oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 29 )

2018 ( 185 )

2017 ( 208 )

2016 ( 333 )

Custom range...

Search Results: 1 - 10 of 201044 matches for " P. Yogesh "
All listed articles are free for downloading (OA Articles)
Page 1 /201044
Display every page Item
Tuberous xanthoma of upper eye lids
Shukla Yogesh,Ratnawat P
Indian Journal of Ophthalmology , 1982,
Abstract:
Spin glass like behavior in the novel layered material Na_2IrO_3
Yogesh Singh,P. Gegenwart
Physics , 2010,
Abstract: We have synthesized the novel material Na_2IrO_3 and studied its structure, transport, magnetic, and thermal properties using powder x-ray diffraction (PXRD), electrical resistivity, isothermal magnetization M versus magnetic field H, static \chi and dynamic \chi_ac magnetic susceptibility versus temperature T, and heat capacity C versus T measurements. Na_2IrO_3 crystallizes in the monoclinic C2/c (No. 15) structure which is made up of Na and NaIr_2O_6 layers alternately stacked along the c axis. From a Rietveld refinement of the PXRD pattern we identify atomic disorder arising from a mixing of Ir and Na sites within the NaIr_2O_6 layers. The \chi data in H = 1 T shows Curie-Weiss behavior at high T > 100 K with an effective moment \mu_eff = 1.82(1) \mu_B indicating an effective spin S_eff = 1/2 on the Ir^{4+} moments. A Weiss temperature \theta = - 62(1) K indicates substantial antiferromagnetic interactions between these S_eff = 1/2, Ir^{4+} moments. The \chi data in low field show a sharp cusp at T_g = 5.5 K and there is a bifurcation between zero-field-cooled (ZFC) and field-cooled (FC) data below this T. The \chi_ac data also show a sharp cusp at T_g = 5.5 K at a frequency f = 1 Hz which moves to higher temperatures with increasing f. We did not observe any anomaly at T_g in our C measurements and only a broad shoulder was observed at a much higher T = 12 K. Our results indicate that in Na_2IrO_3, a spin-glass like state occurs below the freezing temperature T_g = 5.5 K and this freezing most likely arises either from structural disorder or geometrical magnetic frustration.
Antiferromagnetic Mott insulating state in single crystals of the hexagonal lattice material Na2IrO3
Yogesh Singh,P. Gegenwart
Physics , 2010,
Abstract: We have synthesized single crystals of Na_2IrO_3 and studied their structure, transport, magnetic, and thermal properties using powder x-ray diffraction (PXRD), electrical resistivity, isothermal magnetization M versus magnetic field H, magnetic susceptibility \chi versus temperature T, and heat capacity C versus T measurements. Na_2IrO_3 crystallizes in the monoclinic \emph{C2/c} (No. 15) type structure which is made up of Na and NaIr_2O_6 layers alternately stacked along the c axis. The \chi(T) data show Curie-Weiss behavior at high T > 200K with an effective moment \mu_eff = 1.82(1) \mu_B indicating an effective spin S_eff = 1/2 on the Ir^4+ moments. A large Weiss temperature \theta = - 116(3)K indicates substantial antiferromagnetic interactions between these S_eff = 1/2, Ir^4+ moments. Sharp anomalies in \chi(T) and C(T) data indicate that Na_2IrO_3 undergoes a transition into a long-range antiferromagnetically ordered state below T_N = 15 K. The magnetic entropy at T_N is only about 20% of what is expected for S_eff = 1/2 moment ordering. The reduced entropy and the small ratio T_N/\theta \approx 0.13 suggest geometrical magnetic frustration and/or low-dimensional magnetic interactions in Na_2IrO_3. In plane resistivity measurements show insulating behavior. This together with the local moment magnetism indicates that bulk Na_2IrO_3 is a Mott insulator.
Improved theoretical guarantees regarding a class of two-row cutting planes
Yogesh P. Awate
Mathematics , 2012,
Abstract: The corner polyhedron is described by minimal valid inequalities from maximal lattice-free convex sets. For the Relaxed Corner Polyhedron (RCP) with two free integer variables and any number of non-negative continuous variables, it is known that such facet defining inequalities arise from maximal lattice-free splits, triangles and quadrilaterals. We improve on the tightest known upper bound for the approximation of the RCP, purely by minimal valid inequalities from maximal lattice-free quadrilaterals, from 2 to 1.71. We generalize the tightest known lower bound of 1.125 for the approximation of the RCP, purely by minimal valid inequalities from maximal lattice-free triangles, to an infinite subclass of quadrilaterals.
