Time filter

Source Type

Dubey V.,Shri Ram Institute of Technology | Sairam R.,Shri Ram Institute of Technology
International Conference on Advanced Computing and Communication Technologies, ACCT | Year: 2014

This paper presents a design of a 4-bit arithmetic logic unit (ALU) by taking vantage of the concept of gate diffusion input (GDI) technique. ALU is the most crucial and core component of central processing unit as well as of numbers of embedded system and microprocessors. In this, ALU consists of 4x1 multiplexer, 2x1 multiplexer and full adder designed to implements logic operations, such as AND, OR, etc. and arithmetic operations, as ADD and SUBTRACT. GDI cells are used in the design of multiplexers and full adder which are then associated to realize ALU. The simulation is carried out Tanner EDA 13.0 simulator using TSMC BSIM 250nm technologies and compared with previous designs realized with Pass transistor logic and CMOS logic. The simulation shows that the design is more efficient with less power consumption, less surface area and is faster as compared to pass transistor and CMOS techniques. © 2014 IEEE.


Gupta N.,Shri Ram Institute of Technology | Ganeshpurkar A.,Shri Ram Institute of Technology | Jatav N.,Shri Ram Institute of Technology | Bansal D.,Shri Ram Institute of Technology | Dubey N.,Shri Ram Institute of Technology
Asian Pacific Journal of Tropical Biomedicine | Year: 2012

Objective: To investigate chick pancreatic lipase inhibitory activities of the Abroma augusta (A. augusta). Methods: A. augusta was first extracted with methanol and subjected to phytochemical screenings. Quantitative estimation of flavonoids, phenolics and alkaloids was done. Pancreatic lipase from chick pancreas was isolated and used as substrate for anti-lipase studies. Results: A. augusta extract effectively inhibited concentration dependent lipase activity, whereby extract at concentration 100 μg/mL inhibited 88.6% enzyme activity. Conclusions: From these results, it could be concluded that A. augusta can be used as a potential source anti-lipase agents. © 2012 Asian Pacific Tropical Biomedical Magazine.


Ganeshpurkar A.,Shri Ram Institute of Technology | Rai G.,Guru Ramdas Khalsa Institute of Science and Technology
Indian Journal of Pharmacology | Year: 2013

Background: Edible mushrooms have been used as flavorful foods and as health nutritional supplements for several centuries. A number of bioactive molecules have been identified in numerous mushroom species Objective: To evaluate the analgesic and anti-inflammatory potential of Oyster Mushroom Pleurotus florida using various experimental models in Wistar rats. Materials and Methods: Acute toxicity studies were performed whereby dose of 250 mg/kg and 500 mg/kg was selected for present study, Analgesic activity was determined using hot plate method, tail flick method, acetic acid induced writhing and formalin induced pain in rats, while carrageenan was used to induce inflammation and anti-inflammatory studies were performed. Results: HEE showed significant (P < 0.01) analgesic and anti-inflammatory response against all experimental models. Conclusion: These studies conclude that Pleurotus florida possesses analgesic and anti-inflammatory potential which might be due to presence of myochemicals like flavonoids, phenolics and polysaccharides.


Kulkarni G.,Shri Ram Institute of Technology | Patel B.,Shri Ram Institute of Technology | Laxkar P.,Institute of Management Sciences
IET Conference Publications | Year: 2013

Mobile Adhoc NETwork (MANET) is a wireless network where nodes communicate through other nodes without the aid of a base station. Security is a major challenge in MANET as the packets are prone vulnerability and eavesdropping in wireless environment. Generally MAC layer provides the security in such wireless network through encryption and authentication and the protocol is called WEP. Many authentication and encryption techniques are proposed to increase the security of the MANET. But stronger Security leads to more energy loss as mobiles have less energy and limited processing capability. In this work a Cross layer timestamp based network security technique is developed. The technique reduces the encryption packet overflow which is due to PKE or public key exchange, and derives the public key directly from the neighbor's table which is transmitted using routing information exchange. The simulation is performed with omnet++ simulator. Performance results demonstrate that the energy overhead due to encryption or performance compromise are very low in the proposed system. Further as the protocol is embedded in the network layer it is easily adoptable to any existing architecture without modifying the MAC or Physical layer standard or protocol.


