Browse Items (11810 total)
Sort by:
-
Development of a fluorescent scaffold by utilizing quercetin template for selective detection of Hg2+: Experimental and theoretical studies along with live cell imaging
Quercetin is an important antioxidant with high bioactivity and it has been used as SARS-CoV-2 inhibitor significantly. Quercetin, one of the most abundant flavonoids in nature, has been in the spot of numerous experimental and theoretical studies in the past decade due to its great biological and medicinal importance. But there have been limited instances of employing quercetin and its derivatives as a fluorescent framework for specific detection of various cations and anions in the chemosensing field. Therefore, we have developed a novel chemosensor based on quercetin coupled benzyl ethers (QBE) for selective detection of Hg2+ with naked-eye colorimetric and turn-on fluorometric response. Initially QBE itself exhibited very weak fluorescence with low quantum yield (? = 0.009) due to operating photoinduced electron transfer (PET) and inhibition of excited state intramolecular proton transfer (ESIPT) as well as intramolecular charge transfer (ICT) within the molecule. But in presence of Hg2+, QBE showed a sharp increase in fluorescence intensity by 18-fold at wavelength 444 nm with high quantum yield (? = 0.159) for the chelation-enhanced fluorescence (CHEF) with coordination of Hg2+, which hampers PET within the molecule. The strong binding affinity of QBE towards Hg2+ has been proved by lower detection limit at 8.47 M and high binding constant value as 2 104 M?1. The binding mechanism has been verified by DFT study, Cyclic voltammograms and Jobs plot analysis. For the practical application, the binding selectivity of QBE with Hg2+ has been capitalized in physiological medium to detect intracellular Hg2+ levels in living plant tissue by using green gram seeds. Thus, employing QBE as a fluorescent chemosensor for the specific identification of Hg2+ will pave the way for a novel approach to simplifying the creation of various chemosensors based on quercetin backbone for the precise detection of various biologically significant analytes. 2024 Elsevier B.V. -
Development of a scorecard to measure the satisfaction and happiness in higher education
This study aims to identify and test the antecedents affecting students' satisfaction and its relationship with happiness. A conceptual model was designed with the dimensions such as happiness, recognition, gratitude, physical health, and negative emotion to measure students' satisfaction. Martin Seligman's 'theory of well-being' was employed to measure the happiness of the students. Data was collected from 202 respondents and a structural equation modelling (SEM) approach was employed for analysis. The results of the study indicate that physical health, gratitude, and negative emotion influence the satisfaction of students in higher education. It was found that positive emotion and relationships have a significant influence on the happiness of the students. A relationship between satisfaction and happiness was developed. In extension to the present study's findings, a model and scorecard are proposed that can be used to measure the happiness and satisfaction of students in higher educational institutions in India. 2024 Inderscience Enterprises Ltd.. All rights reserved. -
Development of a Supported Education Program for Students with Severe Mental Disorders in India
Background: The onset of severe mental disorders (SMDs) is during adolescence or young adulthood, which affects the well-being and the educational aspirations of the students. Models of supported education practiced in the West are not culturally suitable for Indian students or the Indian education system. This study aimed to develop a Supported Education Program (SEP) for students with SMDs to help them with academic reintegration in an Indian context. Methods and Material: To develop the SEP, a realist review was done, followed by an in-depth interview with eight mental health professionals (MHP) and nine lecturers, using a validated interview script. After each interview, interim analysis and modifications were done to improve the rigor of the interview. After all interviews, the SEP was circulated for a second round of iteration for consensual validation by four mental health experts. The outcome of the entire process was the final version of SEP for students with SMDs. Results: The final SEP had two broad themes and 18 subthemes from the qualitative thematic analysis: theme 1 included issues and strategies relevant to the client or caregivers, and theme 2 was pertinent to the education system. Conclusion: The SEP developed and validated for people with SMDs has distinctive components: one for the individual and caregiver and the other for the educational system. 2020 Indian Psychiatric Society - South Zonal Branch. -
Development of an Efficient and Secured E-Voting Mobile Application Using Android
