Search results for: Nirmal Singh
954 Pyramid Binary Pattern for Age Invariant Face Verification
Authors: Saroj Bijarnia, Preety Singh
Abstract:
We propose a simple and effective biometrics system based on face verification across aging using a new variant of texture feature, Pyramid Binary Pattern. This employs Local Binary Pattern along with its hierarchical information. Dimension reduction of generated texture feature vector is done using Principal Component Analysis. Support Vector Machine is used for classification. Our proposed method achieves an accuracy of 92:24% and can be used in an automated age-invariant face verification system.Keywords: biometrics, age invariant, verification, support vector machine
Procedia PDF Downloads 348953 Network Security Attacks and Defences
Authors: Ranbir Singh, Deepinder Kaur
Abstract:
Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.Keywords: network security, attacks, denial, authenticating
Procedia PDF Downloads 402952 Voltage Stability Assessment and Enhancement Using STATCOM -A Case Study
Authors: Puneet Chawla, Balwinder Singh
Abstract:
Recently, increased attention has been devoted to the voltage instability phenomenon in power systems. Many techniques have been proposed in the literature for evaluating and predicting voltage stability using steady state analysis methods. In this paper, P-V and Q-V curves have been generated for a 57 bus Patiala Rajpura circle of India. The power-flow program is developed in MATLAB using Newton-Raphson method. Using Q-V curves, the weakest bus of the power system and the maximum reactive power change permissible on that bus is calculated. STATCOMs are placed on the weakest bus to improve the voltage and hence voltage stability and also the power transmission capability of the line.Keywords: voltage stability, reactive power, power flow, weakest bus, STATCOM
Procedia PDF Downloads 514951 Rb-Modified Few-Layered Graphene for Gas Sensing Application
Authors: Vasant Reddy, Shivani A. Singh, Pravin S. More
Abstract:
In the present investigation, we demonstrated the fabrication of few-layers of graphene sheets with alkali metal i.e. Rb-G using chemical route method. The obtained materials were characterized by means of chemical, structural and electrical techniques, using the ultraviolet-visible spectroscopy (UV-Vis), Fourier transform infrared spectroscopy (FTIR), X-ray powder diffraction (XRD), scanning electron microscopy (SEM) and 4 points probe, respectively. The XRD studies were carried out to understand the phase of the samples where we found a sharp peak of Rb-G at 26.470. UV-Spectroscopy of Graphene and Rb-modified graphene samples shows the absorption peaks at ~248 nm and ~318 nm respectively. These analyses show that this modified material can be useful for gas sensing applications and to be used in diverse areas.Keywords: chemical route, graphene, gas sensing, UV-spectroscopy
Procedia PDF Downloads 266950 Analysis of Big Data
Authors: Sandeep Sharma, Sarabjit Singh
Abstract:
As per the user demand and growth trends of large free data the storage solutions are now becoming more challenge-able to protect, store and to retrieve data. The days are not so far when the storage companies and organizations are start saying 'no' to store our valuable data or they will start charging a huge amount for its storage and protection. On the other hand as per the environmental conditions it becomes challenge-able to maintain and establish new data warehouses and data centers to protect global warming threats. A challenge of small data is over now, the challenges are big that how to manage the exponential growth of data. In this paper we have analyzed the growth trend of big data and its future implications. We have also focused on the impact of the unstructured data on various concerns and we have also suggested some possible remedies to streamline big data.Keywords: big data, unstructured data, volume, variety, velocity
Procedia PDF Downloads 545949 Discerning of Antimicrobial Potential of Phenylpropanoic Acid Derived Oxadiazoles
Authors: Neeraj Kumar Fuloria, Shivkanya Fuloria, Amit Singh
Abstract:
2-Phenyl propionic acid and oxadiazoles possess antimicrobial potential. 2-Phenyl propane hydrazide (1), on cyclization with aromatic acids offered 2-aryl-5-(1-phenylethyl)-1,3,4-oxadiazole derivatives (1A-E). The PPA derived oxadiazoles were characterized by elemental analysis and spectral studies. The compounds were screened for antimicrobial potential. The compound 1D bearing strong electron withdrawing group showed maximum antimicrobial potential. Other compounds also displayed antimicrobial potential to a certain extent. The SAR of newer oxadiazoles indicated that substitution of strong electronegative group in the PPA derived oxadiazoles enhanced their antimicrobial potential.Keywords: antimicrobial, imines, oxadiazoles, PPA
Procedia PDF Downloads 338948 Variation in Orbital Elements of Mars and Jupiter Due to the Sun Oblateness by Using Secular Theory
