Browse Items (11810 total)
Sort by:
-
Design of a Decision Making Model for Integrating Dark Data from Hybrid Sectors
The research on Dark data, from its definition to identification and utilization is a widely identified and encountered research problem since 2012 when Gartner defined Dark data as every possible information that an organization collects, process, analyze and store throughout regular business activities, but usually fails to make use of the stored information for other suitable purposes. The presence of dark data and its impact has been experienced by every sector, these data occupy large storage and remain unused. In this paper, we analyze Dark Data and proposed a design model to utilize dark data from multiple sectors and providing a solution to any critical situation a person might be in. For eg: Multiple cash transactions from an organizational bank account in a hospital successively over a period of 2-3 days may indicate a health emergency of any particular employee from that organization. Thus we are considering institutional data, medical data, and banking data in which machine learning algorithms can contribute huge changes in the current system and can help the decision-makers to make better decisions. The paper also proposes a few techniques and methods for the conversion of unstructured dark data to structured one and some extraction techniques for data using NLP and Machine Learning. Grenze Scientific Society, 2022. -
Design of a fractional-order atmospheric model via a class of ACT-like chaotic system and its sliding mode chaos control
Investigation of the dynamical behavior related to environmental phenomena has received much attention across a variety of scientific domains. One such phenomenon is global warming. The main causes of global warming, which has detrimental effects on our ecosystem, are mainly excess greenhouse gases and temperature. Looking at the significance of this climatic event, in this study, we have connected the ACT-like model to three climatic components, namely, permafrost thaw, temperature, and greenhouse gases in the form of a Caputo fractional differential equation, and analyzed their dynamics. The theoretical aspects, such as the existence and uniqueness of the obtained solution, are examined. We have derived two different sliding mode controllers to control chaos in this fractional-order system. The influences of these controllers are analyzed in the presence of uncertainties and external disturbances. In this process, we have obtained a new controlled system of equations without and with uncertainties and external disturbances. Global stability of these new systems is also established. All the aspects are examined for commensurate and non-commensurate fractional-order derivatives. To establish that the system is chaotic, we have taken the assistance of the Lyapunov exponent and the bifurcation diagram with respect to the fractional derivative. To perform numerical simulation, we have identified certain values of the parameters where the system exhibits chaotic behavior. Then, the theoretical claims about the influence of the controller on the system are established with the help of numerical simulations. 2023 Author(s). -
Design of a new curve based cipher
This work aims to develop a model with curve based cryptographic scheme which supports Confidentiality and Authentication at low computing resources and equal security. T TARU PUBLICATIONS. -
Design of a square-shaped broadband antenna with ground slots for bandwidth improvement
This paper portrays the design of a compact square-shaped microstrip broadband antenna using ground slots. Polygon shaped slots are placed on the ground under the feed line for bandwidth improvement. Similarly, rectangular slots are placed on the square patch for gain enhancement. Effect of these slots on the performance of the antenna in terms of impedance bandwidth, gain and directivity are studied. Results of simulation tests show that a ground slot with proper dimensions placed under the feed line can improve the impedance matching and hence increase the bandwidth without affecting much the performance of the antenna. This compact antenna of size 9.098 x 9.098 mm can be very useful for applications where size is a major constraint. Simple microstrip feed is used to feed the patch. The percentage bandwidth of this antenna is 75.57 %. 2018 Authors. -
Design of an real time smart health care system through data mining and IOT /
"Patent Number: 201941041826, Applicant: Dr. Dinesh Kumar.
