Recent Research Papers - Academia.edu (original) (raw)

Abstract: As smoking is a major risk factor for lung cancer, routinely approach of present or past smokers towards permanent smoking abstinence is the most legitimate gesture to manage lung cancer development. We conducted a study on 160... more

Abstract: As smoking is a major risk factor for lung cancer, routinely approach of present or past smokers towards permanent smoking abstinence is the most legitimate gesture to manage lung cancer development. We conducted a study on 160 lung cancer suspects ...

A n estimated 45 million people around the world are blind. 1 Most of them have lost their sight to diseases that are treatable or preventable. Eighty percent of them live in the lesser-developed world in countries where chronic economic... more

A n estimated 45 million people around the world are blind. 1 Most of them have lost their sight to diseases that are treatable or preventable. Eighty percent of them live in the lesser-developed world in countries where chronic economic deprivation is exacerbated by the added challenge of failing vision. Without intervention, the number of individuals with blindness might reach 76 million by 2020 because of a number of factors, primarily the rapid aging of populations in most countries. 2 Since eye disease is seen largely in older people, the projected doubling of the world's population older than 50 years to 2 billion by 2020 has profound effects on the number of those with blindness and low vision.

This paper presents design and navigation control of an advanced level comeback CanSat which is going to be launched to an altitude of about 400 m using an amateur rocket from ground level. The CanSat uses advanced and ultra-light... more

This paper presents design and navigation control of an advanced level comeback CanSat which is going to be launched to an altitude of about 400 m using an amateur rocket from ground level. The CanSat uses advanced and ultra-light microcontroller, pressure and temperature sensors, 3-axis accelerometer, 3-axis gyro, camera, GPS, IR distance measuring sensor, and RF communication module to communicate with the ground station PC. Three actuators are considered in this work for flight and ground segments control. They are the motor driven propeller, elevator and rudder. For the flight segment, parachute and attitude control are used to control the CanSat descent rate, attitude and heading. For the ground segment control; both the propeller and the rear landing gear of the CanSat is used for heading toward a predefined location on the ground. The rear landing gear is connected to the rudder rotational axis. An indigenous navigation control and electronic circuit design with the test results also are presented in this paper.

This paper evaluates the effects of a Benthamite formulation for the utility function into the Ramsey model with logistic population growth, introduced by Brida and Accinelli . Within this framework, we demonstrate the economy to be... more

This paper evaluates the effects of a Benthamite formulation for the utility function into the Ramsey model with logistic population growth, introduced by Brida and Accinelli . Within this framework, we demonstrate the economy to be described by a four dimensional dynamical system, whose unique non-trivial steady state equilibrium is a saddle point with a two dimensional stable manifold. Two stable roots, rather than only one as in basic neoclassical models, now determine the speed of convergence.

In this paper an optimal design of two-stage speed reducer is presented. The novelty of this article consists in the complex and complete approach of the optimal design of gearings. The chosen objective function was the volume bounded by... more

In this paper an optimal design of two-stage speed reducer is presented. The novelty of this article consists in the complex and complete approach of the optimal design of gearings. The chosen objective function was the volume bounded by the inner surface of the reducer housing. For this example of optimal design, eleven genes were taken into consideration and a set of thirty six constraints were formulated. In solving the optimization problem we used an original dual-phase evolutionary algorithm (DPEA) inspired from the evolutionary concept of "punctuated equilibrium". DPEA is implemented in Cambrian v.3.2 which is in operation at the Optimal Design Centre of the Technical University of Cluj-Napoca.

The Radio Frequency Identification System (RFID) has become a popular system and its applications has reached in most of the fields like toll bridge, supply chain management and defense sector [8]. The RFID has also entered into the field... more

The Radio Frequency Identification System (RFID) has become a popular system and its applications has reached in most of the fields like toll bridge, supply chain management and defense sector [8]. The RFID has also entered into the field of medical sciences [4, 7]. Everyday, RFID tags are becoming very small and their dimensions are also reducing to 0.002 inches (RFID powder tag) developed by Hitachi [10,11]. There are many different types of RFID tags available in the market for different types of applications. Due to reduction in the cost of production, RFID systems are being deployed everywhere in large number. Therefore, it becomes important to understand the tag technology and their applicability. In this paper, we provide a comprehensive survey of various RFID tag technologies reported in the literatures and classify them into different categories.

