Pub Date : 2024-06-03DOI: 10.17485/ijst/v17i22.581
V. Haridoss, V. Sasikala
Objectives: Optimizing the sum of risks involved in the selection of acceptance sampling plans playing a vital role. This paper uses the Hurdle Poisson distribution to design an optimal quick switching system attribute plan for a given acceptable quality level (AQL) and limiting quality level (LQL) involving a minimum sum of risks. Methods: The sum of producer's and consumer's risks has been met for the specified AQL and LQL. The sum of these risks, as well as the acceptance and rejection numbers have been calculated using the Hurdle Poisson distribution. The operating characteristic function for the quick switching system attribute plan has also been derived using the Hurdle Poisson distribution. Findings: The producer and the consumer both represent the same party in the final inspection. As a result, the sum of these two risks should be minimized. In this paper, the sum of risks for various operating ratios are tabulated using the Hurdle Poisson distribution. These tabulated values are less than the sum of risks calculated using the Weighted Poisson distribution. Novelty: Reducing the sum of risks is the ultimate aim of the work. In this proposed paper, to attain the minimum sum of risks, the authors make an attempt to approach the Quick Switching System Sampling Plan, when the number of defectives in the submitted lots are very less. In other words, the probability of getting defective is very less. This indicates the quality of the lot selected for the inspection to ensure the protection for the consumer. And the plan is also designed in the way that the producer is also not get affected by rejecting a good lot by the consumer. This is the requirement of minimizing the risks. Keywords: Acceptable Quality Level (AQL), Limiting Quality Level (LQL), Minimum Risk Plan, Quick Switching System Sampling Attribute Plan, Operating Characteristic (OC) Function, Hurdle Poisson Distribution
{"title":"Constructing Optimal Quick Switching System with Hurdle Poisson Distribution","authors":"V. Haridoss, V. Sasikala","doi":"10.17485/ijst/v17i22.581","DOIUrl":"https://doi.org/10.17485/ijst/v17i22.581","url":null,"abstract":"Objectives: Optimizing the sum of risks involved in the selection of acceptance sampling plans playing a vital role. This paper uses the Hurdle Poisson distribution to design an optimal quick switching system attribute plan for a given acceptable quality level (AQL) and limiting quality level (LQL) involving a minimum sum of risks. Methods: The sum of producer's and consumer's risks has been met for the specified AQL and LQL. The sum of these risks, as well as the acceptance and rejection numbers have been calculated using the Hurdle Poisson distribution. The operating characteristic function for the quick switching system attribute plan has also been derived using the Hurdle Poisson distribution. Findings: The producer and the consumer both represent the same party in the final inspection. As a result, the sum of these two risks should be minimized. In this paper, the sum of risks for various operating ratios are tabulated using the Hurdle Poisson distribution. These tabulated values are less than the sum of risks calculated using the Weighted Poisson distribution. Novelty: Reducing the sum of risks is the ultimate aim of the work. In this proposed paper, to attain the minimum sum of risks, the authors make an attempt to approach the Quick Switching System Sampling Plan, when the number of defectives in the submitted lots are very less. In other words, the probability of getting defective is very less. This indicates the quality of the lot selected for the inspection to ensure the protection for the consumer. And the plan is also designed in the way that the producer is also not get affected by rejecting a good lot by the consumer. This is the requirement of minimizing the risks. Keywords: Acceptable Quality Level (AQL), Limiting Quality Level (LQL), Minimum Risk Plan, Quick Switching System Sampling Attribute Plan, Operating Characteristic (OC) Function, Hurdle Poisson Distribution","PeriodicalId":13296,"journal":{"name":"Indian journal of science and technology","volume":"8 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141271861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-03DOI: 10.17485/ijst/v17i22.114
Madabushanam Gopi Krishna, R. Guntu, N. R. K. Chand, M. Shareefuddin, N. V. Prasad
