Search results for: image compression and salt and peppers attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4703

Search results for: image compression and salt and peppers attacks

4583 Response of Concrete Panels Subjected to Compression-Tension State of Stresses

Authors: Mohammed F. Almograbi

Abstract:

For reinforced concrete panels the risk of failure due to compression -tension state of stresses, results from pure shear or torsion, can be a major problem. The present calculation methods for such stresses from multiple influences are without taking into account the softening of cracked concrete remains conservative. The non-linear finite element method has become an important and increasingly used tool for the analysis and assessment of the structures by including cracking softening and tension-stiffening. The aim of this paper is to test a computer program refined recently and to simulate the compression response of cracked concrete element and to compare with the available experimental results.

Keywords: reinforced concrete panels, compression-tension, shear, torsion, compression softening, tension stiffening, non-linear finite element analysis

Procedia PDF Downloads 316
4582 A Deletion-Cost Based Fast Compression Algorithm for Linear Vector Data

Authors: Qiuxiao Chen, Yan Hou, Ning Wu

Abstract:

As there are deficiencies of the classic Douglas-Peucker Algorithm (DPA), such as high risks of deleting key nodes by mistake, high complexity, time consumption and relatively slow execution speed, a new Deletion-Cost Based Compression Algorithm (DCA) for linear vector data was proposed. For each curve — the basic element of linear vector data, all the deletion costs of its middle nodes were calculated, and the minimum deletion cost was compared with the pre-defined threshold. If the former was greater than or equal to the latter, all remaining nodes were reserved and the curve’s compression process was finished. Otherwise, the node with the minimal deletion cost was deleted, its two neighbors' deletion costs were updated, and the same loop on the compressed curve was repeated till the termination. By several comparative experiments using different types of linear vector data, the comparison between DPA and DCA was performed from the aspects of compression quality and computing efficiency. Experiment results showed that DCA outperformed DPA in compression accuracy and execution efficiency as well.

Keywords: Douglas-Peucker algorithm, linear vector data, compression, deletion cost

Procedia PDF Downloads 216
4581 Experimental Investigation on Variable Compression Ratio of Single Cylinder Four Stroke SI Engine Working under Ethanol – Gasoline Blend

Authors: B. V. Lande, Suhas Kongare

Abstract:

Fuel blend of alcohol and conventional hydrocarbon fuels for a spark ignition engine can increase the fuel octane rating and the power for a given engine displacement and compression ratio. The greatest advantage of ethanol as a fuel in SI Engines is its high octane number. The efficiency of an SI engine that is the ability to convert fuel energy to mechanical energy, mainly depends on the compression ratio. It is, therefore, an advantage to increase this as much as possible. The major restraint is the fuel octane number – high octane fuels can be used with high compression ratios, thus yielding higher energy efficiency. This work investigates to suggest suitable ethanol gasoline blend and compression ratio for single cylinder four strokes SI Engine on the basis of performance and exhaust emissions. A single cylinder four stroke SI Engine was tested with different blend of ethanol – gasoline like E5 (5% ethanol +95% gasoline), E10 (10% ethanol + 90% gasoline) E15 (15% ethanol + 85% petrol) and E20 ( 20% + 80% gasoline) with Variable compression ratio. The performance parameter evaluated BSFC, Brake thermal efficiency and also exhaust emission CO2, Co & HC%. The result showed that higher compression ratio improved engine Performance and reduction in exhaust emission.

Keywords: blend, compression ratio, ethanol, performance, blend

Procedia PDF Downloads 365
4580 Effect of Salt Forms and Concentrations on the Alveograph and Extensigraph Parameters of Rye Flour

Authors: Péter Sipos, Gerda Diósi, Mariann Móré, Zsófia Szigeti

Abstract:

Several medical research found that the sodium is one of the main risk factor of high blood pressure and reason for different cardiovascular diseases, while sodium chloride is one of the most ancient food additives. As people consume much more sodium chloride as the recommended value several salt reduction programs started worldwide in the last years. The cereal products are the main source of sodium, and the bakery products are one of the main targets of these programs. In this paper we have evaluated the effects of different concentrations of sodium chloride on the alveo graphical and extensi graphical parameters of rye flours to determine whether it has the same strengthening effect on the dough texture as it was found in the case of wheat flours and these effects were compared to the effects of other salt forms. We found that while the strength of rye flours are similar to the ones of wheat flour, rye flours are much less extensible. The effects of salt concentrations are less significant on the rheological properties of rye flour than on the wheat flour and there is no significant difference between the effects of different salts.