In this study, a CanSat with capability of returning back to target is designed and implemented. The device is a part of project that has been implemented during the CLTP (CanSat Leadership Training Program) in Wakayama University. The... more

In this study, a CanSat with capability of returning back to target is designed and implemented. The device is a part of project that has been implemented during the CLTP (CanSat Leadership Training Program) in Wakayama University. The CanSat is controlled by a state-of-the-art MBED 32-bit microcontroller. The main components are the pressure, ultrasonic, gps sensors and the 2.4 GHZ transmitter. The mission is planned for two stages which are flight back to the target by a paraglider and rovering on the ground on wheels. The process will be monitored on the ground station via the GoogleEarth software. The electronics&hardware design and the control algorithm is discussed in depth in this paper.

Global Positioning System (GPS) has been very useful tool for the last two decades in the area of geodynamics because or the validation of the GPS results by the Very Long Baseline Interferometry (VLBI) and Satellite Laser Ranging (SLR)... more

Global Positioning System (GPS) has been very useful tool for the last two decades in the area of geodynamics because or the validation of the GPS results by the Very Long Baseline Interferometry (VLBI) and Satellite Laser Ranging (SLR) observations. The modest budget requirement and the high accuracy relative positioning availability of GPS increased the use of it in determination of crustal and/or regional deformations. Since the civilian use the GPS began in 1980, the development on the receiver and antenna technology with the ease of use software packages reached to a well known state, which may be named as a revolution in the Earth Sciences among other application fields. Analysis of a GPS network can also give unknown information about the fault lines that can not be seen from the ground surface. Having information about the strain accumulation along the fault line may allow us to evaluate future probabilities of regional earthquake hazards and develop earthquake scenarios for specific faults. In this study, the use of GPS in geodynamical studies will be outlined throughout the instrumentation, the measurements, and the methods utilized. The preliminary results of three projects, sponsored by the Scientific & Technical Research Council of Turkey (TUBITAK) and Istanbul Technical University (ITU) which have been carried out in Turkey using GPS will be summarized. The projects are mainly aimed to determine the movements along the fault zones. Two of the projects have been implemented along the North Anatolian Fault Zone. (NAFZ), one is in Mid-Anatolia region, and the ther is in Western Marmara region. The third project has been carried out in the Fethiye-Burdur region. The collected GPS data were processed by the GAMIT/GLOBK software The results are represented as velocity vectors obtained using the yearly combinations of the daily measured GPS data.

This chapter contains sections titled: IntroductionCopigmentation of anthocyaninsFormation of inclusion complexesIon-pair formationMetalloanthocyaninsZ-Chalcones: unexpected open cavities for the ferric cationAnthocyanin biological... more

This chapter contains sections titled: IntroductionCopigmentation of anthocyaninsFormation of inclusion complexesIon-pair formationMetalloanthocyaninsZ-Chalcones: unexpected open cavities for the ferric cationAnthocyanin biological activitySome thoughts on applicationsReferencesIntroductionCopigmentation of anthocyaninsFormation of inclusion complexesIon-pair formationMetalloanthocyaninsZ-Chalcones: unexpected open cavities for the ferric cationAnthocyanin biological activitySome thoughts on applicationsReferences

A n estimated 45 million people around the world are blind. 1 Most of them have lost their sight to diseases that are treatable or preventable. Eighty percent of them live in the lesser-developed world in countries where chronic economic... more

A n estimated 45 million people around the world are blind. 1 Most of them have lost their sight to diseases that are treatable or preventable. Eighty percent of them live in the lesser-developed world in countries where chronic economic deprivation is exacerbated by the added challenge of failing vision. Without intervention, the number of individuals with blindness might reach 76 million by 2020 because of a number of factors, primarily the rapid aging of populations in most countries. 2 Since eye disease is seen largely in older people, the projected doubling of the world's population older than 50 years to 2 billion by 2020 has profound effects on the number of those with blindness and low vision.

