Browse Items (11807 total)
Sort by:
-
Ceria doped titania nano particles: Synthesis and photocatalytic activity
Ceria (0.5, 1 and 2 mol%) doped titania nano catalysts were prepared by combustion synthesis method, using titanium isopropoxide as the starting material. The prepared catalysts were characterized by X-ray diffraction (XRD), Energy dispersive X-ray analysis (EDX), Scanning electron microscopy (SEM) and Infra red spectroscopy (FTIR). Total acidity of the prepared catalysts were determined by temperature programmed desorption of ammonia (TPD - NH3). XRD pattern of 1% ceria doped titania obtained by calcinations at 873 K indicated that the samples were crystalline with a mixture of anatase and rutile phase. No peaks corresponding to cerium oxide were observed XRD patterns indicating that the amount of cerium is negligible on the surface of titania catalyst. The photo catalytic activity was evaluated for the degradation of methylene blue (MB) under visible light irradiation. The degradation rates of MB on cerium doped TiO2 samples were higher than that of pure TiO2. The introduction of structural defects (cationic ceria dopant) into the titania crystal lattice leads to the change of band gap energy. As a result, the excitation energy is expanded from UV light of anatase TiO2 to visible light for ceria doped titania. 2016 Elsevier Ltd. -
Performance analysis of training algorithms of multilayer perceptrons in diabetes prediction
Artificial Intelligence plays a vital role in developing machines or software that can create intelligence. Artificial Neural Networks is a field of neuroscience which contributes tremendous developments in Artificial Intelligence. This paper focuses on the study of performance of various training algorithms of Multilayer Perceptrons in Diabetes Prediction. In this study, we have used Pima Indian Diabetes data set from UCI Machine Learning Repository as input dataset. The system is implemented in MatlabR2013. The Pima Indian Diabetes dataset consists of about 768 instances. The input data is the patient history and the target output is the prediction result as tested positive or tested negative. From the performance analysis, it was observed that out of all the training algorithms, Levenberg-Marquardt Algorithm has given optimal training results. 2015 IEEE. -
Partial load shedding using ant colony algorithm in smart grid environment
Effective power distribution methodology is one of the basic necessities to meet the increasing power demand in any power system. Load shedding is done when power demand is more than power generation, to sustain the power system stability. Load shedding methods followed today shed a particular load completely, neglecting the critical consumers within the system. Controlling the loads at individual utility level in smart grid system enables us to put a maximum power limit on utility. Hence by partially shedding the load, demand can be reduced. The technique used here utilizes ant colony algorithm to choose a maximum power limit for each load dynamically based on the importance and priority of load. This method forces the consumer to manage his load internally based on criticality. It also effectively makes use of availability based tariff schemes. 2015 IEEE. -
Friction stir welding of aluminum alloy 1100 and titanium-al alloy
A intercalating joint between Al and Ti alloy is friction stir welded using a high speed steel tool. The material mixing occurs mainly in the shoulder region while the pin region shows nominal mixing. Microscopy and hardness experiments indicate sporadic formation of intermetallic compounds. The joint region near the shoulder and to some extent below it shows increase in hardness compared to the base Ti alloy. Copyright 2016 by ASME. -
An approach to improvise recognition rate from occluded and pose variant faces
Face recognition is increasingly gaining popularity in today's field mainly because one of the major applications of face recognition, surveillance cameras are being used in real world applications. At the same time, researchers are trying to increase the accuracy of recognition as recognizing face from an unconstrained faces is naturally difficult. In the case of real world application, during image capture there are high chances of faces appearing with different poses, face subjected to illumination and occlusion. In this paper we propose a model that can increase the recognition rate with faces of different pose and faces subjected to occlusion. We introduce the technique of in-painting to restore the occluded face in a frame of video. A dictionary set is created with restored occluded face and faces with varying inclination. In our proposed model, Discrete Curvelet Transform is used to extract features. Comparison with traditional method shows a better recognition rate. 2015 IEEE. -
Encryption of motion vector based compressed video data