Keywords: alveograph, extensigraph, rye flour, salt

Procedia PDF Downloads 462
4579 Effect of Different Salt Concentrations and Temperatures on Seed Germination and Seedling Characters in Safflower (Carthamus tinctorius L.) Genotypes

Authors: Rahim Ada, Zamari Temory, Hasan Dalgic

Abstract:

Germination and seedling responses of seven safflower seed genotypes (Dinçer, Remzibey, Black Sun2 cultivars and A19, F4, I1, J19 lines) to different salinity concentrations (0, 5, 10, and 20 g l-1) and temperatures (10 and 20 oC) evaluated in Completely Randomized Factorial Designs in Department of Field Crops of Selcuk University, Konya, Turkey. Seeds in the control (distilled water) had at 10 and 20 oC the highest germination percentage (93.88 and 94.32 %), shoot length (4.60 and 8.72 cm), root length (4.27 and 6.54 cm), shoot dry weight (22.37 mg and 25.99 mg), and root dry weight (2.22 and 2.47 mg). As the salt concentration increased, values of all characters were decreased. In this experiment, in 20 g l-1 salt concentration found germination percentage (21.28 and 26.66 %), shoot (1.32 and 1.35 cm) and root length (1.04 and 1.10 cm), shoot (8.05 mg and 7.49 mg) and root dry weight (0.83 and 0.98 mg) at 10, and 20 oC.

Keywords: safflower, NaCl, temperature, shoot and root length, salt concentration

Procedia PDF Downloads 263
4578 Prediction Modeling of Compression Properties of a Knitted Sportswear Fabric Using Response Surface Method

Authors: Jawairia Umar, Tanveer Hussain, Zulfiqar Ali, Muhammad Maqsood

Abstract:

Different knitted structures and knitted parameters play a vital role in the stretch and recovery management of compression sportswear in addition to the materials use to generate this stretch and recovery behavior of the fabric. The present work was planned to predict the different performance indicators of a compression sportswear fabric with some ground parameters i.e. base yarn stitch length (polyester as base yarn and spandex as plating yarn involve to make a compression fabric) and linear density of the spandex which is a key material of any sportswear fabric. The prediction models were generated by response surface method for performance indicators such as stretch & recovery percentage, compression generated by the garment on body, total elongation on application of high power force and load generated on certain percentage extension in fabric. Certain physical properties of the fabric were also modeled using these two parameters.

Keywords: Compression, sportswear, stretch and recovery, statistical model, kikuhime

Procedia PDF Downloads 355
4577 Efficient Storage and Intelligent Retrieval of Multimedia Streams Using H. 265

Authors: S. Sarumathi, C. Deepadharani, Garimella Archana, S. Dakshayani, D. Logeshwaran, D. Jayakumar, Vijayarangan Natarajan

Abstract:

The need of the hour for the customers who use a dial-up or a low broadband connection for their internet services is to access HD video data. This can be achieved by developing a new video format using H. 265. This is the latest video codec standard developed by ISO/IEC Moving Picture Experts Group (MPEG) and ITU-T Video Coding Experts Group (VCEG) on April 2013. This new standard for video compression has the potential to deliver higher performance than the earlier standards such as H. 264/AVC. In comparison with H. 264, HEVC offers a clearer, higher quality image at half the original bitrate. At this lower bitrate, it is possible to transmit high definition videos using low bandwidth. It doubles the data compression ratio supporting 8K Ultra HD and resolutions up to 8192×4320. In the proposed model, we design a new video format which supports this H. 265 standard. The major areas of applications in the coming future would lead to enhancements in the performance level of digital television like Tata Sky and Sun Direct, BluRay Discs, Mobile Video, Video Conferencing and Internet and Live Video streaming.

