178 research outputs found
Effect of alkaline hydrolysis on low-stress mechanical properties of polyester/cotton blended weft knitted fabrics
Polyester/cotton blended weft knitted fabrics produced from ring-spun yarn have been treated with alkaline hydrolysis to study their low-stress mechanical and thermal properties. The major changes in the low-stress mechanical properties of the treated fabrics have been noticed. The most affected properties are tensile, shear, bending, and compression. Surprisingly, alkaline hydrolysis treatment increases surface roughness. The thermal properties are also found to exhibit good handling by the alkaline hydrolysis treatment. The 35/65 polyester/cotton blended fabrics exhibit an increase in thermal insulation property. It is apparent that the 65/35 polyester/cotton blended knitted fabric exhibits an exceptionally good handle following alkaline hydrolysis
Comparison of one step glucose tolerance test (75 g GTT) and two step glucose tolerance test (100 g GTT) in screening and diagnosis of gestational diabetes mellitus
Background: Studies suggesting that increasing carbohydrate intolerance among patients not meeting the criteria for the diagnosis of GDM by two step OGTT leads to an increased rate of unfavourable maternal and perinatal outcomes. Patients with abnormal GCT results but a normal OGTT are at increased risk, as are those with one abnormal OGTT value rather than the two required for diagnosis by ADA criteria. Single value of one step GTT is enough to diagnose GDM and to improve the maternal and perinatal complications. The objective is to compare the efficacy of one step OGTT with two step OGTT in screening and diagnosis of gestational diabetes mellitus.Methods: Hospital based analytical cross-sectional study which was conducted for 1 year among all pregnant women booked at government medical college, Alappuzha. They were subjected to detect GDM by 2 methods at 24-28 weeks.Results: 2521 pregnant women were subjected for study, among them who were either 75 gm GTT or 50 gm GCT or both positive (332 pregnant women) were analyzed. 232 women (69.88%) were diagnosed as having gestational diabetes mellitus (GDM) by single step 75 gm GTT. Sensitivity of single step GTT was 92.4% and a false negative rate of the same was 7.6%. False negative rate for 50 gm GCT was 35.2%.Conclusions: Present study concluded that this one step procedure is feasible in terms of better detection rates, saving time, limiting cost on repeated visits to health centre and reducing repeated invasive sampling. Single step GTT will be used both as a screening and a diagnostic procedure for detecting GDM
Safe Routing Approach by Identifying and Subsequently Eliminating the Attacks in MANET
Wireless networks that are decentralized and communicate without using
existing infrastructure are known as mobile ad-hoc networks. The most common
sorts of threats and attacks can affect MANETs. Therefore, it is advised to
utilize intrusion detection, which controls the system to detect additional
security issues. Monitoring is essential to avoid attacks and provide extra
protection against unauthorized access. Although the current solutions have
been designed to defeat the attack nodes, they still require additional
hardware, have considerable delivery delays, do not offer high throughput or
packet delivery ratios, or do not do so without using more energy. The
capability of a mobile node to forward packets, which is dependent on the
platform's life quality, may be impacted by the absence of the network node
power source. We developed the Safe Routing Approach (SRA), which uses
behaviour analysis to track and monitor attackers who discard packets during
the route discovery process. The attacking node recognition system is made for
irregular routing node detection to protect the controller network's usual
properties from becoming recognized as an attack node. The suggested method
examines the nearby attack nodes and conceals the trusted node in the routing
pathway. The path is instantly assigned after the initial discovery of trust
nodes based on each node's strength value. It extends the network's life span
and reduces packet loss. In terms of Packet Delivery Ratio (PDR), energy
consumption, network performance, and detection of attack nodes, the suggested
approach is contrasted with AIS, ZIDS, and Improved AODV. The findings
demonstrate that the recommended strategy performs superior in terms of PDR,
residual energy, and network throughput
Leveraging Semi-Supervised Graph Learning for Enhanced Diabetic Retinopathy Detection
Diabetic Retinopathy (DR) is a significant cause of blindness globally,
highlighting the urgent need for early detection and effective treatment.
Recent advancements in Machine Learning (ML) techniques have shown promise in
DR detection, but the availability of labeled data often limits their
performance. This research proposes a novel Semi-Supervised Graph Learning SSGL
algorithm tailored for DR detection, which capitalizes on the relationships
between labelled and unlabeled data to enhance accuracy. The work begins by
investigating data augmentation and preprocessing techniques to address the
challenges of image quality and feature variations. Techniques such as image
cropping, resizing, contrast adjustment, normalization, and data augmentation
are explored to optimize feature extraction and improve the overall quality of
retinal images. Moreover, apart from detection and diagnosis, this work delves
into applying ML algorithms for predicting the risk of developing DR or the
likelihood of disease progression. Personalized risk scores for individual
patients are generated using comprehensive patient data encompassing
demographic information, medical history, and retinal images. The proposed
Semi-Supervised Graph learning algorithm is rigorously evaluated on two
publicly available datasets and is benchmarked against existing methods.
