scispace - formally typeset
Search or ask a question

Showing papers by "Heritage Institute of Technology published in 2007"


Journal ArticleDOI
TL;DR: In this paper, the activation energy and pre-exponential factor for the decomposition reactions were determined using the Agarwal and Sivasubramanium integral approximation method using a Turbo-C-based computer program to evaluate the integral of the kinetic equation.
Abstract: The kinetics of thermal decomposition of four synthetic alkaline earth metal carbonates (MgCO3, CaCO3, SrCO3, and BaCO3) was studied under non-isothermal conditions using thermo-gravimetry. The activation energy and the pre-exponential factor for the decomposition reactions were determined using the Agarwal and Sivasubramanium integral approximation method. A new method was developed using a Turbo-C-based computer program to evaluate the integral of the kinetic equation. It was observed that the decomposition reaction of MgCO3 and CaCO3 followed two-dimensional diffusion-controlled kinetics and the decomposition reaction of SrCO3 and BaCO3 followed a Ginstling–Brounshtein model-based diffusion-controlled kinetics.

29 citations


Journal ArticleDOI
TL;DR: In this paper, the authors considered a model of the universe filled with modified Chaplygin gas and another fluid (with barotropic equation of state) and its role in accelerating the universe.
Abstract: In this letter, we consider a model of the universe filled with modified Chaplygin gas and another fluid (with barotropic equation of state) and its role in accelerating phase of the universe. We have assumed that the mixture of these two fluid models is valid from (i) the radiation era to ΛCDM for -1 ≤ γ ≤ 1 and (ii) the radiation era to quintessence model for γ < -1. For these two fluid models, the statefinder parameters describe different phase of the evolution of the universe.

16 citations


Journal ArticleDOI
TL;DR: The roles of the ubiquitin—proteasome pathway and molecular chaperones in the development of polyglutamine diseases and probable approach for the prevention of many of these fatal disorders using molecular chapers as a therapeutic agent are discussed.
Abstract: Polyglutamine diseases are a class of inherited neurodegenerative disorders caused by the expansion of a polyglutamine tract within the respective proteins. Clinical studies have revealed that the forming of neuronal intranuclear inclusions by the disease protein is a common pathological feature of polyglutamine diseases. Although there has been considerable progress in understanding polyglutamine diseases, many questions regarding their mechanism are still unanswered. The finding that molecular chaperones are associated with ubiquitinated intranuclear inclusions clearly indicates a crucial role of molecular chaperones in the generation of these fatal diseases. Molecular and chemical chaperones have been found to be a good agent for suppressing many polyglutamine diseases in several animal models. In this review, I discuss the roles of the ubiquitin-proteasome pathway and molecular chaperones in the development of polyglutamine diseases and probable approach for the prevention of many of these fatal disorders using molecular chaperones as a therapeutic agent. Newly found chemical chaperones have been demonstrated to be potentially useful and could be used as a therapeutic strategy in preventing many versions of polyglutamine diseases.

16 citations


Proceedings ArticleDOI
01 Dec 2007
TL;DR: In this paper, a theoretical model was proposed to estimate the resonance frequency and the magnetic polarizability of the square split ring resonators (S-SRR) having varying gap width within the rings.
Abstract: In this paper, we propose a theoretical model to estimate the resonance frequency and the magnetic polarizability of the square split ring resonators (S-SRR) having varying gap width within the rings. The model also predicts the quantitative change in polarizability depending on the geometrical orientation of the S-SRR. The computed results are verified with results obtained using an electromagnetic simulator.