Objective: The principal aim of this investigation was to assess the impact of bismuth oxide on the optical properties, radiation shielding characteristics, and dielectric behavior of lead borosilicate glasses doped with titanium oxide at a low concentration. Method: We intended to utilize the conventional rapid melt quenching method to produce glasses with the following chemical composition: 25 PbO+ 15 B2O3 + 0.1 TiO2 + (59.9-x) SiO2 : x Bi2O3(0≤x≤12). Findings: XRD and SEM analyses were used to confirm the samples' non-crystalline properties, while DTA investigations were used to evaluate the samples' ability to form glass. The numerous structural elements were identified through the utilization of FT–IR and Raman analyses. The optical characteristics of glasses are determined by optical absorption studies. The findings derived from optical absorption spectral analyses revealed a progressive increase in the concentration of octahedral Ti4+ ions with the mol% Bi2O3 concentration. In order to analyse the glasses' dielectric properties, an impudence analyser was employed. The results obtained from these inquiries indicate that glasses do contain Bi2O3 at concentrations lower than 12 mol% experience a progressive increase in dielectric constant values. Further investigation is conducted into the radiation shielding properties of the glasses. Novelty: The findings indicate that the values of the glasses' optical band gap, radiation shielding ability, dielectric constant, and thermal stability are all directly correlated with their Bi2O3 concentration. Keywords: FTIR, Raman, OBG, MAC, Activation Energy
{"title":"Impact of Bi2O3 on the Structural, Optical, Radiation Shielding, and Dielectric Analysis of Lead Borosilicate Glasses Doped with TiO2","authors":"Madabushanam Gopi Krishna, R. Guntu, N. R. K. Chand, M. Shareefuddin, N. V. Prasad","doi":"10.17485/ijst/v17i22.114","DOIUrl":"https://doi.org/10.17485/ijst/v17i22.114","url":null,"abstract":"Objective: The principal aim of this investigation was to assess the impact of bismuth oxide on the optical properties, radiation shielding characteristics, and dielectric behavior of lead borosilicate glasses doped with titanium oxide at a low concentration. Method: We intended to utilize the conventional rapid melt quenching method to produce glasses with the following chemical composition: 25 PbO+ 15 B2O3 + 0.1 TiO2 + (59.9-x) SiO2 : x Bi2O3(0≤x≤12). Findings: XRD and SEM analyses were used to confirm the samples' non-crystalline properties, while DTA investigations were used to evaluate the samples' ability to form glass. The numerous structural elements were identified through the utilization of FT–IR and Raman analyses. The optical characteristics of glasses are determined by optical absorption studies. The findings derived from optical absorption spectral analyses revealed a progressive increase in the concentration of octahedral Ti4+ ions with the mol% Bi2O3 concentration. In order to analyse the glasses' dielectric properties, an impudence analyser was employed. The results obtained from these inquiries indicate that glasses do contain Bi2O3 at concentrations lower than 12 mol% experience a progressive increase in dielectric constant values. Further investigation is conducted into the radiation shielding properties of the glasses. Novelty: The findings indicate that the values of the glasses' optical band gap, radiation shielding ability, dielectric constant, and thermal stability are all directly correlated with their Bi2O3 concentration. Keywords: FTIR, Raman, OBG, MAC, Activation Energy","PeriodicalId":13296,"journal":{"name":"Indian journal of science and technology","volume":"81 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141272680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.17485/ijst/v17i20.3108
Vinita Nair, Jyoti Pareek
Objectives: To construct a comprehensive weighted multi-dimensional model to assess the impact of influence score of Twitter users, considering the credibility based on user profile, their tweets and social interactions aiming to empower users in distinguishing fake news or misinformation. Methods: The credibility evaluation is formulated based on text analysis, user account attributes, and user social engagement. We've gathered around 100,000 tweets from 100 users using Tweepy API over a six-month duration for the purpose of evaluating credibility. The collected tweets spanned diverse professions namely politics, entertainment, business, science, sports, and trending topics. We chose to utilize a self-devised deep active learning model to classify and label the unlabelled data instead of engaging in time-consuming human annotation for the tweets we gathered. Findings: The obtained accuracy for influence score evaluation for Recurrent Neural Network, Random Forest, Naïve Bayes, Decision Tree, and Support Vector Machine are 89.03%, 79.10%, 81.59%, 73.06% and 79.45% respectively. Upon reviewing and analysing the outcomes, RNN surpassed all other models achieving an exceptional accuracy of 89.03%. Novelty: Employing a weighted multi-dimensional framework, it systematically evaluates the influence score by considering the credibility of both users and tweets within the context of Twitter. Weighted features are instrumental in capturing the relative importance of different elements, leading to a more refined and context-aware decision-making process. In contrast to earlier research, which predominantly centred on the credibility of individual tweets, our research work shifts the focus to a broader perspective, encompassing the credibility of users, their tweets and their overall social influence. By incorporating user influence score, the framework not only empower users in discerning fake news or mis-information but also elevates their ability to gauge the reliability of information, offering a nuanced approach to news credibility analysis. Keywords: Active Learning, Credibility Score, User Influence, Twitter, Machine Learning, Recurrent Neural Network
