f) 2020 - 82 Documents
Permanent URI for this communityhttps://dspace.psgrkcw.com/handle/123456789/3917
Browse
83 results
Search Results
Item ANTI-CORROSIVE PROPERTY OF BIOINSPIRED ENVIRONMENTAL BENIGN IMIDAZOLE AND ISOXAZOLINE HETEROCYCLICS: A CUMULATIVE STUDIES OF EXPERIMENTAL AND DFT METHODS(Wiley, 2020) Sowmya, Ramkumar; Nalini, D; Mumtaz A, Quraishi,; Eno E, Ebenso; Chandrabhan, VermaIn the present study, four imidazoline (IDZ) and four isoxazolines (ISO) heterocyclics differing in the nature of methoxy (-OCH3) and aromatic (phenyl and naphthyl) moieties are synthesized, characterized and evaluated as corrosion inhibitors for mild steel in acidic solution of 1 M HCl. Results showed that imidazoline based heterocyclic compounds are better corrosion inhibitors than isoxazoline based heterocyclics and both classes of compounds showed inhibition efficiency of more than 85% at 20 mgL−1 concentration. Results further showed that inhibitors containing methoxy, phenyl, and naphthyl moieties showed higher protection efficiency as compared to the inhibitors without these moieties. PDP Study revealed that investigated IDZs and ISOs acted as mixed type inhibitors and their adsorption on the metallic surface followed the Langmuir adsorption isotherm model. All the experimental results were corroborated by density function theory (DFT) based quantum chemical calculations. Numerous DFT based indices calculated for neutral as well as protonated forms of the IDZs and ISOs in order to get better insight about metal-IDZs/ISOs interactions. Outcomes of the DFT analysis showed that protonated (cationic) form of the all the inhibitors are more strongly adsorbed on the metallic surface as compared to their neutral form.Item DEXTRAN SULFATE STABILIZED SILVER NANOPARTICLE: NEXT GENERATION EFFICIENT THERAPY FOR CANCER(Innovare Academic Sciences, 2020) Sharmila, Chandran; Thilagavathy, Ponnusamy; Dinesh, Bheeman; Ranjith Kumar, Rajamani; Chandar Shekar, BellanSynthesize silver nanoparticles using a green synthesis approach and encapsulate silver nanoparticles with a naturally occurring polymer, particularly of an-hydroglucose type, like dextran sulfate sodium salt and to study its anticancer activityItem OVERLAPPING COMMUNITY STRUCTURE DETECTION USING TWITTER DATA(International Journal on Emerging Technologies, 2020) Sathiyakumari, K; Vijaya, M SOverlapping community detection is progressively becoming a significant issue in social network analysis (SNA). Faced with massive amounts of information while simultaneously restricted by hardware specifications and computation time limits, it is difficult for clustering analysis to reflect the latest developments or changes in complex networks. Techniques for finding community clusters mostly depend on models that impose strong explicit and/or implicit priori assumptions. As a consequence, the clustering effects tend to be unnatural and stay away from the intrinsic grouping natures of community groups. In this method, a process of enumerating highly cohesive maximal community cliques is performed in a random graph, where strongly adjacent cliques are mingled to form naturally overlapping clusters. These approaches can be considered as a generalization of edge percolation with great potential as a community finding method in real-world graphs. The main objective of this work is to find overlapping communities based on the Clique percolation method. Variants of clique percolation method such as Optimized Clique percolation method, Parallel Clique percolation method have also been implemented. This research work focuses on the Clique Percolation algorithm for deriving community from a sports person’s networks. Three algorithms have been applied for finding overlapping communities in the sports person network in which CPM algorithm discovered more number of communities than OCPM and PCPM. CPM overlapping algorithm discovered 198 communities in the network. OCPM algorithm found 180 different sizes of communities. PCPM algorithm discovered 170 communities and different size of the node in the graph. The community measures such as size of the community, length of community and modularity of the community are used for evaluating the communities. The proposed parallel method found a large number of communities and modularity score with less computational time. Finally, the parallel method shows the best performance is detecting overlapping communities from the sports person network.Item GATED RECURRENT NEURAL NETWORK FOR AUTISM SPECTRUM DISORDER GENE PREDICTION(International Journal on Emerging Technologies, 2020) Pream Sudha, V; Vijaya, M SAutism Spectrum Disorder (ASD) is the fastest-growing complex disorder and the genetic ground of this comprehensive developmental disability is very difficult to research. Autism diagnosis for an average child is not done till the age of four, though it can be given at the age of 18 months to two years. Hence a computational model that enables the early diagnosis and personalized treatment is the need of the hour. In this research work, a deep learning based approach is proposed for Autism Spectrum Disorder (ASD) gene prediction. There are various contributors for Autism including genes, mutations, chromosomal settings influence of the environment, prenatal influences, family factors and problems during birth. Recurrent Neural Network (RNN) based Gated Recurrent Units (GRU) are implemented to develop a model that predicts ASD genes, mutations and gene susceptibility. GRUs with their internal memory capability are valuable to store and filter information using the update and reset gates. Also GRU offers a powerful tool to handle sequence data. The model is trained using three simulated datasets with features representing genes, mutations and gene susceptibility to ASD. Besides, the proposed approach is compared to original RNN and Long Short Term Memory Units (LSTM) for ASD prediction. The experimental results confirm that the proposed approach is promising with 82.5% accuracy and hence GRU RNN is found to be effective for ASD gene prediction.Item STABILITY ANALYSIS OF SINGLE NEURON SYSTEM WITH LEVY