Electrolyzed Oxidized Water (EOW): Non-Thermal Approach for Decontamination of Food Borne Microorganisms in Food Industry  [PDF]
Subrota Hati, Surajit Mandal, P. S. Minz, Shilpa Vij, Yogesh Khetra, B. P. Singh, Dipika Yadav
Food and Nutrition Sciences (FNS) , 2012, DOI: 10.4236/fns.2012.36102
Abstract: Electrolyzed Oxidized Water (EOW) is produced by passing a diluted salt solution through an electrolytic cell, having anode and cathode electrodes. The anode and cathode are separated by a bipolar membrane. Negatively charged ions—chloride and hydroxide in the diluted salt solution move to anode to give up electrons and become gas (O2, Cl2) and hypochlorous acid and having redox potential of +700 to +800 mV with pH 4.0. It has a strong oxidation potential and a shortage of electrons giving it the ability to oxidize and sterilize. In microbial inactivation process, oxidized water damage cell membranes, create disruption in cell metabolic processes and essentially kill the cell. EOW, also a strong acid, is different to hydrochloric acid or sulfuric acid in that it is not corrosive to skin, mucous membrane, or organic material. It is easy to handle and suitable for the sanitation of the plant and decontamination of foods. Electrolyzed water has been tested and used as a disinfectant in the food industry and other applications.
Gsta4 Null Mouse Embryonic Fibroblasts Exhibit Enhanced Sensitivity to Oxidants: Role of 4-Hydroxynonenal in Oxidant Toxicity  [PDF]
Kevin E. McElhanon, Chhanda Bose, Rajendra Sharma, Liping Wu, Yogesh C. Awasthi, Sharda P. Singh
Open Journal of Apoptosis (OJApo) , 2013, DOI: 10.4236/ojapo.2013.21001
Abstract: The alpha class glutathione s-transferase (GST) isozyme GSTA4-4 (EC2.5.1.18) exhibits high catalytic efficiency towards 4-hydroxynon-2-enal (4-HNE), a major end product of oxidative stress induced lipid peroxidation. Exposure of cells and tissues to heat, radiation, and chemicals has been shown to induce oxidative stress resulting in elevated concentrations of 4-HNE that can be detrimental to cell survival. Alternatively, at physiological levels 4-HNE acts as a signaling molecule conveying the occurrence of oxidative events initiating the activation of adaptive pathways. To examine the impact of oxidative/electrophilic stress in a model with impaired 4-HNE metabolizing capability, we disrupted the Gsta4 gene that encodes GSTA4-4 inmice. The effect of electrophile and oxidants on embryonic fibroblasts (MEF) isolated from wild type (WT) and Gsta4 null mice were examined. Results indicate that in the absence of GSTA4-4, oxidant-induced toxicity is potentiated and correlates with elevated accumulation of 4-HNE adducts and DNA damage. Treatment of Gsta4 null MEF with 1,1,4-tris(acetyloxy)-2(E)-nonene [4-HNE(Ac)3], a pro-drug form of 4-HNE, resulted in the activation and phosphorylation of the c-jun-N-terminal kinase (JNK), extracellular-signal-regulated kinases (ERK 1/2) and p38 mitogen activated protein kinases (p38 MAPK) accompanied by enhanced cleavage of caspase-3. Interestingly, when recombinant mammalian or invertebrate GSTs were delivered to Gsta4 null MEF, activation of stress-related kinases in 4-HNE(Ac)3 treated Gsta4 null MEF were inversely correlated with the catalytic efficiency of delivered GSTs towards 4-HNE. Our data suggest that GSTA4-4 plays a major role in protecting cells from the toxic effects of oxidant chemicals by attenuating the accumulation of 4-HNE.
Intelligent Agent-Based Intrusion Detection System Using Enhanced Multiclass SVM
S. Ganapathy,P. Yogesh,A. Kannan
Computational Intelligence and Neuroscience , 2012, DOI: 10.1155/2012/850259
Abstract: Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, we propose a new intelligent agent-based intrusion detection model for mobile ad hoc networks using a combination of attribute selection, outlier detection, and enhanced multiclass SVM classification methods. For this purpose, an effective preprocessing technique is proposed that improves the detection accuracy and reduces the processing time. Moreover, two new algorithms, namely, an Intelligent Agent Weighted Distance Outlier Detection algorithm and an Intelligent Agent-based Enhanced Multiclass Support Vector Machine algorithm are proposed for detecting the intruders in a distributed database environment that uses intelligent agents for trust management and coordination in transaction processing. The experimental results of the proposed model show that this system detects