JJTU

Rajasthan, India
Rajasthan, India

Time filter

Source Type

Kumari R.,JJTU | Asthana A.,JIMS | Kumar V.,Asia Pacific Institute of Management
2014 7th International Conference on Information and Automation for Sustainability: "Sharpening the Future with Sustainable Technology", ICIAfS 2014 | Year: 2014

Restoration of digital images contaminated by impulse noise is still a challenging job for researchers. A novel filter based on neuro-fuzzy system and dilation rule has been proposed, which works well in presence of high density noise. Adaptive Neuro-Fuzzy Inference System (ANFIS) has been used to detect the impulse noise, and dilation rule has been used to remove the detected corrupted pixel. ANFIS helps to preserve the fine details of the image and a little modified dilation rule gives the estimated value for pixel replacement. Experimental results show the effectiveness of the proposed restoration method by qualitative and quantitative analysis. © 2014 IEEE.


Sonawane S.S.,JJTU | Nandre S.J.,Uttamrao Patil College | Ahire R.R.,S G Patil College
Der Pharma Chemica | Year: 2014

The fast development in the field of optoelectronics necessitates the search for new and efficient NLO crystal materials, which can be used for optoelectronics applications, such as optical computing, optical data storage, optical communication and electro optic shutters. For the fulfilment of these applications, crystals of calcium tartrate were grown by a simple gel technique using single diffusion method. The optimum growth conditions were established by various parameters such as pH of gel solution, gel concentration, gel setting time, concentration of reactants etc. Crystals having different morphologies and habits were obtained. The crystal size is about 5 x 4 x 3 mm. Calcium tartrate crystals are found to be orthorhombic with lattice parameters: a = 9.45900 Å, b = 6.46400Å, c = 5.39600Å. The crystals were characterized by using XRD, TGA and DTA techniques.


PubMed | JJTU and Padm Dr D Y Patil Institute Of Pharmaceutical Science And Research
Type: Journal Article | Journal: Journal of advanced pharmaceutical technology & research | Year: 2015

The purpose of present study was to optimize rizatriptan (RZT) chitosan (CS) nanoparticles using ionic gelation method by application of quality by design (QbD) approach. Based on risk assessment, effect of three variables, that is CS %, tripolyphosphate % and stirring speed were studied on critical quality attributes (CQAs); particle size and entrapment efficiency. Central composite design (CCD) was implemented for design of experimentation with 20 runs. RZT CS nanoparticles were characterized for particle size, polydispersity index, entrapment efficiency, in-vitro release study, differential scanning calorimetric, X-ray diffraction, scanning electron microscopy (SEM). Based on QbD approach, design space (DS) was optimized with a combination of selected variables with entrapment efficiency > 50% w/w and a particle size between 400 and 600 nm. Validation of model was performed with 3 representative formulations from DS for which standard error of - 0.70-3.29 was observed between experimental and predicted values. In-vitro drug release followed initial burst release 20.26 2.34% in 3-4 h with sustained drug release of 98.43 2.45% in 60 h. Lower magnitude of standard error for CQAs confirms the validation of selected CCD model for optimization of RZT CS nanoparticles. In-vitro drug release followed dual mechanism via, diffusion and polymer erosion. RZT CS nanoparticles were prepared successfully using QbD approach with the understanding of the high risk process and formulation parameters involved and optimized DS with a multifactorial combination of critical parameters to obtain predetermined RZT loaded CS nanoparticle specifications.


Kulkarni D.A.,JJTU | Patil S.H.,BVP's
Advances in Intelligent Systems and Computing | Year: 2016

Wireless Ad Hoc networks are popular for critical applications due to characteristics such as simplicity, low cost, and no central administration. These networks are infrastructure less and not comparable with traditional networks with infrastructure. Infrastructure networks are configured, managed, and administrated centrally. As no centralized administration is present, self-organization is used in wireless networks to create virtual topologies and communication among nodes of network. In this paper, we present a survey of strategies used by different researchers for achieving self-organization in wireless Ad Hoc networks and make the network robust, secure, and energy efficient. © Springer India 2016.


