Dr.Ratnesh dubey - Academia.edu (original) (raw)
Uploads
Papers by Dr.Ratnesh dubey
AYUSHDHARA
Gridhrasi is a Rujapradhana Nanatmaja Vata Vyadhi, intervening with the functional ability of low... more Gridhrasi is a Rujapradhana Nanatmaja Vata Vyadhi, intervening with the functional ability of low back & lower limbs. Low back pain is the major cause of morbidity throughout the world affecting mainly the young adults. Life time incidence of low back pain is said to be 50-70% with the incidence of Sciatica more than 40%. Among various Ayurvedic treatments of Gridhrasi; Basti is a unique procedure which eliminates the aggravated Doshas from the body as such it was described Ardhachikitsa of all treatment. In present study effort is made to compare the effect of Arohana Krama and Sadharana Krama Matra Basti with Vajigandhadi Taila in the management of Gridhrasi. Minimum 40 patients who fulfilled the inclusion criteria, randomly distributed into 2 groups of 20 patients each. When both the groups were compared clinically for Ruk, Toda, Stamba, Spandana & SLR test, Both the groups show statistically significant effect with p <0.001 as Gridhrasi Chikitsa but Group A proved to be bette...
Today a large amount of data is generated in each area. Spatial data is the importance of data wh... more Today a large amount of data is generated in each area. Spatial data is the importance of data where the usage, its access, storage is required in efficient manner. P2P system, communication makes use of these data with their efficient search and storage scheme. Security in access is a major concept where the requirement is to process, storage of data in secure format is required. In this paper our investigation in previous BestPeer++ Approach for large spatial data access with security parameter is monitored. A further extension with parallel approach and HECC (Hyper elliptic curve cryptography) security approach is taken in this paper which is compared with existing bestpeer++ approach over large dataset query system. It is observed that the proposed work outperform better than the existing algorithm in terms of execution time and security concern over the dataset TCP-H.
Load balancing in the cloud computing environment has an important impact on the performance. Goo... more Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. Load balancing with cloud computing provides a good efficient strategy to several inquiries residing inside cloud computing environment set. complete balancing must acquire straight into accounts two tasks, one will be the resource provisioning as well as resource allocation along with will be task scheduling throughout distributed System. Round robin algorithm can be via far the Easiest algorithm shown to help distribute populate among nodes.. Because of this reason it is frequently the first preference when implementing a easy scheduler. One of the reasons for it being so simple is that the only information required is a list of nodes. The proposed algorithm eliminates the drawbacks of implementing a simple round robin architecture in cloud computing by introducing a concept of assigning different tim...
A framework for the automatic fast target object detection of natural object like oil seeps, lost... more A framework for the automatic fast target object detection of natural object like oil seeps, lost submarine and airborne using Synthetic Aperture Radar (SAR) images, implemented in MATLAB, is presented. Dark objects are detected using morphological thresholding. synthetic aperture radar (SAR) images are non-uniform and fantastically noisy image, an test or analysis is plan ahead, wherein the value of the edge of synthetic aperture radar (SAR) image in one of a kind areas like threshold area, axial duration with full-size one-of-a-kind uniform tiers are examined and in comparison. The results preliminarily validated that the degree the complex diploma of synthetic aperture radar (SAR) snap shots. After that, with the intention to make the automobile-segmentation efficient, the segments are also in addition processed with a sequence of strategies. On the second one degree, for each of the, a clustering based totally segmentation algorithm based totally on the Fuzzy C-means approach se...
Doing a digital image transmission over internet need a secure protection against illegal copying... more Doing a digital image transmission over internet need a secure protection against illegal copying. Unfortunately, many current data encryption methods such as DES, RES, AES, and other only suitable for test data, but not for digital image. Encryption security and encryption speed are two important aspects of image encryption algorithm. Digital image encryption is one of the secure methods to protect digital images against illegally copying when transmitted over unsecure channel. In this paper we use, properties of the chaotic maps such as sensitivity to initial conditions and random like behavior have attracted the attention to develop image encryption algorithms. KeywordsDigital image encryption; Digital image decryption; Chaotic logistic map; Logistic Tent map.
Load balancing in the cloud computing environment has an important impact on the performance. Goo... more Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. Load balancing with cloud computing provides a good efficient strategy to several inquiries residing inside cloud computing environment set. complete balancing must acquire straight into accounts two tasks, one will be the resource provisioning as well as resource allocation along with will be task scheduling throughout distributed System. Round robin algorithm can be via far the Easiest algorithm shown to help distribute populate among nodes.. Because of this reason it is frequently the first preference when implementing a easy scheduler. One of the reasons for it being so simple is that the only information required is a list of nodes. The proposed algorithm eliminates the drawbacks of implementing a simple round robin architecture in cloud computing by introducing a concept of assigning different tim...