In this work we propose a method to identify the raga of a Carnatic music signal. Raga is analogous to melody in Western music but is much richer and stronger in its representation. The main motive behind Raga identification is that it... more

In this work we propose a method to identify the raga of a Carnatic music signal. Raga is analogous to melody in Western music but is much richer and stronger in its representation. The main motive behind Raga identification is that it can be used as a good basis for music information retrieval of Carnatic music songs or Film songs based on Carnatic music. The input polyphonic music signal is analyzed and made to pass through a signal separation algorithm to separate the instrument and the vocal signal. After extracting the vocal signal we segment the vocal signal using our proposed segmentation algorithm. Using our proposed singer identification algorithm we determine the singer to know the fundamental frequency of the singer. The frequency components of the signal are then determined and we map these frequency components into the swara sequence and thereby determine the Raga of the particular song, which could be used to index the songs and further for retrieval based on the Raga.

This paper presents the implementation of education reform model namely outcome-based education (OBE) in terms of course delivery, assessment, evaluation and continuous quality improvement (CQI) at the Faculty of Mechanical Engineering,... more

This paper presents the implementation of education reform model namely outcome-based education (OBE) in terms of course delivery, assessment, evaluation and continuous quality improvement (CQI) at the Faculty of Mechanical Engineering, Universiti Malaysia Pahang (UMP). It was formalized based on the quality management system principle which is formulated its philosophy on OBE as well as on teaching and learning to facilitate the implementation. Board of External Examiner (BEE), Board of Industry Advisor (BIA) and Board of Stakeholders (BOS) are engaged for the third party review on the faculty vision, mission, curriculum, and assessment. The aspects of delivery, assessment and evaluation are discussed.

The plant polyphenols are a very heterogeneous group, some universally and others widely distributed among plants, and often present in surprisingly high concentrations. During the evolutionary adaptation of plants to land, the... more

The plant polyphenols are a very heterogeneous group, some universally and others widely distributed among plants, and often present in surprisingly high concentrations. During the evolutionary adaptation of plants to land, the biosynthesis of different phenolics classes in plants has evolved in response to changes in the external environment. Besides a bulk of phenolic substances having cell wall structural roles, a great diversity of non-structural constituents was also formed, having such various roles as defending plants, establishing flower colour and contributing substantially to certain flavours. The accumulation of phenolics in plant tissues is considered a common adaptive response of plants to adverse environmental conditions, therefore increasing evolutionary fitness. In addition, these secondary metabolites may still be physiologically important as a means of channelling and storing carbon compounds, accumulated from photosynthesis, during periods when nitrogen is limiting or whenever leaf growth is curtailed.

Machine transliteration has gained prime importance as a supporting tool for Machine translation and cross language information retrieval especially when proper names and technical terms are involved. The performance of machine... more

Machine transliteration has gained prime importance as a supporting tool for Machine translation and cross language information retrieval especially when proper names and technical terms are involved. The performance of machine translation and cross-language information retrieval depends extremely on accurate transliteration of named entities. Hence the transliteration model must aim to preserve the phonetic structure of words as closely as possible. In this paper, the transliteration problem is modeled as classification problem and trained using C4.5 decision tree classifier, in WEKA Environment. The training was implemented with features extracted from a parallel corpus. This technique was demonstrated for English to Tamil Transliteration and achieved exact Tamil transliterations for 84.82% of English names. Possible equivalent transliterations were also generated by the model. It is found that the transliteration accuracy is increased when the top five ranked transliterations were considered.

