Search results for: Sanjeev K. Singh
955 Pyramid Binary Pattern for Age Invariant Face Verification
Authors: Saroj Bijarnia, Preety Singh
Abstract:
We propose a simple and effective biometrics system based on face verification across aging using a new variant of texture feature, Pyramid Binary Pattern. This employs Local Binary Pattern along with its hierarchical information. Dimension reduction of generated texture feature vector is done using Principal Component Analysis. Support Vector Machine is used for classification. Our proposed method achieves an accuracy of 92:24% and can be used in an automated age-invariant face verification system.Keywords: biometrics, age invariant, verification, support vector machine
Procedia PDF Downloads 350954 Network Security Attacks and Defences
Authors: Ranbir Singh, Deepinder Kaur
Abstract:
Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.Keywords: network security, attacks, denial, authenticating
Procedia PDF Downloads 404953 Voltage Stability Assessment and Enhancement Using STATCOM -A Case Study
Authors: Puneet Chawla, Balwinder Singh
Abstract:
Recently, increased attention has been devoted to the voltage instability phenomenon in power systems. Many techniques have been proposed in the literature for evaluating and predicting voltage stability using steady state analysis methods. In this paper, P-V and Q-V curves have been generated for a 57 bus Patiala Rajpura circle of India. The power-flow program is developed in MATLAB using Newton-Raphson method. Using Q-V curves, the weakest bus of the power system and the maximum reactive power change permissible on that bus is calculated. STATCOMs are placed on the weakest bus to improve the voltage and hence voltage stability and also the power transmission capability of the line.Keywords: voltage stability, reactive power, power flow, weakest bus, STATCOM
Procedia PDF Downloads 515952 Rb-Modified Few-Layered Graphene for Gas Sensing Application
Authors: Vasant Reddy, Shivani A. Singh, Pravin S. More
Abstract:
In the present investigation, we demonstrated the fabrication of few-layers of graphene sheets with alkali metal i.e. Rb-G using chemical route method. The obtained materials were characterized by means of chemical, structural and electrical techniques, using the ultraviolet-visible spectroscopy (UV-Vis), Fourier transform infrared spectroscopy (FTIR), X-ray powder diffraction (XRD), scanning electron microscopy (SEM) and 4 points probe, respectively. The XRD studies were carried out to understand the phase of the samples where we found a sharp peak of Rb-G at 26.470. UV-Spectroscopy of Graphene and Rb-modified graphene samples shows the absorption peaks at ~248 nm and ~318 nm respectively. These analyses show that this modified material can be useful for gas sensing applications and to be used in diverse areas.Keywords: chemical route, graphene, gas sensing, UV-spectroscopy
Procedia PDF Downloads 268951 Analysis of Big Data
Authors: Sandeep Sharma, Sarabjit Singh
Abstract:
As per the user demand and growth trends of large free data the storage solutions are now becoming more challenge-able to protect, store and to retrieve data. The days are not so far when the storage companies and organizations are start saying 'no' to store our valuable data or they will start charging a huge amount for its storage and protection. On the other hand as per the environmental conditions it becomes challenge-able to maintain and establish new data warehouses and data centers to protect global warming threats. A challenge of small data is over now, the challenges are big that how to manage the exponential growth of data. In this paper we have analyzed the growth trend of big data and its future implications. We have also focused on the impact of the unstructured data on various concerns and we have also suggested some possible remedies to streamline big data.Keywords: big data, unstructured data, volume, variety, velocity
Procedia PDF Downloads 548950 Discerning of Antimicrobial Potential of Phenylpropanoic Acid Derived Oxadiazoles
Authors: Neeraj Kumar Fuloria, Shivkanya Fuloria, Amit Singh
Abstract:
2-Phenyl propionic acid and oxadiazoles possess antimicrobial potential. 2-Phenyl propane hydrazide (1), on cyclization with aromatic acids offered 2-aryl-5-(1-phenylethyl)-1,3,4-oxadiazole derivatives (1A-E). The PPA derived oxadiazoles were characterized by elemental analysis and spectral studies. The compounds were screened for antimicrobial potential. The compound 1D bearing strong electron withdrawing group showed maximum antimicrobial potential. Other compounds also displayed antimicrobial potential to a certain extent. The SAR of newer oxadiazoles indicated that substitution of strong electronegative group in the PPA derived oxadiazoles enhanced their antimicrobial potential.Keywords: antimicrobial, imines, oxadiazoles, PPA
