D Gayathri - Academia.edu (original) (raw)

Papers by D Gayathri

Research paper thumbnail of Secure Image Data by Using Different Encryption Techniques a Review

Research paper thumbnail of Detecting And Analysing The Quality Of Air Using Low Cost Sensors To Reduce Air Pollution In Urban Areas

2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), 2019

In developing nations, the extended station of metropolitan air pollutants is a first-degree envi... more In developing nations, the extended station of metropolitan air pollutants is a first-degree environmental question. In developing nations, the expanded stages of city air pollutants are a first-rate environmental problem. Air pollutants has emerged as a tremendous subject rely of discussion the least bit stages in India due to the improved anthropogenic sports activities. The external of this scheme is to project and exhibit a wireless system for supervise the temper of gas in WSN encompassment. The WSN concept endows formation of the smart environments associating with the citizens and arrange the cities around the world by providing a row of dandy services with aim to lengthen the property of life in the cities. This machine-driven air quality overseeing stations record the hourly, monthly or annually averaged data using the sensors. The sensors are worked to discover the events or diversity in the surrounding. Data gathered from these stations are available almost in actual time. Air Pollution may be expounded as any atmospherically state in which some substances are propitious in such concentrations that they can show off undesirable accomplishment on folks and his surroundings. Hence, it is requisite to promote tools for real-time air quality overseeing, so as to admit attribute and opportunely decisions. Aim of this project is to spotlight the technology which is worked for air quality overseeing in WSN surrounding and how forcible of this technology is and identify the essential scrutiny in this necessary region. In this system, portative sensors are gather the air quality data early, which is transmitted through a burn spirit wide area network. All air quality data are produced and analyzed in the WSN base situation. The realized air quality overseeing system, contain both hardware and software, is improved and unfolded satisfyingly in urban environments.

Research paper thumbnail of OF SPEAKER IDENTITY IN HMM BASED SPEECH SYNTHESIZERS Speech Signal Processing

The purpose of speech synthesizer is to convert the input text to speech. Most common synthesizer... more The purpose of speech synthesizer is to convert the input text to speech. Most common synthesizers are USS and HTS synthesizer. The speech synthesized by the HMM based system is found to be more intelligible than that synthesized by the USS system due to the elimination of sonic glitches and also the memory requirement of HMM based system is less around 5MB as against 500MB for an USS system. Hence HMM based synthesizer is efficient and economical. But in HMM synthesizer, buzziness is detected which prevents the preservation of speaker’s identity and decreases the intelligibility and pleasantness. The speaker’s identity preservation depends on two parameters namely speech rate and number of states used for modelling. When the input speech rate is slow, the generated speech seems to be noisy as the number of formants per window is not sufficient. Hence, the importance of choosing an appropriate speech rate in text to speech synthesis systems is analyzed. Two 3-hour speech corpora – o...

Research paper thumbnail of Pltrust AODV: Physical logical factor estimated trust embedded AODV for optimised routing in Manets

2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 2017

A Mobile Ad hoc Network is a collection of mobile nodes forming network of their own. They have d... more A Mobile Ad hoc Network is a collection of mobile nodes forming network of their own. They have dynamic topology implying their mobility and no central authority implying their dual role as routers as well apart of transmitting and receiving the packets. It is implicit that they pave way for the malicious attacks leading havoc in the network. It is important to have secure transmission in order to increase the reliability in MANETs. Trust is incorporated to achieve strengthened security in MANETs. The proposed work encompasses pertinent aspects to evaluate Trust which comprise of energy, time factor, Packets ratio and signal strength in Ad hoc On Demand Distance Vector Protocol for defending the malicious node's attack and the results are compared with Trust based Optimal link state routing protocol. Two main types of attacks namely Black Hole Attack and Jelly Fish Attack are mitigated in this approach. The analysis carried exhibits transcending performance of the MANETs using the proposed approach compared to OLSR based approach. In specific packet delivery ratio, throughput have got significant improvement while energy consumed and average end to end delay having decreased delivering the effectiveness of the proposed approach.