Mobile ad hoc network (MANET) is a collection of mobile nodes and every node has capacity to send... more Mobile ad hoc network (MANET) is a collection of mobile nodes and every node has capacity to send and receive the packet which means that every node behaves like router host. The mobile ad hoc network can form or destroy the network. Due to dynamic behavior of MANET there are different security and congestion issues in the network. At the point when the offered load on the system exceeds congestion happens, which prompts packet losses. There are such a large number of proposed conventions that are versatile to clog and deals with congestion. In this paper, we propose secure channel algorithm to prevent the network from congestion. The experimental analysis of the proposed algorithm is done using network simulator NS-2.34 and the comparative analysis of propose algorithm is done between performance measuring parameter PDR, routing load and throughput Keywords—Ad hoc network, Congestion, Network Simulator, PDR, Throughput.
This paper presents a comparatively analysis of the fast and saliency feature based tone mapping ... more This paper presents a comparatively analysis of the fast and saliency feature based tone mapping technique. After analysis of these techniques we had concluded that fast tonemapping algorithm is most computationally efficient and easy but there may be some halo artifacts. While in Visual-Salience-based Tone mapping method for High dynamic range images the halo artifacts significantly reduced. Thus salience based tone mapping gives best visual image quality as compared to fast tone mapping method. The visual quality of tone-mapped image, especially attention-salient regions, is improved by the saliency-aware weighting. Experimental results show that the saliency-aware technique produces good results on a variety of high dynamic range images.
Phishing scams have also risen quickly with the evolution of the internet in recent years, posing... more Phishing scams have also risen quickly with the evolution of the internet in recent years, posing a major hazard to global Internet security. Phishing is one of the most prevalent & severe safety threats on the Internet where cyber attackers usually attempt at deceiving consumers via using either malware or some other social commerce platforms to disclose private data or economic credentials. Due to the enormous harm and economic loss created by such assaults, phishing detection is of excellent significance and was also an area of great concern. Detecting any Phishing website is a difficult& vibrant matter with many variables & criteria.
GEDRAG & ORGANISATIE REVIEW, 2020
International Journal of Advanced Research, 2019
Indian mustard is one of the major rabi oilseed crop in India. Continuous improvement in rapeseed... more Indian mustard is one of the major rabi oilseed crop in India. Continuous improvement in rapeseed-mustard has resulted in nutritionally superior edible oil, and meal as an important source of protein in animal feed. The crop is affected by various biotic and abiotic stresses. There are many biotic stresses which affect the production of Mustard .Many attempts have been made by the scientists to improve Brassica using molecular markers like Amplified Fragment Length Polymorphism (AFLP), Simple Sequence Repeat (SSR), Single Nucleotide Polymorphism (SNP) based maps (Ramen et al., 2014) etc. Somaclonal variation as a tool for creating in vitro variability offers a unique opportunity for desirable attributes. Molecular markers such as Random Amplified Polymorphic DNA (RAPD), Restriction Fragment Length Polymorphism (RFLP), AFLP and SSR have been used for improving selection efficiency and selecting plant genotypes with the desired combinations of traits. Transgenic approaches have been followed to develop the transgenic for aphid resistance, male sterility, AB tolerance, herbicide resistance and drought tolerance. Bar, Barnase and Barstar based herbicide resistance and genetic male sterility have been used in the development of experimental hybrids.
IOSR Journal of Computer Engineering, 2016
The Content-Based Image Retrieval (CBIR) techniques comprise methodologies intended to retrieve s... more The Content-Based Image Retrieval (CBIR) techniques comprise methodologies intended to retrieve self-content descriptors over the image data set being studied according to the type of the image. The main purpose of CBIR consists in classifying images avoiding the use of manual labels related to understanding of the image by the human being vision. This paper provides an overview on Recent Trends of CBIR includes the Relevance Feedback (RF), Interactive Genetic Algorithm , Neural Network etc.. Relevance Feedback enhances the ability of CBIR effectively by dropping the semantic gap between low-level features and high level features. Interactive Genetic Algorithm is a branch of evolutionary computation which makes the retrieval process more interactive so that user can get advanced results from database matching to Query Image with his evaluation. Neuro-fuzzy logic based implicit feedback gets improved results as compared to traditional implicit feedback.