Procedia PDF Downloads 340949 Curative Role of Bromoenol Lactone, an Inhibitor of Phospholipase A2 Enzyme, during Cigarette Smoke Condensate Induced Anomalies in Lung Epithelium
Authors: Subodh Kumar, Sanjeev Kumar Sharma, Gaurav Kaushik, Pramod Avti, Phulen Sarma, Bikash Medhi, Krishan Lal Khanduja
Abstract:
Background: It is well known that cigarette smoke is one of the causative factors in various lung diseases especially cancer. Carcinogens and oxidant molecules present in cigarette smoke not only damage the cellular constituents (lipids, proteins, DNA) but may also regulate the molecular pathways involved in inflammation and cancer. Continuous oxidative stress caused by the constituents of cigarette smoke leads to higher PhospholipaseA₂ (PLA₂) activity, resulting in elevated levels of secondary metabolites whose role is well defined in cancer. To reduce the burden of chronic inflammation as well as oxidative stress, and higher levels of secondary metabolites, we checked the curative potential of PLA₂ inhibitor Bromoenol Lactone (BEL) during continuous exposure of cigarette smoke condensate (CSC). Aim: To check the therapeutic potential of Bromoenol Lactone (BEL), an inhibitor of PhospholipaseA₂s, in pathways of CSC-induced changes in type I and type II alveolar epithelial cells. Methods: Effect of BEL on CSC-induced PLA2 activity were checked using colorimetric assay, cellular toxicity using cell viability assay, membrane integrity using fluorescein di-acetate (FDA) uptake assay, reactive oxygen species (ROS) levels and apoptosis markers through flow cytometry, and cellular regulation using MAPKinases levels, in lung epithelium. Results: BEL significantly mimicked CSC-induced PLA₂ activity, ROS levels, apoptosis, and kinases level whereas improved cellular viability and membrane integrity. Conclusions: Current observations revealed that BEL may be a potential therapeutic agent during Cigarette smoke-induced anomalies in lung epithelium.Keywords: cigarette smoke condensate, phospholipase A₂, oxidative stress, alveolar epithelium, bromoenol lactone
Procedia PDF Downloads 189948 Variation in Orbital Elements of Mars and Jupiter Due to the Sun Oblateness by Using Secular Theory
Authors: Avaneesh Vaishwar, Badam Singh Kushvah, Devi Prasad Mishra
Abstract:
We studied the variation in orbital elements of Mars and Jupiter for a time span of 200 thousand years by using secular theory. Here we took Sun oblateness into account and considered the first two zonal gravity constants (J2 and J4) for showing the effect of Sun oblateness on the orbital elements of Mars and Jupiter. We found that in both cases (with and without Sun oblateness) the variation in orbital elements of Mars and Jupiter is periodic moreover in case of the Sun oblateness, the period of variation in orbital elements is decreasing for both the planets.Keywords: lagrange's planetary equation, orbital elements, planetary system, secular theory
Procedia PDF Downloads 226947 Eresa, Hospital General Universitario de Elche
Authors: Ashish Kumar Singh, Mehak Gulati, Neelam Verma
Abstract:
Arginine majorly acts as a substrate for the enzyme nitric oxide synthase (NOS) for the production of nitric oxide, a strong vasodilator. Current study demonstrated a novel amperometric approach for estimation of arginine using nitric oxide synthase. The enzyme was co-immobilized in carbon paste electrode with NADP+, FAD and BH4 as cofactors. The detection principle of the biosensor is enzyme NOS catalyzes the conversion of arginine into nitric oxide. The developed biosensor could able to detect up to 10-9M of arginine. The oxidation peak of NO was observed at 0.65V. The developed arginine biosensor was used to monitor arginine content in fruit juices.Keywords: arginine, biosensor, carbon paste elctrode, nitric oxide
Procedia PDF Downloads 424946 Impact of Instrument Transformer Secondary Connections on Performance of Protection System: Experiences from Indian POWERGRID
Authors: Pankaj Kumar Jha, Mahendra Singh Hada, Brijendra Singh, Sandeep Yadav
Abstract:
Protective relays are commonly connected to the secondary windings of instrument transformers, i.e., current transformers (CTs) and/or capacitive voltage transformers (CVTs). The purpose of CT and CVT is to provide galvanic isolation from high voltages and reduce primary currents and voltages to a nominal quantity recognized by the protective relays. Selecting the correct instrument transformers for an application is imperative: failing to do so may compromise the relay’s performance, as the output of the instrument transformer may no longer be an accurately scaled representation of the primary quantity. Having an accurately rated instrument transformer is of no use if these devices are not properly connected. The performance of the protective relay is reliant on its programmed settings and on the current and voltage inputs from the instrument transformers secondary. This paper will help in understanding the fundamental concepts of the connections of Instrument Transformers to the protection relays and the effect of incorrect connection on the performance of protective relays. Multiple case studies of protection system mal-operations due to incorrect connections of instrument transformers will be discussed in detail in this paper. Apart from the connection issue of instrument transformers to protective relays, this paper will also discuss the effect of multiple earthing of CTs and CVTs secondary on the performance of the protection system. Case studies presented in this paper will help the readers to analyse the problem through real-world challenges in complex power system networks. This paper will also help the protection engineer in better analysis of disturbance records. CT and CVT connection errors can lead to undesired operations of protection systems. However, many of these operations can be avoided by adhering to industry standards and implementing tried-and-true field testing and commissioning practices. Understanding the effect of missing neutral of CVT, multiple earthing of CVT secondary, and multiple grounding of CT star points on the performance of the protection system through real-world case studies will help the protection engineer in better commissioning the protection system and maintenance of the protection system.Keywords: bus reactor, current transformer, capacitive voltage transformer, distance protection, differential protection, directional earth fault, disturbance report, instrument transformer, ICT, REF protection, shunt reactor, voltage selection relay, VT fuse failure
Procedia PDF Downloads 81945 Customer Segmentation Revisited: The Case of the E-Tailing Industry in Emerging Market
Authors: Sanjeev Prasher, T. Sai Vijay, Chandan Parsad, Abhishek Banerjee, Sahakari Nikhil Krishna, Subham Chatterjee
Abstract:
With rapid rise in internet retailing, the industry is set for a major implosion. Due to the little difference among competitors, companies find it difficult to segment and target the right shoppers. The objective of the study is to segment Indian online shoppers on the basis of the factors – website characteristics and shopping values. Together, these cover extrinsic and intrinsic factors that affect shoppers as they visit web retailers. Data were collected using questionnaire from 319 Indian online shoppers, and factor analysis was used to confirm the factors influencing the shoppers in their selection of web portals. Thereafter, cluster analysis was applied, and different segments of shoppers were identified. The relationship between income groups and online shoppers’ segments was tracked using correspondence analysis. Significant findings from the study include that web entertainment and informativeness together contribute more than fifty percent of the total influence on the web shoppers. Contrary to general perception that shoppers seek utilitarian leverages, the present study highlights the preference for fun, excitement, and entertainment during browsing of the website. Four segments namely Information Seekers, Utility Seekers, Value Seekers and Core Shoppers were identified and profiled. Value seekers emerged to be the most dominant segment with two-fifth of the respondents falling for hedonic as well as utilitarian shopping values. With overlap among the segments, utilitarian shopping value garnered prominence with more than fifty-eight percent of the total respondents. Moreover, a strong relation has been established between the income levels and the segments of Indian online shoppers. Web shoppers show different motives from being utility seekers to information seekers, core shoppers and finally value seekers as income levels increase. Companies can strategically use this information for target marketing and align their web portals accordingly. This study can further be used to develop models revolving around satisfaction, trust and customer loyalty.Keywords: online shopping, shopping values, effectiveness of information content, web informativeness, web entertainment, information seekers, utility seekers, value seekers, core shoppers