There are indications that pelagic cnidarians and ctenophores ('jellyfish') have increased in abundance throughout the world, or that outbreaks are more frequent, although much uncertainty surrounds the issue, due to the scarcity of... more

There are indications that pelagic cnidarians and ctenophores ('jellyfish') have increased in abundance throughout the world, or that outbreaks are more frequent, although much uncertainty surrounds the issue, due to the scarcity of reliable baseline data. Numerous hypotheses have been proposed for the individual increases or outbreaks that are better documented, but direct experimental or

This paper presents the implementation of education reform model namely outcome-based education (OBE) in terms of course delivery, assessment, evaluation and continuous quality improvement (CQI) at the Faculty of Mechanical Engineering,... more

This paper presents the implementation of education reform model namely outcome-based education (OBE) in terms of course delivery, assessment, evaluation and continuous quality improvement (CQI) at the Faculty of Mechanical Engineering, Universiti Malaysia Pahang (UMP). It was formalized based on the quality management system principle which is formulated its philosophy on OBE as well as on teaching and learning to facilitate the implementation. Board of External Examiner (BEE), Board of Industry Advisor (BIA) and Board of Stakeholders (BOS) are engaged for the third party review on the faculty vision, mission, curriculum, and assessment. The aspects of delivery, assessment and evaluation are discussed.

WLAN uses frequency spectrum for providing wireless access to nomadic nodes which is in fact a very scarce resource. One common issue in deployment of a multi-channel multi-AP wireless network is interference. One of the reasons why... more

WLAN uses frequency spectrum for providing wireless access to nomadic nodes which is in fact a very scarce resource. One common issue in deployment of a multi-channel multi-AP wireless network is interference. One of the reasons why theoretical throughput (54 Mbps for 802.11g) can't be achieved is co-channel interference. In this paper, the effect of cochannel interference on data throughput has been studied in a practical multiple AP (access point) scenario. Interference can be minimized by adjusting the transmission power. This paper also provides an algorithm for transmission power adjustment of APs by using the concept of cognitive radio, which eventually helps in minimizing co-channel interference.

Fig. I : Basic structure of a SAW transversal filter II. FILTER DESIGN

The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not... more

The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, at the time of decryption we need not to find the inverse of the key matrix. The objective of this paper is to encrypt an image using a technique different from the conventional Hill Cipher. In this paper a novel advanced Hill (AdvHill) encryption technique has been proposed which uses an involutory key matrix. The scheme is a fast encryption scheme which overcomes problems of encrypting the images with homogeneous background. A comparative study of the proposed encryption scheme and the existing scheme is made. The output encrypted images reveal that the proposed technique is quite reliable and robust.

Soft Computing is an emerging field that consists of complementary elements of fuzzy logic, neural computing and evolutionary computation. Soft computing techniques have found wide applications. One of the most important applications is... more

Soft Computing is an emerging field that consists of complementary elements of fuzzy logic, neural computing and evolutionary computation. Soft computing techniques have found wide applications. One of the most important applications is edge detection for image segmentation. The process of partitioning a digital image into multiple regions or sets of pixels is called image segmentation. Edge is a boundary between two homogeneous regions. Edge detection refers to the process of identifying and locating sharp discontinuities in an image. In this paper, the main aim is to survey the theory of edge detection for image segmentation using soft computing approach based on the Fuzzy logic, Genetic Algorithm and Neural Network.

The Research Network for a Secure Australia (RNSA) is a multidisciplinary collaboration established to strengthen Australia's research capacity for protecting critical infrastructure (CIP) from natural or human caused disasters including... more

The Research Network for a Secure Australia (RNSA) is a multidisciplinary collaboration established to strengthen Australia's research capacity for protecting critical infrastructure (CIP) from natural or human caused disasters including terrorist acts. The RNSA facilitates a knowledge-sharing network for research organisations, government and the private sector to develop research tools and methods to mitigate emerging safety and security issues relating to critical infrastructure. World-leaders with extensive national and international linkages in relevant scientific, engineering and technological research will lead this collaboration. The RNSA also organises various activities to foster research collaboration and nurture young investigators.