{"title":"Transformative User Credibility Assessment on Twitter: A RNN based Heuristic Approach","authors":"Vinita Nair, Jyoti Pareek","doi":"10.17485/ijst/v17i20.3108","DOIUrl":"https://doi.org/10.17485/ijst/v17i20.3108","url":null,"abstract":"Objectives: To construct a comprehensive weighted multi-dimensional model to assess the impact of influence score of Twitter users, considering the credibility based on user profile, their tweets and social interactions aiming to empower users in distinguishing fake news or misinformation. Methods: The credibility evaluation is formulated based on text analysis, user account attributes, and user social engagement. We've gathered around 100,000 tweets from 100 users using Tweepy API over a six-month duration for the purpose of evaluating credibility. The collected tweets spanned diverse professions namely politics, entertainment, business, science, sports, and trending topics. We chose to utilize a self-devised deep active learning model to classify and label the unlabelled data instead of engaging in time-consuming human annotation for the tweets we gathered. Findings: The obtained accuracy for influence score evaluation for Recurrent Neural Network, Random Forest, Naïve Bayes, Decision Tree, and Support Vector Machine are 89.03%, 79.10%, 81.59%, 73.06% and 79.45% respectively. Upon reviewing and analysing the outcomes, RNN surpassed all other models achieving an exceptional accuracy of 89.03%. Novelty: Employing a weighted multi-dimensional framework, it systematically evaluates the influence score by considering the credibility of both users and tweets within the context of Twitter. Weighted features are instrumental in capturing the relative importance of different elements, leading to a more refined and context-aware decision-making process. In contrast to earlier research, which predominantly centred on the credibility of individual tweets, our research work shifts the focus to a broader perspective, encompassing the credibility of users, their tweets and their overall social influence. By incorporating user influence score, the framework not only empower users in discerning fake news or mis-information but also elevates their ability to gauge the reliability of information, offering a nuanced approach to news credibility analysis. Keywords: Active Learning, Credibility Score, User Influence, Twitter, Machine Learning, Recurrent Neural Network","PeriodicalId":13296,"journal":{"name":"Indian journal of science and technology","volume":"3 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140963620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.17485/ijst/v17i20.1183
V. Sangeetha, T. Anupreethi, M. Somanath
Background/Objectives: Elliptic Curve Cryptography (ECC) is a public-key encryption method that is similar to RSA. ECC uses the mathematical concept of elliptic curves to achieve the same level of security with significantly smaller keys, whereas RSA's security depends on large prime numbers. Elliptic curves and their applications in cryptography will be discussed in this paper. The elliptic curve is formed by the extension of a Diophantine pair of Centered Hexadecagonal numbers to a Diophantine triple with property D(8). Method: The Diffie–Hellman key exchange, named for Whitfield Diffie and Martin Hellman, was developed by Ralph Merkle and is a mathematical technique for safely transferring cryptographic keys over a public channel. Based on the Diffie–Hellman key exchange, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography. The generation of keys, encryption and decryption are the three main operations of the ElGamal cryptosystem. Findings: Given the relative modesty of our objectives, the fundamental algebraic and geometric characteristics of elliptic curves shall be delineated. Then the behaviour of elliptic curves modulo p: ultimately, there is a fairly strong analogy between the structure of the points on an elliptic curve modulo p and the integers modulo n will be studied. In the end, elliptic curve ElGamal encryption analogues of Diffie–Hellman key exchange will be created. Novelty: Elliptic curves are encountered in a multitude of mathematical contexts and have a varied and fascinating history. Elliptic curves are very significant in number theory and are a focus of much recent work. The earlier research works in Elliptic Curve Cryptography has concentrated on computer algorithms and pairing – based algorithms. In this paper, the concept of polygonal numbers and its extension from Diophantine pair to triples is encountered, thus forming an elliptic curve and perform the encryption-decryption process. MSC Classification Number: 11D09, 11D99,11T71,11G05. Keywords: Elliptic curves, Cryptography, Encryption, Decryption, Centered polygonal numbers