Keywords: access HD video, H. 265 video standard, high performance, high quality image, low bandwidth, new video format, video streaming applications

Procedia PDF Downloads 334
4576 Elastic Constants of Fir Wood Using Ultrasound and Compression Tests

Authors: Ergun Guntekin

Abstract:

Elastic constants of Fir wood (Abies cilicica) have been investigated by means of ultrasound and compression tests. Three modulus of elasticity in principal directions (EL, ER, ET), six Poisson’s ratios (ʋLR, ʋLT, ʋRT, ʋTR, ʋRL, ʋTL) and three shear modules (GLR, GRT, GLT) were determined. 20 x 20 x 60 mm samples were conditioned at 65 % relative humidity and 20ºC before testing. Three longitudinal and six shear wave velocities propagating along the principal axes of anisotropy, and additionally, three quasi-shear wave velocities at 45° angle with respect to the principal axes of anisotropy were measured. 2.27 MHz longitudinal and 1 MHz shear sensors were used for obtaining sound velocities. Stress-strain curves of the samples in compression tests were obtained using bi-axial extensometer in order to calculate elastic constants. Test results indicated that most of the elastic constants determined in the study are within the acceptable range. Although elastic constants determined from ultrasound are usually higher than those determined from compression tests, the values of EL and GLR determined from compression tests were higher in the study. The results of this study can be used in the numerical modeling of elements or systems under load using Fir wood.

Keywords: compression tests, elastic constants, fir wood, ultrasound

Procedia PDF Downloads 191
4575 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 182
4574 Surface Modification of Cotton Using Slaughterhouse Wastes

Authors: Granch Berhe Tseghai, Lodrick Wangatia Makokha

Abstract:

Cotton dyeing using reactive dyes is one of the major water polluter; this is due to large amount of dye and salt remaining in effluent. Recent adverse climate change and its associated effect to human life have lead to search for more sustainable industrial production. Cationization of cotton to improve its affinity for reactive dye has been earmarked as a major solution for dyeing of cotton with no or less salt. Synthetic cationizing agents of ammonium salt have already been commercialized. However, in nature there are proteinous products which are rich in amino and ammonium salts which can be carefully harnessed to be used as cationizing agent for cotton. The hoofs and horns have successfully been used to cationize cotton so as to improve cotton affinity to the dye. The cationization action of the hoof and horn extract on cotton was confirmed by dyeing the pretreated fabric without salt and comparing it with conventionally dyed and untreated salt free dyed fabric. UV-VIS absorption results showed better dye absorption (62.5% and 50% dye bath exhaustion percentage for cationized and untreated respectively) while K/S values of treated samples were similar to conventional sample.

Keywords: cationization, cotton, proteinous products, reactive dyes

Procedia PDF Downloads 317
4573 Dynamic Web-Based 2D Medical Image Visualization and Processing Software

Authors: Abdelhalim. N. Mohammed, Mohammed. Y. Esmail

Abstract:

In the course of recent decades, medical imaging has been dominated by the use of costly film media for review and archival of medical investigation, however due to developments in networks technologies and common acceptance of a standard digital imaging and communication in medicine (DICOM) another approach in light of World Wide Web was produced. Web technologies successfully used in telemedicine applications, the combination of web technologies together with DICOM used to design a web-based and open source DICOM viewer. The Web server allowance to inquiry and recovery of images and the images viewed/manipulated inside a Web browser without need for any preinstalling software. The dynamic site page for medical images visualization and processing created by using JavaScript and HTML5 advancements. The XAMPP ‘apache server’ is used to create a local web server for testing and deployment of the dynamic site. The web-based viewer connected to multiples devices through local area network (LAN) to distribute the images inside healthcare facilities. The system offers a few focal points over ordinary picture archiving and communication systems (PACS): easy to introduce, maintain and independently platforms that allow images to display and manipulated efficiently, the system also user-friendly and easy to integrate with an existing system that have already been making use of web technologies. The wavelet-based image compression technique on which 2-D discrete wavelet transform used to decompose the image then wavelet coefficients are transmitted by entropy encoding after threshold to decrease transmission time, stockpiling cost and capacity. The performance of compression was estimated by using images quality metrics such as mean square error ‘MSE’, peak signal to noise ratio ‘PSNR’ and compression ratio ‘CR’ that achieved (83.86%) when ‘coif3’ wavelet filter is used.