Authors: Avaneesh Vaishwar, Badam Singh Kushvah, Devi Prasad Mishra
Abstract:
We studied the variation in orbital elements of Mars and Jupiter for a time span of 200 thousand years by using secular theory. Here we took Sun oblateness into account and considered the first two zonal gravity constants (J2 and J4) for showing the effect of Sun oblateness on the orbital elements of Mars and Jupiter. We found that in both cases (with and without Sun oblateness) the variation in orbital elements of Mars and Jupiter is periodic moreover in case of the Sun oblateness, the period of variation in orbital elements is decreasing for both the planets.Keywords: lagrange's planetary equation, orbital elements, planetary system, secular theory
Procedia PDF Downloads 223947 Eresa, Hospital General Universitario de Elche
Authors: Ashish Kumar Singh, Mehak Gulati, Neelam Verma
Abstract:
Arginine majorly acts as a substrate for the enzyme nitric oxide synthase (NOS) for the production of nitric oxide, a strong vasodilator. Current study demonstrated a novel amperometric approach for estimation of arginine using nitric oxide synthase. The enzyme was co-immobilized in carbon paste electrode with NADP+, FAD and BH4 as cofactors. The detection principle of the biosensor is enzyme NOS catalyzes the conversion of arginine into nitric oxide. The developed biosensor could able to detect up to 10-9M of arginine. The oxidation peak of NO was observed at 0.65V. The developed arginine biosensor was used to monitor arginine content in fruit juices.Keywords: arginine, biosensor, carbon paste elctrode, nitric oxide
Procedia PDF Downloads 422946 Impact of Instrument Transformer Secondary Connections on Performance of Protection System: Experiences from Indian POWERGRID
Authors: Pankaj Kumar Jha, Mahendra Singh Hada, Brijendra Singh, Sandeep Yadav
Abstract:
Protective relays are commonly connected to the secondary windings of instrument transformers, i.e., current transformers (CTs) and/or capacitive voltage transformers (CVTs). The purpose of CT and CVT is to provide galvanic isolation from high voltages and reduce primary currents and voltages to a nominal quantity recognized by the protective relays. Selecting the correct instrument transformers for an application is imperative: failing to do so may compromise the relay’s performance, as the output of the instrument transformer may no longer be an accurately scaled representation of the primary quantity. Having an accurately rated instrument transformer is of no use if these devices are not properly connected. The performance of the protective relay is reliant on its programmed settings and on the current and voltage inputs from the instrument transformers secondary. This paper will help in understanding the fundamental concepts of the connections of Instrument Transformers to the protection relays and the effect of incorrect connection on the performance of protective relays. Multiple case studies of protection system mal-operations due to incorrect connections of instrument transformers will be discussed in detail in this paper. Apart from the connection issue of instrument transformers to protective relays, this paper will also discuss the effect of multiple earthing of CTs and CVTs secondary on the performance of the protection system. Case studies presented in this paper will help the readers to analyse the problem through real-world challenges in complex power system networks. This paper will also help the protection engineer in better analysis of disturbance records. CT and CVT connection errors can lead to undesired operations of protection systems. However, many of these operations can be avoided by adhering to industry standards and implementing tried-and-true field testing and commissioning practices. Understanding the effect of missing neutral of CVT, multiple earthing of CVT secondary, and multiple grounding of CT star points on the performance of the protection system through real-world case studies will help the protection engineer in better commissioning the protection system and maintenance of the protection system.Keywords: bus reactor, current transformer, capacitive voltage transformer, distance protection, differential protection, directional earth fault, disturbance report, instrument transformer, ICT, REF protection, shunt reactor, voltage selection relay, VT fuse failure
Procedia PDF Downloads 80945 Orphan Node Inclusion Protocol for Wireless Sensor Network
Authors: Sandeep Singh Waraich
Abstract:
Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.Keywords: wireless sensor network, orphan node, clustering, ONI protocol
Procedia PDF Downloads 418944 Performance Analysis of Next Generation OCDM-RoF-Based Hybrid Network under Diverse Conditions
Authors: Anurag Sharma, Rahul Malhotra, Love Kumar, Harjit Pal Singh
Abstract:
This paper demonstrates OCDM-ROF based hybrid architecture where data/voice communication is enabled via a permutation of Optical Code Division Multiplexing (OCDM) and Radio-over-Fiber (RoF) techniques under various diverse conditions. OCDM-RoF hybrid network of 16 users with DPSK modulation format has been designed and performance of proposed network is analyzed for 100, 150, and 200 km fiber span length under the influence of linear and nonlinear effect. It has been reported that Polarization Mode Dispersion (PMD) has the least effect while other nonlinearity affects the performance of proposed network.Keywords: OCDM, RoF, DPSK, PMD, eye diagram, BER, Q factor
Procedia PDF Downloads 635943 Reduction Study of As(III)-Cysteine Complex through Linear Sweep Voltammetry
Authors: Sunil Mittal, Sukhpreet Singh, Hardeep Kaur
Abstract:
A simple voltammetric technique for on-line analysis of arsenite [As (III)] is reported. Owing to the affinity of As (III) with thiol group of proteins and enzymes, cysteine has been employed as reducing agent. The reduction study of As(III)-cysteine complex on indium tin oxide (ITO) electrode has been explored. The experimental parameters such as scan rate, cysteine concentration, pH etc. were optimized to achieve As (III) determination. The developed method provided dynamic linear range of detection from 0.1 to 1 mM with a detection limit of 0.1 mM. The method is applicable to environmental monitoring of As (III) from highly contaminated sources such as industrial effluents, wastewater sludge etc.Keywords: arsenite, cysteine, linear sweep voltammetry, reduction
Procedia PDF Downloads 237942 A Survey of Attacks and Security Requirements in Wireless Sensor Networks
Authors: Vishnu Pratap Singh Kirar
Abstract:
Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements
Procedia PDF Downloads 490941 Edge Detection in Low Contrast Images
Authors: Koushlendra Kumar Singh, Manish Kumar Bajpai, Rajesh K. Pandey
Abstract:
The edges of low contrast images are not clearly distinguishable to the human eye. It is difficult to find the edges and boundaries in it. The present work encompasses a new approach for low contrast images. The Chebyshev polynomial based fractional order filter has been used for filtering operation on an image. The preprocessing has been performed by this filter on the input image. Laplacian of Gaussian method has been applied on preprocessed image for edge detection. The algorithm has been tested on two test images.Keywords: low contrast image, fractional order differentiator, Laplacian of Gaussian (LoG) method, chebyshev polynomial
Procedia PDF Downloads 634940 Synthesis and Pharmacological Activity of Some Oxyindole Derivatives
Authors: Vivek Singh Bhadauria, Abhishek Pandey
Abstract:
Indole-2,3-diones are known for their various biological activities. By suitable control of a substituent, different novel indole-2,3-diones were synthesized. In this present study, various Schiff and Mannich bases were synthesized and characterized, and evaluated their for different pharmacological activities. The compounds were prepared by reacting indole-2,3-dione with benzyl chloride and 4-substituted thiosemicarbazides. All the synthesized compounds were characterized by the TLC, MP, Elemental analysis, FTIR, 1H-NMR and Mass spectroscopy. The compounds have been evaluated for their anticancer, antituberculosis, anticonvulsant, antiinflammatory as well as anti-SARS activity and the results are presented. Some of compounds possessed different pharmacological activity at a concentration of 200 mg/kg body weight and even at lower concentration.Keywords: indoles, isatin, NMR, biological activities
Procedia PDF Downloads 353939 Acute Exposure Of Two Classes Of Fungicides And Its Effects On Hematological Indices Of Fish (Clarius batrachus) - A Comparative Study
Authors: Pallavi Srivastava, Ajay Singh
Abstract:
Hematological assay has used for evaluation of blood changes according to its environment. It’s studies employed to evaluate possible eco-toxic risk due to the exposure of chemicals and pesticides in aquatic organisms. Fishes serve as a sensitive bio-indicator, as changes occur in its surrounding environment. The aim of present study has two-folds first we observed that after exposure of two doses of each class of fungicide i.e. 1.11mg/l, 2.23mg/l for Propiconazole and 11.43mg/l, 22.87mg/l for Mancozeb show maximum blood changes. Second we conclude that toxic effects and blood changes induced by Propiconazole is greater than Mancozeb.Keywords: hematological assay, fungicides, bio-indicator, eco-toxic risk
Procedia PDF Downloads 406938 A Modified QuEChERS Method Using Activated Carbon Fibers as r-DSPE Sorbent for Sample Cleanup: Application to Pesticides Residues Analysis in Food Commodities Using GC-MS/MS
Authors: Anshuman Srivastava, Shiv Singh, Sheelendra Pratap Singh
Abstract:
A simple, sensitive and effective gas chromatography tandem mass spectrometry (GC-MS/MS) method was developed for simultaneous analysis of multi pesticide residues (organophosphate, organochlorines, synthetic pyrethroids and herbicides) in food commodities using phenolic resin based activated carbon fibers (ACFs) as reversed-dispersive solid phase extraction (r-DSPE) sorbent in modified QuEChERS (Quick Easy Cheap Effective Rugged Safe) method. The acetonitrile-based QuEChERS technique was used for the extraction of the analytes from food matrices followed by sample cleanup with ACFs instead of traditionally used primary secondary amine (PSA). Different physico-chemical characterization techniques such as Fourier transform infrared spectroscopy, scanning electron microscopy, X-ray diffraction and Brunauer-Emmet-Teller surface area analysis were employed to investigate the engineering and structural properties of ACFs. The recovery of pesticides and herbicides was tested at concentration levels of 0.02 and 0.2 mg/kg in different commodities such as cauliflower, cucumber, banana, apple, wheat and black gram. The recoveries of all twenty-six pesticides and herbicides were found in acceptable limit (70-120%) according to SANCO guideline with relative standard deviation value < 15%. The limit of detection and limit of quantification of the method was in the range of 0.38-3.69 ng/mL and 1.26 -12.19 ng/mL, respectively. In traditional QuEChERS method, PSA used as r-DSPE sorbent plays a vital role in sample clean-up process and demonstrates good recoveries for multiclass pesticides. This study reports that ACFs are better in terms of removal of co-extractives in comparison of PSA without compromising the recoveries of multi pesticides from food matrices. Further, ACF replaces the need of charcoal in addition to the PSA from traditional QuEChERS method which is used to remove pigments. The developed method will be cost effective because the ACFs are significantly cheaper than the PSA. So the proposed modified QuEChERS method is more robust, effective and has better sample cleanup efficiency for multiclass multi pesticide residues analysis in different food matrices such as vegetables, grains and fruits.Keywords: QuEChERS, activated carbon fibers, primary secondary amine, pesticides, sample preparation, carbon nanomaterials
Procedia PDF Downloads 268937 A Sub-Scalar Approach to the MIPS Architecture
Authors: Kumar Sambhav Pandey, Anamika Singh
Abstract:
The continuous researches in the field of computer architecture basically aims at accelerating the computational speed and to gain enhanced performance. In this era, the superscalar, sub-scalar concept has not gained enough attention for improving the computation performance. In this paper, we have presented a sub-scalar approach to utilize the parallelism present with in the data while processing. The main idea is to split the data into individual smaller entities and these entities are processed with a defined known set of instructions. This sub-scalar approach to the MIPS architecture can bring out significant improvement in the computational speedup. MIPS-I is the basic design taken in consideration for the development of sub-scalar MIPS64 for increasing the instruction level parallelism (ILP) and resource utilization.Keywords: dataword, MIPS, processor, sub-scalar
Procedia PDF Downloads 545936 Performance Comparison of Prim’s and Ant Colony Optimization Algorithm to Select Shortest Path in Case of Link Failure
Authors: Rimmy Yadav, Avtar Singh
Abstract:
—Ant Colony Optimization (ACO) is a promising modern approach to the unused combinatorial optimization. Here ACO is applied to finding the shortest during communication link failure. In this paper, the performances of the prim’s and ACO algorithm are made. By comparing the time complexity and program execution time as set of parameters, we demonstrate the pleasant performance of ACO in finding excellent solution to finding shortest path during communication link failure.Keywords: ant colony optimization, link failure, prim’s algorithm, shortest path
Procedia PDF Downloads 397935 Phonological Encoding and Working Memory in Kannada Speaking Adults Who Stutter
Authors: Nirmal Sugathan, Santosh Maruthy
Abstract:
Background: A considerable number of studies have evidenced that phonological encoding (PE) and working memory (WM) skills operate differently in adults who stutter (AWS). In order to tap these skills, several paradigms have been employed such as phonological priming, phoneme monitoring, and nonword repetition tasks. This study, however, utilizes a word jumble paradigm to assess both PE and WM using different modalities and this may give a better understanding of phonological processing deficits in AWS. Aim: The present study investigated PE and WM abilities in conjunction with lexical access in AWS using jumbled words. The study also aimed at investigating the effect of increase in cognitive load on phonological processing in AWS by comparing the speech reaction time (SRT) and accuracy scores across various syllable lengths. Method: Participants were 11 AWS (Age range=19-26) and 11 adults who do not stutter (AWNS) (Age range=19-26) matched for age, gender and handedness. Stimuli: Ninety 3-, 4-, and 5-syllable jumbled words (JWs) (n=30 per syllable length category) constructed from Kannada words served