Enormous size of video data for natural scene and objects is a burden, threat for practical applications and thus there is a strong requirement of compression and encryption of video data. The proposed encryption technique considers motion vector components of the compressed video data and conceals them for their protection. Since the motion vectors exhibit redundancies, further reduction of these redundancies are removed through run-length coding prior to the application of encryption operation. For this, the motion vectors are represented in terms of ordered pair (val, run) corresponding to the motion components along the row and column dimensions, where val represents value of the motion vector while run represents the length of repetition of val. However, an adjustment for having maximal run is made by merging the smaller run value. Eventually we encrypted the val components using knapsack algorithm before sending them to the receiver. The method has been formulated, implemented and executed on real video data. The proposed method has also been evaluated on the basis of some performance measures namely PSNR, MSE, SSIM and the results are found to be satisfactory. Springer International Publishing Switzerland 2016. -
Micromachining process-current situation and challenges
The rapid progress in the scientific innovations and the hunt for the renewable energy increases the urge for producing the bio electronic products, solar cells, bio batteries, nano robots, MEMS, blood less surgical tools which can be possible with the aid of the micromachining. This article helps us to understand the evolution and the challenges faced by the micromachining process. Micro machining is an enabling technology that facilitates component miniaturization and improved performance characteristics. Growing demand for less weight, high accuracy, high precision, meagre lead time, reduced batch size, less human interference are the key drivers for the micromachining than the conventional machining process. Owned by the authors, published by EDP Sciences, 2015. -
An analysis of load balancing algorithms in the cloud environment
The emerging area in an IT environment is Cloud Computing. There are many advantages of the computing but unfortunately, allocation of the job request effectively is a trouble. It requires lots of infra structural commitments and the quality inputs of the resources. Also, in the cloud computing environment, Load Balancing is an important aspect. Efficient load balancing algorithm helps the resource to have optimized utilization with the proper dissemination of the resources to the cloud user in pay-as-you-say-manner. It also supports ranking the job request based on the priority with the help of scheduling technique. We present the various types of Load Balancing Techniques in the different platform of Cloud Environment specified in SLA (Service level Agreement). 2016 IEEE. -
Segmentation of ancient and historical gilgit manuscripts
The Gilgit manuscripts belong to fifth century A.D. and are oeuvre of texts which deal with Buddhist work. It is one of the oldest manuscripts in the world and is considered to be a milestone in the history of Buddhist works in India. It is a collection of both official and unofficial Buddhist works which are believed to have helped in the evolution of many literatures including Chinese, Japanese, and Sanskrit. Since this manuscript is almost seventeen centuries old it has not been able to fully decipher the text yet. It has been laminated by the National Archives of India which proves it is one of the most important literatures concerning India. In this paper, we perform character- based image segmentation on Gilgit manuscript in order to simplify and to better identify character in the image of the manuscript. The employed method gives an accuracy of nearly 87%. Springer India 2016. -
Rectangular microstrip antenna for WLAN application
This paper deals with the design of rectangular microstrip patch antenna for Wireless applications. In this paper a modified slotted microstrip antenna design for 2.5GHz operation is proposed. This provides improved performance in terms of lower return loss and higher gain. This is possible by inclusion of slots appropriately on the patch shape. The substrate material used in this design is Duroid5880 with permittivity 2.2 and size 47.43mm 39.65mm 1.6mm. ANSOFT HFSS EM simulator has been used for design and simulation of the microstrip antenna. The various antenna parameters such as frequency, VSWR, gain and directivity are analyzed to characterize the proposed antenna. 2015 IEEE. -
A modified approach for extraction and association of triplets
In this paper we present an enhanced algorithm with modified approach to extricate various Triplets i.e. subject-predicate-object from Natural language sentences. The Treebank Structure and the Typed Dependencies obtained from Stanford Parser are used to elicit multiple triplets from English Sentences. Typed Dependencies represents grammatical connections among the words of any sentence and represents how triplets are associated. The intended interpretation behind the extraction of Triplets is that the subject is acting on the object in a way described by the predicate. In graphical form it can be considered that subject and object will be acting as nodes i.e. entities and predicate as edges i.e. relationship. The resulting triplets and relations can be useful for building and analysis of a social network graph and for generating communication pattern and Information retrieval. 2015 IEEE. -