Research paper thumbnail of Smart Home Automation Based on IOT and Android Technology

Accessibility of rapid portable systems like Gand Long Term Evolution (LTE) combined with less ex... more Accessibility of rapid portable systems like Gand Long Term Evolution (LTE) combined with less expensive and open advanced cells, versatile industry has seen a gigantic development as far as giving different admin istrations and applications at the fingertips to the natives. Internet of Things (IOT) is one of the promising innovations which can be utilized for interfacing, controlling and overseeing insightful articles which are associated with Internet through an IP address. Applications extending from keen administration, savvy training, brilliant horticulture, shrewd human services, savvy homes and so forth can utilize IOT to viable conveyance 0f administrations without manual intercession in a more powerfu l way. This paper examines about IOT and how it can be utilized for acknowledging brilliant home mechanizat ion utilizing a small scale controller based Arduino board and Android portable application. In this paper, two models to be specific home mechanizat ion utilizing Bluet...

Research paper thumbnail of DDOS Attacks-A Stealthy Way of Implementation and Detection

Cloud Computing is a new paradigm provides various host service [paas, saas, Iaas over the intern... more Cloud Computing is a new paradigm provides various host service [paas, saas, Iaas over the internet. According to a self-service,on-demand and pay as you use business model,the customers will obtain the cloud resources and services.It is a virtual shared service.Cloud Computing has three basic abstraction layers System layer(Virtual Machine abstraction of a server),Platform layer(A virtualized operating system, database and webserver of a server and Application layer(It includes Web Applications).Denial of Service attack is an attempt to make a machine or network resource unavailable to the intended user. In DOS a user or organization is deprived of the services of a resource they would normally expect to have.A Successful DOS attack is a highly noticeable event impacting the entire online user base.DOS attack is found by First Mathematical Metrical Method (Rate Controlling,Timing Window,Worst Case and Pattern Matching)DOS attack not only affect the Quality of the service and also a...

Research paper thumbnail of Ballot Box with Digital Image Processing Security

International journal of engineering research and technology, 2018

The problem of voting is still critical in terms of safety and security hence this project aims t... more The problem of voting is still critical in terms of safety and security hence this project aims to develop a secure Electronic voting machine using Finger print identification and iris identification to provide a high performance and high security to the voting system .The proposed electronic voting system allows the voters to scan their fingerprint and iris which is then compared with the AADHAR card database. After the process of authentication the voters can cast their vote and then automatically the electronic ballot is reset for others to vote. Also for the blind people plug in components are present through which the recorded voice of the symbol to vote can be listened and voting is done by the voice message send through the plug in component. Keywords—AADHAR card dtabase iris Identification,Authenticaton,Electronic Voting Machine.

Research paper thumbnail of PROTECTIVE EFFECTS OF A - CRYSTALLIN ON B - AMYLOID (Aβ) INDUCED TOXICITY Original Article

Objectives: To investigate the protective role of α-crystallin against β-amyloid aggregation. Met... more Objectives: To investigate the protective role of α-crystallin against β-amyloid aggregation. Methods: In vitro spectroscopic methods and cell culture studies were done to validate our objective. Results:The molecular basis of alzhemiers disease has been proposed to be accumulation and aggregation of β-amyloid (Aβ). However, prevention of β-amyloid aggregation is still a promising means to reduce its neurotoxicity. In this work, we show that α-crystallin was able to inhibit cellular toxicity of Aβ on astrocytes and lymphocytes. Theα−crystallin (αA and αB): the two vertebrate eye lens proteins that are related to the small heat shock protein family, was able to reverse the oxidative stress induced by Aβ 1-42. Treatment of α-crystallin enhances the activity of proteasome and it also induces the expression of Hsp70 which is known to inhibit the intramolecular misfolding. We also demonstrate that Aβ 1-42 Conclusions: Research findings in this study provide the basis for the development ...

Research paper thumbnail of Acknowledgement based Intrusion-Detection System for MANETS

In the next generation of wireless communication systems, there will be a need for the quick depl... more In the next generation of wireless communication systems, there will be a need for the quick deployment of independent mobile users. notable examples include establishing survivable, efficient, flush communication for emergency/ recover operations, defeat relief efforts, and Army networks. Such network scenarios cannot count on centralized and organized connectivity, and can be make up as applications of Mobile Ad Hoc Networks. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. The self configuring ability of nodes in MANET made it popular among critical mission applications like ...