背景/目标:椭圆曲线加密法(ECC)是一种与 RSA 相似的公钥加密方法。ECC 利用椭圆曲线的数学概念,用小得多的密钥实现相同级别的安全性,而 RSA 的安全性则依赖于大质数。本文将讨论椭圆曲线及其在密码学中的应用。椭圆曲线是由一对居中十六边形数的二项式扩展为具有 D(8) 属性的二项式三倍而形成的。方法Diffie-Hellman 密钥交换以 Whitfield Diffie 和 Martin Hellman 命名,由 Ralph Merkle 开发,是一种通过公共信道安全传输加密密钥的数学技术。基于 Diffie-Hellman 密钥交换,ElGamal 加密系统是一种用于公钥加密的非对称密钥加密算法。生成密钥、加密和解密是 ElGamal 密码系统的三个主要操作。研究结果考虑到我们的目标相对温和,我们将描述椭圆曲线的基本代数和几何特征。然后将研究椭圆曲线 modulo p 的行为:最终,椭圆曲线 modulo p 上点的结构与整数 modulo n 之间存在着相当强的相似性。最后,将创建椭圆曲线 ElGamal 加密类似于 Diffie-Hellman 密钥交换。新颖性:椭圆曲线在许多数学环境中都会遇到,而且有着丰富多彩、引人入胜的历史。椭圆曲线在数论中非常重要,是近期许多工作的重点。椭圆曲线密码学的早期研究工作主要集中在计算机算法和基于配对的算法上。本文将讨论多边形数的概念及其从二叉数对到三叉数对的扩展,从而形成椭圆曲线并执行加密-解密过程。MSC 分类号: 11D09, 11D99,11T71,11G05.关键词:椭圆曲线 加密 解密 居中多边形数
{"title":"Cryptographic Application of Elliptic Curve Generated through Centered Hexadecagonal Numbers","authors":"V. Sangeetha, T. Anupreethi, M. Somanath","doi":"10.17485/ijst/v17i20.1183","DOIUrl":"https://doi.org/10.17485/ijst/v17i20.1183","url":null,"abstract":"Background/Objectives: Elliptic Curve Cryptography (ECC) is a public-key encryption method that is similar to RSA. ECC uses the mathematical concept of elliptic curves to achieve the same level of security with significantly smaller keys, whereas RSA's security depends on large prime numbers. Elliptic curves and their applications in cryptography will be discussed in this paper. The elliptic curve is formed by the extension of a Diophantine pair of Centered Hexadecagonal numbers to a Diophantine triple with property D(8). Method: The Diffie–Hellman key exchange, named for Whitfield Diffie and Martin Hellman, was developed by Ralph Merkle and is a mathematical technique for safely transferring cryptographic keys over a public channel. Based on the Diffie–Hellman key exchange, the ElGamal encryption system is an asymmetric key encryption algorithm for public-key cryptography. The generation of keys, encryption and decryption are the three main operations of the ElGamal cryptosystem. Findings: Given the relative modesty of our objectives, the fundamental algebraic and geometric characteristics of elliptic curves shall be delineated. Then the behaviour of elliptic curves modulo p: ultimately, there is a fairly strong analogy between the structure of the points on an elliptic curve modulo p and the integers modulo n will be studied. In the end, elliptic curve ElGamal encryption analogues of Diffie–Hellman key exchange will be created. Novelty: Elliptic curves are encountered in a multitude of mathematical contexts and have a varied and fascinating history. Elliptic curves are very significant in number theory and are a focus of much recent work. The earlier research works in Elliptic Curve Cryptography has concentrated on computer algorithms and pairing – based algorithms. In this paper, the concept of polygonal numbers and its extension from Diophantine pair to triples is encountered, thus forming an elliptic curve and perform the encryption-decryption process. MSC Classification Number: 11D09, 11D99,11T71,11G05. Keywords: Elliptic curves, Cryptography, Encryption, Decryption, Centered polygonal numbers","PeriodicalId":13296,"journal":{"name":"Indian journal of science and technology","volume":"5 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140963799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.17485/ijst/v17i20.1231
K. R. Srivaishnavi, T. P. Perumal, P. Anishiya
Objectives: The primary goal of the research work is to accurately detect the precise location of the brain tumor in the radiological Magnetic Resonance Imaging (MRI) images of human brain using segmentation method. Methods: In this research work, we introduce mainly the Morphological Region-based Active Contour model and Boltzmann Monte Carlo method (MACB model), involving a comprehensive three-step methodology for the segmentation of the brain, MRI images in order to detect brain tumor. The initial step involves pre-processing which includes Gaussian filtering for noise reduction and Contrast Limited Adaptive Histogram Equalization (CLAHE) technique to enhance image features. In the second step, we identify tumor-related clusters using morphological operations and delineate the tumor regions using Active Contour (Snake) model to get a segmented image. In the final step, the Boltzmann Monte Carlo method is used to refine the edges of the segmented image. To evaluate the effectiveness of this approach, the 2D brain tumor datasets, available in the public domain, are used. The first dataset is taken from Kaggle website and has 3064 MRI human brain images and its respective ground truth images which is used for segmentation. The second dataset is used for visualization of segmented tumor, available in the same Kaggle website. Findings: The Performance metrics for finding similarity between the segmented images generated using the proposed MACB model and the ground truth images, available in the first dataset, exhibit higher values. That is, the proposed method has achieved higher values of Dice Similarity Coefficient (DSC): 93.26%, Jaccard Co-efficient: 86.44%, Sensitivity: 97.27%, Specificity: 99.43% and Pixel accuracy: 98.95%. Novelty: In this research work, MACB model is proposed for the detection, segmentation, and refinement process of brain tumor by incorporating Boltzmann Monte Carlo method with Morphological Region-Based Active Contour model. This novel approach has resulted in enhanced precision and efficiency in the brain tumor segmentation process. Keywords: Brain Tumor Segmentation, Morphological Operation, Active Contour, Boltzmann Monte Carlo Method, Magnetic Resonance Imaging
