IET Seminar Digest | Year: 2012
The main target of this paper is to propose an algorithm to implement data hiding in DNA sequences to increase the confidentiality and complexity by using software point of view in cloud computing environments. By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied in cloud. The algorithm which has been proposed here is based on binary coding and complementary pair rules. Therefore, DNA reference sequence is chosen and a secret data M is hidden into it as well. As result of applying some steps, M is come out to upload to cloud environments. The process of identifying and extracting the original data M, hidden in DNA reference sequence begins once clients decide to use data. Furthermore, security issues are demonstrated to inspect the complexity of the algorithm. In addition, providing better privacy as well as ensure data availability, can be achieved by dividing the user's data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper, we propose a secured cost effective multi-cloud storage (SCMCS) model in cloud computing which holds an economical distribution of data among the available SPs in the market, to provide customers with data availability as well as secure storage.
Textile Asia | Year: 2015
This study aimed at producing knitted fabrics with good comfort level investigates the thermal properties of single jersey fabrics kinitted with viscose and excel yarns for sportswear. It found that excel single jersey fabrics are preferable for warmer climate sportwear.
Modi C.D.,Shree Krishna Institute of Pharmacy |
Patel S.J.,Shree Krishna Institute of Pharmacy |
Desai A.B.,Shree Krishna Institute of Pharmacy |
Journal of Applied Pharmaceutical Science | Year: 2011
Several delivery systems are developed to target methotrexate to cancer tissues with limited success due to low drug loading, size control, toxicity, and scale up and also the cost of formulation. Off late, carbon nanotubes have been projected as a promising carrier for many drugs including anticancer agents. The present work is an attempt to investigate the potentialities of multi-walled carbon nanotubes (MWCNT) as a carrier for targeting methotrexate to cancer tissues. MWCNTs were functionalized using DSPE-mPEG 2000 and was then reacted with methotrexate (MTX) to produce MWCNT-mPEG-MTX conjugate. The conjugate was characterized for particle size, loading efficiency, morphology & rate of drug release. The result indicated that about 2.26 mg of Methotrexate per mg of MWCNTs were loaded with 56.5% entrapment efficiency. Particle size of the MWCNT conjugate was found to be less than 200nm with polydispersity index of 0.286 post lyophilization of the product. The MWCNT conjugate was found to release the drug faster in acidic medium than at neutral pH. However, in both neutral and acidic media, the release was continuous over the period of 48 hours.
Lalitha V.,Mother Teresa Women's University |
Wireless Personal Communications | Year: 2014
Nodes in a mobile ad hoc network are battery constrained devices and energy efficiency becomes an important consideration. In a multi-hop mobile ad hoc network the most common method to achieve energy efficiency is the transmission power control scheme in which a node transmits the data packets to its nearest neighbor which is at minimum required power level. However this scheme minimizes only the transmission power within the node's neighborhood and energy efficiency at the link level is possible. With this scheme it is not possible to minimize the overall energy consumption of the network and the communication overhead of the network is not minimized. An analysis has been performed and our results have proved that instead of using low transmission power, the routing strategy needs to be controlled and only certain nodes are to be allowed to receive and process this routing request based on the received signal strength, then the overall energy consumption of the network can be minimized and the communication overhead is also minimized. The modified routing strategy is applied to the basic ad hoc on-demand distance vector (AODV) routing protocol and a maximum transmission range based ad hoc on-demand distance vector routing protocol named AODV range routing (AODV-RR) is proposed and studied under different network sizes. Measurable difference in performance is realized and the proposed AODV-RR perform better than normal AODV with respect to all the selected metrics. © 2014 Springer Science+Business Media New York.
Pandya K.S.,Charusat University |
Dabhi D.A.,Charusat University |
2015 Clemson University Power Systems Conference, PSC 2015 | Year: 2015
Optimal power flow is an important non-linear optimization task in power systems. In this process, the total power demand is distributed amongst the generating units such that each unit satisfies its generation limit constraints and the cost of power production is minimized. This paper presents a comparative study of new meta-heuristic optimization techniques namely bat and flower pollination algorithm for the optimal solution of optimal power flow problem such as minimizing the fuel cost of a thermal power plant. In this paper PSO is also taken just as a reference for measure the performance of the above two techniques. The numerical results clearly show that the bat algorithm gives better results than flower pollination algorithm in terms of fuel cost value and time required to reach global best solution. In order to illustrate the effectiveness of the proposed algorithm, it has been tested on highly stressed modified IEEE 300-bus test system. © 2015 IEEE.