Smart technologies, particularly the development of the Internet, are employed to enhance the quality of human existence. Thanks to the Internet's explosive expansion, more and more tasks can now be completed quickly and easily compared to the earlier times. E-voting is a relatively recent field that has been identified. Voting can be conducted in a variety of methods, including in person at a polling place, online, and via a mobile application. The security of applications cannot be disregarded given the internet's explosive growth. In order to prevent phishing attacks, we created an Android application and included a 3-step security process before voting. Students can now vote online from any location at any time using a mobile device. Android Studio is used to create and deploy the application. While creating the voting application, this research adheres to the software development life cycle. The result of this research is the creation of a mobile application that is user-friendly for students and serves as a practical tool for letting them vote with three levels of security. 2022 Anli Sherine et al. -
Development of an efficient real-time H.264/AVC advanced video compression encryption scheme
Multimedia is the combination of media such as text, graphics, video clips, and audio files. In todays world, multimedia plays an important role in many applications that we use in our daily lives. It is used in educational software, animation, sound, and text, as well as multi-media software. H.264/AVC video compression is extremely efficient in terms of compression. Despite this, H.264/AVC requires a lot of processing and consumes a lot of power insdespite of the fact that its compression efficiency is lower than that of H.264/AVC. We examine the various methods of Video H.264 Advanced Video Compression Standard Encryption Schemes in this paper. The performance of all types of encryption techniques will be evaluated using parameters such as cost overhead, delay, and encryption quality. This will provide us with a detailed comparative analysis of video encryption schemes, allowing us to determine which one is far more efficient for H.264/AVC. 2021 Taru Publications. -
Development of an intelligent health monitoring system integrated with mobile application through IOT /
Patent Number: 202041053102, Applicant: Dr.A.Narasima Venkatesh.
An Intelligent health measuring system measures the vital health parameters like blood pressure, heart beat blood sugar, body position and temperature of the user or the patient. The non-invasive sensors are used to measure the health parameters easily without causing any disturbances to the patient or the user. -
Development of an intelligent health monitoring system integrated with mobile application through IOT /
Patent Number: 202041053102, Applicant: Dr.A.Narasima Venkatesh.
An Intelligent health measuring system measures the vital health parameters like blood pressure, heart beat blood sugar, body position and temperature of the user or the patient. The non-invasive sensors are used to measure the health parameters easily without causing any disturbances to the patient or the user. -
Development of big data analytics for intelligent industrial manufacturing based on wireless and IOT technology /
Patent Number: 202141041225, Applicant: Mrs. Vaishali Gajendra Shende.
The global network interconnecting physical devices such as mechanical machines, sensors, computing devices, actuators, objects, smart applications and people is termed as Internet of Things (IoT) which has become significant part of several applications. In industrial applications, abundant amount of data is generated during the manufacturing process, which is heterogeneous, massive and time sensitive bringing substantial challenges in real time data collection, its processing and thereby decision making. In this invention, we develop a novel framework for big data analytics for intelligent industrial manufacturing based on Internet of Things for managing the huge data generated in industries for controlling smart manufacturing and for supporting online process of industrial monitoring. -
Development of Biocompatible Barium peroxide/Pluronic F127/L-ornithine Composite for Enriched Antimicrobial, Antioxidant and Anticancer Potential: An in vitro Study
Osteosarcoma (MG-63) is a type of bone cancer affects mostly adolescents and young adults. Disease-causing microorganisms like Bacillus subtilis, Staphylococcus aureus, Escherichia coli, Klebsiella pneumoniae and Candida albicans pose serious illness in humans. There is a need to develop multifunctional composite to combat cancer and other most common disease caused by disease causing microorganisms. In this context, BaO2 and pluronic F127, L-Ornithine coated BaO2 (BaO2-PF127-LO) composite have been prepared and characterized by XRD, FTIR, UV-Vis, SEM, HRTEM, EDAX, and XPS analytical techniques. BaO2 and BaO2-PF127-LO were orthorhombic crystalline structure and the crystallite size was found as 32nm for BaO2 and 26nm for modified BaO2 PL studies revealed the green emission observed at 506nm for BaO2-PF127-LO composite which is absent in the case of bare BaO2. Antimicrobial activity of BaO2 and BaO2-PF127-LO was investigated. MTT assay was performed to determine the anticancer potential while the DPPH free radical scavenging assay was carried out to determine the antioxidant potential. The experiment study revealed that the BaO2-PF127-LO exhibited enhanced antimicrobial, antioxidant, and anticancer activity and low toxicity when compared to pristine BaO2. The experimental results revealed that the BaO2-PF127-LO composite holds promising potential for biomedical applications. The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. -
Development of CeO2ZrO2 bimetallic oxide catalyst for quinoxaline synthesis
