P. Amudha

Learn More
The present study was undertaken to evaluate the anxiolytic activity of methanolic extract of Sapindus mukorossi Gaertn.(Sapindaceae). The anxiolytic activity was evaluated by Elevated plus maze, Y-maze, Hole-board, Actophotometer, and Marble-burying behavior models. The efficacy of the extract (200 and 400 mg/kg) was compared with the standard anxiolytic(More)
The present study was undertaken to evaluate the antidiabetic activity of methanol extract of Flacourtia jangomas (lour) in streptozotocin induced diabetic rats. In this study, the acute and subacute anti hyperglycaemic effect of the two different doses (200 and 400 mg/kg b.w.p.o) of plant extracts were investigated. Fasting blood glucose level, body weight(More)
Intrusion detection has become a main part of network security due to the huge number of attacks which affects the computers. This is due to the extensive growth of internet connectivity and accessibility to information systems worldwide. To deal with this problem, in this paper a hybrid algorithm is proposed to integrate Modified Artificial Bee Colony(More)
Security is becoming a critical part of organizational information systems and security of a computer system or network is compromised when an intrusion takes place. In the field of computer networks security, the detection of threats or attacks is nowadays a critical problem to solve. Intrusion Detection Systems (IDS) have become a standard component in(More)
Acmella calva (DC.) R.K.Jansen., commonly known as toothache plant was analyzed for their chemical composition and minerals. The various extracts of the plant parts (leaves, inflorescence and whole plant) possessed the presence of active phytochemical constituents such as alkaloids, glycosides, flavanoids, reducing sugar, tannins, anthraquinone, saponins(More)
With the widespread use of Internet, the possibilities of exposing confidential data to invaders or attackers increases. Intrusion Detection System (IDS) is used for detecting various intrusions in network environment and to prevent data from malicious attackers. In this paper, a combined algorithm based on Principal Component Analysis (PCA) and Core Vector(More)
The present work is to evaluate the anxiolytic activity of a hydroalcoholic extract of Tephrosia purpuria (L) Pers (HAETP) in mice using the elevated plus-maze (EPM), elevated zero-maze (EZM), Y-maze and hole-board models. Furthermore, the anxiolytic effects of HAETP were compared to a known active anxiolytic drug diazepam. The extract, administered orally,(More)
This paper intends to classify the Ljubljana Breast Cancer dataset using C4.5 Decision Tree and Naïve Bayes classifiers. In this work, classification is carriedout using two methods. In the first method, dataset is analysed using all the attributes in the dataset. In the second method, attributes are ranked using information gain ranking technique and only(More)
Intrusion Detection System is a security support mechanism which has received great attention from researchers all over the globe recently. In the recent past, bio-inspired meta-heuristic technique such as swarm intelligence is being proposed for intrusion detection. Swarm Intelligence approaches are used to solve complicated problems by multiple simple(More)