Research paper thumbnail of Lactobacillus sp. as probiotics for human health with special emphasis on colorectal cancer

Indian Journal of Science and Technology, 2011

Popular article "Probiotics to treat colo-rectal cancer" Gayathri et al. Indian Society for Educ... more Popular article "Probiotics to treat colo-rectal cancer" Gayathri et al. Indian Society for Education and Environment (iSee) http://www.indjst.org Indian J.Sci.Technol.

Research paper thumbnail of Design and Implementation of PI Controller in a Two Tank Interacting Process using Lab View Software

International Journal of Mechanical and Production Engineering Research and Development, 2020

Research paper thumbnail of Anti-inflammatory activity of Syzygium aromaticum (L.) Merrill Perry oil in carrageenan-induced paw edema in female rats

Annals of Phytomedicine: An International Journal, 2019

The present study was planned to evaluate in vivo anti-inflammatory activity of Syzygium aromatic... more The present study was planned to evaluate in vivo anti-inflammatory activity of Syzygium aromaticum (L.) Merrill & Perry oil (clove oil), following single dose oral administration @ 100, 250 and 500 mg/kg in female wistar rats by using carrageenan-induced paw edema model. Twenty five rats were divided randomly into 5 groups and each group consists of five female rats. All rats were injected subcutaneously with 0.1 ml of 10% w/v carrageenan suspension subcutaneously as a local acute edema inducer after 30 min subsequent to oral administration of clove oil. Rats of control groups were kept untreated. Rats of standard control group were treated orally with indomethacin @ 10 mg/ kg body weight as a reference standard drug. Rats of other three treatment groups were treated with clove oil @ 100, 250 and 500 mg/kg body weight, respectively. Edema was expressed as the increase in paw volume in ml and measured up to the tibiotarsal articulation. Volume of edematous paw was measured at 0 h (before treatment), 1, 2, 3, 4, 6 and 24 h after treatments. Increase in paw thickness was measured by using digital plethysmometer and per cent inhibition was calculated. The anti-inflammatory effect of clove oil was highest at 3 h (35.46 %) at the dose of 500 mg/kg. The anti-inflammatory effect of standard drug indomethacin (42.99 %) was higher than clove oil at 3 h. Clove oil at 3 h all doses gave higher anti-inflammatory effect. Clove oil showed dose dependent anti-inflammatory activity in female wistar rats.

Research paper thumbnail of An Overview of Biometric Technologies and Its Benefits

International Journal of Computer Sciences and Engineering, 2019

Biometric technology is becoming a standard security feature in large businesses. In the modern n... more Biometric technology is becoming a standard security feature in large businesses. In the modern networked society, there is an ever growing need to determine or verify the identity of a person. Where authorization is necessary for any action, be it collecting a child from child-care facilities or boarding an aircraft, authorization is almost always vested in a single individual or a class of individuals. There are a number of existing methods, used by society or automated systems to verify identity. Traditional existing methods can be grouped into three classes: (i) possessions; (ii) knowledge and (iii) biometrics. Biometrics is the science of identifying or verifying the identity of a person based on physiological or behavioral characteristics. It provides additional layer of security via its strong authentication process. This innovation allows compromised premises to quickly identify intruders. As the technology world is evolving there are more and more trends and demand in the field of identity management. All these trends and demands are generated from one basic need – the need for a more accurate and secure way of identifying an individual. The intelligent ones are already learning to adopt with these trends in order to gain competitive advantage. This Paper brings about the recent trends in Biometric Technologies and its applications. Keywords— Wi-Fi, SSO, Cryptography, Cloud-Biometrics etc.,

Research paper thumbnail of Multipurpose Card Using Rfid Technology

International Journal Of Engineering And Computer Science, 2016

Most often in our daily life we have to carry lot of cards such as credit cards, debit cards and ... more Most often in our daily life we have to carry lot of cards such as credit cards, debit cards and some other special cards for toll system ERP, parking and personal identification purpose. Currently smart card implementations can be seen around the world but they are not unified i.e. each developers uses different programming standards and data structures. The smart card will provide service to the user only within a university campus or an organization. In order to make available such multiple application access using a single card to every individual person we have planned to use RFID technology, which is cost effective. As RFID technology is used in the proposed concept, the programming standards and data structures will be unified. Unlike smart card, the RFID card can be used by every individual person to access different applications. Thus, a person needs not to carry number of cards; he can just carry a single card for different purpose.