{"title":"Brain Tumor Prediction and Segmentation with Morphological Region-based Active Contour Model and Refinement using Boltzmann Monte Carlo Method in MRI Images","authors":"K. R. Srivaishnavi, T. P. Perumal, P. Anishiya","doi":"10.17485/ijst/v17i20.1231","DOIUrl":"https://doi.org/10.17485/ijst/v17i20.1231","url":null,"abstract":"Objectives: The primary goal of the research work is to accurately detect the precise location of the brain tumor in the radiological Magnetic Resonance Imaging (MRI) images of human brain using segmentation method. Methods: In this research work, we introduce mainly the Morphological Region-based Active Contour model and Boltzmann Monte Carlo method (MACB model), involving a comprehensive three-step methodology for the segmentation of the brain, MRI images in order to detect brain tumor. The initial step involves pre-processing which includes Gaussian filtering for noise reduction and Contrast Limited Adaptive Histogram Equalization (CLAHE) technique to enhance image features. In the second step, we identify tumor-related clusters using morphological operations and delineate the tumor regions using Active Contour (Snake) model to get a segmented image. In the final step, the Boltzmann Monte Carlo method is used to refine the edges of the segmented image. To evaluate the effectiveness of this approach, the 2D brain tumor datasets, available in the public domain, are used. The first dataset is taken from Kaggle website and has 3064 MRI human brain images and its respective ground truth images which is used for segmentation. The second dataset is used for visualization of segmented tumor, available in the same Kaggle website. Findings: The Performance metrics for finding similarity between the segmented images generated using the proposed MACB model and the ground truth images, available in the first dataset, exhibit higher values. That is, the proposed method has achieved higher values of Dice Similarity Coefficient (DSC): 93.26%, Jaccard Co-efficient: 86.44%, Sensitivity: 97.27%, Specificity: 99.43% and Pixel accuracy: 98.95%. Novelty: In this research work, MACB model is proposed for the detection, segmentation, and refinement process of brain tumor by incorporating Boltzmann Monte Carlo method with Morphological Region-Based Active Contour model. This novel approach has resulted in enhanced precision and efficiency in the brain tumor segmentation process. Keywords: Brain Tumor Segmentation, Morphological Operation, Active Contour, Boltzmann Monte Carlo Method, Magnetic Resonance Imaging","PeriodicalId":13296,"journal":{"name":"Indian journal of science and technology","volume":"42 47","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140966220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.17485/ijst/v17i20.1434
U Usha Rani, A Sreedevi
Objectives: To synthesize a new scaff fold of 3'-(2-Benzoyl-4-chlorophenyl)-4'H-spiro [indole-3,2'-[1,3] thiazolidine]-2,4'(1H)-dione derivatives and to assess the compounds for anti-tubercular and antimicrobial activities. Methods : A new series of 3'-(2-Benzoyl-4-chlorophenyl)-4'H-spiro [indole-3,2'- [1,3] thiazolidine]-2,4'(1H)-dione derivatives were prepared by synthesizing schiff’s bases followed by condensing schiff base with 2-mercaptopropanoic acid in the presence of zinc chloride. Synthesized compounds were characterized by IR, NMR and Mass spectral data. Their antimicrobial, antitubercular and also docking simulations were evaluated. Findings : Compound 3c (floro substituent) showed potent activity against Mycobacterium tuberculosis H37Rv with MIC value of 3.125 µg/ml when compared with standard Isoniazid. Compound 3c, 3d and 3f displayed better antimicrobial activity against used bacterial and fungal species with MIC range of 3-20µg/ml comparable to standard drugs ciprofloxacin and ketoconazole respectively. In silico studies revealed that compound 3c, 3f and 3d had a better binding affinity with M. tuberculosis enoyl-CoA hydratase EchA6 with ΔG values of -9.6kcal/mol, -9.4kcal/mol, and -8.6kcal/mol respectively comparable to isoniazid of -5.4kcal/mol. Compound 3c, 3f and 3d also displayed good binding affinity with DNA gyrase and lanosterol methylase. Novelty : Introducing benzoyl moiety to the thiazolidine ring potentiates the antitubercular and antimicrobial activity of spiro indole derivatives. Keywords: AntiTB, Antimicrobial, Molecular Docking, Spiro indole, Thiazolidine