Due to the advancements in the medical field , the life expectancy has been i increased significantly .This project is mainly useful forthe elderly people who live without the support from others . They need the assistance for the various parameters. IoT in health careplays a major role in identifying the medical facilities for the patients and the doctors . Our Proposed system with various sensors todiagnose the patients health condition from the remote place" -
Design of automatic follicle detection and ovarian classification system for ultrasound ovarian images
Polycystic Ovary Syndrome (PCOS) is a common reproductive and metabolic disorder characterized by an increased number of ovarian follicles. Accurate diagnosis of PCOS requires detailed ultrasound imaging to assess follicles size, number, and position. However, noise often needs to be improved on these images, complicating manual detection for radiologists and leading to potential misidentification. This paper introduces an automated diagnostic system for integration with ultrasound imaging equipment to enhance follicle identification accuracy. The system consists of two main stages: preprocessing and follicle segmentation. Preprocessing employs an adaptive Frost filter to reduce noise, while follicle segmentation utilizes a region-based active contour combined with a modified Otsu method. Unlike the conventional Otsu method, where the threshold value is selected manually, the modified Otsu method automatically selects initial threshold values using an iterative approach. After segmentation, features are extracted from the segmented results. An SVM classifier then categorizes the ovarian image as normal, cystic, or polycystic. Experimental results demonstrate that the proposed methods Follicle Identification Rate is 96.3% and the False Acceptance Rate is 2%, which significantly improves classification accuracy, highlighting its potential advantages for clinical application. The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. -
Design of body wearable antenna for medical monitoring devices
In this research work, an inset fed microstrip patch antenna, an analysis of its effect on human body and human body influence on antenna performance are presented. Polystyrene substrate (?r= 2.6) with a 1 mm thickness is used to create the proposed antenna. Use of HFSS Ver. 18.2 is made for simulations. The simulated antenna exhibits S11 of -37.4 dB in the absence of human arm and -28.39 dB in the presence. Similar to this, the SAR findings showed that the Specific Absorption Rate (SAR) value obtained is 1.28 W/kg, which is significantly less than the allowed standard of 2 W/kg, when the suggested antenna is set at an offset of 2 mm off the body's surface. Hence the proposed antenna can be suitable for integrating with medicalmonitoring devices. 2024 Author(s). -
Design of Computationally Efficient FRM Based Reconfigurable Filter Structure for Spectrum Sensing in Cognitive Radio for IoT Networks
A low computational complexity FIR bank of filters are essential for spectrum sensing in wireless networks. FRM is a widely used method to generate a sharp transition width sub-bands or channels. The intention of this work is to design multiple non-uniform sharp transition width FIR bank of filter with low computational complexity for spectrum sensing in cognitive radio for IoT networks. The design parameters of the proposed structure are calculated in an efficient way. The proposed structure is designed based on the FRM filter and complex exponential modulation technique (CEMT). The performance of the proposed structure is illustrated with the help of an example. Result indicates that the number of multipliers of the proposed structure is less compared to other existing techniques. 2022 IEEE. -
Design of Computationally Efficient IFIR based Filter Structure for Digital Channelizer'
A low computational complexity digital channelizer is essential for a wide band system. FRM is a widely used method to generate a sharp transition width sub-bands or channels in a digital channelizer. The aim of this work is to design a uniform and non-uniform sharp transition width FIR filter bank with low computational complexity compared to FRM based digital channelizer. The design parameters of the proposed structure are evaluated in an efficient way. The proposed structure is designed based on IFIR filter and complex exponential modulation technique (CEMT). The performance of the proposed structure is demonstrated with the help of an example. Results show that the number of multipliers of the proposed structure is less compared to other existing methods. 2022 IEEE. -
Design of decision support system to identify crop water need
Crop Water Need (ET crop) is referred to as the amount of water needed by a crop to grow. ET crop has high significance to identify the adequate amount of irrigation need. In this paper, a decision support system is proposed to identify Crop Water Need. The proposed decision support system is implemented through sensors and android based smartphone. Internet of Things (IoT) based temperature sensor (DHT11) is used to acquire the real time environmental factors that affect the ET crop. The sensor will communicate with android based smartphone application using Bluetooth Technology (BT-HC05). This proposed system has been compared with available evapotranspiration and existing manual method of evapotranspiration and it was found that proposed system is more correlated than existing manual method of evapotranspiration. The correlation coefficient obtained between proposed system and available evapotranspiration is 0.9783. The proposed decision support system is beneficial for farmers, agriculture researchers and professionals. 2021, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature. -
Design of digital filters for multi-standard transceivers