Research paper thumbnail of Rapid in Vitro Propagation of Bixa orellana L: An Important Dye Yielding Tree

Research paper thumbnail of Molecular Characterization of 2-Chlorobiphenyl Degrading Stenotrophomonas maltophilia GS-103

Bulletin of Environmental Contamination and Toxicology, 2013

The catabolic potential of transformer oil contaminated soil bacteria in aerobic degradation of p... more The catabolic potential of transformer oil contaminated soil bacteria in aerobic degradation of polychlorinated biphenyls (PCB) were assessed. Transformer oil contaminated soil sample was subjected to microcosm enrichment experiments (PAS medium/biphenyl as sole carbon source). PCB-degrading activity of the enrichment cultures in PAS medium with the addition of 2-chlorobiphenyl were analysed by GC-MS indicated that, although the isolates differed in PCB-degrading capabilities, all of the enrichment cultures expressed activity toward at least some of the lower chlorinated congeners. Biphenyl-utilizing bacteria isolated from the most active PCB-degrading mixed cultures showed little taxonomic diversity and identified as Stenotrophomonas maltophilia GS-103.

Research paper thumbnail of Crystal structure of 3-isopropylmalate dehydrogenase in complex with NAD+ and a designed inhibitor

Bioorganic & Medicinal Chemistry, 2009

Isopropylmalate dehydrogenase (IPMDH) is the third enzyme specific to leucine biosynthesis in mic... more Isopropylmalate dehydrogenase (IPMDH) is the third enzyme specific to leucine biosynthesis in microorganisms and plants, and catalyzes the oxidative decarboxylation of (2R,3S)-3-isopropylmalate to a-keto isocaproate using NAD + as an oxidizing agent. In this study, a thia-analogue of the substrate was designed and synthesized as an inhibitor for IPMDH. The analogue showed strong competitive inhibitory activity with K i = 62 nM toward IPMDH derived from Thermus thermophilus. Moreover, the crystal structure of T. thermophilus IPMDH in a ternary complex with NAD + and the inhibitor has been determined at 2.8 Å resolution. The inhibitor exists as a decarboxylated product with an enol/enolate form in the active site. The product interacts with Arg 94, Asn 102, Ser 259, Glu 270, and a water molecule hydrogen-bonding with Arg 132. All interactions between the product and the enzyme were observed in the position associated with keto-enol tautomerization. This result implies that the tautomerization step of the thia-analogue during the IPMDH reaction is involved in the inhibition.

Research paper thumbnail of 8-Formyl-4-methyl-2-oxo-2 H -chromen-7-yl 4-methylbenzenesulfonate

Acta Crystallographica Section E Structure Reports Online, 2011

In the title compound, C 18 H 14 O 6 S, the coumarin ring system is nearly planar, with a maximum... more In the title compound, C 18 H 14 O 6 S, the coumarin ring system is nearly planar, with a maximum out-of-plane deviation of 0.032 (2) Å. The dihedral angle between the benzene ring and the coumarin ring system is 32.41 (8). The crystal packing is stabilized by intermolecular C-HÁ Á ÁO interactions, generating C(8), C(10) and C(11) chains and an R 2 2 (10) ring. The formyl group is disordered over two sets of sites, with occupancies of 0.548 (5) and 0.452 (5).

Research paper thumbnail of Storage Practices of Pulses in Selected Households

International Journal of Scientific Research, 2012

Pulses are biologically rich source of protein and essential minerals. Pulses play a key role in ... more Pulses are biologically rich source of protein and essential minerals. Pulses play a key role in improving and sustaining soil productivity on account of biological nitrogen fixation and addition of huge amount of organic matter. The crisis of pulses is gradually firing up its grip due to growth of population and introduction of protein based food industries. The total food grain loss accounts to 9.33 per cent on total food grains production. About 10 per cent of this stored food grain is lost every year due to attack by insects, rodents, moisture, birds, micro-organisms etc. Hence, conducting research in the field of grain storage especially in the sphere of pulses storage is the need of the hour. An attempt was made in this direction to find out the existing storage practices and problems faced during storage of pulses in Anamali and Pollachi block.