Keywords: DICOM, discrete wavelet transform, PACS, HIS, LAN

Procedia PDF Downloads 139
4572 Interrogating the Impact of Insurgency Attacks on Vulnerable Groups in West Africa: Implications for Global Security

Authors: Godiya Atsiya Pius

Abstract:

The recent dimension of terrorist attacks and violence in West Africa and Nigeria in particular has attracted both academic and global concerns. Children, young girls and women are now victims of violent attacks and insurgency in their own country. Today, we have a reverse situation where women and children were spared during violence in the past. Empirical evidence shows that millions of children, young girls and women are caught up in violent attacks in which they are not merely spectatorial, but victims of circumstance. Some fall victims of a general onslaught against civilians by the drivers of such conflicts. Others die as part of a calculated genocide. Still others are taken as hostages as part of a deliberate attack on them. With particular reference to over 200 Chibok school girls that were abducted by the Boko Haram Islamic sect in Maiduguri, Borno state, Nigeria, this study shall attempt a theoretical exploration of the circumstances surrounding the insurgency attacks on these categories of vulnerable groups in Nigeria. This paper also intends to examine the nature, dimensions, causes, effects as well as implications of these attacks on women and children in West Africa. The paper shall sum up with conclusion and possible recommendations that could help the region in the 21st century and beyond.

Keywords: insurgency, gender, violence, security, vulnerable groups

Procedia PDF Downloads 445
4571 Genetic Diversity in Capsicum Germplasm Based on Inter Simple Sequence Repeat Markers

Authors: Siwapech Silapaprayoon, Januluk Khanobdee, Sompid Samipak

Abstract:

Chili peppers are the fruits of Capsicum pepper plants well known for their fiery burning sensation on the tongue after consumption. They are members of the Solanaceae or common nightshade family along with potato, tomato and eggplant. Thai cuisine has gained popularity for its distinct flavors due to usages of various spices and its heat from the addition of chili pepper. Though being used in little quantity for each dish, chili pepper holds a special place in Thai cuisine. There are many varieties of chili peppers in Thailand, and thirty accessions were collected at Rajamangala University of Technology Lanna, Lampang, Thailand. To effectively manage any germplasm it is essential to know the diversity and relationships among members. Thirty-six Inter Simple Sequence Repeat (ISSRs) DNA markers were used to analyze the germplasm. Total of 335 polymorphic bands was obtained giving the average of 9.3 alleles per marker. Unweighted pair-group mean arithmetic method (UPGMA) clustering of data using NTSYS-pc software indicated that the accessions showed varied levels of genetic similarity ranging from 0.57-1.00 similarity coefficient index indicating significant levels of variation. At SM coefficient of 0.81, the germplasm was separated into four groups. Phenotypic variation was discussed in context of phylogenetic tree clustering.

Keywords: diversity, germplasm, Chili pepper, ISSR

Procedia PDF Downloads 129
4570 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution

Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla

Abstract:

The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.

Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad

Procedia PDF Downloads 58
4569 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 60
4568 Elastic Constants of Heat Treated Wood

Authors: Ergun Guntekin

Abstract:

Effects of heat treatment on elastic constants of Black pine (Pinus nigra) wood were investigated. Specimens were exposed to heat under atmospheric pressure at two different temperatures (180 and 210 °C) and three different time levels (2, 5, 8 hours). Three Young’s modulus in three anatomical directions, six Poisson’s ratios and three Shear modulus values associated with the main directions were evaluated by compression tests. Compression strength of the samples in three principal directions was also determined. All of the properties of the specimens tested were altered by heat treatment. The degree of alteration depends on the temperature as well as duration applied. Results indicate that EL and compression strength in L direction were not significantly influenced, compression strength in R direction significantly decreased, ER, ET and compression strength in T direction were increased for shorter periods, then dropped for 8-hour application of 180 ºC. ER was not significantly affected, compression strength in R direction and EL was significantly decreased, ET and compression strength in T direction were increased for shorter periods, then decreased for 8-hour application of 210 ºC. The shear modulus of the samples was decreased with application of treatment combinations. Most of the Poisson’s ratios were not affected by heat treatment.

Keywords: black pine, elastic constants, heat treatment, wood

Procedia PDF Downloads 127
4567 Modulation of Alternative Respiration Pathyway under Salt Stress in Exogenous Estrogen-Treated Maize Seedlings

Authors: Farideh K. Khosroushahi, Serkan Erdal, Mucip Geni̇şel

Abstract:

Soil salinity is one of the major abiotic stress factors that restricts arable land and reduces crop productivity worldwide. High salt concentration adversely affects plant growth and development inducing water deficit, ionic toxicity, nutrient imbalance, and lead to oxidative stress. Although the stimulating role of mammalian sex hormones on various biological and biochemical processes under normal and stress condition have been proven, there is no study regarding with these hormone's effect on modulation of the alternative respiration pathway and AOX gene expression. In this study, changes in alternative respiration pathway in leaves of maize seedlings under salinity and the possible modulating effect of estrogen on these changes were investigated. Maize seedlings were grown in a hydroponic media for 11 days and then were exposed to salt stress for 3 days after being sprayed estrogen. The data obtained from oxygen consumption revealed that salt stress elevated cellular respiration value in the leaves. In addition, a marked increase was observed at alternative respiration level in salt-stressed seedlings. Compared to salt application alone, supplementation with estrogen resulted in a significant rise in alternative oxidase (AOX) activities. Similarly, while salt stress caused to rise in expressions of AOX gene compared to control seedlings, estrogen application resulted in further activation of these genes’ expression compared to stressed-seedlings alone. These data revealed that mitigating role of estrogen against the detrimental effects of salt stress is linked to modulation of alternative respiration pathway.

Keywords: alternative oxidase, estrogen, Ssalt stress, AOX, maize

Procedia PDF Downloads 190
4566 Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

Abstract:

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: IDS, DDoS, MLP, KDD

Procedia PDF Downloads 207
4565 A Survey of Feature-Based Steganalysis for JPEG Images

Authors: Syeda Mainaaz Unnisa, Deepa Suresh

Abstract:

Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.

Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography

Procedia PDF Downloads 187
4564 Ab-Initio Study of Native Defects in SnO Under Strain

Authors: A. Albar, D. B. Granato, U. Schwingenschlogl

Abstract:

Tin monoxide (SnO) has promising properties to be applied as a p-type semiconductor in transparent electronics. To this end, it is necessary to understand the behavior of defects in order to control them. We use density functional theory to study native defects of SnO under tensile and compressive strain. We show that Sn vacancies are more stable under tension and less stable under compression, irrespectively of the charge state. In contrast, O vacancies behave differently for different charge. It turns out that the most stable defect under compression is the +1 charged O vacancy in a Sn-rich environment and the charge neutral O interstitial in an O-rich environment. Therefore, compression can be used to transform SnO from an n-type into un-doped semiconductor.

Keywords: native defects, ab-initio, point defect, tension, compression, semiconductor

Procedia PDF Downloads 368
4563 Performance of Hybrid Image Fusion: Implementation of Dual-Tree Complex Wavelet Transform Technique

Authors: Manoj Gupta, Nirmendra Singh Bhadauria

Abstract:

Most of the applications in image processing require high spatial and high spectral resolution in a single image. For example satellite image system, the traffic monitoring system, and long range sensor fusion system all use image processing. However, most of the available equipment is not capable of providing this type of data. The sensor in the surveillance system can only cover the view of a small area for a particular focus, yet the demanding application of this system requires a view with a high coverage of the field. Image fusion provides the possibility of combining different sources of information. In this paper, we have decomposed the image using DTCWT and then fused using average and hybrid of (maxima and average) pixel level techniques and then compared quality of both the images using PSNR.

Keywords: image fusion, DWT, DT-CWT, PSNR, average image fusion, hybrid image fusion

Procedia PDF Downloads 575
4562 Plastic Deformation of Mg-Gd Solid Solutions between 4K and 298K

Authors: Anna Kula, Raja K. Mishra, Marek Niewczas

Abstract:

Deformation behavior of Mg-Gd solid solutions have been studied by a combination of measurements of mechanical response, texture and dislocation substructure. Increase in Gd content strongly influences the work-hardening behavior and flow characteristics in tension and compression. Adiabatic instabilities have been observed in all alloys at 4K under both tension and compression. The frequency and the amplitude of adiabatic stress oscillations increase with Gd content. Profuse mechanical twinning has been observed under compression, resulting in a texture dominated by basal component parallel to the compression axis. Under tension, twining is less active and the texture evolution is affected mostly by slip. Increasing Gd concentration leads to the reduction of the tension and compression asymmetry due to weakening of the texture and stabilizing more homogenous twinning and slip, involving basal and non-basal slip systems.