anomalies with low false alarm rate and high-detection rate when tested with KDD Cup 99 data set. 1. Introduction Mobile ad hoc networks (MANETs) consist of mobile nodes that work independently without an infrastructure. They are useful in application areas like disaster management emergency and rescue operations where it is not possible to have well-defined infrastructure. MANETs are characterized by its great flexibility. However, MANET’s inherent vulnerability increases their security risks. Though MANETs are dynamic and cooperative in nature, it needs efficient and effective security mechanisms to safeguard the mobile nodes. Intrusion detection and prevention are primary mechanisms to reduce possible intrusions. Intrusion detection using classification algorithms effectively discriminates “normal” behavior from “abnormal” behavior. Therefore, intrusion detection and prevention system can be used as a secondary mechanism of defense in any wireless environment and mobile databases so that it can be a part of the reliable communication in MANETs [1]. Intrusion detection systems (IDS) play a major role in providing security to networks. In this paper, we introduce a new intelligent agent-based intrusion detection model for securing the mobile ad hoc networks. The main function of the proposed intrusion detection system is to monitor the computer system and network in order to find the intrusion activities in the system. In such system, attacks are divided into two categories, namely, host-based attacks and network-based attacks. Hence, IDSs are also
Neural Network Approach for Anomaly Intrusion Detection in Adhoc Networks Using Agents
S. Bose,P. Yogesh,A. Kannan
International Journal of Soft Computing , 2012,
Abstract: This study proposes a distributed intrusion detection system for adhoc wireless networks using self organizing maps and mobile agents. In this research, we efficiently use log file data obtained from the local host for training the neural network, to analyze the adhoc wireless network for detecting intrusions. Security agents are used to monitor multiple clients of the wireless network to determine the correlation among the observed anomalous patterns and to report such abnormal behavior to the administrator and the user in order to take possible actions. From the system developed in this research, we obtained high intrusion-detection rates (99.2%) and low false-alarm rates. The main contribution of this paper is the provision of an agent based framework that is capable of detecting intruders and to forecast the anomalies using the neural classifier, self organizing maps.
Effective Tcp Friendly Rate Control Scheme for Video Streaming over Wireless Networks
P. Yogesh,S. Bose,A. Kannan
Asian Journal of Information Technology , 2012,
Abstract: Rate control is an important issue in video streaming application for both wired and wireless networks. A widely accepted rate control method in wired networks is TCP Friendly Rate Control (TFRC). TFRC assumes that packet loss in wired networks is primarily due to congestion and as such is not be applicable to wireless networks in which the bulk of packet loss is at the physical layer. Hence the multiple TFRC Connections (MULTFRC) are being used as an existing approach, which is an end-to-end based solution to this problem. By opening appropriate number of TFRC connections, MULTFRC not only avoids modifications to the network infrastructure but also results in full utilization of the wireless bandwidth. However MULTFRC suffers form underutilization of resources and loss of granularity in number of connections. To address these drawbacks, we propose a modified TFRC rate control scheme that combines multiple connections to one connection and improves the performance of streaming over wireless networks. We name our rate control scheme as CTFRC (Consolidated TFRC) with loss handling mechanism. We carried out NS-2 simulations to compare the performance of MULTFRC and our own rate control scheme.
Site Content Analyzer in Context of Keyword density and Key Phrase
Yogesh Yadav,Dr. P. K. Yadav
International Journal of Computer Technology and Applications , 2011,
Abstract: In this paper we describe about the simulation environment in which the research implementation work is done. Here we present the brief description of the Site content analyzer which we have used in web content analysis and keyword density
Page 1 /201044
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.