Research paper thumbnail of Secure Image Data by Using Different Encryption Techniques a Review

Research paper thumbnail of Detecting And Analysing The Quality Of Air Using Low Cost Sensors To Reduce Air Pollution In Urban Areas

2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN), 2019

In developing nations, the extended station of metropolitan air pollutants is a first-degree envi... more In developing nations, the extended station of metropolitan air pollutants is a first-degree environmental question. In developing nations, the expanded stages of city air pollutants are a first-rate environmental problem. Air pollutants has emerged as a tremendous subject rely of discussion the least bit stages in India due to the improved anthropogenic sports activities. The external of this scheme is to project and exhibit a wireless system for supervise the temper of gas in WSN encompassment. The WSN concept endows formation of the smart environments associating with the citizens and arrange the cities around the world by providing a row of dandy services with aim to lengthen the property of life in the cities. This machine-driven air quality overseeing stations record the hourly, monthly or annually averaged data using the sensors. The sensors are worked to discover the events or diversity in the surrounding. Data gathered from these stations are available almost in actual time. Air Pollution may be expounded as any atmospherically state in which some substances are propitious in such concentrations that they can show off undesirable accomplishment on folks and his surroundings. Hence, it is requisite to promote tools for real-time air quality overseeing, so as to admit attribute and opportunely decisions. Aim of this project is to spotlight the technology which is worked for air quality overseeing in WSN surrounding and how forcible of this technology is and identify the essential scrutiny in this necessary region. In this system, portative sensors are gather the air quality data early, which is transmitted through a burn spirit wide area network. All air quality data are produced and analyzed in the WSN base situation. The realized air quality overseeing system, contain both hardware and software, is improved and unfolded satisfyingly in urban environments.

Research paper thumbnail of OF SPEAKER IDENTITY IN HMM BASED SPEECH SYNTHESIZERS Speech Signal Processing

The purpose of speech synthesizer is to convert the input text to speech. Most common synthesizer... more The purpose of speech synthesizer is to convert the input text to speech. Most common synthesizers are USS and HTS synthesizer. The speech synthesized by the HMM based system is found to be more intelligible than that synthesized by the USS system due to the elimination of sonic glitches and also the memory requirement of HMM based system is less around 5MB as against 500MB for an USS system. Hence HMM based synthesizer is efficient and economical. But in HMM synthesizer, buzziness is detected which prevents the preservation of speaker’s identity and decreases the intelligibility and pleasantness. The speaker’s identity preservation depends on two parameters namely speech rate and number of states used for modelling. When the input speech rate is slow, the generated speech seems to be noisy as the number of formants per window is not sufficient. Hence, the importance of choosing an appropriate speech rate in text to speech synthesis systems is analyzed. Two 3-hour speech corpora – o...

Research paper thumbnail of Pltrust AODV: Physical logical factor estimated trust embedded AODV for optimised routing in Manets

2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), 2017

A Mobile Ad hoc Network is a collection of mobile nodes forming network of their own. They have d... more A Mobile Ad hoc Network is a collection of mobile nodes forming network of their own. They have dynamic topology implying their mobility and no central authority implying their dual role as routers as well apart of transmitting and receiving the packets. It is implicit that they pave way for the malicious attacks leading havoc in the network. It is important to have secure transmission in order to increase the reliability in MANETs. Trust is incorporated to achieve strengthened security in MANETs. The proposed work encompasses pertinent aspects to evaluate Trust which comprise of energy, time factor, Packets ratio and signal strength in Ad hoc On Demand Distance Vector Protocol for defending the malicious node's attack and the results are compared with Trust based Optimal link state routing protocol. Two main types of attacks namely Black Hole Attack and Jelly Fish Attack are mitigated in this approach. The analysis carried exhibits transcending performance of the MANETs using the proposed approach compared to OLSR based approach. In specific packet delivery ratio, throughput have got significant improvement while energy consumed and average end to end delay having decreased delivering the effectiveness of the proposed approach.