as stimuli for jumbled word paradigm. In order to generate jumbled words (JWs), the syllables in the real words were randomly transpositioned. Procedures: To assess PE, the JWs were presently visually using DMDX software and for WM task, JWs were presented through auditory mode through headphones. The participants were asked to silently manipulate the jumbled words to form a Kannada real word and verbally respond once. The responses for both tasks were audio recorded using record function in DMDX software and the recorded responses were analyzed using PRAAT software to calculate the SRT. Results: SRT: Mann-Whitney test results demonstrated that AWS performed significantly slower on both tasks (p < 0.001) as indicated by increased SRT. Also, AWS presented with increased SRT on both the tasks in all syllable length conditions (p < 0.001). Effect of syllable length: Wilcoxon signed rank test was carried out revealed that, on task assessing PE, the SRT of 4syllable JWs were significantly higher in both AWS (Z= -2.93, p=.003) and AWNS (Z= -2.41, p=.003) when compared to 3-syllable words. However, the findings for 4- and 5-syllable words were not significant. Task Accuracy: The accuracy scores were calculated for three syllable length conditions for both PE and PM tasks and were compared across the groups using Mann-Whitney test. The results indicated that the accuracy scores of AWS were significantly below that of AWNS in all the three syllable conditions for both the tasks (p < 0.001). Conclusion: The above findings suggest that PE and WM skills are compromised in AWS as indicated by increased SRT. Also, AWS were progressively less accurate in descrambling JWs of increasing syllable length and this may be interpreted as, rather than existing as a uniform deficiency, PE and WM deficits emerge when the cognitive load is increased. AWNS exhibited increased SRT and increased accuracy for JWs of longer syllable length whereas AWS was not benefited from increasing the reaction time, thus AWS had to compromise for both SRT and accuracy while solving JWs of longer syllable length.Keywords: adults who stutter, phonological ability, working memory, encoding, jumbled words
Procedia PDF Downloads 238934 Blind Data Hiding Technique Using Interpolation of Subsampled Images
Authors: Singara Singh Kasana, Pankaj Garg
Abstract:
In this paper, a blind data hiding technique based on interpolation of sub sampled versions of a cover image is proposed. Sub sampled image is taken as a reference image and an interpolated image is generated from this reference image. Then difference between original cover image and interpolated image is used to embed secret data. Comparisons with the existing interpolation based techniques show that proposed technique provides higher embedding capacity and better visual quality marked images. Moreover, the performance of the proposed technique is more stable for different images.Keywords: interpolation, image subsampling, PSNR, SIM
Procedia PDF Downloads 577933 The Feasibility of Online, Interactive Workshops to Facilitate Anatomy Education during the UK COVID-19 Lockdowns
Authors: Prabhvir Singh Marway, Kai Lok Chan, Maria-Ruxandra Jinga, Rachel Bok Ying Lee, Matthew Bok Kit Lee, Krishan Nandapalan, Sze Yi Beh, Harry Carr, Christopher Kui
Abstract:
We piloted a structured series of online workshops on the 3D segmentation of anatomical structures from CT scans. 33 participants were recruited from four UK universities for two-day workshops between 2020 and 2021. Open-source software (3D-Slicer) was used. We hypothesized that active participation via real-time screen-sharing and voice-communication via Discord would enable improved engagement and learning, despite national lockdowns. Written feedback indicated positive learning experiences, with subjective measures of anatomical understanding and software confidence improving.Keywords: medical education, workshop, segmentation, anatomy
Procedia PDF Downloads 199932 Smart Helmet for Two-Wheelers
Authors: Ravi Nandu, Kuldeep Singh
Abstract:
A helmet is a protective layer that is worn in order to prevent head injury. Helmet is the most important safety gear for two wheeler riders. However, due to carelessness of people, less importance toward safety, lot of causalities is every year. According to National Crime Records Bureau (NCRB) two wheelers claimed 92 lives every day out of which most were due to helmetless drive. The system design will be such that without wearing the helmet the rider cannot start two wheelers. The helmet will be connected to vehicle key ignition systems which will be electronically controlled. The smart helmet will be having proximity sensor fitted inside it, which will act as our switch for ignition and further with wireless connection the helmet sensor circuit will be connected to the vehicle ignition system.Keywords: helmet, proximity sensor, microcontroller, head injury
Procedia PDF Downloads 307931 Thermohydraulic Performance Comparison of Artificially Roughened Rectangular Channels
