7 resultados para Musculoskeletal manipulations

em Cochin University of Science


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this modern complex world, stress at work is found to be increasingly a common feature in day to day life. For the same reason, job stress is one of the active areas in occupational health and safety research for over last four decades and is continuing to attract researchers in academia and industry. Job stress in process industries is of concern due to its influence on process safety, and worker‘s safety and health. Safety in process (chemical and nuclear material) industry is of paramount importance, especially in a thickly populated country like India. Stress at job is the main vector in inducing work related musculoskeletal disorders which in turn can affect the worker health and safety in process industries. In view of the above, the process industries should try to minimize the job stress in workers to ensure a safe and healthy working climate for the industry and the worker. This research is mainly aimed at assessing the influence of job stress in inducing work related musculoskeletal disorders in chemical process industries in India

Relevância:

10.00% 10.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The growing demand for quality prawn seed from the farmers‘ and entrepreneurs, coupled with uncertainity of their availability from nature at the appropriate time in required quantities has prompted‘ research on problems connected with prawn seed production. Endocrine control of reproduction in the penaeid shrimp _P_. monodon has been investigated in detail by adopting a comprehensive approach to the problem. The major aspects of the study included in depth investigations of the cytological details of the reproductive and neuroendocrine organs in correlation with the process of gonadal maturation. Based on the conclusions drawn from such ultrastructural studies various endocrine manipulations were carried out to see their effects on gonadal maturation. Besides that studies on the reproductive quality of male P_. monodon and the cryopreservation of spermatophores form a part of the present investigation. The shrimp 3; Inonodon used in the present study were collected from the offshore waters of Cochin, Madras and Mandapam and from the culture ponds of Vypeen Island near Cochin (Kerala) . The entire investigation on the cytological aspects were carried out using standard histological and electron-microscopic methods. Endocrine manipulations and cryopreservation studies is also carried out using the standard methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For improving agricultural marketing, which has been discussed in the previous chapter, the Government has intervened in different ways. The direct regulatory role through the regulation of markets and market practices is one of the ways in which governmental intervention can improve agricultural marketing. This study is an enquiry of the direct regulatory role of the government through regulation of markets and market practices. By restructuring the operational methods and redesigning the existing physical markets, this system gives direct benefit to the cultivating class and protects them from the market manipulations of organised and powerful private traders. If traders do not continue their trade for the time being they will not be affected financially, because they are resourceful or financially solvent. On the other hand, Cultivators must sell their produce immediately after harvesting for the lack of additional facilities or to satisfy other needs for which finance is required. Another important reason is that Cultivators/farmers are not organised and because of lack of their organisation, they sell their produces individually. In this situation, a farmer is helpless when astute traders indulge in manipulations at the time of purchase of the produces. So it is the government's obligation to protect the interest of the farmers. Protection of the farmer/cultivator is necessary not only from the point of social justice but also from that of economic growth. If the farmers are assured of a remunerative or incentive price for their produce, they will get the inspiration to produce more and through more production, economy will be developed and the nation as a whole will be benefitted. This study will examine the management system of the markets through the direct regulatory role played by the governments to control markets and market practices in West Bengal and Bangladesh.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The reactions involving fulvenes and its derivatives have received a great deal of attention over the years in synthetic organic chemistry. Functionalizations of fulvenes provide versatile and powerful approaches to various polycyclic systems and natural products. They serve as versatile intermediates in the construction of various ring systems through inter- as well as intramolecular cycloadditions. Compared to the rich literature on the cycloaddition reactions of pentafulvenes, much less attention has been paid to the synthetic utilization of their cycloadducts. Tactical manipulations on the chosen adduct offer the prospects for designing a variety of useful molecular skeletons. Addition of heterodienophiles to fulvenes offers an efficient strategy towards the synthesis of azabicyclic olefins. However, there have been no serious attempts to study the synthetic utility of these substrates. In this context and with the intention of utilizing pentafulvenes towards synthetically important molecules, author decided to explore the reactivity of pentafulvene derived azabicyclic olefins. Our attention was focused on the synthetic potential associated with the ring opening of fulvene derived bicyclic hydrazines under palladium catalysis. It was envisioned that the desymmetrization of these adducts using various soft nucleophiles will provide a novel access to synthetically and biologically important alkylidene cyclopentenes. The investigations along this line form the focal theme of this thesis entitled “PALLADIUM CATALYZED CARBONCARBON/ CARBON-HETEROATOM BOND FORMATION REACTIONS UTILIZING PENTAFULVENE DERIVED BICYCLIC HYDRAZINES

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we propose a cryptographic transformation based on matrix manipulations for image encryption. Substitution and diffusion operations, based on the matrix, facilitate fast conversion of plaintext and images into ciphertext and cipher images. The paper describes the encryption algorithm, discusses the simulation results and compares with results obtained from Advanced Encryption Standard (AES). It is shown that the proposed algorithm is capable of encrypting images eight times faster than AES.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In symmetric block ciphers, substitution and diffusion operations are performed in multiple rounds using sub-keys generated from a key generation procedure called key schedule. The key schedule plays a very important role in deciding the security of block ciphers. In this paper we propose a complex key generation procedure, based on matrix manipulations, which could be introduced in symmetric ciphers. The proposed key generation procedure offers two advantages. First, the procedure is simple to implement and has complexity in determining the sub-keys through crypt analysis. Secondly, the procedure produces a strong avalanche effect making many bits in the output block of a cipher to undergo changes with one bit change in the secret key. As a case study, matrix based key generation procedure has been introduced in Advanced Encryption Standard (AES) by replacing the existing key schedule of AES. The key avalanche and differential key propagation produced in AES have been observed. The paper describes the matrix based key generation procedure and the enhanced key avalanche and differential key propagation produced in AES. It has been shown that, the key avalanche effect and differential key propagation characteristics of AES have improved by replacing the AES key schedule with the Matrix based key generation procedure