labeling

    Get PDF
    In this study, we conceptualise a hybrid approach of plaintext encryption by making use of Substitution and Transposition cipher technique namely Playfair Cipher and Simple Columnar Transposition. Both the Ciphers are Symmetric Encryption Technique and the need for developing such a hybrid is to inherit the positive traits as well as restrict certain limitations of both the techniques to a considerable extent. The resulting hybrid text is further subjected to Graph Labeling Technique as the receiver receives the ciphertext in the form of a Graph structure together with a clue to determine the type of labeling used and the ciphertext sequence. Here we adopt two varied labeling techniques namely Simply Sequentially Additive labeling and Distance two labeling for some Tree related Graphs and the corresponding Decryption of the Cipher Graph yields the desired plaintext.Publisher's Versio

    Micro Sp-Open Sets in Micro Topological Spaces

    Get PDF
    In this paper, a new class of open sets called Micro Sp- Open sets in Micro topological spaces are introduced and its fundamental properties are analyzed. Also, some operations on Micro Sp-open sets are investigated

    Potential of Silver Craft Product Through to Community-Based for Tourism Sustainability in Celuk Village

    Get PDF
    Celuk village has been known as a center of silver industry. In its current development of tourism, the purchasing power of tourists has decreased. The development of tourism trends with the changing mindset to do traveling was given some impact on it. Tourist reduced interest in buying silver, so the economy of Celuk villagers was weakening. Tourist more interested in interacting and directly involved tourism activities in an area where they visited especially in terms of unique social and cultural. From the research results obtained the tourism potential that can be developed in the Celuk village as a center of silver industry quite a lot and there also can develop supporting facilities for tourism activities as a tourist attraction. The potential of tourism products can be developed in Celuk village such as special interest tourism through  to  silver craft class by handmade process, educational tourism with a tour around the process how to make silver craft by hand (traditional) or by modern machine (silver process print), visiting the gallery/art shop to see the results of silver handicrafts and in  the same time can bought directly, Celuk Jewelry Festival held every year on a particular month, accommodation (homestay) at craftsmen house with simple concept according to the daily silver craftsman life's especially for tourists who want to learn to make silver crafts more than a day

    New Characterization Of (1,2)S_P-Kernel In Bitopological Spaces

    Get PDF
    Let J(G)=(V,E) be a jump graph. Let D be a nominal prevailing (dominating) set in a jump graph J(G). If V-D contains a prevailing set D\primeof J(G), then D\prime is called an inverse prevailing set with respect to D. The nominal cardinality of an inverse prevailing set of a jump graph J(G) is called inverse domination number of J(G). In this paper, we computed some interconnections betwixt inverse domination number of jump graph for some graphs

    Intelligent Intrusion Detection System using Enhanced Arithmetic Optimization Algorithm with Deep Learning Model

    Get PDF
    The widespread use of interoperability and interconnectivity of computing systems is becoming indispensable for enhancing our day-to-day actions. The susceptibilities deem cyber-security systems necessary for assuming communication interchanges. Secure transmission needs security measures for combating the threats and required developments to security measures that counter evolving security risks. Though firewalls were devised to secure networks, in real-time they cannot detect intrusions. Hence, destructive cyber-attacks put forward severe security complexities, requiring reliable and adaptable intrusion detection systems (IDS) that could monitor unauthorized access, policy violations, and malicious activity practically. Conventional machine learning (ML) techniques were revealed for identifying data patterns and detecting cyber-attacks IDSs successfully. Currently, deep learning (DL) methods are useful for designing accurate and effective IDS methods. In this aspect, this study develops an intelligent IDS using enhanced arithmetic optimization algorithm with deep learning (IIDS-EAOADL) method. The presented IIDS-EAOADL model performs data standardization process to normalize the input data. Besides, equilibrium optimizer based feature selection (EOFS) approach is developed to elect an optimal subset of features. For intrusion detection, deep wavelet autoencoder (DWAE) classifier is applied. Since the proper tuning of parameters of the DWNN is highly important, EAOA algorithm is used to tune them. For assuring the simulation results of the IIDS-EAOADL technique, a widespread simulation analysis takes place using a benchmark dataset. The experimentation outcomes demonstrate the improvements of the IIDS-EAOADL model over other existing technique

    Analysis of various types of ectopic pregnancies: a five-year review

    Get PDF
    Background: Ectopic pregnancy (EP) is a common, life threatening emergency during the first trimester and a significant cause for maternal morbidity and mortality. In any woman of reproductive age presenting with abdominal pain and vaginal bleeding, ectopic pregnancy should be considered. The objectives of the present study is to determine the incidence, risk factors, clinical presentation, type of ectopic pregnancy, treatment, morbidity and mortality.Methods: Retrospective analysis of case sheets of patients admitted with ectopic pregnancy at PSGIMSR, Coimbatore during the period July 2011 to June 2016 was done. The details noted were age, parity, risk factors {previous abortion, previous EP, previous pelvic surgery, intrauterine contraceptive device, tubectomy, history of pelvic inflammatory disease}, treatment for infertility, clinical presentation, ultrasound findings, investigations including beta HCG value and hemoglobin level, treatment offered, need for blood transfusion, operative findings and morbidity.Results: During the five year, there were 12,407 deliveries at our hospitals and 88 cases of ectopic pregnancies were managed. The incidence is 6.6/1000 deliveries. Among them 44% belonged to the age group of 25-30 years and multi gravida were 73.8%. Most common risk factors were previous abortion (23.8%) and previous surgeries including caesarean section, tubectomy, appendicectomy, tubal microsurgery (23.8%). Most common presentation was pain abdomen (85.2%). Out of the 88 cases, 73 patients were managed surgically (82.9%) and 11 cases were managed successfully with methotrexate (12.5%). Three of them underwent conservative management and one had Uterine Artery Embolization.Conclusions: Early diagnosis based on risk factors and timely intervention plays a main role in reducing morbidity and mortality associated with ectopic pregnancy
    corecore