495 research outputs found

    Segmentation and feature extraction of fluid-filled uterine fibroid–A knowledge-based approach

    Get PDF
    Uterine fibroids are the most common pelvic tumours in females. Ultrasound images of fibroids require image segmentation and feature extraction for analysis. This paper proposes a new method for segmenting the fluid-filled fibroid found in the uterus. It presents a fully automatic approach in which there is no need for human intervention. The method used in this paper employs a number of knowledge-based rules to locate the object and also utilises the concepts in mathematical morphology. It also extracts the necessary features of the fibroid which can be used to prepare the radiological report. The performance of this method is evaluated using area-based metrics

    A Study on The Factors Influencing The Investors’ Attitude Towards Mutual Funds – With Special Reference to Salem City, Tamil Nadu

    Get PDF
    This paper seeks to understand the various demographic factors which affect investors’ attitude towards mutual fund. For analysing the collected data, percentage analysis and Chi-square test has been used and also ranking was done for analysing the various factors responsible for investment in mutual funds on the basis of the weighed scores. The findings of this research will help the mutual fund companies in identifying the areas to be concentrated for the improvement in investors’ response to mutual funds

    Moral Principles in the Politics of Kings in Puranaanooru

    Get PDF
    A man should always act with good intentions. It is good thoughts and virtuous actions that ultimately bring good to a person. Realizing this, the scholars guided the kings with the help of the tool of knowledge. Apart from that, they paved the way for the blossoming of virtuous thoughts in the minds of the kings and the establishment of good governance. And the Purananooru suggests that the poets imparted to the rulers the moral principles that a king should protect his subjects like a mother who protects her child with little self-interest. Poets highlighted many morals to make society in good order during the Sangam period. When the king failed to perform his duty in political rule and deviated from the principles to be followed in war, even if he had forgotten charity, the Sangam poets are credited with advising the kings in a proper manner and changing their rule in a righteous way, even if they had not shown mercy to the enemy. Even the kings who listened to the pious thoughts of the poets are worthy of admiration even today. Many of the works that propose the superiority of Tamil are among the works that guide the norms that are followed even today. Even though it is a book that talks about Purananooru war stories and bad news, it takes all the principles of human life. The rule of the kings led to the happiness of the people. The ancient Tamil kings were not only brave but full of courage, and the purpose of this article is to investigate the political principles and practises followed by the kings during their reign

    Can cross-cultural awareness programs help to lead? With the help of MIS

    Get PDF
    Purpose:The purpose of the study is to contribute to the issue of cross-cultural management and the contemporary management of cultural diversity. Furthermore, illustrate how diversity management may lead to a competitive advantage.  Theoretical framework:This part mainly discusses the related theories to lay a solid foundation for the smooth implementation of theories. Besides, these theories will provide theoretical support for cross-cultural awareness.   Design/methodology/approach:The researchers used a descriptive and explanatory strategy to detect cultural distinctions between Indian national and global cultures. The empirical findings are based on a qualitative case study of the Indian and international management of the company. The empirical data came from semi-structured interviews with people interested in cultural diversity and how to handle it collaboratively. Particular emphasis is on four aspects of cross-culture: hierarchy, time, gender equality, and relationships.   Findings:The findings show that a culturally varied workforce enhances competitive advantage when managed appropriately. In addition, individuals from many cultural backgrounds will offer their perspectives, abilities, and concerns.   Research implications:The model of central cross-cultural aspects is identified. Similarly, further studies are also required to ascertain the effectiveness of cross-cultural awareness programs.   Practical implications:The MNCs should include this kind of training in their CCT programs to create team member awareness. It would make the expatriates more aware of the issues they will be facing, will motivate them to learn and acquire the necessary skills, and will familiarize them with By letting them know what to anticipate, you may reduce any potential stress, speed up the transition process, and support the earliest possible development of cross-cultural competency.   Social implications :The social importance of this research is its potential increase in cross cultural awareness and acceptance of differences among cross cultural employees. In addition, it fosters a deep and broad knowledge of and respect for the myriad values and norms of individuals from diverse social groups who work with them.   Originality/value :The study is an original effort to look at four cross-cultural aspects to see how problems in these areas could be alleviated. Understanding the cultural differences within these dimensions can help you better grasp how to manage these differences inside a European multinational firm with Indian operations