Research paper thumbnail of Smart Home Automation Based on IOT and Android Technology

Accessibility of rapid portable systems like Gand Long Term Evolution (LTE) combined with less ex... more Accessibility of rapid portable systems like Gand Long Term Evolution (LTE) combined with less expensive and open advanced cells, versatile industry has seen a gigantic development as far as giving different admin istrations and applications at the fingertips to the natives. Internet of Things (IOT) is one of the promising innovations which can be utilized for interfacing, controlling and overseeing insightful articles which are associated with Internet through an IP address. Applications extending from keen administration, savvy training, brilliant horticulture, shrewd human services, savvy homes and so forth can utilize IOT to viable conveyance 0f administrations without manual intercession in a more powerfu l way. This paper examines about IOT and how it can be utilized for acknowledging brilliant home mechanizat ion utilizing a small scale controller based Arduino board and Android portable application. In this paper, two models to be specific home mechanizat ion utilizing Bluet...

Research paper thumbnail of DDOS Attacks-A Stealthy Way of Implementation and Detection

Cloud Computing is a new paradigm provides various host service [paas, saas, Iaas over the intern... more Cloud Computing is a new paradigm provides various host service [paas, saas, Iaas over the internet. According to a self-service,on-demand and pay as you use business model,the customers will obtain the cloud resources and services.It is a virtual shared service.Cloud Computing has three basic abstraction layers System layer(Virtual Machine abstraction of a server),Platform layer(A virtualized operating system, database and webserver of a server and Application layer(It includes Web Applications).Denial of Service attack is an attempt to make a machine or network resource unavailable to the intended user. In DOS a user or organization is deprived of the services of a resource they would normally expect to have.A Successful DOS attack is a highly noticeable event impacting the entire online user base.DOS attack is found by First Mathematical Metrical Method (Rate Controlling,Timing Window,Worst Case and Pattern Matching)DOS attack not only affect the Quality of the service and also a...

Research paper thumbnail of Ballot Box with Digital Image Processing Security

International journal of engineering research and technology, 2018

The problem of voting is still critical in terms of safety and security hence this project aims t... more The problem of voting is still critical in terms of safety and security hence this project aims to develop a secure Electronic voting machine using Finger print identification and iris identification to provide a high performance and high security to the voting system .The proposed electronic voting system allows the voters to scan their fingerprint and iris which is then compared with the AADHAR card database. After the process of authentication the voters can cast their vote and then automatically the electronic ballot is reset for others to vote. Also for the blind people plug in components are present through which the recorded voice of the symbol to vote can be listened and voting is done by the voice message send through the plug in component. Keywords—AADHAR card dtabase iris Identification,Authenticaton,Electronic Voting Machine.

Research paper thumbnail of PROTECTIVE EFFECTS OF A - CRYSTALLIN ON B - AMYLOID (Aβ) INDUCED TOXICITY Original Article

Objectives: To investigate the protective role of α-crystallin against β-amyloid aggregation. Met... more Objectives: To investigate the protective role of α-crystallin against β-amyloid aggregation. Methods: In vitro spectroscopic methods and cell culture studies were done to validate our objective. Results:The molecular basis of alzhemiers disease has been proposed to be accumulation and aggregation of β-amyloid (Aβ). However, prevention of β-amyloid aggregation is still a promising means to reduce its neurotoxicity. In this work, we show that α-crystallin was able to inhibit cellular toxicity of Aβ on astrocytes and lymphocytes. Theα−crystallin (αA and αB): the two vertebrate eye lens proteins that are related to the small heat shock protein family, was able to reverse the oxidative stress induced by Aβ 1-42. Treatment of α-crystallin enhances the activity of proteasome and it also induces the expression of Hsp70 which is known to inhibit the intramolecular misfolding. We also demonstrate that Aβ 1-42 Conclusions: Research findings in this study provide the basis for the development ...

Research paper thumbnail of Acknowledgement based Intrusion-Detection System for MANETS

In the next generation of wireless communication systems, there will be a need for the quick depl... more In the next generation of wireless communication systems, there will be a need for the quick deployment of independent mobile users. notable examples include establishing survivable, efficient, flush communication for emergency/ recover operations, defeat relief efforts, and Army networks. Such network scenarios cannot count on centralized and organized connectivity, and can be make up as applications of Mobile Ad Hoc Networks. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. IDS come in a variety of “flavors” and approach the goal of detecting suspicious traffic in different ways. The self configuring ability of nodes in MANET made it popular among critical mission applications like ...