Procedia PDF Downloads 195944 Orphan Node Inclusion Protocol for Wireless Sensor Network
Authors: Sandeep Singh Waraich
Abstract:
Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.Keywords: wireless sensor network, orphan node, clustering, ONI protocol
Procedia PDF Downloads 420943 Performance Analysis of Next Generation OCDM-RoF-Based Hybrid Network under Diverse Conditions
Authors: Anurag Sharma, Rahul Malhotra, Love Kumar, Harjit Pal Singh
Abstract:
This paper demonstrates OCDM-ROF based hybrid architecture where data/voice communication is enabled via a permutation of Optical Code Division Multiplexing (OCDM) and Radio-over-Fiber (RoF) techniques under various diverse conditions. OCDM-RoF hybrid network of 16 users with DPSK modulation format has been designed and performance of proposed network is analyzed for 100, 150, and 200 km fiber span length under the influence of linear and nonlinear effect. It has been reported that Polarization Mode Dispersion (PMD) has the least effect while other nonlinearity affects the performance of proposed network.Keywords: OCDM, RoF, DPSK, PMD, eye diagram, BER, Q factor
Procedia PDF Downloads 637942 Reduction Study of As(III)-Cysteine Complex through Linear Sweep Voltammetry
Authors: Sunil Mittal, Sukhpreet Singh, Hardeep Kaur
Abstract:
A simple voltammetric technique for on-line analysis of arsenite [As (III)] is reported. Owing to the affinity of As (III) with thiol group of proteins and enzymes, cysteine has been employed as reducing agent. The reduction study of As(III)-cysteine complex on indium tin oxide (ITO) electrode has been explored. The experimental parameters such as scan rate, cysteine concentration, pH etc. were optimized to achieve As (III) determination. The developed method provided dynamic linear range of detection from 0.1 to 1 mM with a detection limit of 0.1 mM. The method is applicable to environmental monitoring of As (III) from highly contaminated sources such as industrial effluents, wastewater sludge etc.Keywords: arsenite, cysteine, linear sweep voltammetry, reduction
Procedia PDF Downloads 240941 A Survey of Attacks and Security Requirements in Wireless Sensor Networks
Authors: Vishnu Pratap Singh Kirar
Abstract:
Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements
Procedia PDF Downloads 491940 Edge Detection in Low Contrast Images
Authors: Koushlendra Kumar Singh, Manish Kumar Bajpai, Rajesh K. Pandey
Abstract:
The edges of low contrast images are not clearly distinguishable to the human eye. It is difficult to find the edges and boundaries in it. The present work encompasses a new approach for low contrast images. The Chebyshev polynomial based fractional order filter has been used for filtering operation on an image. The preprocessing has been performed by this filter on the input image. Laplacian of Gaussian method has been applied on preprocessed image for edge detection. The algorithm has been tested on two test images.Keywords: low contrast image, fractional order differentiator, Laplacian of Gaussian (LoG) method, chebyshev polynomial
Procedia PDF Downloads 635939 Synthesis and Pharmacological Activity of Some Oxyindole Derivatives
Authors: Vivek Singh Bhadauria, Abhishek Pandey
Abstract:
Indole-2,3-diones are known for their various biological activities. By suitable control of a substituent, different novel indole-2,3-diones were synthesized. In this present study, various Schiff and Mannich bases were synthesized and characterized, and evaluated their for different pharmacological activities. The compounds were prepared by reacting indole-2,3-dione with benzyl chloride and 4-substituted thiosemicarbazides. All the synthesized compounds were characterized by the TLC, MP, Elemental analysis, FTIR, 1H-NMR and Mass spectroscopy. The compounds have been evaluated for their anticancer, antituberculosis, anticonvulsant, antiinflammatory as well as anti-SARS activity and the results are presented. Some of compounds possessed different pharmacological activity at a concentration of 200 mg/kg body weight and even at lower concentration.Keywords: indoles, isatin, NMR, biological activities