A proof of concept implementation of a mobile based authentication scheme without password table for cloud environment
Cloud computing is a fast growing technology offering a wide range of software and infrastructure services on a pay-per-use basis. Many small and medium businesses (SMB's) have adopted this utility based Computing Model as it contributes to reduced operational and capital expenditure. Though the resource sharing feature adopted by Cloud service providers (CSP's) enables the organizations to invest less on infrastructure, it also raises concerns about the security of data stored at CSP's premises. The fact that data is prone to get accessed by the insiders or by other customers sharing the storage space is a matter of concern. Regulating access to protected resources requires reliable and secure authentication mechanism, which assures that only authorized users are provided access to the services and resources offered by CSP. This paper proposes a strong two-factor authentication mechanism using password and mobile token. The proposed model provides Single Sign-on (SSO) functionality and does not require a password table. Besides introducing the authentication scheme, the proof of concept implementation is also provided. 2015 IEEE. -
Design and simulation of CPW fed circular spike antenna for wireless applications
The aim of the paper is to design, and simulate circular spike Coplanar Waveguide (CPW) fed antenna for wireless applications. The size of the antenna is very small occupying a space of 36mm 36mm including the substrate board. The antenna is designed using FR-4 substrate of thickness 1.6mm with dielectric permittivity of 4.4. The Coplanar Waveguide (CPW) fed system is used, so we can avoid double side printed board. This proposed antenna covers the bandwidth frequency range from 2.85GHz to 3.31GHZ and 5.09GHz to 5.65GHz for various wireless applications. The antenna design and performance are analyzed by using High Frequency Structure Simulator (HFSS) electromagnetic software for wireless applications according to frequency bands. The results of proposed antenna simulation on return loss, VSWR, gain and directivity are calculated. 2015 IEEE. -
Accessing Accurate Documents by Mining Auxiliary Document Information
Earlier techniques of text mining included algorithms like k-means, Nae Bayes, SVM which classify and cluster the text document for mining relevant information about the documents. The need for improving the mining techniques has us searching for techniques using the available algorithms. This paper proposes one technique which uses the auxiliary information that is present inside the text documents to improve the mining. This auxiliary information can be a description to the content. This information can be either useful or completely useless for mining. The user should assess the worth of the auxiliary information before considering this technique for text mining. In this paper, a combination of classical clustering algorithms is used to mine the datasets. The algorithm runs in two stages which carry out mining at different levels of abstraction. The clustered documents would then be classified based on the necessary groups. The proposed technique is aimed at improved results of document clustering. 2015 IEEE. -
Enabling context-awareness: A service oriented architecture implementation for a hospital use case
The medical field is continuously flooded with newer technologies and tools for automating all kinds of medical care processes. There are a variety of software solutions and platforms for enabling smart healthcare and for assisting care providers such as doctors, nurses, surgeons and specialists with all kinds of timely insights to diagnose and decide the correct course of actions. There are patient monitoring and expert systems to simplify and streamline healthcare service design, development, and delivery. However there are concerns and challenges with the multiplicity and heterogeneity of technologies and solutions. The dense heterogeneous medical devices available in the intensive therapy units pose a challenge of medical device integration. Needless to say, lot of research work has gone in devising techniques in integrating these systems for exchange of data. However mere device integration does not exploit the modern technologies until meaningful and critical information is presented to doctors and patient care personals adapting to the changes in the patient condition. The goal of this research is to apply context aware computing using service oriented architecture in acquiring, analysing and assisting doctors and nurses with necessary information for easy and critical time saving decision making. This paper presents an implementation of the identified web services which can be consumed during a treatment at the Intensive Therapy Unit (ITU). 2015 IEEE. -
RASK: Request authentication using shared keys for secured data aggregation in sensor network