In recent years, heterogeneous catalysts have led to environment-friendly transformations with better yields and reusability. Pd, one of the initial metals employed in heterogeneous organic synthesis, suffered from limitations like its high cost. This justifies the need for development of catalysts with abundant, low-cost metals, which has been receiving a lot of attention in the scientific community. In this work, a bimetallic oxide catalyst, CeO2ZrO2, is synthesized by a solgel route. The structure and morphology of the catalyst are investigated using X-ray diffraction, scanning electron microscopy, energy-dispersive X-ray analysis, thermogravimetric analysis, BrunauerEmmettTeller measurements, and temperature-programmed desorption. It is utilized for obtaining quinoxaline derivatives at room temperature. 2,3-Diphenylquinoxaline is obtained via a simple condensation reaction between 1,2-diaminobenzene and 1,2-diketones, catalyzed by CeO2(50)ZrO2(50) with 87% yield in 15 min. Quinoxalines are known for their biological and therapeutic activities; hence, they are essential molecules. The biological activity of the synthesized quinoxaline derivatives has been evaluated against bacterial and fungal strains. 2023 Society of Chemical Industry. 2023 Society of Chemical Industry. -
Development of classical swine fever virus E2-protein based indirect ELISA for detection of antibodies against the virus in pigs
Classical swine fever (CSF) is an economically important and highly contagious disease of pigs caused by CSF virus, genus Pestivirus. Serological diagnosis of the disease is highly valuable for surveillance and thereby containment of spread of the disease. In this study, we have demonstrated the development of CSFV envelope glycoprotein E2-based indirect ELISA (E2-iELISA) for the detection of CSFV specific antibodies. The full-length E2 protein was expressed in E. coli and the purified protein was used as a coating antigen in indirect ELISA for detecting CSFV specific antibodies in pigs. A panel of 506 pig sera samples was used to validate the ELISA and the results were highly comparable to the results obtained with the commercial antibody detection kit (PrioCHECK CSFV Ab kit). The in-house E2-iELISA demonstrated high diagnostic sensitivity (95.4%) and specificity (95.5%), highlighting its potential application for sero-surveillance or monitoring of the disease in the swine population. The Author(s), under exclusive licence to Springer Nature B.V. 2024. -
Development of computational techniques for preserving privacy using secure multi-party computation protocols
Data related to individual wealth, financial status and health is sensitive and to ensure confidentiality of these data special mechanism is required. For betterment of research and development, requirement is right input from authorized users. Due to personal confidentiality concerns, it is very difficult to get individuals sensitive information even if it is for mutual benefits. To get the real time data from actual users is critical to achieve extraordinary quality research outcomes. In collaborative computation participants are unwilling to provide straight answers when the questions involve personal information. The service providers who collect s data need to establish substantial trust with the parties. The confidentiality and integrity guarantees of the proposed protocols can simplify this issue. newlinePrivacy preservation is a big challenge for the data generated from various sources such as social networking sites, online transactions, weather forecast to name a few. The socialization of the internet and cloud computing generates pica bytes of unstructured data online with intrinsic values. The inflow of big data and the requirement to move this information throughout an organization has become a new target for hackers. The collaborative computation data is subject to confidentiality laws and should be protected. newlinePeople are more interested toward outsourcing work to a third party rather than maintaining their own resources, in this circumstance there is a requirement of insuring security from the service provider as it may lead to security breaches and party may not be interested in such service providers. newlineSecure multi-party computations deals with collection of challenges in which the requirement is the collaborative computation result. This computation needs input from multiple parties, but all the parties are concerned about their individual input. -
Development of effective charging station for EVs using multiport converter and photovoltaic cell integration
The adoption of electric vehicles (EVs) is increasing rapidly as a response to the urgent need to reduce greenhouse gas emissions and dependence on fossil fuels. However, the deployment of a reliable and cost-effective EV charging infrastructure remains a challenge. To address this challenge, this paper proposes the development of an effective charging station using multiport converter and photovoltaic cell integration. A promising approach in the transportation sector is an efficient charging station with multiport converter and photovoltaic cell integration. A multiport converter, photovoltaic cells, a battery energy storage system, and an electric vehicle charging port constitute the proposed charging station. The power flow between the photovoltaic cells, the battery energy storage system, and the electric vehicle charging port is controlled by the multiport converter. The excess energy generated by the photovoltaic cells is stored in the battery energy storage system. The proposed charging station is designed and analysed using MATLAB/Simulink. The simulation results show that the proposed charging station is capable of providing an electric vehicle a reliable and consistent power supply. In contrast to conventional charging stations, the proposed charging station is also capable of offering a faster charging rate. 2024 Nova Science Publishers, Inc. All rights reserved. -
