416 research outputs found
Weed flora of aerobic rice and their effect on growth, yield and nutrient uptake by rice Oryza sativa in the coastal region of Karaikal of Puducherry, India
A field experiment was conducted at farm lands of Pandit Jawaharlal Nehru College of Agriculture and Research Institute, Karaikal to know the weed floristic composition and their effect on growth, yield and nutrient uptake by aerobic rice (Oryza sativa). The results revealed that totally 29 species of weeds from 22 genera belonging to 17 families were noticed. Among them, four were grasses, six were sedges, and nineteen were broad leaved weeds. Of this 29 species, four were perennials, and the rest were annuals. During initial stages (30 DAS), sedges dominated (38.3%) whereas at later stages (60 DAS) broad leaved weeds dominated the aerobic rice fields (42.5%). Grasses were found to be comparatively less dominant at both the stages. Echinochloa colona Link. (28.1%) followed by E. cruss-galli (L.) Beauv. (6.1%) among the grasses; Cyperus difformis L. (19.8%) followed by C. iria L (9.9%) among the sedges and Ludwigia abyssinica (28.0%) among the broad leaved weeds, were the predominant weed species in aerobic rice cultivation. Weeds, when left unchecked, competed with rice for all resources like nutrients, space, light and soil moisture. The unweeded control recorded the maximum nutrient depletion by weeds (76.6, 6.4 and 106.8 Kg of N, P andK ha-1 ). Due to severe competition, weeds suppressed the growth of rice which resulted in lower growth and yield attributes leading to lower grain (333 kg ha-1 ) and straw yields (1903 kg ha-1 )
Mechanical and Morphological Behavior of Waste GFRP Powder Reinforced Polybutyrate composites
Biocomposites have emerged to become one of the most sought-after materials, these days. Yet, their high cost, limits their applications. On this regard, the blending of low-cost fillers into the biodegradable polymer may be an alternative solution. This present work concentrates on the development of Polybutyrate/waste GFRP powder (Both Raw and Treated) composites. These composites were synthesized by melt mixing using a Haake Rheocord. Later, samples were prepared by Compression Moulding Technique, followed by Punching and Saw-Cutting. The samples were then tested for Mechanical (Tensile, Flexural and Impact Properties) and Morphological behaviour. The results indicate that the blending was highly successful in improving the fore said properties, while reducing the cost effectively. These biocomposites could be applied in packaging, garden products, waste bin liners, etc. Keywords--Polybutyrate, Waste GFRP Powder, Treatment, Mechanical, Morphology.
Sol-Gel Derived Single Layer Zeolite-MgF2 Composite Antireflective Coatings with Improved Mechanical Properties on Polycarbonate
Single layer antireflective coatings with good optical and mechanical properties are difficult to be obtained on temperature sensitive substrates like plastics. This challenge has been taken up in the present study. Single layer MgF2 and for the first time, zeolite 4Å… and zeolite 4Å… - MgF2 composite antireflective coatings were generated by a wet chemical route on flat polycarbonate sheets and characterized for their reflectance, surface roughness, thickness, porosity, surface morphology and scratch hardness by haze measurement. Autoclaving and boiling water treatment under microwave irradiation were used in case of MgF2 sols and zeolite/zeolite-MgF2 coatings respectively. Pure MgF2 coatings deposited after autoclaving of the MgF2 sol yielded a low refractive index of 1.28 and an average reflectance of 1.9% vis-Å -vis 9.7% reflectance for an uncoated polycarbonate substrate over the wavelength range of 400-1100 nm. Single layer zeolite coatings after a brief treatment in boiling water under microwave irradiation yielded a reflectance of 5.1%. A composite zeolite-MgF2 coating exhibited a reflectance of 2.8% and the percentage change in haze after crockmeter testing in case of the composite coating was lower than that of a pure MgF2 coating. This implied that the composite layer had improved mechanical properties combined with good optical properties and could be suitable for practical applications
Web Service Deployment for Selecting a Right Steganography Scheme for Optimizing Both the Capacity and the Detectable Distortion