Procedia PDF Downloads 355938 Acute Exposure Of Two Classes Of Fungicides And Its Effects On Hematological Indices Of Fish (Clarius batrachus) - A Comparative Study
Authors: Pallavi Srivastava, Ajay Singh
Abstract:
Hematological assay has used for evaluation of blood changes according to its environment. It’s studies employed to evaluate possible eco-toxic risk due to the exposure of chemicals and pesticides in aquatic organisms. Fishes serve as a sensitive bio-indicator, as changes occur in its surrounding environment. The aim of present study has two-folds first we observed that after exposure of two doses of each class of fungicide i.e. 1.11mg/l, 2.23mg/l for Propiconazole and 11.43mg/l, 22.87mg/l for Mancozeb show maximum blood changes. Second we conclude that toxic effects and blood changes induced by Propiconazole is greater than Mancozeb.Keywords: hematological assay, fungicides, bio-indicator, eco-toxic risk
Procedia PDF Downloads 408937 A Modified QuEChERS Method Using Activated Carbon Fibers as r-DSPE Sorbent for Sample Cleanup: Application to Pesticides Residues Analysis in Food Commodities Using GC-MS/MS
Authors: Anshuman Srivastava, Shiv Singh, Sheelendra Pratap Singh
Abstract:
A simple, sensitive and effective gas chromatography tandem mass spectrometry (GC-MS/MS) method was developed for simultaneous analysis of multi pesticide residues (organophosphate, organochlorines, synthetic pyrethroids and herbicides) in food commodities using phenolic resin based activated carbon fibers (ACFs) as reversed-dispersive solid phase extraction (r-DSPE) sorbent in modified QuEChERS (Quick Easy Cheap Effective Rugged Safe) method. The acetonitrile-based QuEChERS technique was used for the extraction of the analytes from food matrices followed by sample cleanup with ACFs instead of traditionally used primary secondary amine (PSA). Different physico-chemical characterization techniques such as Fourier transform infrared spectroscopy, scanning electron microscopy, X-ray diffraction and Brunauer-Emmet-Teller surface area analysis were employed to investigate the engineering and structural properties of ACFs. The recovery of pesticides and herbicides was tested at concentration levels of 0.02 and 0.2 mg/kg in different commodities such as cauliflower, cucumber, banana, apple, wheat and black gram. The recoveries of all twenty-six pesticides and herbicides were found in acceptable limit (70-120%) according to SANCO guideline with relative standard deviation value < 15%. The limit of detection and limit of quantification of the method was in the range of 0.38-3.69 ng/mL and 1.26 -12.19 ng/mL, respectively. In traditional QuEChERS method, PSA used as r-DSPE sorbent plays a vital role in sample clean-up process and demonstrates good recoveries for multiclass pesticides. This study reports that ACFs are better in terms of removal of co-extractives in comparison of PSA without compromising the recoveries of multi pesticides from food matrices. Further, ACF replaces the need of charcoal in addition to the PSA from traditional QuEChERS method which is used to remove pigments. The developed method will be cost effective because the ACFs are significantly cheaper than the PSA. So the proposed modified QuEChERS method is more robust, effective and has better sample cleanup efficiency for multiclass multi pesticide residues analysis in different food matrices such as vegetables, grains and fruits.Keywords: QuEChERS, activated carbon fibers, primary secondary amine, pesticides, sample preparation, carbon nanomaterials
Procedia PDF Downloads 271936 A Sub-Scalar Approach to the MIPS Architecture
Authors: Kumar Sambhav Pandey, Anamika Singh
Abstract:
The continuous researches in the field of computer architecture basically aims at accelerating the computational speed and to gain enhanced performance. In this era, the superscalar, sub-scalar concept has not gained enough attention for improving the computation performance. In this paper, we have presented a sub-scalar approach to utilize the parallelism present with in the data while processing. The main idea is to split the data into individual smaller entities and these entities are processed with a defined known set of instructions. This sub-scalar approach to the MIPS architecture can bring out significant improvement in the computational speedup. MIPS-I is the basic design taken in consideration for the development of sub-scalar MIPS64 for increasing the instruction level parallelism (ILP) and resource utilization.Keywords: dataword, MIPS, processor, sub-scalar