The ECG Signal is a graphical representation of the electromechanical activity of the cardiac system. It is one of the most important physiological parameter, which is being extensively used for knowing the state of cardiac patients. For... more

The ECG Signal is a graphical representation of the electromechanical activity of the cardiac system. It is one of the most important physiological parameter, which is being extensively used for knowing the state of cardiac patients. For diagnostic quality ECG recordings, signal acquisition must be noise free. Since ECG signals are only of the order of 1 mV in amplitude, the ECG acquisition is susceptible to many types of noises and power line interference is one of them. Many types of analog and Digital Filters have been proposed/ suggested by the researchers. The present paper has proposed a combination technique of two methods i.e. the moving averages technique and IIR notch to reduce the power line interference. The results have clearly indicated that there is reduction in the power line noise in the ECG signal. The filter proposed in this paper has fewer coefficients and hence lesser computation time. So the above combination is applicable for real time processing. The results have been concluded using Matlab and MIT-BIH database (with 60 Hz powerline interference)

Defected ground structures (DGS) have been developed to improve characteristics of many microwave devices. Although the DGS has advantages in the area of the microwave filter design, microstrip antenna design for different applications... more

Defected ground structures (DGS) have been developed to improve characteristics of many microwave devices. Although the DGS has advantages in the area of the microwave filter design, microstrip antenna design for different applications such as cross polarization reduction and mutual coupling reduction etc., it can also be used for the antenna size reduction. The etching of a defect in the ground plane is a unique technique for the antenna size reduction. The DGS is easy to be an equivalent LC resonator circuit. The value of the inductance and capacitance depends on the area and size of the defect. By varying the various dimensions of the defect, the desired resonance frequency can be achieved. In this paper the effect of dumbbell shaped DGS, to the size reduction of a microstrip patch antenna is investigated. Then a cavity backed structure is used to increase the efficiency of the microstrip patch antenna, in which the electric walls are placed surrounding the patch. The simulation is carried out with IE3D full wave EM simulator.

Where f h is the upper end frequency and f L is lower end frequency of the antenna operational band. There are three classes of UWB antennas based on their applications. First is the "DC-to-Daylight" classhaving the maximal bandwidth.... more

Where f h is the upper end frequency and f L is lower end frequency of the antenna operational band. There are three classes of UWB antennas based on their applications. First is the "DC-to-Daylight" classhaving the maximal bandwidth. Second is the "multinarrow band" class-receiving or detecting narrowband signals across broad swaths of frequencies.

This paper reviews the basic of multimode interference (MMI) coupler and its application in optics, especially for optical switching. We have demonstrated the design & performance of 2 x 2 MMI coupler based all optical switch of lesser... more

This paper reviews the basic of multimode interference (MMI) coupler and its application in optics, especially for optical switching. We have demonstrated the design & performance of 2 x 2 MMI coupler based all optical switch of lesser dimensions than conventional structures. This structure is based on special multimode region shape, which leads switch to have less coupling loss & lesser cross talk. The variations of the refractive indices of various sections to achieve switching actions are kept in the range of 1-2%.

Nickel Oxide (NiO) nanoparticles have been synthesised by self-propagating low temperature Combustion synthesis method using Nickel salt with polyethylene glycol as fuel. As synthesized NiO nanoparticles was characterized by employing... more

Nickel Oxide (NiO) nanoparticles have been synthesised by self-propagating low temperature Combustion synthesis method using Nickel salt with polyethylene glycol as fuel. As synthesized NiO nanoparticles was characterized by employing Fourier transform infrared spectroscopy (FTIR), Scanning Electron Microscopy (SEM), and Energy dispersive X-ray microanalysis studies (EDAX) techniques and X-ray diffraction (XRD) confirmed the formation of NiO nanoparticles in the range 20 to 40 nm. SEM images clearly shows the NiO particles are in Nano size.