This paper addresses on three different architectures of digital decimation filter design of a multi-standard RF transceivers. Instead of using single stage decimation filter network, the filters are implemented in multiple stages using FPGA to optimize the area, delay and dynamic power consumption. The proposed decimation filter architectures reflect the considerable reduction in area and dynamic power consumption without degradation of performance. The filter coefficients are derived from MATLAB, the filter architectures are implemented and tested using Xilinx SPARTAN FPGA.First, the types of decimation filter architectures are tested and implemented using conventional binary number system. Then the two different encoding schemesi.e. Canonic Signed Digit (CSD) and Minimum Signed Digit (MSD) are used for filter coefficients and then the architecture performances are tested.The results of CSD and MSD based architectures show a considerable reduction in the area and power against the conventional number system based filter design implementation. The implementation results reflect that considerable reduction in area of 47.89% and dynamic power reduction of 28.64% are achieved using hybrid architecture. 2015 School of Electrical Engineering and Informatics. All rights reserved. -
Design of Grovers Algorithm over 2, 3 and 4-Qubit Systems in Quantum Programming Studio
In this paper, we design and analyse the Circuit for Grovers Quantum Search Algorithm on 2, 3 and 4-qubit systems, in terms of number of gates, representation of state vectors and measurement probability for the state vectors. We designed, examined and simulated the quantum circuit on IBM Q platform using Quantum Programming Studio. We present the theoretical implementation of the search algorithm on different qubit systems. We observe that our circuit design for 2 and 4-qubit systems are precise and do not introduce any error while experiencing a small error to our design of 3-qubit quantum system. 2022 Polish Academy of Sciences. All rights reserved. -
Design of Lowpower 4-bit Flash ADC Using Multiplexer Based Encoder in 90nm CMOS Process
This work describes a 4-bit Flash ADC with low power consumption. The performance metrics of a Flash ADC depend on the kind of comparator and encoder used. Hence open-loop comparator and mux-based encoder are used to obtain improved performance. Simulation results show that the simulated design consumes 0.265mW of power in 90nm CMOS technology using cadence-virtuoso software. The circuit operates with an operating frequency of 100MHz and a supply voltage of 1V. The Author(s). -
Design of Machine Learning Model for Health Care Index during COVID- 19
Predicting stock prices and index movement in the field of finance is always challenging. The events in the macro-economic framework affect the trends of the market and the COVID-19 pandemic was a major reason for the slowdown of the global economies in the short run. It was assumed that the healthcare industry has completely been transformed due to changing behavioral habits of individuals. The study presents the time series approach with the help of historical prices on the Bombay Stock Exchanges (BSE) Health Care Index, both in the long and short run, using the ARIMA model. The period of the study is from February 1999 to August 2020. The ARIMA equations are used to forecast the future price movement of the Health Care Index till December 2020. The findings reveal that the market will continue with the same volatility, and investors should give due attention to analysis and logical reasoning rather than following their feeling of overconfidence. 2024 Taylor & Francis Group, LLC. -
Design of new access control structure for provenance based on secret sharing
Access control is one of the important elements in providing confidentiality to the secured data. Access specifiers helps us understand degree of rights given to the users in utilizing data records in a right manner. Tampering the records by unauthorized parties is a high concern in secure communication. Tamper detection plays an important role in trouble shooting an issue associated with network/ host intrusion scenario. The advances in information technology have driven the modern world to focus on the Web for digital information. People across the globe rely on the internet for all the data from generic information to distribution of personal data over heterogeneous networks. Technology has grown so wide to an extent, where almost all of the financial transactions are taking place through online portals. On the other hand, there has been high rise in the security threats towards users confidential data. This information is however shared by the online users while performing financial transaction in e-commerce portals. In order to maintain security mechanism over the untrusted networks various authentication techniques available in this regard. All these security procedures are said to be stubborn and adequate on contextual basis, on the other hand over a period of time the intruders would find out ways to break into systems. Data theft and intrusion into the information systems would increase on a daily basis if defensive measures are not in place. In this concern a new mechanism for securing the data using majority voting concept is proposed. Majority voting for securing the provenance data is applied. Provenance data is data of origin, genesis data and often observed as sensitive data. Provenance is a record of events, timestamps, versions, transformations occurred for the data of interest. Elicitation of an entity's genesis is termed provenance. This understanding is called as data provenance for data objects and their relationships. In most of the cases provenance data is tend to be sensitive, and a small variation or regulation paves way to changes to entire lineage of the connected data. This origin needs to be protected and only approved parties should have right to use the data. Specific description or classification of an instance's historical record or data object is called data provenance. It has many implications in different disciplines in terms of its significance for the acquisition of data flow mechanisms. Personal control of data privacy is a common scenario and various solutions towards security exists. In this regard a unique model is proposed where control of data and its related allies is available with several bodies but however not one; and if access control is to be permitted for a cause based on context, all the entities holding their right keys will have to agree and share on a common platform for accessing the data. Combining these shares in a peculiar pattern allows the grant for accessing data. The method of