Procedia PDF Downloads 545935 Performance Comparison of Prim’s and Ant Colony Optimization Algorithm to Select Shortest Path in Case of Link Failure
Authors: Rimmy Yadav, Avtar Singh
Abstract:
—Ant Colony Optimization (ACO) is a promising modern approach to the unused combinatorial optimization. Here ACO is applied to finding the shortest during communication link failure. In this paper, the performances of the prim’s and ACO algorithm are made. By comparing the time complexity and program execution time as set of parameters, we demonstrate the pleasant performance of ACO in finding excellent solution to finding shortest path during communication link failure.Keywords: ant colony optimization, link failure, prim’s algorithm, shortest path
Procedia PDF Downloads 398934 Blind Data Hiding Technique Using Interpolation of Subsampled Images
Authors: Singara Singh Kasana, Pankaj Garg
Abstract:
In this paper, a blind data hiding technique based on interpolation of sub sampled versions of a cover image is proposed. Sub sampled image is taken as a reference image and an interpolated image is generated from this reference image. Then difference between original cover image and interpolated image is used to embed secret data. Comparisons with the existing interpolation based techniques show that proposed technique provides higher embedding capacity and better visual quality marked images. Moreover, the performance of the proposed technique is more stable for different images.Keywords: interpolation, image subsampling, PSNR, SIM
Procedia PDF Downloads 578933 The Feasibility of Online, Interactive Workshops to Facilitate Anatomy Education during the UK COVID-19 Lockdowns
Authors: Prabhvir Singh Marway, Kai Lok Chan, Maria-Ruxandra Jinga, Rachel Bok Ying Lee, Matthew Bok Kit Lee, Krishan Nandapalan, Sze Yi Beh, Harry Carr, Christopher Kui
Abstract:
We piloted a structured series of online workshops on the 3D segmentation of anatomical structures from CT scans. 33 participants were recruited from four UK universities for two-day workshops between 2020 and 2021. Open-source software (3D-Slicer) was used. We hypothesized that active participation via real-time screen-sharing and voice-communication via Discord would enable improved engagement and learning, despite national lockdowns. Written feedback indicated positive learning experiences, with subjective measures of anatomical understanding and software confidence improving.Keywords: medical education, workshop, segmentation, anatomy
Procedia PDF Downloads 200932 Creating Energy Sustainability in an Enterprise
Authors: John Lamb, Robert Epstein, Vasundhara L. Bhupathi, Sanjeev Kumar Marimekala
Abstract:
As we enter the new era of Artificial Intelligence (AI) and Cloud Computing, we mostly rely on the Machine and Natural Language Processing capabilities of AI, and Energy Efficient Hardware and Software Devices in almost every industry sector. In these industry sectors, much emphasis is on developing new and innovative methods for producing and conserving energy and sustaining the depletion of natural resources. The core pillars of sustainability are economic, environmental, and social, which is also informally referred to as the 3 P's (People, Planet and Profits). The 3 P's play a vital role in creating a core Sustainability Model in the Enterprise. Natural resources are continually being depleted, so there is more focus and growing demand for renewable energy. With this growing demand, there is also a growing concern in many industries on how to reduce carbon emissions and conserve natural resources while adopting sustainability in corporate business models and policies. In our paper, we would like to discuss the driving forces such as Climate changes, Natural Disasters, Pandemic, Disruptive Technologies, Corporate Policies, Scaled Business Models and Emerging social media and AI platforms that influence the 3 main pillars of Sustainability (3P’s). Through this paper, we would like to bring an overall perspective on enterprise strategies and the primary focus on bringing cultural shifts in adapting energy-efficient operational models. Overall, many industries across the globe are incorporating core sustainability principles such as reducing energy costs, reducing greenhouse gas (GHG) emissions, reducing waste and increasing recycling, adopting advanced monitoring and metering infrastructure, reducing server footprint and compute resources (Shared IT services, Cloud computing, and Application Modernization) with the vision for a sustainable environment.Keywords: climate change, pandemic, disruptive technology, government policies, business model, machine learning and natural language processing, AI, social media platform, cloud computing, advanced monitoring, metering infrastructure