International Ayurvedic Medical Journal, 2021
In this study, VatajaKasa is compared to Tropical Pulmonary Eosinophilia, which is having symptom... more In this study, VatajaKasa is compared to Tropical Pulmonary Eosinophilia, which is having symptoms ShuskaKasa, PrasktaVega, ParshwaShula, ShiraShoola, Urashula, SwaraBheda and Kanthakandu similar to that in T.P.E. hence taken for the study. The present study was undertaken to evaluate the efficacy of Kasantakachoorna and Sitopaladichoorna in in the management of VatajaKasa w.s.r.t. T.P.E. The symptoms which are expressed in Tropical Pulmonary Eosinophilia, are very nearer to the symptoms of vatajakasa. Evaluate the effect of KasantakaChoorna in Vatajakasa (T.P.E). Evaluate the effect of Sitopaldi Choorna in Vatajakasa (T.P. E). To compare the efficacy of Kasantaka Choorna and Sitopaladi Choorna in the management of Vatajakasa (T.P.E). Sample size – 40 patients of Vatajakasa were selected and divided into 2 groups, comprising 20 patients in each group. Kasantaka Choorna: This is more effective on ShushkaKasa, HrutShoola, Prasakta Vega Kantha Kandu because Kasantaka Choorna ingredient...
AYUSHDHARA, 2021
In present scenario the most common cause of disability in patients under 45years of age is back ... more In present scenario the most common cause of disability in patients under 45years of age is back pain. Gridhrasi can be correlated to Sciatica where pain radiates from buttock into thigh, calf, and occasionally the foot. In the surgical treatment of Sciatica may have serious post-operative complications. Basti being superior treatment in Vatavyadhis and keeping in view of lacunae in medical management and due to the complications caused by modern surgical interventions there is a need of a safe, potent, cost effective, simple and short-term therapy for this condition. So here is an attempt to compare the effect of Matra Basti with Shuddha Bala Taila (group A) and Ksheerabala Taila (group B) in the management of Gridhrasi. Where 40 patients who fulfilled the inclusion criteria randomly and distributed into 2 groups of 20 patients each. Clinical symptoms were given grading according their severity. After completion of the treatment result were assessed and statistically analyzed to kn...
AYUSHDHARA
Gridhrasi is a Rujapradhana Nanatmaja Vata Vyadhi, intervening with the functional ability of low... more Gridhrasi is a Rujapradhana Nanatmaja Vata Vyadhi, intervening with the functional ability of low back & lower limbs. Low back pain is the major cause of morbidity throughout the world affecting mainly the young adults. Life time incidence of low back pain is said to be 50-70% with the incidence of Sciatica more than 40%. Among various Ayurvedic treatments of Gridhrasi; Basti is a unique procedure which eliminates the aggravated Doshas from the body as such it was described Ardhachikitsa of all treatment. In present study effort is made to compare the effect of Arohana Krama and Sadharana Krama Matra Basti with Vajigandhadi Taila in the management of Gridhrasi. Minimum 40 patients who fulfilled the inclusion criteria, randomly distributed into 2 groups of 20 patients each. When both the groups were compared clinically for Ruk, Toda, Stamba, Spandana & SLR test, Both the groups show statistically significant effect with p <0.001 as Gridhrasi Chikitsa but Group A proved to be bette...
Today a large amount of data is generated in each area. Spatial data is the importance of data wh... more Today a large amount of data is generated in each area. Spatial data is the importance of data where the usage, its access, storage is required in efficient manner. P2P system, communication makes use of these data with their efficient search and storage scheme. Security in access is a major concept where the requirement is to process, storage of data in secure format is required. In this paper our investigation in previous BestPeer++ Approach for large spatial data access with security parameter is monitored. A further extension with parallel approach and HECC (Hyper elliptic curve cryptography) security approach is taken in this paper which is compared with existing bestpeer++ approach over large dataset query system. It is observed that the proposed work outperform better than the existing algorithm in terms of execution time and security concern over the dataset TCP-H.
Load balancing in the cloud computing environment has an important impact on the performance. Goo... more Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. Load balancing with cloud computing provides a good efficient strategy to several inquiries residing inside cloud computing environment set. complete balancing must acquire straight into accounts two tasks, one will be the resource provisioning as well as resource allocation along with will be task scheduling throughout distributed System. Round robin algorithm can be via far the Easiest algorithm shown to help distribute populate among nodes.. Because of this reason it is frequently the first preference when implementing a easy scheduler. One of the reasons for it being so simple is that the only information required is a list of nodes. The proposed algorithm eliminates the drawbacks of implementing a simple round robin architecture in cloud computing by introducing a concept of assigning different tim...