Results indicate significant improvements in classification accuracy,
specificity, and sensitivity while demonstrating robustness against noise and
outlie rs.Notably, the proposed algorithm addresses the challenge of imbalanced
datasets, common in medical image analysis, further enhancing its practical
applicability.Comment: 13 pages, 6 figure
Outsourced Analysis of Encrypted Graphs in the Cloud with Privacy Protection
Huge diagrams have unique properties for organizations and research, such as
client linkages in informal organizations and customer evaluation lattices in
social channels. They necessitate a lot of financial assets to maintain because
they are large and frequently continue to expand. Owners of large diagrams may
need to use cloud resources due to the extensive arrangement of open cloud
resources to increase capacity and computation flexibility. However, the
cloud's accountability and protection of schematics have become a significant
issue. In this study, we consider calculations for security savings for
essential graph examination practices: schematic extraterrestrial examination
for outsourcing graphs in the cloud server. We create the security-protecting
variants of the two proposed Eigen decay computations. They are using two
cryptographic algorithms: additional substance homomorphic encryption (ASHE)
strategies and some degree homomorphic encryption (SDHE) methods. Inadequate
networks also feature a distinctively confidential info adaptation convention
to allow the trade-off between secrecy and data sparseness. Both dense and
sparse structures are investigated. According to test results, calculations
with sparse encoding can drastically reduce information. SDHE-based strategies
have reduced computing time, while ASHE-based methods have reduced stockpiling
expenses
A Neural Radiance Field-Based Architecture for Intelligent Multilayered View Synthesis
A mobile ad hoc network is made up of a number of wireless portable nodes that spontaneously come together en route for establish a transitory network with no need for any central management. A mobile ad hoc network (MANET) is made up of a sizable and reasonably dense community of mobile nodes that travel across any terrain and rely solely on wireless interfaces for communication, not on any well before centralized management. Furthermore, routing be supposed to offer a method for instantly delivering data across a network between any two nodes. Finding the best packet routing from across infrastructure is the major issue, though. The proposed protocol's major goal is to identify the least-expensive nominal capacity acquisition that assures the transportation of realistic transport that ensures its durability in the event of any node failure. This study suggests the Optimized Route Selection via Red Imported Fire Ants (RIFA) Strategy as a way to improve on-demand source routing systems. Predicting Route Failure and energy Utilization is used to pick the path during the routing phase. Proposed work assess the results of the comparisons based on performance parameters like as energy usage, packet delivery rate (PDR), and end-to-end (E2E) delay. The outcome demonstrates that the proposed strategy is preferable and increases network lifetime while lowering node energy consumption and typical E2E delay under the majority of network performance measures and factors
Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration
As the integration of Internet of Things devices with cloud computing
proliferates, the paramount importance of privacy preservation comes to the
forefront. This survey paper meticulously explores the landscape of privacy
issues in the dynamic intersection of IoT and cloud systems. The comprehensive
literature review synthesizes existing research, illuminating key challenges
and discerning emerging trends in privacy preserving techniques. The
categorization of diverse approaches unveils a nuanced understanding of
encryption techniques, anonymization strategies, access control mechanisms, and
the burgeoning integration of artificial intelligence. Notable trends include
the infusion of machine learning for dynamic anonymization, homomorphic
encryption for secure computation, and AI-driven access control systems. The
culmination of this survey contributes a holistic view, laying the groundwork
for understanding the multifaceted strategies employed in securing sensitive
data within IoT-based cloud environments. The insights garnered from this
survey provide a valuable resource for researchers, practitioners, and
policymakers navigating the complex terrain of privacy preservation in the
evolving landscape of IoT and cloud computingComment: 33 page
Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing
With the onset of the Information Era and the rapid growth of information
technology, ample space for processing and extracting data has opened up.
However, privacy concerns may stifle expansion throughout this area. The
challenge of reliable mining techniques when transactions disperse across
sources is addressed in this study. This work looks at the prospect of creating
a new set of three algorithms that can obtain maximum privacy, data utility,
and time savings while doing so. This paper proposes a unique double encryption
and Transaction Splitter approach to alter the database to optimize the data
utility and confidentiality tradeoff in the preparation phase. This paper
presents a customized apriori approach for the mining process, which does not
examine the entire database to estimate the support for each attribute.
Existing distributed data solutions have a high encryption complexity and an
insufficient specification of many participants' properties. Proposed solutions
provide increased privacy protection against a variety of attack models.
Furthermore, in terms of communication cycles and processing complexity, it is
much simpler and quicker. Proposed work tests on top of a realworld transaction
database demonstrate that the aim of the proposed method is realistic
A system of remote patients' monitoring and alerting using the machine learning technique
Machine learning has become an essential tool in daily life, or we can say it is a powerful tool in the majority of areas that we wish to optimize. Machine learning is being used to create techniques that can learn from labelled or unlabeled information, as well as learn from their surroundings. Machine learning is utilized in various areas, but mainly in the healthcare industry, where it provides significant advantages via appropriate decision and prediction methods. ,e proposed work introduces a remote system that can continuously monitor the patient and can produce an alert whenever necessary. ,e proposed methodology makes use of different machine learning algorithms along with cloud computing for continuous data storage. Over the years, these technologies have resulted in significant advancements in the healthcare industry. Medical professionals utilize machine learning tools and methods to analyse medical data in order to detect hazards and offer appropriate diagnosis and treatment. ,e scope of remote healthcare includes anything from tracking chronically sick patients, elderly people, preterm children, and accident victims.The current study explores the machine learning technologies’ capability of monitoring remote patients and alerts their current condition through the remote system. New advances in contactless observation demonstrate that it is only necessary for the patient to be present within a few meters of the sensors for them to work. Sensors connected to the body and environmental sensors connected to the surroundings are examples of the technology available.Campus At
- …