Procedia PDF Downloads 111931 Smart Helmet for Two-Wheelers
Authors: Ravi Nandu, Kuldeep Singh
Abstract:
A helmet is a protective layer that is worn in order to prevent head injury. Helmet is the most important safety gear for two wheeler riders. However, due to carelessness of people, less importance toward safety, lot of causalities is every year. According to National Crime Records Bureau (NCRB) two wheelers claimed 92 lives every day out of which most were due to helmetless drive. The system design will be such that without wearing the helmet the rider cannot start two wheelers. The helmet will be connected to vehicle key ignition systems which will be electronically controlled. The smart helmet will be having proximity sensor fitted inside it, which will act as our switch for ignition and further with wireless connection the helmet sensor circuit will be connected to the vehicle ignition system.Keywords: helmet, proximity sensor, microcontroller, head injury
Procedia PDF Downloads 311930 Thermohydraulic Performance Comparison of Artificially Roughened Rectangular Channels
Authors: Narender Singh Thakur, Sunil Chamoli
Abstract:
The use of roughness geometry in the rectangular channel duct is an effective technique to enhance the rate of heat transfer to the working fluid. The present research concentrates on the performance comparison of a rectangular channel with different roughness geometry of the test plate. The performance enhancement is compared by considering the statistical correlations developed by the various investigators for Nusselt number and friction factor. Among all the investigated geometries multiple v-shaped rib roughened rectangular channel found thermo hydraulically better than other investigated geometries under similar current and operating conditions.Keywords: nusselt number, friction factor, thermohydraulic, performance parameter
Procedia PDF Downloads 422929 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices
Authors: Robin Singh, Jing-Chiou Liou
Abstract:
The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secureKeywords: cybersecurity, DDoS, IoT, medical devices
Procedia PDF Downloads 86928 Interactive Multiple Functions User Interface
Authors: Manjit Singh Sidhu, Waleed Maqableh, Jee Geak Ying
Abstract:
Tangible user interfaces (TUI) that employ markers in the augmented reality (AR) environment has hampered the interactivity between the user and the software application. This is because the user lacks focus on visualizing the contents due to the interaction mechanisms whereby multiple markers may need to be used to perform a particular function. In this research, we have designed a novel TUI user interface where multiple functions could be triggered similar to a natural keyboard thus allowing user to focus more on its digital contents such as 2D/3D, text input, animation and sound. Test results of the user interface with potential users and HCI experts revealed that the multiple functions user interface was new, preferred and appreciated more as opposed to marker based user interface.Keywords: multimedia, augmented reality, engineering, user interface, visualization
Procedia PDF Downloads 448927 Performance of Non-toxic, Corrosion Resistant, and Lubricious Metalworking Fluids under Machining
Authors: Ajay Pratap Singh Lodhi, Deepak Kumar
Abstract:
Vegetable oil-based environmentally friendly metalworking fluids (MWFs) are formulated. The tribological performance, cytotoxicity, and corrosion resistance of the formulated fluids (FFs) are evaluated and benchmarked with commercial mineral oil-based MWFs (CF). Results show that FFs exhibited better machining characteristics (roughness, cutting forces, and surface morphology) during machining than CF. MTT assay and Live dead cell assay confirm the cytocompatibility nature of the FFs relative to the toxic CF. Electrochemical analysis shows that FFs and CF exhibited comparable corrosion current density.Keywords: corrosion inhibitors, cytotoxicity, machining, MTT assay, Taguchi method, vegetable oil
Procedia PDF Downloads 188926 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 382