14 citations


Journal ArticleDOI
TL;DR: In this paper, a hybrid quantum cloning machine is introduced which is a combination of pre-existing quantum cloning transformations and creates its own identity in the field of quantum cloners.
Abstract: In this work, we introduce a special kind of quantum cloning machine called Hybrid quantum cloning machine. The introduced Hybrid quantum cloning machine or transformation is nothing but a combination of pre-existing quantum cloning transformations. In this sense it creates its own identity in the field of quantum cloners. Hybrid quantum cloning machine can be of two types: (i) State dependent and (ii) State independent or Universal. We study here the above two types of Hybrid quantum cloning machines. Later we will show that the state dependent hybrid quantum-cloning machine can be applied on only four input states. We will also find in this paper another asymmetric universal quantum cloning machine constructed from the combination of optimal universal B---H quantum cloning machine and universal anti-cloning machine. The fidelities of the two outputs are different and their values lie in the neighborhood of $$\frac{5}{6}$$ .

12 citations


Proceedings ArticleDOI
26 Apr 2007
TL;DR: This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.
Abstract: In this paper, we propose a technique for embedding handwritten signature image data into color images and extracting embedded image data from color images. For the sake of security, two watermarked images will be transmitted in different times from the sender's end to the receiver's end, in due course, from two transmitted images, at the receiver's end, original handwritten signature image data will be extracted; a new way of data hiding. From 1994 onward, the use and popularity of Internet in business particular has explored the area of Intellectual Property protection techniques. This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.

9 citations


Proceedings ArticleDOI
26 Aug 2007
TL;DR: This proposed scheme could be applied for ownership protection, copy control, annotation and authentication of digital media, and is focused on authentication of handwritten signature.
Abstract: In this paper, we propose data hiding, extraction and handwritten signature authentication algorithms for binary images. Handwritten signature Image can be transmitted from source to target securely over network after processing the source image by using this proposed data hiding algorithm. According to the algorithm, size of the carrier image must be double (or more) the size of source image. If necessary then additional bytes or noise needed to be injected into carrier image to attain the required size. To do this, the header is updated by the new value (sum of original size of file and amount of noise). There are numerous biometric authentication methods also proposed. In this paper, we propose a novel and new alternative. Entire work can be divided into two phases- a. security on transmission; and b. Recognition and authentication. Our scheme supports the application environment and we strongly believe that "user authentication by statistical analysis" could be a solid platform for future research and study. This proposed scheme could be applied for ownership protection, copy control, annotation and authentication of digital media. This work is focused on authentication of handwritten signature.

8 citations


Journal ArticleDOI
TL;DR: In this article, the impossibility of partial swapping of quantum information was shown to hold in higher dimensions as well as in 2-dimensional Hilbert space and 3-dimensional Euclidean space.
Abstract: It is a well–known fact that a quantum state |ψ(θ, ϕ)〉 is represented by a point on the Bloch sphere, characterized by two parameters θ and ϕ. Here in this work, we find out another impossible operation in quantum information theory. We name this impossibility as 'Impossibility of partial swapping of quantum information'. By this we mean that if two unknown quantum states are given at the input port, there exists no physical process, consistent with the principles of quantum mechanics, by which we can partially swap either of the two parameters θ and ϕ between these two quantum states. In this work, we provided the impossibility proofs for the qubits (i.e. the quantum states taken from two-dimensional Hilbert space) and this impossible operation can be shown to hold in higher dimensions also.

8 citations


Proceedings ArticleDOI
06 Aug 2007
TL;DR: It is seen that, in general timetabling problems need two criteria, compactness & balancing, that are obtainable by GA & ACO approaches, and these approaches need cultivations afresh.
Abstract: Graph coloring problem is NP-complete. It is polynomially reducible to classical and practical university timetabling problem. College course timetabling problem (CCTP) is a parallel instance of University course timetabling problem (UCTP). Obviously, heuristic and approximate algorithms are only ammunitions for solution of search problems. Soft computing approaches namely GA & ACO are particularly suitable to attack CCTP problems. We have seen that, in general timetabling problems need two criteria, compactness & balancing, that are obtainable by GA & ACO approaches. While it is observed that duo processor architecture based computers are readily available in the market, these approaches need cultivations afresh. In this paper we have initiated the process and hope for better culmination.