Research paper thumbnail of Lactobacillus sp. as probiotics for human health with special emphasis on colorectal cancer

Indian Journal of Science and Technology, 2011

Popular article "Probiotics to treat colo-rectal cancer" Gayathri et al. Indian Society for Educ... more Popular article "Probiotics to treat colo-rectal cancer" Gayathri et al. Indian Society for Education and Environment (iSee) http://www.indjst.org Indian J.Sci.Technol.

Research paper thumbnail of Design and Implementation of PI Controller in a Two Tank Interacting Process using Lab View Software

International Journal of Mechanical and Production Engineering Research and Development, 2020

Research paper thumbnail of Anti-inflammatory activity of Syzygium aromaticum (L.) Merrill Perry oil in carrageenan-induced paw edema in female rats

Annals of Phytomedicine: An International Journal, 2019

The present study was planned to evaluate in vivo anti-inflammatory activity of Syzygium aromatic... more The present study was planned to evaluate in vivo anti-inflammatory activity of Syzygium aromaticum (L.) Merrill & Perry oil (clove oil), following single dose oral administration @ 100, 250 and 500 mg/kg in female wistar rats by using carrageenan-induced paw edema model. Twenty five rats were divided randomly into 5 groups and each group consists of five female rats. All rats were injected subcutaneously with 0.1 ml of 10% w/v carrageenan suspension subcutaneously as a local acute edema inducer after 30 min subsequent to oral administration of clove oil. Rats of control groups were kept untreated. Rats of standard control group were treated orally with indomethacin @ 10 mg/ kg body weight as a reference standard drug. Rats of other three treatment groups were treated with clove oil @ 100, 250 and 500 mg/kg body weight, respectively. Edema was expressed as the increase in paw volume in ml and measured up to the tibiotarsal articulation. Volume of edematous paw was measured at 0 h (before treatment), 1, 2, 3, 4, 6 and 24 h after treatments. Increase in paw thickness was measured by using digital plethysmometer and per cent inhibition was calculated. The anti-inflammatory effect of clove oil was highest at 3 h (35.46 %) at the dose of 500 mg/kg. The anti-inflammatory effect of standard drug indomethacin (42.99 %) was higher than clove oil at 3 h. Clove oil at 3 h all doses gave higher anti-inflammatory effect. Clove oil showed dose dependent anti-inflammatory activity in female wistar rats.

Research paper thumbnail of An Overview of Biometric Technologies and Its Benefits

International Journal of Computer Sciences and Engineering, 2019

Biometric technology is becoming a standard security feature in large businesses. In the modern n... more Biometric technology is becoming a standard security feature in large businesses. In the modern networked society, there is an ever growing need to determine or verify the identity of a person. Where authorization is necessary for any action, be it collecting a child from child-care facilities or boarding an aircraft, authorization is almost always vested in a single individual or a class of individuals. There are a number of existing methods, used by society or automated systems to verify identity. Traditional existing methods can be grouped into three classes: (i) possessions; (ii) knowledge and (iii) biometrics. Biometrics is the science of identifying or verifying the identity of a person based on physiological or behavioral characteristics. It provides additional layer of security via its strong authentication process. This innovation allows compromised premises to quickly identify intruders. As the technology world is evolving there are more and more trends and demand in the field of identity management. All these trends and demands are generated from one basic need – the need for a more accurate and secure way of identifying an individual. The intelligent ones are already learning to adopt with these trends in order to gain competitive advantage. This Paper brings about the recent trends in Biometric Technologies and its applications. Keywords— Wi-Fi, SSO, Cryptography, Cloud-Biometrics etc.,

Research paper thumbnail of Multipurpose Card Using Rfid Technology

International Journal Of Engineering And Computer Science, 2016

Most often in our daily life we have to carry lot of cards such as credit cards, debit cards and ... more Most often in our daily life we have to carry lot of cards such as credit cards, debit cards and some other special cards for toll system ERP, parking and personal identification purpose. Currently smart card implementations can be seen around the world but they are not unified i.e. each developers uses different programming standards and data structures. The smart card will provide service to the user only within a university campus or an organization. In order to make available such multiple application access using a single card to every individual person we have planned to use RFID technology, which is cost effective. As RFID technology is used in the proposed concept, the programming standards and data structures will be unified. Unlike smart card, the RFID card can be used by every individual person to access different applications. Thus, a person needs not to carry number of cards; he can just carry a single card for different purpose.