{"title":"Synthesis and Biological Evaluation of 3-(2-Benzoyl-4-chlorophenyl)-4H-spiro [indole-3,2-[1,3]thiazolidine]-2,4(1H)- dione Derivatives for Anti-tubercular and Antimicrobial Activities","authors":"U Usha Rani, A Sreedevi","doi":"10.17485/ijst/v17i20.1434","DOIUrl":"https://doi.org/10.17485/ijst/v17i20.1434","url":null,"abstract":"Objectives: To synthesize a new scaff fold of 3'-(2-Benzoyl-4-chlorophenyl)-4'H-spiro [indole-3,2'-[1,3] thiazolidine]-2,4'(1H)-dione derivatives and to assess the compounds for anti-tubercular and antimicrobial activities. Methods : A new series of 3'-(2-Benzoyl-4-chlorophenyl)-4'H-spiro [indole-3,2'- [1,3] thiazolidine]-2,4'(1H)-dione derivatives were prepared by synthesizing schiff’s bases followed by condensing schiff base with 2-mercaptopropanoic acid in the presence of zinc chloride. Synthesized compounds were characterized by IR, NMR and Mass spectral data. Their antimicrobial, antitubercular and also docking simulations were evaluated. Findings : Compound 3c (floro substituent) showed potent activity against Mycobacterium tuberculosis H37Rv with MIC value of 3.125 µg/ml when compared with standard Isoniazid. Compound 3c, 3d and 3f displayed better antimicrobial activity against used bacterial and fungal species with MIC range of 3-20µg/ml comparable to standard drugs ciprofloxacin and ketoconazole respectively. In silico studies revealed that compound 3c, 3f and 3d had a better binding affinity with M. tuberculosis enoyl-CoA hydratase EchA6 with ΔG values of -9.6kcal/mol, -9.4kcal/mol, and -8.6kcal/mol respectively comparable to isoniazid of -5.4kcal/mol. Compound 3c, 3f and 3d also displayed good binding affinity with DNA gyrase and lanosterol methylase. Novelty : Introducing benzoyl moiety to the thiazolidine ring potentiates the antitubercular and antimicrobial activity of spiro indole derivatives. Keywords: AntiTB, Antimicrobial, Molecular Docking, Spiro indole, Thiazolidine","PeriodicalId":13296,"journal":{"name":"Indian journal of science and technology","volume":"58 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140965210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.17485/ijst/v17i20.2536
Gargi Danda De, Soumya Sarkar, Souren Mitra
Objectives: This study focuses on the mechanical behavior of different fiber orientations of bi-directional woven Kevlar fabric to improve the mechanical properties of the Kevlar epoxy composite materials. Methods: Here in this paper hand moulded composites are fabricated with the Bidirectional plain-woven Kevlar-49, Epoxy resin LY 556 and hardener HT972 and the configuration of the layer was symmetrical and contained 6 plies which arranged as C- (0/45/-45/45/-45/0), B- (0/60/-60/60/-60/0). The standard ASTM D 3039 for tensile test, ASTM D790 for flexural test and ASTM D256 was followed for the laboratory test. F indings: Polymer composite materials are popular due to its weight strength ratio. Bidirectional woven fiber is used for the analysis, where different fiber orientations are compared. From the analysis it is observed that, mechanical properties vary with different fiber orientations. Novelty: In this paper, tensile modulus, flexural modulus, and absorbed impact energy observed in the laboratory to find out the suitability of the Kevlar composite as a building material. The findings of this research are expected to have practical implications for the development of stronger and more durable polymer fiber composites in various structural applications. Keywords Kevlar fiber, Epoxy, Tensile test, Woven fabric, Fiber orientation
{"title":"Effects of Fiber Orientation on the Mechanical Properties of Bidirectional Woven Kevlar Epoxy Composite","authors":"Gargi Danda De, Soumya Sarkar, Souren Mitra","doi":"10.17485/ijst/v17i20.2536","DOIUrl":"https://doi.org/10.17485/ijst/v17i20.2536","url":null,"abstract":"Objectives: This study focuses on the mechanical behavior of different fiber orientations of bi-directional woven Kevlar fabric to improve the mechanical properties of the Kevlar epoxy composite materials. Methods: Here in this paper hand moulded composites are fabricated with the Bidirectional plain-woven Kevlar-49, Epoxy resin LY 556 and hardener HT972 and the configuration of the layer was symmetrical and contained 6 plies which arranged as C- (0/45/-45/45/-45/0), B- (0/60/-60/60/-60/0). The standard ASTM D 3039 for tensile test, ASTM D790 for flexural test and ASTM D256 was followed for the laboratory test. F indings: Polymer composite materials are popular due to its weight strength ratio. Bidirectional woven fiber is used for the analysis, where different fiber orientations are compared. From the analysis it is observed that, mechanical properties vary with different fiber orientations. Novelty: In this paper, tensile modulus, flexural modulus, and absorbed impact energy observed in the laboratory to find out the suitability of the Kevlar composite as a building material. The findings of this research are expected to have practical implications for the development of stronger and more durable polymer fiber composites in various structural applications. Keywords Kevlar fiber, Epoxy, Tensile test, Woven fabric, Fiber orientation","PeriodicalId":13296,"journal":{"name":"Indian journal of science and technology","volume":"12 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140962943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.17485/ijst/v17i20.1017
K Radha, S Sri Harini