    Use of Digital Tools for Horizontal Spread of Agricultural Technologies by Farmers of Kerala

    Get PDF
    In this digital era, integration of digital tools is common in every sector and agriculture is not an exception. The present study was conducted among the farmers of Kerala who were using various digital tools, during the year 2018-2019. The sample of the study consisted of 120 farmers from three zones of Kerala. Awareness and Preference of the respondents were studied in order to find out the horizontal spread. Based on the results obtained it was found that all farmers were aware about tools like television, mobile phone and social media. Most of the farmers had selected mobile phones as the most preferred tool. Farmers were found to use mobile phones mainly for ‘crop protection’ purposes and social media for ‘marketing’ purposes

    Malware Detection Using Tlenet On Image Data

    Get PDF
    The prevalence of malicious software is referred to as malware and has seen a notable increase today. It is a significant threat to the overall integrity of internet security in modern time is significant. Malware is a dangerous threat to the whole internet users due to its unauthorized data acquisition and inflict damage upon computer systems. Malware detection has gathered a significant attention within academic fields due to the growing prevalence of malware. Threats pose risks to the individual computer users, corporations and governmental entities, etc., to detect the unidentified malware in real-time is difficult. The malware detection systems depend on the examination of the malware signatures and behavioral patterns is by the combination of dynamic and static analysis.  The problem is to identify and categorise the malicious software by image analysis techniques. Deep learning (DL) are used for image recognition after the conversion of executable files into image formats in the mailimg and ImageNet datasets. Transfer learning is used to train deep learning models for large-scale datasets. The problem within this method is slow and laborious. In pursuit of the objective, the study investigates the implementation of deep convolutional neural networks to classify the malware. Additionally, it provides methodologies for effectively using transfer learning techniques to compromise the challenges associated with detecting and categorizing the different types of malware. To enhance the classification of malware, a pre-trained convolutional neural network (CNN) in transfer learning is used to categorize the malware images from the Malimg and ImageNet datasets are proposed. The Malimg dataset consists of malicious programs in the form of images are classified using the portable executable files. EfficientNet3 classifier has scored an impressive accuracy of 99.60 percentage

    ROLE OF VITAMIN C AND VITAMIN E ON HYPERTENSION

    Get PDF
    Objective: Both Vitamin C and Vitamin E supplementation were associated with reduction in blood pressure (BP) in observational studies, although, results of clinical trials are inconsistent. The objective of our study is to conduct a clinical trial to observe the effects of oral supplementation of Vitamin C and Vitamin E on BP. Methods: About 60 non-teaching staffs of our college with systolic BP more than 130 mmHg and diastolic BP more than 90 mmHg were taken as subjects and divided into two groups. Initial BP and BP after oral Vitamin C, 500 mg/day for a period of 12weeks to Group 1 and initial BP and BP after oral Vitamin E, 200 IU/day, for a period of 12 weeks to Group 2 were recorded. Results: Statistical analysis was done by paired t-test, analysis of variance (ANOVA), and least significant difference (LSD) tests. *p<0.05 was considered statistically significant. Systolic 2 and diastolic 2 – after 3 months of supplementation showed 0.161 and 0.161 which is not significant. ANOVA and LSD tests show no significant results. Conclusion: Long-term trials on the effects of Vitamin C and Vitamin E supplementation on BP and clinical events are needed

    Comparative evaluation of antimicrobial efficacy of various phytochemical irrigants and 3% sodium hypochlorite against an endodontic biofilm model and scanning electron microscopic observation of surface morphology of root canal dentin after treatment with different irrigants: An Ex Vivo study