NOISE(International Journal of Scientific and Technology Research, 2020) Arthi, GThis article addresses the asymptotic stability of single neuron system with neutral delay and Levy noise. Sufficient conditions are derived to ensure that the considered system with Levy noise is asymptotic stable by means of the linear matrix inequality (LMI) approach together with a Lyapunov-Krasovskii functional and stochastic analysis theory. This work provides two examples of application of stability analysis in numerical formulation about the impact of Levy noise on neutral type single neuron model.Item SURVEY ON LOCATION AIDED ROUTING PROTOCOLS WITH SECURITY FEATURES FOR MASNET(International Journal of Scientific and Technology Research, 2020) Viji Gripsy, J; Kiruthika, JA Mobile Ad-Hoc Sensor Networks (MASNET) is a collection of wireless mobile nodes without any predefined topology and infrastructure. This does not rely on any centralized access point or administration. Due to this nature and characteristics it affected by severe network overhead and energy-based issues. In order to decrease routing overhead, and to achieve higher packet delivery ratio MASNET, there are several routing protocols are designed and developed in the literature. In specific, the location aided routing protocols to have tremendous growth and usage in this network. In this paper, we prepared a survey on secure location aided routing protocol, which utilizes the node location information and make a forwarding decision based on that. This will greatly reduce the flooding control packet count and decreases the search zone. Finally, this will result in low routing overhead in the network. This survey finally summarizes and provides possible future directions.Item A RECENT WORK ON NANO J-CLOSED SETS IN NANO TOPOLOGICAL SPACES(Journal of Advanced Research in Dynamical and Control Systems, 2020) Sasikala, D; Radhamani, K C; Shalini, RIn this paper, we introduce a new class of closed sets namely nano j-closed sets. Also, we define nano generalized j-closed sets, nano generalized j*-closed sets, nano j-continuous mapping, nano generalized j-continuous mapping, nano generalized j*-continuous mapping and study some of their properties.Item STRONG FORMS OF GENERALISED J-CLOSED SETS IN DITOPOLOGICAL TEXTURE SPACES(Journal of Advanced Research in Dynamical and Control Systems, 2020) Sasikala, D; Divya, A JThe focus of this paper deals with the new notions that is to say j-g-closed and j-g-open sets in ditopological texture spaces. The associations between these classes of sets are studied. Some effective characterizations and properties are inquired and also the concept of j-bicontinuous difunctions and their properties are discussed.Item FACTORS DETERMINING THE SERVICE QUALITY OF E-TICKETING PROCESS IN INDIAN CONTEXT – AN EMPIRICAL STUDY(International Journal on Emerging Technologies, 2020) Nithya, N; Kiruthika, RThe aim of the present study attempted to measure the factors influencing the service quality of e-ticketing and characterize Indian tire three city's customer satisfaction with web purchasing experience. So many works have been done in service quality of e-ticketing whereas service quality of e-ticketing with respect to both rail and bus transport is very few especially in the Indian context. For this study, a selfadministered questionnaire was drafted and proclamations were coined in discussion with the subject specialists and on line with the references from literature survey. The data was collected by convenience sampling method and customers crosswise over different demographic profiles were covered for the examination. The framework of analysis includes descriptive statics, one-way ANOVA and correlation analysis and reliability analysis. Service Quality factors included ease of use, web composition, information security, specialized help offered by the site and customer satisfaction. The study also found that age, gender and education as the associating profiles in measuring the service quality factors. All the factors were found to be significantly correlated to each other and the same was dealt analytically through correlation analysis. The results of the study confirm the importance of the factors as a vital tool that support organisation’s attempts to encourage their customers to continue using online channels. In the growing world of digitalization, the expectations of the people are increasing this study will help the service providers to understand the gap and enhance the service quality.Item SECURE HYBRID ROUTING TO THWART SEQUENTIAL ATTACKS IN MOBILE AD-HOC NETWORKS(Journal of Advanced Research in Dynamical and Control Systems, 2020) Viji Gripsy, J; Kanchana, K RIn the recent trends, wireless networks and Mobile Ad-hoc Network (MANET) have yielded tremendous opportunity and popularity. This opportunity and popularity insisted on many kinds of research to focus on it. This highly flexible nature of the MANET also creates many network performance-related and security related issues. Various security vulnerabilities threaten the process in MANET in various ways. Sequence number attacks such as grey hole and black hole attacks are such dangerous attacks that significantly weaken the functioning and performance of the network in different situations. The proposed approach generates a fusion outline and that organizes with the Ad hoc on-demand distance vector (AODV) routing protocol to moderate these attacks. The new and modified protocol is named as SRD-AODV (Secure Route Discovery-Adhoc On-Demand Distance Vector) protocol. This protocol contains different components and methods to provide both proactive and reactive solutions by deploying effective authentication using the Elliptic Curve Diffie-Hellman algorithm (ECDHA) methods. This also aims to secure the data packets and routing table information and finally the incursion detection and prevention from sequential attacks in MANET. The performance of this protocol is measured with the help of performance parameters such as packet delivery ratio, and delay. The SRD-AODV protocol also compares with attacked AODV and other existing protocols.