The Research Network for a Secure Australia (RNSA) is a multidisciplinary collaboration established to strengthen Australia's research capacity for protecting critical infrastructure (CIP) from natural or human caused disasters including... more

The Research Network for a Secure Australia (RNSA) is a multidisciplinary collaboration established to strengthen Australia's research capacity for protecting critical infrastructure (CIP) from natural or human caused disasters including terrorist acts. The RNSA facilitates a knowledge-sharing network for research organisations, government and the private sector to develop research tools and methods to mitigate emerging safety and security issues relating to critical infrastructure. World-leaders with extensive national and international linkages in relevant scientific, engineering and technological research will lead this collaboration. The RNSA also organises various activities to foster research collaboration and nurture young investigators.

Riboflavin is a basic component of the cellular metabolism since it is the precursor of the coenzymes flavin mononucleotide (FMN) and flavin adenine dinucleotide (FAD). Riboflavin producing lactic acid bacteria are of potential importance... more

Riboflavin is a basic component of the cellular metabolism since it is the precursor of the coenzymes flavin mononucleotide (FMN) and flavin adenine dinucleotide (FAD). Riboflavin producing lactic acid bacteria are of potential importance to the fermented food industry since the chemical processes is being replaced by the fermentative biotechnological methods. The present study was carried out to identify and characterize the best riboflavin producing lactic acid bacteria from the yoghurt samples of the Vellore district. The strains isolated belong to the genus Lactobacillus, streptococcus, Pediococcus, and Leuconostoc. Lactobacillus was the predominant strain. The best riboflavin producing strain was characterized to be Lactobacillus fermentum by both biochemical as well as molecular methods from the Institute of microbial technology (IMTECH), Chandigarh, India and deposited with the accession number MTCC 8711. The strain could be a better starter replacing the conventional lactic acid bacteria where in the fermented foods could be naturally fortified with the riboflavin.

Eight sunflower parents and their sixteen F 1 hybrids were evaluated at Agricultural Research Institute Tarnab, Peshawar during autumn 2006-07 to estimate correlation among different Morpho-physiological characters. A randomized complete... more

Eight sunflower parents and their sixteen F 1 hybrids were evaluated at Agricultural Research Institute Tarnab, Peshawar during autumn 2006-07 to estimate correlation among different Morpho-physiological characters. A randomized complete block design with three replicates was used. The correlation study has indicated that days to maturity was positively linked with days to first flowering, days to 100 percent flowering, internodes length and stem girth. Plant height was positively correlated with stem girth, number of leaves, days to first ...

The World Wide Web (WWW) continues to grow at an astounding rate in both the sheer volume of traffic and the size and complexity of Web sites. The complexity of tasks such as Web site design, Web server design, and of simply navigating... more

The World Wide Web (WWW) continues to grow at an astounding rate in both the sheer volume of traffic and the size and complexity of Web sites. The complexity of tasks such as Web site design, Web server design, and of simply navigating through a Web site has increased along with this growth. An important input to these design tasks is the analysis of how a Web site is being used. Usage analysis includes straightforward statistics, such as page access frequency, as well as more sophisticated forms of analysis, such as finding the common traversal paths through a Web site. Web Usage Mining is the application of data mining techniques to usage logs of large Web data repositories in order to produce results that can be used in the design tasks mentioned above. However, there are several preprocessing tasks that must be per-formed prior to applying data mining algorithms to the data collected from server logs. This paper presents several data preparation techniques in order to identify unique users and user sessions. Also, a method to divide user sessions into semantically meaningful transactions is defined and successfully tested against two other methods.

Information security, and Cryptography as a part of it, is a critical topic for computer science students to understand. Different teaching approaches can be effective in helping the students understand abstract principles. In this paper,... more

Information security, and Cryptography as a part of it, is a critical topic for computer science students to understand. Different teaching approaches can be effective in helping the students understand abstract principles. In this paper, we present our approach to Cryptography education that is based on the idea that the stages of growth of the individual might recapitulate the stages of growth of the science. The Cryptography is apprehended as pilot model for further proposal of Computer Science education.