The principal objective of this effort is to organize a network facility to hide the secret information in an image folder without disturbing its originality. In the literature lot of algorithms are there to hide the information in an image file but most of it consumes high resource for completing the task which is not suitable for light weight mobile devices. Few basic algorithms like 1LSB, 2LSB and 3LSB methods in the literature are suitable for mobile devices since the computational complexity is very low. But, these methods either lack in maintaining the originality of the source image or in increasing the number of bits to be fixed. Furthermore, every algorithm in the literature has its own merits and demerits and we cannot predict which algorithm is best or worst since, based on the parameters such as size of the safety duplicate and encryption algorithm used to generate the cipher text the steganography schemes may produce best or worst result with respect to computational complexity, capacity, and detectable distortion. In our proposed work, we have developed a web service that takes cover image and plain text as the input from the clients and returns the steganoimage to the clients. The steganoimage will be generated by our proposed work by analyzing the above said parameters and by applying the right steganography scheme. The proposed work helps in reducing the detectable distortion, computational complexity of the client device, and in increasing the capacity. The experimental result says that, the proposed system performs better than the legacy schemes with respect to capacity, computational complexity, and detectable distortion. This proposed work is more useful to the client devices with very low computational resource since all the computational tasks are deployed in the server side
Correlation of HbA1c levels in third trimester with maternal and perinatal outcome in patients with gestational diabetes mellitus
Background: Gestational diabetes mellitus (GDM) is one of the most common metabolic disorders complicating pregnancy. GDM occurs in 2-22% of pregnancies depending on the diagnostic criteria and the epidemiologic characteristics of the population. Elevation of HBA1c have strong correlation with risks of adverse maternal and neonatal outcomes. Aims and objective were to determine the HbA1c levels and to evaluate the maternal and neonatal outcomes in women with HbA1c <5.8% and >5.8%
Methods: A retrospective study at ESIC-PGIMSR from June 2021 to December 2021.All mothers diagnosed with GDM using IADPSG criteria were included. HbA1c measured during the 2nd or 3rd trimester. Cut offs of HbA1c in 3rd trimester was taken as 5.8 according to Versantvoort et al. Maternal and neonatal outcome were assessed among two groups i.e., HbA1c <5.8% the control group and HbA1c >5.8% the case group. Demographic, maternal, and infant data were entered and statistical analysis done using SPSS software.
Results: Total GDM mothers diagnosed were 152 out of 1454 pregnancies. Incidence is 10.4%. the 38.8% were of 25-30 years age group and 46% were multiparous.48.6% neonates were male and 50.6% were females. Among women with HbA1c >5.8%- Preeclampsia seen in 11 cases (21%), polyhydromnios in 5 cases (11.6%), hypothyroidism in 6 cases (12%) UTI in 1 case (2.3%) and candidiasis in 2 cases (4.6%) while among women with HBA1c <5.8% preeclampsia seen in 20 cases (18.3%), polyhydromnios in 2 cases (1.8%), hypothyroidism in 14 cases (13%) UTI in 2 cases (1.8%) and candidiasis in 4 cases (3.6%). Among women with HbA1c >5.8%-respiratory distress syndrome in 6 babies (13%), hyperbilirubinemia in 9 babies (18.6%), hypoglycemia 2 (4.6%) and hypocalemia in 2 babies (4.6%), 14 babies had normal course (32.5%) while among women with HbA1c 5.8% Among women with HbA1c >5.8%-respiratory distress syndrome in 13 babies (12%), hyperbilirubinemia in 20 babies (18.3%) and hypoglycemia 3 (2.7%).
Conclusions: Optimal control of HbA1c along with lifestyle modification and glycemic control helps to reduce maternal and neonatal complications
Enhancing Student Engagement in Online Learning through Facial Expression Analysis and Complex Emotion Recognition using Deep Learning
In response to the COVID-19 pandemic, traditional physical classrooms have
transitioned to online environments, necessitating effective strategies to
ensure sustained student engagement. A significant challenge in online teaching
is the absence of real-time feedback from teachers on students learning
progress. This paper introduces a novel approach employing deep learning
techniques based on facial expressions to assess students engagement levels
during online learning sessions. Human emotions cannot be adequately conveyed
by a student using only the basic emotions, including anger, disgust, fear,
joy, sadness, surprise, and neutrality. To address this challenge, proposed a
generation of four complex emotions such as confusion, satisfaction,
disappointment, and frustration by combining the basic emotions. These complex
emotions are often experienced simultaneously by students during the learning
session. To depict these emotions dynamically,utilized a continuous stream of
image frames instead of discrete images. The proposed work utilized a
Convolutional Neural Network (CNN) model to categorize the fundamental
emotional states of learners accurately. The proposed CNN model demonstrates
strong performance, achieving a 95% accuracy in precise categorization of
learner emotions.Comment: Face emotion recognition wor
Standardization of optimum sieve size for maximizing seed quality in Amaranthus (Amaranthus tricolor L.)