allocating controls to multiple bodies and allowing grants based on the combination of stakes is called a mechanism for secret sharing. Share separation may be derived from the concept of visual encryption methodology We integrate concepts of secret sharing and provenance to provide an indigenous solution for parameters of information security namely confidentiality, integrity and availability. It is with the availability of exceptional wireless internet access in mobile motivated situations, users and usage data has become massive with respect to media. For example, financial related operations carried out over online platforms by users in many ways were found insecure and unauthenticated. Procedure with appropriate algorithms are available for safe data communication in various modes, however lacks to attain high accuracy and performance with regards to the basic goals of security; confidentiality, integrity, availability at a significant level. Security is the main aspect of any communications among untrusted networks in the current world. Sincere gratitude to many researchers for their tremendous contributions to effective security algorithms despite various threats that compromise the computer systems vulnerabilities. The origin of the data, i.e., by which the transaction thread was created, is the pertinent question to be answered while the financial operation is finalized. This definition of 'data antiquity ' has received good interest from researchers in different fields for many decades and is often termed as data provenance. However, security in provenance has made some progress with recent research, particularly in the field of cyber security. This study emphases on the safety characteristics of data provenance with a distinctive cryptographic approach. The combination of these principles produces unique results for safeguarding the genesis data. -
Design of personalized diet and physical activities recommendation framework for hypothyroid patients
These days, hypothyroid disease is quickly growing among individuals. In India, one out of eight women experiences hypothyroid disorder because of iodine deficiency. It is necessary to maintain the thyroid hormone levels because it may lead to thyroid cancer. There is a need to consume an adequate amount of iodine intake and other nutrients required to balance thyroid hormones levels. So, patients should follow a customized daily diet and exercise plan to meet their nutritional needs. These recommendations help hypothyroid patients to enhance their metabolism and to adjust thyroid hormones levels. Most of the existing online systems usually provide diet recommendations in general forms. Such recommendations are insufficient for any patient suffering from a specific disease. This paper provides a personalized recommendation framework to provide appropriate diet plans and physical activities to patients. These recommendations are based on their clinical data and personal choices. Validation of recommendations can be made by combining both domains like human expertise and computer technologies. BEIESP. -
Design of pseudo stator generator
In today's energy generation scenario, the extensive use of conventional sources are causing lot of environmental issues. It is necessary that humankind should come up with a strategy to produce clean energy. Even though we cannot completely stop relying on non-renewable sources of energy, lot of research is happening to find the ideal substitute for conventional sources of energy and also for migrating towards renewable energy sources from conventional sources. Its gaining popularity because of the fact that availability of fossil fuels are reducing at an alarming rate. Thus, these research works will aid in producing clean energy and also make the existing systems more efficient. A better substitution would be to design a machine which would use less conventional sources of energy and gives required output. Thus it is necessary to come up with a new technology which would suffice the above stated requirements. The proposed project is an novel idea aimed at designing an alternator which has higher power output at lower RPM when compared to conventional alternators. This model finds application in automobiles, WECS, Aerospace, hybrid vehicles in the near future. 2016 IEEE. -
Design of Reconfigurable Filter Structure Based on FRM for Wideband Channelizer?
A reconfigurable FIR bank of filters are essential for digital channelizer in wideband system. FRM is a extensively used method to generate a sharp transition width sub-bands or channels for digital channelizer. The aim of this work is to design multiple non-uniform sharp transition width FIR bank of filters with reduced number of multipliers and group delay for wideband channelizer. The design parameters of the proposed structure are evaluated in an efficient way. The proposed structure is designed based on FRM filters and exponential modulation (EM) technique. The performance of the proposed structure is illustrated with the help of an example. Result shows that the number of multipliers of the proposed structure is less compared to other existing techniques. 2022 IEEE. -
Design of Reconfigurable FRM Channelizer using Resource Shared Non-maximally Decimated Masking Filters
This paper presents a reconfigurable frequency response masking (FRM) wideband channelizer architecture which is characterized by low computational and hardware complexity. The proposed hardware efficient architecture is realized by incorporating resource shared non-maximally decimated filter bank in the implementation of the FRM wideband channelizer structure. The coefficients of the proposed architecture are optimized and made multiplier-free using Pareto based meta-heuristic algorithm in the canonic signed digit (CSD) space for reducing the total power consumption of the architecture. The architecture is finally designed and synthesized using Xilinx Vivado and Cadence RTL Encounter compiler for the area and power analysis and is compared with existing channnelizer architectures. The comparison highlights the advantages of the proposed architecture in terms of hardware complexity, power and workload in realizing sharp wideband channel filters. 2020, Springer Science+Business Media, LLC, part of Springer Nature.