Th is paper describes the virtual assembly automation systems, as decision support systems, for the better knowledge of assembly operation. The study of this procedure is described as well as the necessity for assembly systems design. The... more

Th is paper describes the virtual assembly automation systems, as decision support systems, for the better knowledge of assembly operation. The study of this procedure is described as well as the necessity for assembly systems design. The work draws on research into product and manufacturing knowledge models, and uses a case study based on a simplified assembly line realized in Delphi programming mediu m.

The differences in drain current and drain voltage characteristics of top gate and bottom gate Organic Thin Film Transistor (OTFT) structures are analyzed by two dimensional numerical device simulators. Further discussion shows different... more

The differences in drain current and drain voltage characteristics of top gate and bottom gate Organic Thin Film Transistor (OTFT) structures are analyzed by two dimensional numerical device simulators. Further discussion shows different characteristics parameters of OTFTs. Transistor based on organic semiconductor (conjugated or conducting polymers) as active layer to manage electric current flow is known as OTFTs. The performance parameters of OTFTs are evaluated from output and transfer characteristics of different structures of OTFTs. Device characteristics parameters have been evaluated in terms of drain current, mobility, on/off current ratio, threshold voltage, subthreshold slope and transconductance. OTFTs are considered as promising device for future development of their various applications in the areas of low-cost and large-area electronics. Further this paper thoroughly discusses the overall performance and applications of OTFTs in various fields.

This chapter presents an offline signature verification and forgery detection system based on fuzzy modelling. The various handwritten signature characteristics and features are first studied and encapsulated to devise a robust... more

This chapter presents an offline signature verification and forgery detection system based on fuzzy modelling. The various handwritten signature characteristics and features are first studied and encapsulated to devise a robust verification system. The verification of genuine signatures and detection of forgeries is achieved via angle features extracted using a grid method. The derived features are fuzzified by an exponential membership function, which is modified to include two structural parameters. The structural parameters are devised to take account of possible variations due to handwriting styles and to reflect other factors affecting the scripting of a signature. The efficacy of the proposed system is tested on a large database of signatures comprising over 1200 signature images obtained from 40 volunteers. J Average J Maximum J Average J Maximum J 1

The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not... more

The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, at the time of decryption we need not to find the inverse of the key matrix. The objective of this paper is to encrypt an image using a technique different from the conventional Hill Cipher. In this paper a novel advanced Hill (AdvHill) encryption technique has been proposed which uses an involutory key matrix. The scheme is a fast encryption scheme which overcomes problems of encrypting the images with homogeneous background. A comparative study of the proposed encryption scheme and the existing scheme is made. The output encrypted images reveal that the proposed technique is quite reliable and robust.

Pseudo Random Number Generators (PRNG) are the base for stochastic simulations. The usage of good generators is essential for valid simulation results. OPNET Modeler a well-known tool for simulation of communication networks provides a... more

Pseudo Random Number Generators (PRNG) are the base for stochastic simulations. The usage of good generators is essential for valid simulation results. OPNET Modeler a well-known tool for simulation of communication networks provides a Pseudo Random Number Generator. The extension of OPNET Modeler with external generators and additional statistical evaluation methods that has been performed for this paper increases the flexibility and options in the simulation studies performed.

Matrix-isolation infrared spectra of 1,2-cyclohexanedione (CD) and 3-methyl-1,2-cyclohexanedione (3-MeCD) were measured in a nitrogen matrix at 8 K. The spectral features reveal that, in the matrix environment, both molecules exist... more

