Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Search Results: 1 - 10 of 265 matches for " Senthilkumar Thiyagarajan "
All listed articles are free for downloading (OA Articles)
Page 1 /265
Display every page Item
Comparing the Effectiveness of Motor Control Exercises versus Mckenzie Exercises for Work Related Back Pain  [PDF]
Tanvi Tanna, Senthilkumar Thiyagarajan, Prabhu Chinna Gounder
Open Journal of Therapy and Rehabilitation (OJTR) , 2016, DOI: 10.4236/ojtr.2016.43017
Abstract: Background: Work related low back pain has been identified as a one of the most costly disorders among the worldwide working population. This condition was highly prevalent that approximately 85% patients having back pain were brought on by prolonged sitting. With the rapid development of modern technology, sitting has now become the most common posture in today’s work- place. Idea of using motor control learning approach provides the optimal control and coordination of the spine. The McKenzie evaluation was received using repeated movements and sustained positions. Therefore high quality randomized clinical trial was required to compare the effectiveness of these treatments for work related low back pain. Objectives: To compare the effectiveness of motor control exercises and McKenzie exercises in reducing pain and disability in work related low back pain. Method: The study included 40 subjects with work related low back pain due to prolonged sitting. They were randomly allocated into two groups (Group A and Group B). Group A was treated with motor control exercises and group B was treated with McKenzie exercises for 4 weeks. Results: Both the groups have shown statically significant improvement in vas with p < 0.0001 and ODI with p < 0.0001. When the comparison was done after the 4 weeks, the percentage of improvement in group A was much higher than Group B. Conclusion: The study concluded that motor control exercises have shown statically and clinically significant improvement in reducing pain and disability when compared to McKenzie exercises among work related low back pain subjects.
Literature Review of Single Machine Scheduling Problem with Uniform Parallel Machines  [PDF]
Panneerselvam Senthilkumar, Sockalingam Narayanan
Intelligent Information Management (IIM) , 2010, DOI: 10.4236/iim.2010.28056
Abstract: This paper presents a survey of single machine scheduling problem with uniform parallel machines. The single machine scheduling problem with uniform parallel machines consists of n jobs, each with single operation, which are to be scheduled on m parallel machines with different speeds. These parallel machines are also called proportional machines or related machines. There are several measures of performance which are to be optimized in uniform parallel machines scheduling. Since, this scheduling problem is a combinatorial problem; usage of a heuristic is inevitable to obtain solution in polynomial time. This paper gives a classification of the literatures of this scheduling problem in three major categories, viz. offline scheduling, online scheduling and miscellaneous scheduling. In total, the available literatures are classified into 17 subgroups. Under each of the first two categories, the available literatures are discussed under different groups based on different measures of performance and non-preemptive/preemptive nature of the jobs. In the last category, the literatures are discussed under three subgroups, namely non-preemptive jobs, preemptive jobs and periodic jobs.
QoS Aware Power and Hop Count Constraints Routing Protocol with Mobility Prediction for MANET Using SHORT  [PDF]
Senthilkumar Maruthamuthu, Somasundaram Sankaralingam
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2011, DOI: 10.4236/ijcns.2011.43023
Abstract: A mobile ad hoc network (MANET) is composed of mobile nodes, which do not have any fixed wired communication infrastructure. This paper proposes a protocol called “Delay, Jitter, Bandwidth, Cost, Power and Hop count Constraints Routing Protocol with Mobility Prediction for Mobile Ad hoc Network using Self Healing and Optimizing Routing Technique (QPHMP-SHORT)”. It is a multiple constraints routing protocol with self healing technique for route discovery to select a best routing path among multiple paths between a source and a destination as to increase packet delivery ratio, reliability and efficiency of mobile communication. QPHMP-SHORT considers the cost incurred in channel acquisition and the incremental cost proportional to the size of the packet. It collects the residual battery power of each node for each path; selects multiple paths, which have nodes with good battery power for transmission to satisfy the power constraint. QPHMP-SHORT uses Self-Healing and Optimizing Routing Technique (SHORT) to select a shortest best path among multiple selected paths by applying hops count constraint. It also uses the mobility prediction formula to find the stability of a link between two nodes.
Simulated Annealing Algorithm to Minimize Makespanin Single Machine Scheduling Problem withUniform Parallel Machines  [PDF]
Panneerselvam Senthilkumar, Sockalingam Narayanan
Intelligent Information Management (IIM) , 2011, DOI: 10.4236/iim.2011.31003
Abstract: This paper presents a simulated annealing algorithm to minimize makespan of single machine scheduling problem with uniform parallel machines. The single machine scheduling problem with uniform parallel machines consists of n jobs, each with single operation, which are to be scheduled on m parallel machines with different speeds. Since, this scheduling problem is a combinatorial problem; usage of a heuristic is inevitable to obtain the solution in polynomial time. In this paper, simulated annealing algorithm is presented. In the first phase, a seed generation algorithm is given. Then, it is followed by three variations of the simulated annealing algorithms and their comparison using ANOVA in terms of their solutions on makespan.
