Technocrats Institute of Technology

India

Technocrats Institute of Technology

India
SEARCH FILTERS
Time filter
Source Type

Irfan M.,Technocrats Institute of Technology | Verma S.,A And G Pharmaceutical, Inc. | Ram A.,A And G Pharmaceutical, Inc.
Asian Journal of Pharmaceutical and Clinical Research | Year: 2012

The goal of this study was to develop and evaluate the potential use of transfersome vesicles in the transdermal drug delivery of Ibuprofen. It was investigated by encapsulating the drug in various formulations of composed of various ratios of soya phosphatidylcholine, span 80 and tween 80, prepared by lipid film hydration by rotatary evaporation method and evaluated for particle shape, size, zeta potential, entrapment efficiency (%EE),elasticity, stability, and in vitro skin permeation. The vesicles were spherical in structure as confirmed by Scanning Electron Microscopy and TEM, the vesicle size of best formulation for Span 80 and Tween 80 was 962 nm and 2250 nm respectively, and zeta potential (negatively charged) for Span 80 and Tween 80 was found to be -16.1 and -17.5 respectively. The %EE of ibuprofen in the vesicles was 47.8±2.2 and the elasticity of both increases with increase in surfactant conc. and were found to be 34.4±1.4 and 26.5±1.6. Stability studies for Transferosome were carried out for 5 weeks at 450C. In vitro skin permeation studies were carried by human cadaver skin using franz diffusion cell, and drug release after 24 hrs and flux was found 2.5824 and 1.9672 ug/cm2/hr respectively. Fourier Transform Infrared Spectroscopy (FT-IR) and Differential Scanning Calorimetry (DSC) analysis indicated that the application of transfersomes significantly disrupted the stratum corneum lipid. It is evident from this study that transfersomes are a promising prolonged delivery system for Ibuprofen and have reasonably good stability characteristics. This research suggests that ibuprofen loaded transfersomes can be potentially used as a transdermal drug delivery system.


Phadikar A.,MCKV Institute of Engineering | Maity S.P.,Bengal Engineering and Science University | Verma B.,Technocrats Institute of Technology
Computers and Electrical Engineering | Year: 2011

This paper proposes a region based digital watermarking scheme to serve the purpose of copyright protection and integrity verification of image database using discrete cosine transform (DCT). The objective is achieved by embedding watermark into visually significant regions of the image(s) using quantization index modulation (QIM). The main contributions of this work are, (1) the use of quad tree decomposition for image segmentation to find visually significant regions, and (2) the use of image database as a single entity for watermarking, instead of watermarking on individual image, so that integrity of the database is checked. Simulation results validate the above claims. Simulation results also show that the proposed scheme is robust and secured against a wide range of attacks available in StirMark 4.0 package. © 2011 Elsevier Ltd. All rights reserved.


Patel C.,Technocrats Institute of Technology | Veena C.S.,Technocrats Institute of Technology
Proceedings on 2014 2nd International Conference on "Emerging Technology Trends in Electronics, Communication and Networking", ET2ECN 2014 | Year: 2015

Here a new design of comparator is proposed which is based half precharged CMOS dynamic logic just by introducing few more transistors as précharge, transmission transistor which not only reduces the leakage current but improves the power consumption of circuit. For simulation, designing Microwind & DSCH software with 120/70 nm technology is used. © 2014 IEEE.


Saurabh P.,Technocrats Institute of Technology | Verma B.,Technocrats Institute of Technology
Expert Systems with Applications | Year: 2016

Artificial Immune System (AIS) is inspired from Biological Immune System (BIS) and demonstrates a lot of interesting facets and intelligence that include self-learning, self adaption, self regulatory, distributed with self/non-self detection capabilities. Due to these astonishing qualities AIS are predominantly used in anomaly detection where anomalies are treated as non-self that needs to be detected. Therefore, AIS appears appropriate for development of a proactive system to identify and prevent novel and unseen anomalies. This paper presents "An Efficient Proactive Artificial Immune System based Anomaly Detection and Prevention System (EPAADPS)" which embodies immune attributes to distinguish self and non-self in quest to identify and prevent novel, unseen anomalies. Negative Selection Algorithm (NSA) is a key AIS concept and is used for anomaly detection in various publications. Despite its relative success, detector selection and thereafter anomaly detection demands a more effective algorithm. This paper put forwards concept of self-tuning of detectors and detector power in NSA with the intension to make a detector evolve and facilitate better and correct self and non-self coverage. Thereafter, agents accompanying detectors collaborate and communicate between themselves to proactively discover correct anomalies and then take appropriate preventive measures. The performance of EPAADPS is contrasted with closely related state of art RNS algorithm using real valued representation and Euclidean distance. Experimental results revels promising EPAADPS performance which very comfortably outperforms the RNS. Furthermore, these results also demonstrate that EPAADPS shows remarkable resilience and intelligence in detecting novel unseen anomalies and with preventive measures to overcome the threat perception. © 2016 Elsevier Ltd. All rights reserved.