Authors: Narender Singh Thakur, Sunil Chamoli
Abstract:
The use of roughness geometry in the rectangular channel duct is an effective technique to enhance the rate of heat transfer to the working fluid. The present research concentrates on the performance comparison of a rectangular channel with different roughness geometry of the test plate. The performance enhancement is compared by considering the statistical correlations developed by the various investigators for Nusselt number and friction factor. Among all the investigated geometries multiple v-shaped rib roughened rectangular channel found thermo hydraulically better than other investigated geometries under similar current and operating conditions.Keywords: nusselt number, friction factor, thermohydraulic, performance parameter
Procedia PDF Downloads 420930 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices
Authors: Robin Singh, Jing-Chiou Liou
Abstract:
The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secureKeywords: cybersecurity, DDoS, IoT, medical devices
Procedia PDF Downloads 83929 Interactive Multiple Functions User Interface
Authors: Manjit Singh Sidhu, Waleed Maqableh, Jee Geak Ying
Abstract:
Tangible user interfaces (TUI) that employ markers in the augmented reality (AR) environment has hampered the interactivity between the user and the software application. This is because the user lacks focus on visualizing the contents due to the interaction mechanisms whereby multiple markers may need to be used to perform a particular function. In this research, we have designed a novel TUI user interface where multiple functions could be triggered similar to a natural keyboard thus allowing user to focus more on its digital contents such as 2D/3D, text input, animation and sound. Test results of the user interface with potential users and HCI experts revealed that the multiple functions user interface was new, preferred and appreciated more as opposed to marker based user interface.Keywords: multimedia, augmented reality, engineering, user interface, visualization
Procedia PDF Downloads 446928 Performance of Non-toxic, Corrosion Resistant, and Lubricious Metalworking Fluids under Machining
Authors: Ajay Pratap Singh Lodhi, Deepak Kumar
Abstract:
Vegetable oil-based environmentally friendly metalworking fluids (MWFs) are formulated. The tribological performance, cytotoxicity, and corrosion resistance of the formulated fluids (FFs) are evaluated and benchmarked with commercial mineral oil-based MWFs (CF). Results show that FFs exhibited better machining characteristics (roughness, cutting forces, and surface morphology) during machining than CF. MTT assay and Live dead cell assay confirm the cytocompatibility nature of the FFs relative to the toxic CF. Electrochemical analysis shows that FFs and CF exhibited comparable corrosion current density.Keywords: corrosion inhibitors, cytotoxicity, machining, MTT assay, Taguchi method, vegetable oil
Procedia PDF Downloads 185927 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 381926 Speed up Vector Median Filtering by Quasi Euclidean Norm
Authors: Vinai K. Singh
Abstract:
For reducing impulsive noise without degrading image contours, median filtering is a powerful tool. In multiband images as for example colour images or vector fields obtained by optic flow computation, a vector median filter can be used. Vector median filters are defined on the basis of a suitable distance, the best performing distance being the Euclidean. Euclidean distance is evaluated by using the Euclidean norms which is quite demanding from the point of view of computation given that a square root is required. In this paper an optimal piece-wise linear approximation of the Euclidean norm is presented which is applied to vector median filtering.Keywords: euclidean norm, quasi euclidean norm, vector median filtering, applied mathematics
Procedia PDF Downloads 472925 An Overview of Adaptive Channel Equalization Techniques and Algorithms
Authors: Navdeep Singh Randhawa
Abstract:
Wireless communication system has been proved as the best for any communication. However, there are some undesirable threats of a wireless communication channel on the information transmitted through it, such as attenuation, distortions, delays and phase shifts of the signals arriving at the receiver end which are caused by its band limited and dispersive nature. One of the threat is ISI (Inter Symbol Interference), which has been found as a great obstacle in high speed communication. Thus, there is a need to provide perfect and accurate technique to remove this effect to have an error free communication. Thus, different equalization techniques have been proposed in literature. This paper presents the equalization techniques followed by the concept of adaptive filter equalizer, its algorithms (LMS and RLS) and applications of adaptive equalization technique.Keywords: channel equalization, adaptive equalizer, least mean square, recursive least square
Procedia PDF Downloads 448