A framework for the automatic fast target object detection of natural object like oil seeps, lost... more A framework for the automatic fast target object detection of natural object like oil seeps, lost submarine and airborne using Synthetic Aperture Radar (SAR) images, implemented in MATLAB, is presented. Dark objects are detected using morphological thresholding. synthetic aperture radar (SAR) images are non-uniform and fantastically noisy image, an test or analysis is plan ahead, wherein the value of the edge of synthetic aperture radar (SAR) image in one of a kind areas like threshold area, axial duration with full-size one-of-a-kind uniform tiers are examined and in comparison. The results preliminarily validated that the degree the complex diploma of synthetic aperture radar (SAR) snap shots. After that, with the intention to make the automobile-segmentation efficient, the segments are also in addition processed with a sequence of strategies. On the second one degree, for each of the, a clustering based totally segmentation algorithm based totally on the Fuzzy C-means approach se...
Doing a digital image transmission over internet need a secure protection against illegal copying... more Doing a digital image transmission over internet need a secure protection against illegal copying. Unfortunately, many current data encryption methods such as DES, RES, AES, and other only suitable for test data, but not for digital image. Encryption security and encryption speed are two important aspects of image encryption algorithm. Digital image encryption is one of the secure methods to protect digital images against illegally copying when transmitted over unsecure channel. In this paper we use, properties of the chaotic maps such as sensitivity to initial conditions and random like behavior have attracted the attention to develop image encryption algorithms. KeywordsDigital image encryption; Digital image decryption; Chaotic logistic map; Logistic Tent map.
Load balancing in the cloud computing environment has an important impact on the performance. Goo... more Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. Load balancing with cloud computing provides a good efficient strategy to several inquiries residing inside cloud computing environment set. complete balancing must acquire straight into accounts two tasks, one will be the resource provisioning as well as resource allocation along with will be task scheduling throughout distributed System. Round robin algorithm can be via far the Easiest algorithm shown to help distribute populate among nodes.. Because of this reason it is frequently the first preference when implementing a easy scheduler. One of the reasons for it being so simple is that the only information required is a list of nodes. The proposed algorithm eliminates the drawbacks of implementing a simple round robin architecture in cloud computing by introducing a concept of assigning different tim...
Mobile ad hoc network (MANET) is a collection of mobile nodes and every node has capacity to send... more Mobile ad hoc network (MANET) is a collection of mobile nodes and every node has capacity to send and receive the packet which means that every node behaves like router host. The mobile ad hoc network can form or destroy the network. Due to dynamic behavior of MANET there are different security and congestion issues in the network. At the point when the offered load on the system exceeds congestion happens, which prompts packet losses. There are such a large number of proposed conventions that are versatile to clog and deals with congestion. In this paper, we propose secure channel algorithm to prevent the network from congestion. The experimental analysis of the proposed algorithm is done using network simulator NS-2.34 and the comparative analysis of propose algorithm is done between performance measuring parameter PDR, routing load and throughput Keywords—Ad hoc network, Congestion, Network Simulator, PDR, Throughput.
This paper presents a comparatively analysis of the fast and saliency feature based tone mapping ... more This paper presents a comparatively analysis of the fast and saliency feature based tone mapping technique. After analysis of these techniques we had concluded that fast tonemapping algorithm is most computationally efficient and easy but there may be some halo artifacts. While in Visual-Salience-based Tone mapping method for High dynamic range images the halo artifacts significantly reduced. Thus salience based tone mapping gives best visual image quality as compared to fast tone mapping method. The visual quality of tone-mapped image, especially attention-salient regions, is improved by the saliency-aware weighting. Experimental results show that the saliency-aware technique produces good results on a variety of high dynamic range images.
Phishing scams have also risen quickly with the evolution of the internet in recent years, posing... more Phishing scams have also risen quickly with the evolution of the internet in recent years, posing a major hazard to global Internet security. Phishing is one of the most prevalent & severe safety threats on the Internet where cyber attackers usually attempt at deceiving consumers via using either malware or some other social commerce platforms to disclose private data or economic credentials. Due to the enormous harm and economic loss created by such assaults, phishing detection is of excellent significance and was also an area of great concern. Detecting any Phishing website is a difficult& vibrant matter with many variables & criteria.