Matrix-isolation infrared spectra of 1,2-cyclohexanedione (CD) and 3-methyl-1,2-cyclohexanedione (3-MeCD) were measured in a nitrogen matrix at 8 K. The spectral features reveal that, in the matrix environment, both molecules exist exclusively in the monohydroxy tautomeric form, which is stabilized by an intramolecular OsH · · · OdC hydrogen bond (HB). The ν OsH band of the enol tautomer of 3-MeCD appears at a relatively lower frequency and displays a somewhat broader bandwidth compared to that of CD, and these spectral differences between the two molecules are interpreted as being due to the formation of an interconnected CsH · · · O HB, where the enolic oxygen is the HB acceptor and one of the CsH covalent bonds of the methyl group is the HB donor. Electronic structure calculations at the B3LYP/6-311++G**, MP2/6-311++G**, and MP2/cc-pVTZ levels predict that this tautomer (enol-2) is ∼3.5 kcal/mol more stable than a second enolic form (enol-1) where such interconnected H-bonding is absent. Theoretical analysis with a series of molecules having similar functional groups reveals that part of the excess stability (∼1 kcal/mol) of enol-2 originates from a cooperative interaction between the interconnected CsH · · · O and OsH · · · O HBs. In the IR spectrum, a weak band at 3007 cm -1 is assigned to ν CsH of the methyl CsH bond involved in the H-bonded network. The spectra predicted by both harmonic and anharmonic calculations reveal that this transition is largely blue-shifted compared to the fundamentals of the other two methyl CsH stretching frequencies that are not involved in H-bonding. The conclusions are corroborated further by natural bond orbital (NBO) analysis.

An Impulse noise detection & removal with adaptive filtering approach is proposed to restore images corrupted by salt & pepper noise. The proposed algorithm works well for suppressing impulse noise with noise density from 5 to 60% while... more

An Impulse noise detection & removal with adaptive filtering approach is proposed to restore images corrupted by salt & pepper noise. The proposed algorithm works well for suppressing impulse noise with noise density from 5 to 60% while preserving image details. The difference of current central pixel with median of local neighborhood pixels is used to classify the central pixel as noisy or noise-free. The noise is attenuated by estimating the values of the noisy pixels with a switching based median filter applied exclusively to those neighborhood pixels not labeled as noisy. The size of filtering window is adaptive in nature, and it depends on the number of noise-free pixels in current filtering window. Simulation results indicate that this filter is better able to preserve 2-D edge structures of the image and delivers better performance with less computational complexity as compared to other denoising algorithms existing in literature.

The behavioral effect of Fructus Psoraleae (FP) was investigated in the rat by using maze apparatus. Ethanol was found to increase the ambulatory, rearing and grooming behaviors in the open-field test. In animal studies, FP increase the... more

The behavioral effect of Fructus Psoraleae (FP) was investigated in the rat by using maze apparatus. Ethanol was found to increase the ambulatory, rearing and grooming behaviors in the open-field test. In animal studies, FP increase the number of cholinergic neurons in the basal forebrain which in turn leads to increased hippocampal function, a structure heavily implicated in behavioral activity and memory consolidation. In addition, FP blocked plasma elevated cortisol level, an indicator of the hypothalamic-pituitary-adrenal (HPA) axis. People with extensive hippocampal damage may experience amnesia, learning and memory disabilities. Hence the herb FP may be used as an adjuvant to treat the above neurological disorders.

A two-dimensional (2-D) analytical subthreshold model is developed for a graded channel double gate (DG) fully depleted SOI n-MOSFET incorporating a gate misalignment effect. The conformal mapping transformation (CMT) approach has been... more

A two-dimensional (2-D) analytical subthreshold model is developed for a graded channel double gate (DG) fully depleted SOI n-MOSFET incorporating a gate misalignment effect. The conformal mapping transformation (CMT) approach has been used to provide an accurate prediction of the surface potential, electric field, threshold voltage and subthreshold behavior of the device, considering the gate misalignment effect to be on both source and drain side. The model is applied to both uniformly doped (UD) and graded channel (GC) DG MOSFETs. The results of an analytical model agree well with 3-D simulated data obtained by ATLAS-3D device simulation software.

Beach deposits from the marine intertidal zone at Keawe'ula Bay, on the north-western flank of Kohala Volcano, north Hawaii, yield a population of Semicytherura challengerae sp. nov. that appear to have been living interstitially within... more

Beach deposits from the marine intertidal zone at Keawe'ula Bay, on the north-western flank of Kohala Volcano, north Hawaii, yield a population of Semicytherura challengerae sp. nov. that appear to have been living interstitially within the coarse-to very coarse-grained beach sand. The ostracods, which preserve part of their soft-anatomy, are systematically described.