Narhar U.K.,MMCOE | Joshi R.B.,JJTU
Proceedings - 1st International Conference on Computing, Communication, Control and Automation, ICCUBEA 2015 | Year: 2015

The increased level of effective security control and transaction fraud in the world of electronic and internet commerce, demands for highly secured identification and personal verification systems. The Knowledge based authentication system encourage to user in selecting password for high security. For high security application the proposed scheme presents an integrated evaluation of the graphical password scheme by using persuasive cued click points, including usability and security evaluations, and implementation considerations along with the biometric authentication using finger nail plate surface. It implements the graphical passwords scheme to improvise the difficulty level of guessing it along with the biometric authentication which is very convenient and efficient method by acquiring low resolution images of nail plate surface which is the outermost part of the nail unit. The contour and texture characteristics of nail plates from three fingers (Index, Middle and Ring) are represented by the appearance and shape based feature descriptors. To implement these we use the technique of score level rules for fusion and classifier based fusion of matching scores by employing decision tree and support vector machine. The objective is to provide highly secure authentication scheme by using user name with graphical password using persuasive cued click points along with biometric authentication using finger nail plate. The scope of the scheme is limited to three fingers only and also for high security purpose where it is very important to keep tight security like military application, forensic labs, civilian, banking applications, etc. © 2015 IEEE.


Harekal D.,JJTU | Rao J.J.,Dayananda Sagar Institutions | Suma V.,Dayananda Sagar Institutions
Advances in Intelligent Systems and Computing | Year: 2015

Software has laid a strong influence on all occupations. The key challenge of an IT industry is to engineer a software product with minimum post deployment defects. Software Engineering approaches help engineers to develop quality software within the scheduled time, cost, and resources in a systematic manner. In order to incorporate effective defect management strategies using software engineering discipline needs a complete and widespread knowledge of various aspects of defects. The position of this paper is to provide a pattern analysis of post production defects based on empirical observations made on several main frame projects developed in one of the leading software industries. Inferences thus obtained from this investigation indicate the existence of show stopper severity defects and their associated root cause. This awareness enables the developing team to reduce the residual defects and improve the pre production quality. It further aids the attainment of total customer satisfaction. © Springer International Publishing Switzerland 2015.


Deshpande B.,JJTU | Rao J.J.,Dayananda Sagar Institutions | Suma V.,Dayananda Sagar Institutions
Advances in Intelligent Systems and Computing | Year: 2015

Ever since the introduction of computers, technological advancement has taken an exponential form. Thus, development of software which attains total customer satisfaction is one of the mandatory needs of any software industry. Delivery of defect free software is one of the primary requisites to achieve the aforementioned objective. In order to comprehend defect facets, it is essential to have knowledge of defect pattern at various phases of software development. This paper therefore provides a comprehensive analysis of occurrence of defect pattern which are obtained through a case study carried out in one of the sampled leading software industry. This empirical investigation is a throw light for the project personnel to formulate effective strategies towards reduction of defect occurrences and thereby improve quality, productivity and sustainability of the software products. © Springer International Publishing Switzerland 2015.


Mishra P.B.,JJTU | Salokhe S.G.,JJTU | Deshpande S.G.,JJTU
Research Journal of Pharmaceutical, Biological and Chemical Sciences | Year: 2013

The effect of the chitin synthesis inhibitor lufenuron on the various developmental stages of red flour beetle Tribolium castaneum adults was determined by exposing them to different sub-lethal concentrations (LC10, LC20 and LC40) of lufenuron through diet for 24 hrs on 1 day old adults. There was a dose dependent effect on the larval weight, time taken for pupation, and adult emergence, percentage pupation and percentage adult emergence. When two day old larvae were fed on sub-lethal concentrations through diet a small proportion of pupal -adult intermediates were observed at LC20 and LC40. Adults emerging from the larvae fed on diet containing LC10, LC20 and LC40 of lufenuron showed minor variation in the fecundity and hatchability of eggs from that of control. The fecundity of adults fed with sub-lethal concentration of lufenuron (obtained against 1 day old adults through diet) was affected, also, percentage hatching and survival was affected. Interestingly there was a reversal of the effect within ten days of treatment with respect to percentage hatching and survival. When eggs were exposed to treated diet hatching was not affected. We obsereved similar results with larval and adult stages therefore present data suggest that lufenuron even at sub-lethal concentrations has a very good larvicidal and ovicidal activity in T. Castaneum.


Ravi V.,JJTU | Singhal R.,Innovation Labs.
Proceedings of the 2011 World Congress on Information and Communication Technologies, WICT 2011 | Year: 2011

Information Technology (IT) has touched and changed the lives of the younger generation in India in many ways but IT still has its role to play in making a significant impact to the quality of lives of the senior citizens of our country. This study is undertaken to address the objective of using technology to provide affordable health care and other essential services for senior citizens. This study will involve understanding the needs of the senior citizens in India and to find a way of using technology to improve their lives. The study will then focus on understanding how to design a system that will be accessible by virtually every senior citizen across the country. The aim of the research is to understand and specify the functional and technical requirements, explore the technology options available and help in concluding if cloud computing is the best technology option for designing the system to cater to the senior citizens. © 2011 IEEE.

Loading JJTU collaborators
Loading JJTU collaborators