    Get PDF
    AIM OF THE STUDY: To determine the optimum concentration of herbal extracts namely Acacia nilotica (Babool), Azadirachta indica (Neem), Cinnamomum zeylanicum (Cinnamon), and Syzygium aromaticum (Clove) for their antimicrobial activity and to test the efficacy of herbal irrigation against 3% Sodium Hypochlorite, together with instrumentation in the removal of multispecies endodontic biofilm. MATERIALS AND METHODS: Ethanolic extract of A.nilotica, A.indica, C.zeylanicum and S.aromaticum was prepared and the susceptibility of mixed microbial strain to different antibiotics Vs herbal extracts was tested using well diffusion method to determine the optimum concentration of the extract. Sixty single-rooted human mandibular premolars were decoronated, prepared and randomly grouped into five groups consisting of 12 teeth each. Two teeth in each group were selected and prepared for viewing under Scanning Electron Microscope (SEM) after the irrigation protocol. Group I – conventional irrigation consisting 3% Sodium Hypochlorite (NaOCl), Group II – irrigation with Acacia nilotica extract, Group III – irrigation with Azadirachta indica extract, Group IV – irrigation with Cinnamomum zeylanicum extract, Group V – irrigation with Syzygium aromaticum extract. All the prepared teeth were sterilized and the canals were inoculated with mixed human subgingival plaque bacteria and incubated at 37ᵒC for 24 hours to allow the biofilm to form. The teeth specimens were treated with the various irrigants to be tested and the antibacterial efficacy of the herbal extracts compared to NaOCl was evaluated by Culture Study (Colony Counting) and Turbidity Testing (Optical Density at 600nm). RESULTS: The results showed that complete elimination of bacteria was not achieved in any of the experimental groups. The best antibacterial activity through Optical Density was shown by Group I, followed by Group II and the least by Group III. The best antibacterial activity through Colony Counting was shown by Group I, followed by Group II and the least by Group V. Scanning Electron Microscopy analysis showed moss like depositions on the dentin surface in Group IV and V and mat like depositions in Group I and II, whereas dentin surface in Group I showed relatively clear dentinal surface with patent dentinal tubules. CONCLUSION: Within the limitations of this study, 3% sodium hypochlorite showed maximum antibacterial activity, followed by Acacia nilotica which showed almost similar results. The use of herbal alternatives as a root canal irrigant might prove to be advantageous considering the several undesirable characteristics of Sodium Hypochlorite. Further research is needed to overcome the deposition of extracts on the dentin surface and conclusively recommend herbal solutions as root canal irrigants

    Multi-Biometric System Based On The Fusion Of Fingerprint And Finger-Vein

    Get PDF
    Biometrics is the process of measuring the unique biological traits of an individual for identification and verification purposes. Multiple features are used to enhance the security and robustness of the system. This study concentrates exclusively on the finger and employs two modalities - fingerprint and finger vein. The proposed system utilizes feature extraction for finger vein and two matching algorithms, namely ridge-based matching, and minutiae-based matching, to derive matching scores for both biometrics. The scores from the two modalities are combined using four fusion approaches: holistic fusion, non-linear fusion, sum rule-based fusion, and Dempster-Shafer theory. The ultimate decision is made by the performance metrics and the Receiver Operating Characteristics (ROC) curve of the fusion technique with the best results. The proposed technique is tested on images collected from the "Nanjing University Posts and Telecommunications- Fingerprint and Finger vein dataset (NUPT-FPV)." According to the results, which were obtained for 840 input images the proposed system accomplishes the Equal Error Rate (EER) of 0% while using Dempster Shafer-based fusion and 14% while using the other three fusion techniques. Also, the False Acceptance Rate (FAR) is very low at 0% for all the fusion techniques which are crucial for security and preventing unauthorized access
    corecore