6 citations


Journal ArticleDOI
TL;DR: In this article, the behavior of an elastic unsymmetrical, orthotropic sandwich shell of double curvature with orthotropic core having different elastic characteristics under uniform heating is derived, where a restriction that the radii of curvature of the shell elements be large compared with the overall thickness of the sandwich shell is imposed.

5 citations


Journal ArticleDOI
TL;DR: In this paper, a genetic algorithm-based simulation technique was carried out using DTA data with a fitness function, and a computer program was developed for the same, which was applied to the decomposition reactions of limestone and magnesite samples.
Abstract: Solid-state reactions take place by different rate-controlling heterogeneous processes. To find the appropriate kinetic model for a particular solid-state reaction, a genetic algorithm-based simulation technique was carried out using DTA data with a fitness function, and a computer program was developed for the same. The process was applied to the decomposition reactions of limestone and magnesite samples. It was observed that both the decomposition reactions mostly followed the Avrami-Erofeev kinetics model.

Journal ArticleDOI
TL;DR: The impossibility of the general operation introduced by Pati (Phys. Rev. A 66:062319, 2002) using two different but consistent principles (i) no-signaling (ii) non increase of entanglement under LOCC) was shown in this article.
Abstract: In this letter, we show the impossibility of the general operation introduced by Pati (Phys. Rev. A 66:062319, 2002) using two different but consistent principles (i) no-signaling (ii) non increase of entanglement under LOCC.

Journal ArticleDOI
TL;DR: Sir Jagadish Chandra Bose's pioneering work on photosynthesis preceded much of the future work in this area, and his work on Hydrilla that was a precursor to C-4 photosynthesis is emphasized.
Abstract: First, we provide a brief description of the life of Sir Jagadish Chandra Bose (1858–1937), his contemporaries, and some of his achievements. He is known for demonstrating the World’s first wireless communication link at a wavelength of 5 mm. Then, we describe his contribution to photosynthesis research, as published in one of the earliest books on photosynthesis—a 1924 book entitled “Physiology of Photosynthesis.” His pioneering work on photosynthesis preceded much of the future work in this area. In particular, we emphasize his work on Hydrilla that was a precursor to C-4 photosynthesis.

Journal ArticleDOI
TL;DR: In this paper, Zhou et al. showed that splitting of quantum information is an impossible task from three different but consistent principles namely unitarity of Quantum Mechanics, no-signaling condition and non-increase of entanglement under Local Operation and Classical Communication.
Abstract: In this work, we show that ‘splitting of quantum information’ (Zhou, D., et al. in quant-ph/0503168) is an impossible task from three different but consistent principles namely unitarity of Quantum Mechanics, no-signaling condition and non-increase of entanglement under Local Operation and Classical Communication.

Posted Content
TL;DR: The introduced Hybrid quantum cloning machine or transformation is nothing but a combination of pre-existing quantum cloning transformations and creates its own identity in the field of quantum cloners.
Abstract: In this work, we introduce a special kind of quantum cloning machine called Hybrid quantum cloning machine. The introduced Hybrid quantum cloning machine or transformation is nothing but a combination of pre-existing quantum cloning transformations. In this sense it creates its own identity in the field of quantum cloners. Hybrid quantum cloning machine can be of two types: (i) State dependent and (ii) State independent or Universal. We study here the above two types of Hybrid quantum cloning machines. Later we will show that the state dependent hybrid quantum-cloning machine can be applied on only four input states. We will also find in this paper another asymmetric universal quantum cloning machine constructed from the combination of optimal universal B-H quantum cloning machine and universal anti-cloning machine. The fidelities of the two outputs are different and their values lie in the neighborhood of ${5/6} $