Choubey S.D.,Shri Ram Institute of Technology | Namdeo M.K.,Shri Ram Institute of Technology
Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015 | Year: 2015

Cloud computing is a rapidly growing model of computation. It is the delivery of computing services by shared resources, software and information over the network (Internet or Intranet). It allows user to store large amount of data in cloud storage and use as when required from any part of the world by networks. Cloud computing is network based technology since security issues like privacy, data security, confidentiality etc. are encountered. It has a number of users, who are using cloud services like social network, email, file-sharing and other which are increasing the data load in cloud storage regularly. It is also increasing the risk of data vulnerability. Therefore, the data security must be provided in cloud computing models. There are some solutions proposed, to resolve these issues, based on encryption techniques. The main contribution of this paper is to perform a study of different solutions to provide data security and privacy in existing cloud computing scenario. © 2015 IEEE.


Gore A.,Shri Ram Institute of Technology | Choubey S.D.,Shri Ram Institute of Technology | Gangrade K.,Shri Ram Institute of Technology
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2016

The need of bug localization tools and increased popularity of text based IR models to locate the source code files containing bugs is growing continuously. Time and cost required for fixing bugs can be considerably minimized by improving the techniques of reducing the search space from few thou‐ sand source code files to a few files. The main contribution of this paper is to propose a Hybrid model based on two existing IR models (VSM and N-gram) for bug localization. In the proposed hybrid model performance is further improved by using word based bigrams. We have also introduced a weighing factor beta β to calculate the weighted sum of unigram and bigram and analyzed its accuracy for values ranging from (0-1). Using TopN, MRR and MAP measures, we have conducted experiments which show that the proposed hybrid model outperforms some existing state-of-art bug localization techniques. © Springer International Publishing Switzerland 2016.


Sharma S.,Gyan Ganga Institute of Technology and Sciences | Mishra N.K.,Shri Ram Institute of Technology
Communications in Computer and Information Science | Year: 2011

The invention of public-key cryptography was of central importance to the field of cryptography and provided answers to many key management problems for large scale networks. For all its benefits, however, public-key cryptography did not provide a comprehensive solution to the key management problem. Indeed, the possibilities brought forth by public-key cryptography heightened the need for sophisticated key management systems to answer questions such as the following: "How can I easily encrypt a file once for a number of different people using public-key cryptography?" "If I lose my keys, how can I decrypt all of my files that were encrypted with those keys?" "How do I know that I really have Alice's public key and not the public key of someone pretending to be Alice?" "How can I know that a public key is still trustworthy?" The paper discusses public key cryptography and its use in applications such as Key Agreement, Data Encryption and Digital Signature. The paper discusses some public key algorithms such as DH, RSA, and DSA and also gives working explanations of these algorithms. © 2011 Springer-Verlag.


Kurmi R.,Shri Ram Institute of Technology | Ganeshpurkar A.,Shri Ram Institute of Technology | Bansal D.,Shri Ram Institute of Technology | Agnihotri A.,Shri Ram Institute of Technology | Dubey N.,Shri Ram Institute of Technology
Indian Journal of Ophthalmology | Year: 2014

Aim of Study: The aim of current work was to evaluate in vitro anticataract potential of Moringa oliefera extract. Materials and Methods: Goat eye lenses were divided into 4 groups; Group served as control, Group II as toxic control, Group III and Group IV were incubated in extract (250 μg/ml and 500 μg/ml of extract of M. oliefera) Group II, III and IV were incubated in 55 mM glucose in artificial aqueous humor to induce lens opacification. Estimation of total, water soluble protein, catalase, glutathione and malondialdehyde along with photographic evaluation of lens was done. Results: Group II (toxic control) lenses showed high amount of MDA (Malondialdehyde), soluble, insoluble protein, decreased catalase and glutathione levels, while lenses treated with Moringa oliefera extract (Group III and Group IV) showed significant (FNx01 P < 0.05) reduction in MDA and increased level of catalase, glutathione, total and soluble protein. Conclusion: Results of present findings suggest protective effect of Moringa oliefera in prevention of in vitro glucose induced cataract.