GEDRAG & ORGANISATIE REVIEW, 2020
International Journal of Advanced Research, 2019
Indian mustard is one of the major rabi oilseed crop in India. Continuous improvement in rapeseed... more Indian mustard is one of the major rabi oilseed crop in India. Continuous improvement in rapeseed-mustard has resulted in nutritionally superior edible oil, and meal as an important source of protein in animal feed. The crop is affected by various biotic and abiotic stresses. There are many biotic stresses which affect the production of Mustard .Many attempts have been made by the scientists to improve Brassica using molecular markers like Amplified Fragment Length Polymorphism (AFLP), Simple Sequence Repeat (SSR), Single Nucleotide Polymorphism (SNP) based maps (Ramen et al., 2014) etc. Somaclonal variation as a tool for creating in vitro variability offers a unique opportunity for desirable attributes. Molecular markers such as Random Amplified Polymorphic DNA (RAPD), Restriction Fragment Length Polymorphism (RFLP), AFLP and SSR have been used for improving selection efficiency and selecting plant genotypes with the desired combinations of traits. Transgenic approaches have been followed to develop the transgenic for aphid resistance, male sterility, AB tolerance, herbicide resistance and drought tolerance. Bar, Barnase and Barstar based herbicide resistance and genetic male sterility have been used in the development of experimental hybrids.
IOSR Journal of Computer Engineering, 2016
The Content-Based Image Retrieval (CBIR) techniques comprise methodologies intended to retrieve s... more The Content-Based Image Retrieval (CBIR) techniques comprise methodologies intended to retrieve self-content descriptors over the image data set being studied according to the type of the image. The main purpose of CBIR consists in classifying images avoiding the use of manual labels related to understanding of the image by the human being vision. This paper provides an overview on Recent Trends of CBIR includes the Relevance Feedback (RF), Interactive Genetic Algorithm , Neural Network etc.. Relevance Feedback enhances the ability of CBIR effectively by dropping the semantic gap between low-level features and high level features. Interactive Genetic Algorithm is a branch of evolutionary computation which makes the retrieval process more interactive so that user can get advanced results from database matching to Query Image with his evaluation. Neuro-fuzzy logic based implicit feedback gets improved results as compared to traditional implicit feedback.
International Ayurvedic Medical Journal, 2021
In this study, VatajaKasa is compared to Tropical Pulmonary Eosinophilia, which is having symptom... more In this study, VatajaKasa is compared to Tropical Pulmonary Eosinophilia, which is having symptoms ShuskaKasa, PrasktaVega, ParshwaShula, ShiraShoola, Urashula, SwaraBheda and Kanthakandu similar to that in T.P.E. hence taken for the study. The present study was undertaken to evaluate the efficacy of Kasantakachoorna and Sitopaladichoorna in in the management of VatajaKasa w.s.r.t. T.P.E. The symptoms which are expressed in Tropical Pulmonary Eosinophilia, are very nearer to the symptoms of vatajakasa. Evaluate the effect of KasantakaChoorna in Vatajakasa (T.P.E). Evaluate the effect of Sitopaldi Choorna in Vatajakasa (T.P. E). To compare the efficacy of Kasantaka Choorna and Sitopaladi Choorna in the management of Vatajakasa (T.P.E). Sample size – 40 patients of Vatajakasa were selected and divided into 2 groups, comprising 20 patients in each group. Kasantaka Choorna: This is more effective on ShushkaKasa, HrutShoola, Prasakta Vega Kantha Kandu because Kasantaka Choorna ingredient...
AYUSHDHARA, 2021
In present scenario the most common cause of disability in patients under 45years of age is back ... more In present scenario the most common cause of disability in patients under 45years of age is back pain. Gridhrasi can be correlated to Sciatica where pain radiates from buttock into thigh, calf, and occasionally the foot. In the surgical treatment of Sciatica may have serious post-operative complications. Basti being superior treatment in Vatavyadhis and keeping in view of lacunae in medical management and due to the complications caused by modern surgical interventions there is a need of a safe, potent, cost effective, simple and short-term therapy for this condition. So here is an attempt to compare the effect of Matra Basti with Shuddha Bala Taila (group A) and Ksheerabala Taila (group B) in the management of Gridhrasi. Where 40 patients who fulfilled the inclusion criteria randomly and distributed into 2 groups of 20 patients each. Clinical symptoms were given grading according their severity. After completion of the treatment result were assessed and statistically analyzed to kn...