Accomplishing a robust security features to resists lethal attacks is still an open research area in wireless sensor network. The present paper review existing security techniques to find that there is still a trade-off between cryptographic-based security incorporations and communication performance. Moreover, we have identified that majority of the existing system has not emphasized on first line of defense i.e. security the route discovery process that can act as a firewall for all forms of illegitimate nodes existing in the network. The proposed study introduced RASK i.e. Request Authentication using Shared Key, which is a novel concept developed using simple quadratic formulation of generating keys for encrypting the message during data aggregation. The study outcome has been significantly benchmarked with recent studies and existing cryptographic standards to find RASK outperform existing techniques. Springer International Publishing AG 2017. -
Secure magnetic resonance image transmission and tumor detection techniques
The transmission of important medical diagnostic, MRI (Magnetic Resonance Imaging) images are vulnerable to third party hackers who does spoofing and they are able to introduce faulty and noisy data that damage the transmission data, which hinders the proper medical diagnostics, research and credibility of labs and doctors, there is a clear lack of awareness and lack of proper security measures taken in transmission of MRI images in the present labs, hospitals and research centers. This project is helpful to reduce the problem of secure transmission of medical images. There are many algorithms which can be applied to these medical images. This project is helpful to provide good security to medical images during transmission. Tumor detection or prediction in medical science is a very complex and expensive job, which is not yet been addressed properly and no proper graphical user interface exists in an open source environment. This project is dedicated to analyze the best tumor detection from an MRI brain image after several segmentation methods such as K-means Clustering and Watershed segmentation. Security is realized considering various techniques for encryption and decryption of the image. The encryption technique finally selected after the survey was based on Rivest, Shamir & Adleman [RSA] algorithm. 2016 IEEE. -
Human heart disease prediction system using data mining techniques
Nowadays, health disease are increasing day by day due to life style, hereditary. Especially, heart disease has become more common these days, i.e. life of people is at risk. Each individual has different values for Blood pressure, cholesterol and pulse rate. But according to medically proven results the normal values of Blood pressure is 120/90, cholesterol is and pulse rate is 72. This paper gives the survey about different classification techniques used for predicting the risk level of each person based on age, gender, Blood pressure, cholesterol, pulse rate. The patient risk level is classified using datamining classification techniques such as Nae Bayes, KNN, Decision Tree Algorithm, Neural Network. etc., Accuracy of the risk level is high when using more number of attributes. 2016 IEEE. -
Survey on Microwave frequency v Band: Characteristics and challenges
This paper presents the characteristics of V band frequency range of Microwave band in electromagnetic spectrum. The paper also identifies the challenges using this band in applications. The lower microwave frequency band of 2-3 GHz is used in wireless applications. Wi-Fi, Wi-Max and cellular frequencies are quite familiar using in the lower band of microwave frequency band. However, the congestion of the frequency band in this lower frequency band invoked researchers to think a higher frequency microwave band lies between 57 GHz-64 GHz band. The wireless application can utilize this unlicensed frequency band. However signal absorption, fast fading of signals in long range communication, also transceiver design architectures complexity pose great challenges in this higher band. Applications of short range such as military applications utilize this band. However, thinking a new dimension of characteristic features of microwave upper band is the focus of this paper. This paper tells the V Band, that is upper band of microwave range frequencies (57 - 64 GHz). 2016 IEEE. -
Wavelet packet transform based fusion of misaligned images
This paper proposes an image fusion method based on wavelet packet transform (WPT) for images with misaligned region of interest, which finds wide application in target recognition and feature extraction. The region of interest of the images are first aligned and then fused in the transform domain. The various no-reference parameters such as standard deviation (SD), spatial frequency (SF) are measured for the fused image. The result obtained from this method is compared with the other methods such as image fusion using discrete wavelet transform (DWT), stationary wavelet transform and guided filtering. It is evident from the simulation results that the two parameters are high for the fused image using wavelet packet transform. 2016 IEEE.