Development of efficient biometric recognition algorithms based on fingerprint and face
The reliable verification systems are required to verify and confirm the identity of an individual requesting their service. Secure access to the buildings, laptops, cellular phones, ATM etc. is an example of such applications. In the absence of robust verification systems, these systems are vulnerable to the wiles of an impostor. The traditional ways of authentications are passwords (knowledge – based security) and the ID Cards (token – based security). These methods can be easily breached due to the chance of stolen, lost or forget. The development and progress of biometrics technology, the fear of stolen, lost or forget can be eliminated. Biometrics refers to the automatic identification (or verification) of an individual (or a claimed identity) by using certain physiological or behavioral traits associated with the person. The biometrics identifies the person based on features vector derived from physiological or behavioural characteristics such as uniqueness, permanence, accessibility, collectability with minimum cost. The physiological biometrics are Fingerprint, Hand Scan, Iris Scan, Facial
Scan and Retina Scan etc., and behavioural biometric are Voice, Keystroke, Gait, Signature etc., The physiological biometrics measures the specific part of the structure or shape of a portion of a subject’s body. -
Development of Efficient Biometric Recognition algorithms based on Fingerprint and Face
The reliable verification systems are required to verify and confirm the identity of an individual requesting their service. Secure access to the buildings, laptops, cellular phones, ATM etc. is an example of such applications. In the absence of robust verification systems, these systems are vulnerable to the wiles of an impostor. The traditional ways of authentications are passwords (knowledge based security) and the ID Cards (token based security). These methods can be easily breached due to the chance of stolen, lost or forget. The development and progress of biometrics technology, the fear of stolen, lost or forget can be eliminated. Biometrics refers to the automatic identification (or verification) of an individual (or a claimed identity) by using certain physiological or newlinebehavioral traits associated with the person. newlineThe biometrics identifies the person based on features vector derived from physiological or behavioural characteristics such as uniqueness, permanence, accessibility, collectability with minimum cost. The newlinephysiological biometrics are Fingerprint, Hand Scan, Iris Scan, Facial Scan and Retina Scan etc., and behavioural biometric are Voice, Keystroke, Gait, Signature etc., The physiological biometrics measures the specific part of the structure or shape of a portion of a subject s body. But the behavioural biometric are more concerned with mood and environment.Chapter one presents the introduction to biometrics and its various newlinetraits. Further description like structure of the biometric system, different newlineapproaches are discussed. Also the design issues in biometric system such as universality, collectability, distinctiveness, permanence, acceptability, newlineuniqueness, performance, circumvention etc., are discussed. Chapter two gives a detailed survey of biometric techniques. It includes the literature survey of fingerprint and face biometric traits and various approaches. -
Development of efficient biometric recognition algorithms based on fingerprint and face /
The reliable verification systems are required to verify and confirm the identity of an individual requesting their service. Secure access to the buildings, laptops, cellular phones, ATM etc. is an example of such applications. In the absence of robust verification systems, these systems are vulnerable to the wiles of an impostor. The traditional ways of authentications are passwords (knowledge ?? based security) and the ID Cards (token ?? based security). These methods can be easily breached due to the chance of stolen, lost or forget. The development and progress of biometrics technology, the fear of stolen, lost or forget can be eliminated. Biometrics refers to the automatic identification (or verification) of an individual (or a claimed identity) by using certain physiological or behavioral traits associated with the person. The biometrics identifies the person based on features vector derived from physiological or behavioural characteristics such as uniqueness, permanence, accessibility, collectability with minimum cost. The physiological biometrics are Fingerprint, Hand Scan, Iris Scan, Facial Scan and Retina Scan etc., and behavioural biometric are Voice, Keystroke, Gait, Signature etc., The physiological biometrics measures the specific part of the structure or shape of a portion of a subjects body. But the behavioural biometric are more concerned with mood and environment. Chapter one presents the introduction to biometrics and its various traits. Further description like structure of the biometric system, different approaches are discussed. Also the design issues in biometric