Objectives: This study presents a new type of fuzzy graph known as the difference mean fuzzy graph by introducing difference mean edge. Methodology: In this paper, difference mean edge in a fuzzy graph is defined by considering the relationship between the membership value of the edge and the membership values of its end vertices. Also, difference mean fuzzy graph is defined and its properties are derived. Findings: The difference mean edge and the difference mean fuzzy graph are introduced. The requirements for an edge in the direct sum of two fuzzy graphs to be a difference mean edge are found in this study. Additionally, conditions are derived such that the direct sum of two fuzzy graphs is a difference mean fuzzy graph. Novelty: Depending on the membership values of the edges and vertices, effective edge in fuzzy graph have already been defined. A new concept of difference mean edge in fuzzy graph is introduced. Using this, difference mean fuzzy graph is also introduced. Characterizations of the difference mean edge in the direct sum of fuzzy graphs are attained. The requirements for the necessary and sufficient component of difference mean fuzzy graphs to be a direct sum are suggested. Mathematics Subject Classification (2020): 05C72, 05C76. Keywords: Difference mean edge, Difference Mean fuzzy graph, Effective fuzzy graph, Effective difference mean edge, Direct sum
{"title":"Characterizations of the Direct Sum of Two Difference - Mean Fuzzy Graphs","authors":"K Radha, S Sri Harini","doi":"10.17485/ijst/v17i20.1017","DOIUrl":"https://doi.org/10.17485/ijst/v17i20.1017","url":null,"abstract":"Objectives: This study presents a new type of fuzzy graph known as the difference mean fuzzy graph by introducing difference mean edge. Methodology: In this paper, difference mean edge in a fuzzy graph is defined by considering the relationship between the membership value of the edge and the membership values of its end vertices. Also, difference mean fuzzy graph is defined and its properties are derived. Findings: The difference mean edge and the difference mean fuzzy graph are introduced. The requirements for an edge in the direct sum of two fuzzy graphs to be a difference mean edge are found in this study. Additionally, conditions are derived such that the direct sum of two fuzzy graphs is a difference mean fuzzy graph. Novelty: Depending on the membership values of the edges and vertices, effective edge in fuzzy graph have already been defined. A new concept of difference mean edge in fuzzy graph is introduced. Using this, difference mean fuzzy graph is also introduced. Characterizations of the difference mean edge in the direct sum of fuzzy graphs are attained. The requirements for the necessary and sufficient component of difference mean fuzzy graphs to be a direct sum are suggested. Mathematics Subject Classification (2020): 05C72, 05C76. Keywords: Difference mean edge, Difference Mean fuzzy graph, Effective fuzzy graph, Effective difference mean edge, Direct sum","PeriodicalId":13296,"journal":{"name":"Indian journal of science and technology","volume":"12 37","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140962185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.17485/ijst/v17i20.646
V Rajesh Kumar, Sai Kumar Koda, P Sai Kumar, Naveen Aravind Arivalagan
Objectives: This study was conducted to achieve optimized power duct sizes with ensuring sufficient bending for the electrical cables at the road junction locations. Methods: Used Revit tool, a Building Information Modelling (BIM) technology to integrate the design data of electrical cables and for modelling the power duct structure. Tools in the Revit software were used to automate the cable bending and clash detection simulations tasks. Findings: With the help of these tools, we modeled cable routing and optimized power duct structure sizes, saving 90% of man-hours and achieving 20% cost savings at the site compared to conventional methods. Novelty: It’s a pioneering effort to integrate the design data of electrical cables and automate the cable routing by ensuring the sufficient bending radius by utilizing the tools in the Revit software. And optimization of the power duct size at the cable transition locations by performing multiple simulations of the model and clash detection. Keywords: BIM, Revit, Virtual Design, Cable Routing, Electrical Design
{"title":"BIM in Optimization of Power Duct for Efficient Cable Routing: An Industrial Approach","authors":"V Rajesh Kumar, Sai Kumar Koda, P Sai Kumar, Naveen Aravind Arivalagan","doi":"10.17485/ijst/v17i20.646","DOIUrl":"https://doi.org/10.17485/ijst/v17i20.646","url":null,"abstract":"Objectives: This study was conducted to achieve optimized power duct sizes with ensuring sufficient bending for the electrical cables at the road junction locations. Methods: Used Revit tool, a Building Information Modelling (BIM) technology to integrate the design data of electrical cables and for modelling the power duct structure. Tools in the Revit software were used to automate the cable bending and clash detection simulations tasks. Findings: With the help of these tools, we modeled cable routing and optimized power duct structure sizes, saving 90% of man-hours and achieving 20% cost savings at the site compared to conventional methods. Novelty: It’s a pioneering effort to integrate the design data of electrical cables and automate the cable routing by ensuring the sufficient bending radius by utilizing the tools in the Revit software. And optimization of the power duct size at the cable transition locations by performing multiple simulations of the model and clash detection. Keywords: BIM, Revit, Virtual Design, Cable Routing, Electrical Design","PeriodicalId":13296,"journal":{"name":"Indian journal of science and technology","volume":"43 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140964734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-17DOI: 10.17485/ijst/v17i20.1350