Bhalla A.,Technocrats Institute of Technology
Proceedings of the 2nd Asia Symposium on Quality Electronic Design, ASQED 2010 | Year: 2010

For VLSI design which have large collection of objects to be constrained, clear sequence ofexecution ofconstraints is important using constraint- satisfaction method for proper execution to avoid constraint loop at algorithmic level. The objective of this paper is relaxation based constraint sequence solving technique applied to the backtrack step of backtrack search solver, with the goal of increasing the ability ofthe solver to search different parts of the search space. The experimental results are promising, and motivate the integration of relaxation based constraint sequence solving in state-of-the-art solvers. © 2010 IEEE.


Gupta V.,Technocrats Institute of Technology | Sharma A.,Technocrats Institute of Technology
Lecture Notes in Electrical Engineering | Year: 2013

In the field of digital image processing [1], noise removal is always a critical process. In this paper we proposed an enhanced method of image de-noising. The purpose of this new method is to improve the signal to noise ratio (SNR) of de-noised image and get more better image, especially when image corrupted by high noise density. We improved the median filter algorithm, and get comparatively better results than previous methods. The mathematical analysis shows that this process improve the PSNR [2](Peak signal to noise ratio) at high density noise level. It also reduces the complexity of calculation because noise detection and noise removal both processes are performing simultaneously. This method produce better image without blurring and also preserve the edge and fine details of image. © 2013 Springer.


Bhadlawala S.,JVIMS KBS MCA College Jamnagar | Chachapara K.,Technocrats Institute of Technology
NUiCONE 2015 - 5th Nirma University International Conference on Engineering | Year: 2015

Data Growth and Data complexity will increase day by day. Present day needs of data will require unstructured and more access will lead to more data backup, audit, security concerns and need of preparing reduplication. Term cloud computing has opened entire new domain of computability, reliability and efficiency for organizations in term of private cloud computing. It can now focus on providing targeted services and overcome challenges to consumers rather than considering infrastructure and resource issues. Nowadays, sharing secure data to another person without authentication and authorization it with can be more and more difficult for the off-premise cloud which leads to some key points like the security of cloud data should be considered, sharing of cloud data as per requirement should be done. This research paper is based on providing some mechanism to allow secure file sharing for off-premise cloud computing among various cloud users. This paper proposes a framework that can be followed easily to share the file using roll management concept which residing on the cloud with another cloud user. In this framework, a concept of cryptography has been used to generate the secure key that can be shared among users. Cryptography allows encryption and decryption of different normal text to some cipher text that cannot be interpreted easily. This paper proposes the secure mechanism of generating key, sharing a key and validating use of the key for given file. © 2015 IEEE.


Jain A.M.,Technocrats Institute of Technology | Tiwari N.,Technocrats Institute of Technology
ICIIECS 2015 - 2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems | Year: 2015

Now-a-day vehicle detection has been an active research field in image processing. This research area interest is increase due to high traffic problems and limited roads and space. This paper described an algorithms and important methods to handle the high traffic volume. We described some important factors which are treated as an input i.e. Road Database, Global DEM, and Images. The road data base includes maps and information of roads and global DEM provide the height information of the image object. By using this all the information we calculate the disparity map. This disparity map is used to exclude elevated object like buildings and vegetation. In this paper we use two concept i.e. Histogram of oriented Gradients (HoG) and disparity mapping. The Histogram of oriented Gradients (HoG) concept is used to classify the images. We introduced here two new concepts, 1) To treat shady areas differently to identify the object covered by shady region and 2) To detect wrong direction moving object. © 2015 IEEE.


Bajpayee D.,Technocrats Institute of Technology | Mathur J.,Technocrats Institute of Technology
ICIIECS 2015 - 2015 IEEE International Conference on Innovations in Information, Embedded and Communication Systems | Year: 2015

It is a great contribution for the automotive industry which is going towards innovation and economic growth. If we talking about some past decade the momentum of new research and the world is now at the very advanced stage of technological revolution: 'Autonomous-driving' vehicles. The term Self-driving cars, autonomous car, or the driverless cars have different name with common objective. The main focus is to keep the human being out of the vehicle control loop and to relieve them from the task of driving. The prime requisite of self-driving vehicles are sensors (for acquiring traffic information of vehicle surrounding), computers (for processing sensor information and sending warning/control signals) and actuators (responsible for lateral and longitudinal control).The basic responsibility of self-driving cars which includes lateral and longitudinal control of vehicle along with vehicle to vehicle (V2V) and vehicle to infrastructure (V2I) communication. © 2015 IEEE.


Bhardwaj R.,Technocrats Institute of Technology
Materials Science- Poland | Year: 2016

In the present paper structural and electronic properties of rare earth pnictides have been presented. The present calculation has been performed using self-consistent tight binding linear muffin tin orbital (TB-LMTO) method within the local density approximation (LDA). The studied compounds undergo a structural phase transition from NaCl-type structure to CsCl-type structure. The electronic band structure and density of states of the pnictides have been reported. The equilibrium lattice parameter a (Å), bulk modulus B (GPa), number of f-states at the Fermi level Nf (states/Ry cell) and volume collapse of AmBi and CmBi have also been reported. The calculated equilibrium structural parameters are in good agreement with the available experimental results. © 2016 Ramakant Bhardwaj, published by De Gruyter Open.

Loading Technocrats Institute of Technology collaborators
Loading Technocrats Institute of Technology collaborators