system such as universality, collectability, distinctiveness, permanence, acceptability, uniqueness, performance, circumvention etc., are discussed. Chapter two gives a detailed survey of biometric techniques. It includes the literature survey of fingerprint and face biometric traits and various approaches. In Chapter three, the algorithm of Fingerprint Verification based on Dual Tree Complex Wavelet Transformation (DTCWT) is proposed. The original fingerprint is cropped and resized to apply the DTCWT. The features of Fingerprint are obtained by applying different levels of DTCWT. Performance analysis is discussed with the FRR, FAR and TSR. Chapter four discusses another highly recommended source of authentication such as face recognition. In this chapter, the algorithm of Performance Comparison of Face Recognition using Transform Domain Techniques (PCFTD) is proposed. The face databases L ?? Spacek, JAFFE and NIR are considered. The features of face are generated using wavelet families such as Haar, Symelt and DB1 by considering approximation band only. The face features are also generated using magnitudes of FFTs. The test image features are compared with database features using Euclidian Distance (ED). The performance parameters such as FAR, FRR, TSR and EER computed using wavelet families and FFT. The methodology described in this paper is accurate, simple, fast and better than the existing algorithms. Chapter five presents conclusion and future work. -
Development of empirical formulas to determine the shear planes /
Patent Number: 202141033078, Applicant: Nanjunda K N.
The determination of shear planes is very essential in order to determine the design capacity of bolted joint due to single shear force or double shear force acted in either in lap joint or but joint. The shear plane is the plane between two or more pieces under the load where the pieces tend to move parallel from each other, but in opposite directions. The shear planes for lap joint and but joint with double cover plates with numbers of bolts are analysed. From this result empirical formulas are developed. -
Development of Enhance-Net Deep Learning Approach for Performance Boosting on Medical Images
Only a few clinical procedures include the use of clinical methods for the early detection, observing, evaluation, and treatment evaluation of a range of medical illnesses. Knowing the analysis of medical images in computer vision necessitates being acquainted with the core concepts and uses of deep learning and artificial neural networks. The A rapidly expanding area of study is the Deep Learning Approach (DLA) in medical image processing. DLA is often used in medical imaging to determine if an ailment is present or not. By producing speedier, more accurate results in real time, deep learning algorithms may make the jobs of radiologists and orthopaedic surgeons easier. But the standard deep learning approach has reached its efficiencies. While offering an ideal solution known as boost-Net, we study numerous optimization strategies to increase the effectiveness of deep neural networks in this research. From a selection of well-known deep learning models, Champion-Net was selected as the deep learning model. The musculoskeletal radiograph-bone classification (MURA-BC) dataset is used in this investigation. Utilizing the train and test datasets, Enhance-Net's classification precision was evaluated. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025. -
Development of Family Intervention for Management of Psychogenic Seizures : A Qualitative Study
Background: In the somatoform and dissociative spectrum, family functioning has been poorly researched based on the search in PubMed, Google Scholar, Science Direct, PROQUEST, EBSCO and Cochrane Reviews. In Psychogenic Non-Epileptic Seizures (PNES) primarily, family functioning has been understood as a comparison between Epileptic Seizures (ES) and PNES. However, an attempt to study different aspects of family functioning and its ability to influence the newlinemanifestation of the disorder is yet to be made. Methods: This study attempted to understand different family functions qualitatively by interviewing both the patients and family members of these patients. Nine patients and seven families of these patients participated in the study. Braun and Clarke s thematic model was used. Latent thematic analysis was used to analyse the data. Based on the analysis, major and sub-themes were used to develop family intervention and a family psychoeducational model. Both were developed with the help of the GUIDED Checklist to report health interventions; the TIDieR format and Delphi newlinetechnique was used to collect the expert opinion of the developed intervention. newlineResults: Two sets of results and analyses were compiled with qualitative data, that is, for patients and families. Major themes and sub-themes were developed for both, including family interaction, attachment, poor communication, structural-systemic aspects, distressful family aspects, negative newlineexpressed emotions, cultural aspects, nature of the illness, family s views of the illness and coping mechanisms. These themes indicated the importance of family functioning and its impact on the manifestation of the disorder. newlineConclusion: The researcher concludes that family dysfunction can impact the manifestation of the disorder. Hence, an additional family intervention or psychoeducation is essential for holistic newlinetreatment.