K. Sreeranjini
Objectives: The study focuses on utilising invasive flora affecting the indigenous plants and thereby bring about monetary benefits to the local people by means of handmade papers from the invasive weeds. Methods: Handmade paper from five invasive plants namely, Eichhornia crassipes, Eupatorium odorata, Combretum indicum, Lantana camara and Hyptis capitata was attempted. These plants after collection from Nilambur, Kerala were subjected to treatment with washing soda, blending, vat preparation, moulding and drying. This is followed by checking the paper quality parameters viz., Productivity, Clarity/opacity/transparency, Strength, Grammage, Paper grain, Ageing of paper and Moisture content. Findings: Out of the five invasive plants tested, the fibre yield was maximum for Eichhornia, but the productivity rate was less compared to other samples. Lantana and Hyptis yielded maximum productivity even though the fibre yield from these plants was less. The fibre uniformity of paper developed was positively detected for all the 4 plants except Eichhornia thereby proving the feasibility for paper manufacture. All sample paper allows the light; so, all are translucent in nature. Integrity of paper samples was retained in the paint test. The age test also yielded positive results. The gsm test showed lowest for Eichhornia as 98.12g/m2; Lantana 111.87g/m2; Combretum 131.87g/m2; Hyptis 163.75g/m2; Eupatorium is 255g/m2. Even though the gsm of Eichhornia is the best for paper manufacture according to gsm standards, the lack of fibre uniformity is a withdrawing feature for feasibility. The moisture content appeared high for Eichhornia and lowest for Combretum. Novelty: To date, studies on invasive plant utilisation done individually; no comparative study on productivity done. Current study can be further refined for environmental sustenance along with livelihood for local people. Keywords: Invasive Flora, Paper manufacture, Grammage test, Productivity, Ecological sustainability
{"title":"A Feasibility Inquiry to the Sustainable Utilization of Few Invasive Flora","authors":"K. Sreeranjini","doi":"10.17485/ijst/v17i20.1350","DOIUrl":"https://doi.org/10.17485/ijst/v17i20.1350","url":null,"abstract":"Objectives: The study focuses on utilising invasive flora affecting the indigenous plants and thereby bring about monetary benefits to the local people by means of handmade papers from the invasive weeds. Methods: Handmade paper from five invasive plants namely, Eichhornia crassipes, Eupatorium odorata, Combretum indicum, Lantana camara and Hyptis capitata was attempted. These plants after collection from Nilambur, Kerala were subjected to treatment with washing soda, blending, vat preparation, moulding and drying. This is followed by checking the paper quality parameters viz., Productivity, Clarity/opacity/transparency, Strength, Grammage, Paper grain, Ageing of paper and Moisture content. Findings: Out of the five invasive plants tested, the fibre yield was maximum for Eichhornia, but the productivity rate was less compared to other samples. Lantana and Hyptis yielded maximum productivity even though the fibre yield from these plants was less. The fibre uniformity of paper developed was positively detected for all the 4 plants except Eichhornia thereby proving the feasibility for paper manufacture. All sample paper allows the light; so, all are translucent in nature. Integrity of paper samples was retained in the paint test. The age test also yielded positive results. The gsm test showed lowest for Eichhornia as 98.12g/m2; Lantana 111.87g/m2; Combretum 131.87g/m2; Hyptis 163.75g/m2; Eupatorium is 255g/m2. Even though the gsm of Eichhornia is the best for paper manufacture according to gsm standards, the lack of fibre uniformity is a withdrawing feature for feasibility. The moisture content appeared high for Eichhornia and lowest for Combretum. Novelty: To date, studies on invasive plant utilisation done individually; no comparative study on productivity done. Current study can be further refined for environmental sustenance along with livelihood for local people. Keywords: Invasive Flora, Paper manufacture, Grammage test, Productivity, Ecological sustainability","PeriodicalId":13296,"journal":{"name":"Indian journal of science and technology","volume":"52 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140965803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}