Vegetables have a critical function in human health and nutritional security. Vegetables are considered an essential building block of any diet. Out of the leafy vegetables, Amaranthus is the most popular and salable vegetable consumed by people all over India. Seed processing experiment was undertaken in Amaranthus tricolor (CO 2) by using the sieves placed inside the mechanical seed shaker (Gyratory sieve shaker) to improve the quality of Amaranthus seeds. The seeds of Amaranthus were size graded with seed shaker attached with various sieve size of BSS 18 X18 (R), BSS 20 X 20 (R), BSS 22 X 22 (R) and BSP 22 X 22 (P). During processing, the machine could be adjusted for 2, 3, 4 and 5 minutes with an oscillating speed of 1440 rpm. The separated seeds were evaluated for seed quality characteristics such as seed germination percentage, shoot length, root length, dry matter production, 1000 seed weight and seed recovery percentage. The results revealed that the sieve size of BSS 22 X 22 (R=retained) mesh sieve had the better quality seeds with a maximum recovery of 67.41 g and when it is operated for a period of 5 minutes. The germination percentage was improved from 77 % to 95 % with 1000 seed weight of 73.21 mg, and the observed recovery was 56 per cent with the vigour index of 1145. Hence, BSS 22 X 22 retained mesh sieve with a duration of 5 minutes could be recommended as an optimum sieve size for grading Amaranthus seeds for improving the seed quality
Software Defined Based Pure VPN Protocol for Preventing IP Spoofing Attacks in IOT
The Internet of things (IoT) is the network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. IoT involves extending Internet connectivity beyond standard devices, such as desktops, laptops, smart phones and tablets, to any range of traditionally dumb or non-internet-enabled physical devices and everyday objects. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled. Traditionally, current internet packet delivery only depends on packet destination IP address and forward devices neglect the validation of packet’s IP source address. It makes attacks can leverage this flow to launch attacks with forge IP source address so as to meet their violent purpose and avoid to be tracked. In order to reduce this threat and enhance internet accountability, many solution proposed in the inter domain and intra domain aspects. Furthermore, most of them faced with some issues hard to cope, i.e., data security, data privacy. And most importantly code cover PureVPN protocol for both inter and intra domain areas. The novel network architecture of SDN possess whole network PureVPN protocol rule instead of traditional SDN switches, which brings good opportunity to solve IP spoofing problems. However, use authentication based on key exchange between the machines on your network; something like IP Security protocol will significantly cut down on the risk of spoofing. This paper proposes a SDN based PureVPN protocol architecture, which can cover both inter and intra domain areas with encrypted format effectively than SDN devices. The PureVPN protocol scheme is significant in improving the security and privacy in SDN for IoT
Cloud Data Security Using Elliptic Curve Cryptography
Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key issue in effective execution of Cloud Computing is to adequately deal with the security in the cloud applications. This paper talks about the part of cryptography in cloud computing to improve the data security. The expectation here is to get bits of knowledge another security approach with the usage of cryptography to secure information at cloud data centers
A secured and optimized deep recurrent neural network (DRNN) scheme for remote health monitoring system with edge computing
Patients now want a contemporary, advanced healthcare system that is faster and more individualized and that can keep up with their changing needs. An edge computing environment, in conjunction with 5G speeds and contemporary computing techniques, is the solution for the latency and energy efficiency criteria to be satisfied for a real-time collection and analysis of health data. The feature of optimum computing approaches, including encryption, authentication, and classification that are employed on the devices deployed in an edge-computing architecture, has been ignored by previous healthcare systems, which have concentrated on novel fog architecture and sensor kinds. To avoid this problem in this paper, an Optimized Deep Recurrent Neural Network (O-DRNN) model is used with a multitier secured architecture. Initially, the data obtained from the patient are sent to the healthcare server in edge computing and the processed data are stored in the cloud using the Elliptic Curve Key Agreement Scheme (ECKAS) security model. The data is pre-processed and optimal features are selected using the Particle Swarm Optimization (PSO) algorithm. O-DRNN algorithm hyper-parameters are optimized using Bayesian optimization for better diagnosis. The proposed work offers superior outcomes in terms of accuracy and encryption latency while using computational cloud services
- …