Journal ArticleDOI
01 Nov 2007-Ubiquity
TL;DR: Most systems have their heritage in the Material Requirements Planning (MRP) philosophy developed in the 1960s, which later evolved into MRPII promoted by APICS and Ollie Wight during the 1980s, and further evolved to the Enterprise Resource Planning (ERP) systems available today.
Abstract: Most systems have their heritage in the Material Requirements Planning (MRP) philosophy developed in the 1960s. This concept utilized computer power to calculate time-phased material requirements. It later evolved into MRPII promoted by APICS and Ollie Wight during the 1980s, and further evolved to the Enterprise Resource Planning (ERP) systems available today. The original premise of all of these systems is that material planning is the center of the universe. The typical manufacturing system was designed with an MRP process at the heart of the system. The emphasis of such systems is on standard bills and routings and standard costs. Companies in the ETO world have different requirements. Designing and building complex products to exact customer specifications frequently involves long lead times and heavy engineering content. To win business, you must provide accurate estimates and quotations to a demanding customer base. Unlike the majority of manufacturers, capital equipment manufacturers typically purchase material to a specific project or job. You need to do progress billing and collect actual costs to projects. Often, you will not receive payment for a project until it is installed and operating at a customer's site. So, cash management is of vital importance. And after the sale, you need to track warranty information and provide aftermarket services, including the sale of spare parts that may constitute a significant share of your company's business.

Journal ArticleDOI
TL;DR: In this paper, a magnetic non-destructive evaluation is used to assess the condition of full-locked coil ropes used in cage and skip winders for a period of four years.
Abstract: Magnetic nondestructive evaluation is being used to assess the condition of full locked coil ropes used in cage and skip winders. Four locked coil ropes were studied for a period of 4 years. This paper focuses on the determination of the in situ condition of full locked coil ropes in cage and skip winders throughout this 4-year period.

Journal ArticleDOI
TL;DR: In this article, it was shown that perfect self-replication would also lead to superluminal signaling, which violates the no-no-signaling principle and thus leads to super-luminance.
Abstract: It is known that if one could clone an arbitrary quantum state one could send signal faster than the speed of light. However it remains interesting to see that if one can perfectly self replicate an arbitrary quantum state, does it violate the no signaling principle? Here we see that perfect self replication would also lead to superluminal signaling.

Proceedings ArticleDOI
01 Nov 2007
TL;DR: This work focuses on the protection of digital signature by implementing bit masking to retrieve alternate bits of the watermark image and stuff that bit to the alternate bit positions in the image file at the source end.
Abstract: In this paper we propose a data hiding and extraction algorithm for binary images. Handwritten signature can be easily transmitted through the network using this data hiding method. Here we are implementing bit masking to retrieve alternate bits of the watermark image and stuff that bit to the alternate bit positions in the image file at the source end. The eight bits of a single pixel of the watermark image are embedded into the alternate positions of two adjacent pixels of the image that is to be sent. At the target end the bits at the alternate positions of the two adjacent pixels make up the single pixel of the extracted watermark image. This method can be used as ownership protection, copy control and authentication of digital media. This work focuses on the protection of digital signature.

Proceedings ArticleDOI
01 Oct 2007
TL;DR: This work is focused on hiding Handwritten Signature during transmission over untrusted network and could be applied for ownership protection, copy control, annotation and authentication of digital media.
Abstract: In this paper, we propose hiding and extraction algorithms for Handwritten Signature. Handwritten Signature Image can be transmitted from source to target securely over untrusted network by using this proposed Data Hiding Algorithm. In this algorithm, size of the carrier image must be double or more the size of source image. If necessary then additional bytes or noise needed to be injected into carrier image to attain the required size. To do this, the header is updated by the new value (sum of original size of file and amount of noise). There are numerous Data Hiding and Extraction algorithms are already proposed. In this paper, we propose a novel and new alternative. Entire work divides into - a. security on transmission; and b. Extraction. This proposed scheme could be applied for ownership protection, copy control, annotation and authentication of digital media. This work is focused on hiding Handwritten Signature during transmission over untrusted network.