Keywords: Mg-Gd alloys, mechanical properties, work hardening, twinning

Procedia PDF Downloads 511
4561 Dilution of Saline Irrigation Based on Plant's Physiological Responses to Salt Stress Following by Re-Watering

Authors: Qaiser Javed, Ahmad Azeem

Abstract:

Salinity and water scarcity are major environmental problems which are limiting the agricultural production. This research was conducted to construct a model to find out appropriate regime to dilute saline water based on physiological and electrophysiological properties of Brassica napus L., and Orychophragmus violaceus (L.). Plants were treated under salt-stressed concentrations of NaCl (NL₁: 2.5, NL₂: 5, NL₃: 10; gL⁻¹), Na₂SO₄ (NO₁: 2.5, NO₂: 5, NO₃: 10; gL⁻¹), and mixed salt concentration (MX₁: NL₁+ NO₃; MX₂: NL₃+ NO₁; MX₃: NL₂+ NO₂; gL⁻¹) and 0 as control, followed by re-watering. Growth, physiological and electrophysiology traits were highly restricted under high salt concentration levels at NL₃, NO₃, MX₁, and MX₂, respectively. However, during the rewatering phase, growth, electrophysiological, and physiological parameters were recovered well. Consequently, the increase in net photosynthetic rate was noted under moderate stress condition which was 44.13, 37.07, and 43.01%, respectively in Orychophragmus violaceus (L.) and 44.94%, 53.45%, and 63.04%, respectively were found in Brassica napus L. According to the results, the best dilution point was 5–2.5% for NaCl and Na₂SO₄ alternatively, whereas it was 10–0.0% for the mixture of salts. Therefore, the effect of salinity in O. violaceus and B. napus may also be reduced effectively by dilution of saline irrigation. It would be a better approach to utilize dilute saline water for irrigation instead of applies direct saline water to plant. This study provides new insight in the field of agricultural engineering to plan irrigation scheduling considering the crop ability to salt tolerance and irrigation water use efficiency by apply specific quantity of irrigation calculated based on the salt dilution point. It would be helpful to balance between irrigation amount and optimum crop water consumption in salt-affected regions and to utilize saline water in order to safe freshwater resources.

Keywords: dilution model, plant growth traits, re-watering, salt stress

Procedia PDF Downloads 135
4560 Geometry of the Bandaging Procedure and Its Application while Wrapping Bandages for Treatment of Leg Ulcers

Authors: Monica Puri Sikka, Subrato Ghosh Arunangshu Mukhopadhyay

Abstract:

Appropriate compression bandaging is important for compression therapeutic medical diseases. The high compression approach employed for treating venous leg ulcers should be used correctly so that sufficient (but not excessive) pressure is applied. Bandages used to treat venous disease by compression should achieve and sustain effective levels and gradients of pressure and minimise the risk of pressure trauma. To maintain graduated compression on the limb the bandage needs to be applied at same tension for each layer from ankle to the knee. In this paper the geometry for various bandaging procedures is used to wrap each layer of bandage by marking the relaxed length of the bandage. The relaxed length is calculated depending on the stretch, average circumference of the limb on which it is to be applied and the bandaging technique to be used. This paper aims at developing a scientific approach while applying the bandage to reduce the inter operator variability in applying same tension on each successive layer of bandage.

Keywords: bandaging, compression, inter operator variability, graduated, relaxed length, stretch

Procedia PDF Downloads 473
4559 Effect of Curing Temperature on Unconfined Compression Strength of Bagasse Ash-Calcium Carbide Residue Treated Organic Clay

Authors: John Trihatmoko, Luky Handoko

Abstract:

A series of experimental program was undertaken to study the effect of curing temperature on the unconfined compression strength of bagasse ash (BA) - calcium carbide residue (CCR) stabilized organic clay (OC). A preliminary experiment was performed to get the physical properties of OC, and to get the optimum water content (OMC), the standard compaction test was done. The stabilizing agents used in this research was (40% BA + 60% CCR) . Then to obtain the best binder proportion, unconfined compression test was undertaken for OC + 3, 6, 9, 12 and 15% of binder with 7, 14, 21, 28 and 56 days curing period. The best quantity of the binder was found on 9%. Finally, to study the effect of curing temperature, the unconfined compression test was performed on OC + 9% binder with 7, 14, 21, 28 and 56 days curing time with 20O, 25O, 30O, 40O, and 50O C curing temperature. The result indicates that unconfined compression strength (UCS) of treated OC improve according to the increase of curing temperature at the same curing time. The improvement of UCS is probably due to the degree of cementation and pozzolanic reactions.