Research paper thumbnail of Rapid in Vitro Propagation of Bixa orellana L: An Important Dye Yielding Tree

Research paper thumbnail of Molecular Characterization of 2-Chlorobiphenyl Degrading Stenotrophomonas maltophilia GS-103

Bulletin of Environmental Contamination and Toxicology, 2013

The catabolic potential of transformer oil contaminated soil bacteria in aerobic degradation of p... more The catabolic potential of transformer oil contaminated soil bacteria in aerobic degradation of polychlorinated biphenyls (PCB) were assessed. Transformer oil contaminated soil sample was subjected to microcosm enrichment experiments (PAS medium/biphenyl as sole carbon source). PCB-degrading activity of the enrichment cultures in PAS medium with the addition of 2-chlorobiphenyl were analysed by GC-MS indicated that, although the isolates differed in PCB-degrading capabilities, all of the enrichment cultures expressed activity toward at least some of the lower chlorinated congeners. Biphenyl-utilizing bacteria isolated from the most active PCB-degrading mixed cultures showed little taxonomic diversity and identified as Stenotrophomonas maltophilia GS-103.

Research paper thumbnail of Crystal structure of 3-isopropylmalate dehydrogenase in complex with NAD+ and a designed inhibitor

Bioorganic & Medicinal Chemistry, 2009

Isopropylmalate dehydrogenase (IPMDH) is the third enzyme specific to leucine biosynthesis in mic... more Isopropylmalate dehydrogenase (IPMDH) is the third enzyme specific to leucine biosynthesis in microorganisms and plants, and catalyzes the oxidative decarboxylation of (2R,3S)-3-isopropylmalate to a-keto isocaproate using NAD + as an oxidizing agent. In this study, a thia-analogue of the substrate was designed and synthesized as an inhibitor for IPMDH. The analogue showed strong competitive inhibitory activity with K i = 62 nM toward IPMDH derived from Thermus thermophilus. Moreover, the crystal structure of T. thermophilus IPMDH in a ternary complex with NAD + and the inhibitor has been determined at 2.8 Å resolution. The inhibitor exists as a decarboxylated product with an enol/enolate form in the active site. The product interacts with Arg 94, Asn 102, Ser 259, Glu 270, and a water molecule hydrogen-bonding with Arg 132. All interactions between the product and the enzyme were observed in the position associated with keto-enol tautomerization. This result implies that the tautomerization step of the thia-analogue during the IPMDH reaction is involved in the inhibition.

Research paper thumbnail of 8-Formyl-4-methyl-2-oxo-2 H -chromen-7-yl 4-methylbenzenesulfonate

Acta Crystallographica Section E Structure Reports Online, 2011

In the title compound, C 18 H 14 O 6 S, the coumarin ring system is nearly planar, with a maximum... more In the title compound, C 18 H 14 O 6 S, the coumarin ring system is nearly planar, with a maximum out-of-plane deviation of 0.032 (2) Å. The dihedral angle between the benzene ring and the coumarin ring system is 32.41 (8). The crystal packing is stabilized by intermolecular C-HÁ Á ÁO interactions, generating C(8), C(10) and C(11) chains and an R 2 2 (10) ring. The formyl group is disordered over two sets of sites, with occupancies of 0.548 (5) and 0.452 (5).

Research paper thumbnail of Storage Practices of Pulses in Selected Households

International Journal of Scientific Research, 2012

Pulses are biologically rich source of protein and essential minerals. Pulses play a key role in ... more Pulses are biologically rich source of protein and essential minerals. Pulses play a key role in improving and sustaining soil productivity on account of biological nitrogen fixation and addition of huge amount of organic matter. The crisis of pulses is gradually firing up its grip due to growth of population and introduction of protein based food industries. The total food grain loss accounts to 9.33 per cent on total food grains production. About 10 per cent of this stored food grain is lost every year due to attack by insects, rodents, moisture, birds, micro-organisms etc. Hence, conducting research in the field of grain storage especially in the sphere of pulses storage is the need of the hour. An attempt was made in this direction to find out the existing storage practices and problems faced during storage of pulses in Anamali and Pollachi block.