PubMed | Shri Ram Institute of Technology, Pharmaceutics Research Projects Laboratory and Bundelkhand Medical College
Type: | Journal: International journal of biological macromolecules | Year: 2015

Folic Acid conjugated liposomes encapsulating Oxaliplatin (L-OHP) were entrapped in alginate beads and further coated with Eudragit-S-100 for effective delivery to colon tumors.Liposomes were prepared by cast film method and folic acid was coupled on the surface of liposomes. They were further entrapped in alginate beads which were Eudragit coated for degradation in the colonic region. The prepared beads were characterized for shape and surface morphology, percentage entrapment efficiency and drug release studies. The in vitro drug release was investigated using a USP dissolution paddle type apparatus in different simulated gastrointestinal fluids. In vivo studies of the beads containing free drug, folic acid coupled and uncoupled liposomes bearing L-OHP was administered orally at the dose of 10mg L-OHP/kg body weight to tumor bearing NUDE/SCID mice.-Scintigraphic study showed that Eudragit coated alginate beads entered into the colon of Balb/c mice between 4.20 and 4.50h after oral administration. In vivo data showed that folic acid coupled liposomes entrapped in alginate beads delivered 2.82 0.58 and 21.52 2.76 g L-OHP/g tissues in the colon and tumor after 12h, reflecting its targeting potential to colon and tumor.The results clearly demonstrate that Eudragit coated calcium alginate beads bearing folic acid coupled liposome can be used as a prospective carrier for drug delivery to colon specific tumor.


Bansal D.,Shri Ram Institute of Technology | Gulbake A.,Pharmaceutics Research Projects Laboratory | Tiwari J.,Bundelkhand Medical College | Jain S.K.,Pharmaceutics Research Projects Laboratory
International Journal of Biological Macromolecules | Year: 2016

Background: Folic Acid conjugated liposomes encapsulating Oxaliplatin (L-OHP) were entrapped in alginate beads and further coated with Eudragit-S-100 for effective delivery to colon tumors. Methods: Liposomes were prepared by cast film method and folic acid was coupled on the surface of liposomes. They were further entrapped in alginate beads which were Eudragit coated for degradation in the colonic region. The prepared beads were characterized for shape and surface morphology, percentage entrapment efficiency and drug release studies. The in vitro drug release was investigated using a USP dissolution paddle type apparatus in different simulated gastrointestinal fluids. In vivo studies of the beads containing free drug, folic acid coupled and uncoupled liposomes bearing L-OHP was administered orally at the dose of 10. mg L-OHP/kg body weight to tumor bearing NUDE/SCID mice. Results: γ-Scintigraphic study showed that Eudragit coated alginate beads entered into the colon of Balb/c mice between 4.20 and 4.50. h after oral administration. In vivo data showed that folic acid coupled liposomes entrapped in alginate beads delivered 2.82 ± 0.58 and 21.52 ± 2.76. μg L-OHP/g tissues in the colon and tumor after 12. h, reflecting its targeting potential to colon and tumor. Conclusion: The results clearly demonstrate that Eudragit coated calcium alginate beads bearing folic acid coupled liposome can be used as a prospective carrier for drug delivery to colon specific tumor. © 2015 Elsevier B.V..

Loading Shri Ram Institute of Technology collaborators
Loading Shri Ram Institute of Technology collaborators