Keywords: curing temperature, organic clay, bagasse ash, calcium carbide residue, unconfined compression strength

Procedia PDF Downloads 98
4558 Efficient DCT Architectures

Authors: Mr. P. Suryaprasad, R. Lalitha

Abstract:

This paper presents an efficient area and delay architectures for the implementation of one dimensional and two dimensional discrete cosine transform (DCT). These are supported to different lengths (4, 8, 16, and 32). DCT blocks are used in the different video coding standards for the image compression. The 2D- DCT calculation is made using the 2D-DCT separability property, such that the whole architecture is divided into two 1D-DCT calculations by using a transpose buffer. Based on the existing 1D-DCT architecture two different types of 2D-DCT architectures, folded and parallel types are implemented. Both of these two structures use the same transpose buffer. Proposed transpose buffer occupies less area and high speed than existing transpose buffer. Hence the area, low power and delay of both the 2D-DCT architectures are reduced.

Keywords: transposition buffer, video compression, discrete cosine transform, high efficiency video coding, two dimensional picture

Procedia PDF Downloads 496
4557 Effect of 3-Dimensional Knitted Spacer Fabrics Characteristics on Its Thermal and Compression Properties

Authors: Veerakumar Arumugam, Rajesh Mishra, Jiri Militky, Jana Salacova

Abstract:

The thermo-physiological comfort and compression properties of knitted spacer fabrics have been evaluated by varying the different spacer fabric parameters. Air permeability and water vapor transmission of the fabrics were measured using the Textest FX-3300 air permeability tester and PERMETEST. Then thermal behavior of fabrics was obtained by Thermal conductivity analyzer and overall moisture management capacity was evaluated by moisture management tester. Spacer Fabrics compression properties were also tested using Kawabata Evaluation System (KES-FB3). In the KES testing, the compression resilience, work of compression, linearity of compression and other parameters were calculated from the pressure-thickness curves. Analysis of Variance (ANOVA) was performed using new statistical software named QC expert trilobite and Darwin in order to compare the influence of different fabric parameters on thermo-physiological and compression behavior of samples. This study established that the raw materials, type of spacer yarn, density, thickness and tightness of surface layer have significant influence on both thermal conductivity and work of compression in spacer fabrics. The parameter which mainly influence on the water vapor permeability of these fabrics is the properties of raw material i.e. the wetting and wicking properties of fibers. The Pearson correlation between moisture capacity of the fabrics and water vapour permeability was found using statistical software named QC expert trilobite and Darwin. These findings are important requirements for the further designing of clothing for extreme environmental conditions.

Keywords: 3D spacer fabrics, thermal conductivity, moisture management, work of compression (WC), resilience of compression (RC)

Procedia PDF Downloads 520
4556 Engineering the Human Mind: Social Engineering Attack Using Kali Linux

Authors: Joy Winston James, Abdul Kadher Jilani

Abstract:

This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.

Keywords: pen testing, hacking, Kali Linux, social engineering

Procedia PDF Downloads 62
4555 Ageing Deterioration of High-Density Polyethylene Cable Spacer under Salt Water Dip Wheel Test

Authors: P. Kaewchanthuek, R. Rawonghad, B. Marungsri

Abstract:

This paper presents the experimental results of high-density polyethylene cable spacers for 22 kV distribution systems under salt water dip wheel test based on IEC 62217. The strength of anti-tracking and anti-erosion of cable spacer surface was studied in this study. During the test, dry band arc and corona discharge were observed on cable spacer surface. After 30,000 cycles of salt water dip wheel test, obviously surface erosion and tracking were observed especially on the ground end. Chemical analysis results by fourier transforms infrared spectroscopy showed chemical changed from oxidation and carbonization reaction on tested cable spacer. Increasing of C=O and C=C bonds confirmed occurrence of these reactions.

Keywords: cable spacer, HDPE, ageing of cable spacer, salt water dip wheel test

Procedia PDF Downloads 355
4554 Assessment of Image Databases Used for Human Skin Detection Methods

Authors: Saleh Alshehri

Abstract:

Human skin detection is a vital step in many applications. Some of the applications are critical especially those related to security. This leverages the importance of a high-performance detection algorithm. To validate the accuracy of the algorithm, image databases are usually used. However, the suitability of these image databases is still questionable. It is suggested that the suitability can be measured mainly by the span the database covers of the color space. This research investigates the validity of three famous image databases.

Keywords: image databases, image processing, pattern recognition, neural networks

Procedia PDF Downloads 229