Vinu P.V.,Msuniversity |
Sherimon P.C.,Msuniversity |
Krishnan R.,Muscat College
ACM International Conference Proceeding Series | Year: 2015
The environmental risks of seafood are enormous which include, water pollution, metal pollution and other bacterial pollution. So the quality of seafood is a major concern to food processors and public health authorities around the world. Seafood companies implement the quality management systems in their platforms; mostly database oriented one. We have proposed ontology-based system for assuring the quality of seafood. Ontology based systems are semantically rich and have better clarity compared to database systems. Such systems enable information retrieval in a more meaningful way. Our model analyses the different lab test results with the standard specification guidelines, generates hazard reports, seafood quality reports, etc. This paper focuses on the ontology modeling of test specifications of raw material using Semantic Web Rule Language (SWRL). Protege 3.5 is used to implement the user interfaces of the model. As a case study, molluscus raw material is considered. The lab test results of molluscus sample are input to the system. Ontology reasoners check whether the test results satisfy the criteria according to the test specifications of molluscus, expressed in SWRL and display appropriate messages. An individual OWL (web ontology language) file is automatically created for each instance of the sample tested. © Copyright 2015 ACM.
Chairman K.,Msuniversity |
Ranjit Singh A.J.A.,Msuniversity |
Padmalatha C.,Government of Tamilnadu
Asian Journal of Pharmaceutical and Clinical Research | Year: 2011
Study effects of pesticides that are commonly used in farming practices to the culturable fishes provide valuable information to set the aquaculture pond in safe place. In the present study the effect two type's pesticides. Parrysulfan and Sicocil that are commonly used for crop protection and get reached in to adjacent fresh water system present in the gut of the edible fish Mystus vittatus. In the gut of the fish probiotic microbial colonization in present to help the digestive process but in the fish that are exposed to pesticide had reduced lane of microbial population in the gut. Indicatly that the intrusion of pesticide in to the alimentary tract had eliminated many bacterial flora. The sensitivity of the bacteria. The pesticides were also studied.
Ramesh A.,Msuniversity |
Proceedings of IEEE International Conference on Circuit, Power and Computing Technologies, ICCPCT 2013 | Year: 2013
Information Security has become an important issue in data communication. Encryption algorithms have come up as a solution and play an important role in information security system. On other side, those algorithms consume a significant amount of computing resources such as CPU time, memory and battery power. Therefore it is essential to measure the performance of encryption algorithms. In this work, three encryption algorithms namely DES, AES and Blowfish are analyzed by considering certain performance metrics such as execution time, memory required for implementation and throughput. Based on the experiments, it has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation. © 2013 IEEE.
Jenicka S.,Msuniversity |
2011 International Conference on Emerging Trends in Electrical and Computer Technology, ICETECT 2011 | Year: 2011
Texture classification is applied to remotely sensed imagery to get accurate results in terms of classification accuracy as every pixel is classified based on the collective relationship of the pixel with its neighbors. In this paper, Modified Multivariate Local Binary Pattern (MMLBP) texture model was taken up and supervised classification was performed on a remotely sensed image varying the distance measure used. A number of distance measures were taken up and applied to the marginal distribution comprising of one dimensional histogram called feature vector and the results were evaluated based on classification accuracy, inter cluster distance and intra cluster distance. It was shown that Bhattacharyya distance and Chi squared distances outperformed other distance measures. © 2011 IEEE.
Chandwani H.B.,Msuniversity |
Proceedings on 2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking, ET2ECN 2012 | Year: 2012
This paper presents the overview of modulation methods for hybrid multilevel inverters. Modulation techniques consider modulation index with respect to amplitude and frequency which are to be defined. These modulation techniques can be applied to various multilevel inverters. Some techniques can be applied directly to multilevel inverters while some modifications are required in some techniques for various multilevel inverters. Therefore, a given modulation technique can synthesize several multilevel configurations, significantly increasing flexibility and decreasing total harmonic distortion (THD). The purpose of the modulation techniques presented here is to observe effect of different techniques on different multilevel inverter topology. This paper presents a survey of different modulation techniques for different multilevel inverter for different level output. © 2012 IEEE.