Health Care Discrimination in HIV Care  [PDF]
Jayakumar Palanisamy, Senthilkumar Subramanian
World Journal of AIDS (WJA) , 2011, DOI: 10.4236/wja.2011.13015
Abstract: Human Immunodeficiency Virus (HIV) infected population is experiencing enormous amount of social discrimination and stigmatization compared to other patients with any other chronic illness. Healthcare setup is not an exception where the HIV infected patients are shuttled from one place to another to get their basic services compared to HIV negative patients. This referral game of manipulation imparts additional stress to the already stressed HIV infected population. The physical and psychological impacts caused by other chronic conditions will be supplemented by social impact in the HIV infected population. This referral game in healthcare can cause the HIV infected to avoid their health seeking behavior and it may bring them back to their high risk activities, which can result in higher mortality/morbidity and failure in prevention and intervention strategies.
GA Based Heuristic to Minimize Makespan in Single Machine Scheduling Problem with Uniform Parallel Machines  [PDF]
P. Senthilkumar, S. Narayanan
Intelligent Information Management (IIM) , 2011, DOI: 10.4236/iim.2011.35025
Abstract: This paper considers the single machine scheduling problem with uniform parallel machines in which the objective is to minimize the makespan. Four different GA based heuristics are designed by taking different combinations of crossover methods, viz. single point crossover method and two point crossover method, and job allocation methods while generating initial population, viz. equal number of jobs allocation to machines and proportionate number of jobs allocation to machines based on machine speeds. A detailed experiment has been conducted by assuming three factors, viz. Problem size, crossover method and job allocation method on 135 problem sizes each with two replications generated randomly. Finally, it is suggested to use the GA based heuristic with single point crossover method, in which the proportionate number of jobs allocated to machines based on machine speeds.
Synthesis and Characterization of Ultrafine Grained 304 Stainless Steel through Machining  [PDF]
V. Senthilkumar, K. Lenin
Journal of Minerals and Materials Characterization and Engineering (JMMCE) , 2011, DOI: 10.4236/jmmce.2011.105034
Abstract: The microstructures of 304 stainless steel chips created by plane strain machining at ambient temperature have been analyzed using scanning electron microscopy (SEM) and the crystallite size of the ultrafine chips were analyzed using X-Ray Diffraction Analysis. The strain imposed in the chips was varied by changing the tool rake angle. An attempt is made in the present investigation to correlate the plastic strain, strain rate with the grain size of the stainless steel.
Growth, Structural, Spectral and Optical Studies on Pure and L-Alanine Mixed Bisthiourea Cadmium Bromide (LABTCB) Crystals  [PDF]
M. Senthilkumar, C. Ramachandraraja
Journal of Minerals and Materials Characterization and Engineering (JMMCE) , 2012, DOI: 10.4236/jmmce.2012.116046
Abstract: Pure bisthiourea cadmium bromide (BTCB) and 1 mole % L-alanine mixed bisthiourea cadmium bromide (LABTCB) single crystals have been grown by slow evaporation method. The grown crystals have been characterized by single crystal XRD analysis, powder XRD analysis, FTIR analysis, UV-Vis-NIR analysis and SHG studies. XRD analysis confirms the crystalline nature of the materials. The addition of L-alanine changes the crystal structure from orthorhombic to tetragonal. The presence of various functional groups present in the pure BTCB and LABTCB crystals have been confirmed by FTIR analysis. The UV-Vis-NIR spectrum shows the transmission characteristics of the crystals. The SHG study depicts the nonlinear optical efficiency of the crystals.
High Speed and Low Power Architecture for Network Intrusion Detection System  [PDF]
Palanisamy Brindha, Athappan Senthilkumar
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.78115
Abstract: The tremendous growth in the field of modern communication and network systems places demands on the security. As the network complexity grows, the need for the automated detection and timely alert is required to detect the abnormal activities in the network. To diagnose the system against the malicious signatures, a high speed Network Intrusion Detection System is required against the attacks. In the network security applications, Bloom Filters are the key building block. The packets from the high speed link can be easily processed by Bloom Filter using state- of-art hardware based systems. As Bloom Filter and its variant Counting Bloom Filter suffer from False Positive Rate, Multi Hash Counting Bloom Filter architecture is proposed. The proposed work, constitute parallel signature detection improves the False Positive Rate, but the throughput and hardware complexity suffer. To resolve this, a Multi-Level Ranking Scheme is introduced which deduces the 13% - 16% of the power and increases the throughput to 23% - 30%. This work is best suited for signature detection in high speed network.
Thiyagarajan M
Journal of Global Research in Computer Science , 2012,
Abstract: : Product Authentication is one of the fundamental procedures to ensure the standard and quality of any product in the market. Counterfeit products are often offered to consumers as being authentic. Counterfeit consumer goods such as electronics, music, apparel, and Counterfeit medications have been sold as being legitimate. Efforts to control the supply chain and educate consumers to evaluate the packaging and labeling help ensure that authentic products are sold and used. However educating the consumer to evaluate the product is a challenging task. Our work ensures that the task is made as simple with the help of a camera enabled mobile phone supported with QR (Quick Response) Code Reader. We propose a model whereby the application in the mobile phone decodes the captured coded image and sends it through the Cloud Data Management Interface for authentication. The system then forwards the message to product manufacturer’s data center or any central database and the response received from the cloud enables the consumer to decide on the products authenticity. The authentication system is made as a pay per use model and thereby making it as a Security as a Service (Saas) architecture. The system is being implemented with a mobile toolkit in the cloud environment provided by the simulator Cloud Sim 1.0.
Page 1 /265
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.