Entity

Time filter

Source Type


Ganeshpurkar A.,Shri Ram Institute of Technology | Rai G.,Guru Ramdas Khalsa Institute of Science and Technology
Indian Journal of Pharmacology | Year: 2013

Background: Edible mushrooms have been used as flavorful foods and as health nutritional supplements for several centuries. A number of bioactive molecules have been identified in numerous mushroom species Objective: To evaluate the analgesic and anti-inflammatory potential of Oyster Mushroom Pleurotus florida using various experimental models in Wistar rats. Materials and Methods: Acute toxicity studies were performed whereby dose of 250 mg/kg and 500 mg/kg was selected for present study, Analgesic activity was determined using hot plate method, tail flick method, acetic acid induced writhing and formalin induced pain in rats, while carrageenan was used to induce inflammation and anti-inflammatory studies were performed. Results: HEE showed significant (P < 0.01) analgesic and anti-inflammatory response against all experimental models. Conclusion: These studies conclude that Pleurotus florida possesses analgesic and anti-inflammatory potential which might be due to presence of myochemicals like flavonoids, phenolics and polysaccharides. Source


Sharma S.,Gyan Ganga Institute of Technology and Sciences | Mishra N.K.,Shri Ram Institute of Technology
Communications in Computer and Information Science | Year: 2011

The invention of public-key cryptography was of central importance to the field of cryptography and provided answers to many key management problems for large scale networks. For all its benefits, however, public-key cryptography did not provide a comprehensive solution to the key management problem. Indeed, the possibilities brought forth by public-key cryptography heightened the need for sophisticated key management systems to answer questions such as the following: "How can I easily encrypt a file once for a number of different people using public-key cryptography?" "If I lose my keys, how can I decrypt all of my files that were encrypted with those keys?" "How do I know that I really have Alice's public key and not the public key of someone pretending to be Alice?" "How can I know that a public key is still trustworthy?" The paper discusses public key cryptography and its use in applications such as Key Agreement, Data Encryption and Digital Signature. The paper discusses some public key algorithms such as DH, RSA, and DSA and also gives working explanations of these algorithms. © 2011 Springer-Verlag. Source


Dubey V.,Shri Ram Institute of Technology | Sairam R.,Shri Ram Institute of Technology
International Conference on Advanced Computing and Communication Technologies, ACCT | Year: 2014

This paper presents a design of a 4-bit arithmetic logic unit (ALU) by taking vantage of the concept of gate diffusion input (GDI) technique. ALU is the most crucial and core component of central processing unit as well as of numbers of embedded system and microprocessors. In this, ALU consists of 4x1 multiplexer, 2x1 multiplexer and full adder designed to implements logic operations, such as AND, OR, etc. and arithmetic operations, as ADD and SUBTRACT. GDI cells are used in the design of multiplexers and full adder which are then associated to realize ALU. The simulation is carried out Tanner EDA 13.0 simulator using TSMC BSIM 250nm technologies and compared with previous designs realized with Pass transistor logic and CMOS logic. The simulation shows that the design is more efficient with less power consumption, less surface area and is faster as compared to pass transistor and CMOS techniques. © 2014 IEEE. Source


Choubey S.D.,Shri Ram Institute of Technology | Namdeo M.K.,Shri Ram Institute of Technology
Proceedings of the 2015 International Conference on Green Computing and Internet of Things, ICGCIoT 2015 | Year: 2015

Cloud computing is a rapidly growing model of computation. It is the delivery of computing services by shared resources, software and information over the network (Internet or Intranet). It allows user to store large amount of data in cloud storage and use as when required from any part of the world by networks. Cloud computing is network based technology since security issues like privacy, data security, confidentiality etc. are encountered. It has a number of users, who are using cloud services like social network, email, file-sharing and other which are increasing the data load in cloud storage regularly. It is also increasing the risk of data vulnerability. Therefore, the data security must be provided in cloud computing models. There are some solutions proposed, to resolve these issues, based on encryption techniques. The main contribution of this paper is to perform a study of different solutions to provide data security and privacy in existing cloud computing scenario. © 2015 IEEE. Source


Kulkarni G.,Shri Ram Institute of Technology | Patel B.,Shri Ram Institute of Technology | Laxkar P.,Institute of Management Sciences
IET Conference Publications | Year: 2013

Mobile Adhoc NETwork (MANET) is a wireless network where nodes communicate through other nodes without the aid of a base station. Security is a major challenge in MANET as the packets are prone vulnerability and eavesdropping in wireless environment. Generally MAC layer provides the security in such wireless network through encryption and authentication and the protocol is called WEP. Many authentication and encryption techniques are proposed to increase the security of the MANET. But stronger Security leads to more energy loss as mobiles have less energy and limited processing capability. In this work a Cross layer timestamp based network security technique is developed. The technique reduces the encryption packet overflow which is due to PKE or public key exchange, and derives the public key directly from the neighbor's table which is transmitted using routing information exchange. The simulation is performed with omnet++ simulator. Performance results demonstrate that the energy overhead due to encryption or performance compromise are very low in the proposed system. Further as the protocol is embedded in the network layer it is easily adoptable to any existing architecture without modifying the MAC or Physical layer standard or protocol. Source

Discover hidden collaborations