scispace - formally typeset
Search or ask a question

Showing papers by "Heritage Institute of Technology published in 2009"


Journal ArticleDOI
TL;DR: In this paper, the analytical solutions of the space fractional diffusion equations by two-step Adomian Decomposition Method (TSADM) are presented by using initial conditions, the explicit solution of the equations have been presented in the closed form and then their solutions have been represented graphically.

102 citations


Journal ArticleDOI
TL;DR: A three-tier model of phytoplankton, zooplankon and nutrient is considered and stability of different equilibrium points is analyzed along with Hopf-bifurcation around coexisting equilibrium point to reveal chaotic oscillation exhibited by the model system for certain choice of the parameter values.
Abstract: In this paper, a three-tier model of phytoplankton, zooplankton and nutrient is considered and stability of different equilibrium points is analyzed along with Hopf-bifurcation around coexisting equilibrium point. Here, we have assumed toxication process as the guiding factor for bloom formation as well as its termination and this process is incorporated into our model by choosing the zooplankton grazing function as a Monod-Haldane function due to the phytoplankton toxicity. Extensive numerical simulations have been performed to validate the analytical findings and these simulation work reveal the chaotic oscillation exhibited by the model system for certain choice of the parameter values.

61 citations


Journal ArticleDOI
TL;DR: In this article, the feasibility of separating ovalbumin from chicken egg white (CEW) was investigated using Amicon stirred cell fitted with polyether sulfone (PES) membrane.

55 citations


Journal ArticleDOI
TL;DR: In this article, non-linear PDEs are systematically solved by the decomposition method of Adomian for general boundary conditions described by boundary operator equations, and the solution of the nonlinear Klein-Gordon equation has been considered as an illustration of the decomposition method.

53 citations


Journal ArticleDOI
TL;DR: The results thus obtained have been found to be satisfactory and the sample has been designated as charcoal-immobilized papain (CIP) and used for further studies of mercury removal.

39 citations


Journal ArticleDOI
TL;DR: Elman's recurrent neural network (ERNN) is employed for automatic identification of healthy and pathological gait and subsequent diagnosis of the neurological disorder in pathological gaits from the respective gait patterns.
Abstract: In this paper Elman's recurrent neural network (ERNN) is employed for automatic identification of healthy and pathological gait and subsequent diagnosis of the neurological disorder in pathological gaits from the respective gait patterns. Stance, swing and double support intervals (expressed as percentages of stride) of 63 subjects were analysed for a period of approximately 300 s. The relevant gait features are extracted from cross-correlograms of these signals with corresponding signals of a reference subject. These gait features are used to train modular ERNNs performing binary and tertiary classifications. The average accuracy of binary classifiers is obtained as 90.6%–97.8% and that of tertiary classifiers is 89.8%. Hence, two hierarchical schemes are developed each of which uses more than one modular ERNN to segregate healthy, Parkinson's disease, Huntington's disease and amyotrophic lateral sclerosis subjects. The average testing performances of the schemes are 83.8% and 87.1%.

38 citations


Proceedings ArticleDOI
01 Dec 2009
TL;DR: In this paper, a theoretical model was proposed to estimate the accurate resonance frequency of a circular split ring resonator (SRR), and the model also predicted the shift in the resonance frequency for rotational SRR.
Abstract: In this paper, we propose a theoretical model to estimate the accurate resonance frequency of a circular split ring resonator (SRR). Moreover, the model also predicts the shift in the resonance frequency for rotational SRR. The computed results are compared with available measured results and simulated results obtained using an electromagnetic simulator.

33 citations


Journal ArticleDOI
TL;DR: In this article, the analytical approximate solution of the fractionally damped Van der Pol equation by the homotopy perturbation method and a numerical method is presented and the results obtained by two methods are compared.
Abstract: The present paper deals with the analytical approximate solution of the fractionally damped Van der Pol equation by the homotopy perturbation method and a numerical method. By using initial conditions, the explicit solution of the equation is presented and then the numerical solutions are represented graphically; then the results obtained by two methods are compared.

23 citations


Proceedings ArticleDOI
28 Dec 2009
TL;DR: The position of biometrics in the current field of Security has been depicted in this work and opinions about the usability of biometric authentication systems are outlined.
Abstract: Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs to be identified based on some characteristic physiological parameters. A wide variety of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user, and not anyone else. By using biometrics it is possible to confirm or establish an individual’s identity. The position of biometrics in the current field of Security has been depicted in this work. We have also outlined opinions about the usability of biometric authentication systems, comparison between different techniques and their advantages and disadvantages in this paper.

20 citations


Proceedings ArticleDOI
15 Jun 2009
TL;DR: A novel technique, Discrete Fourier Transformation based Image Authentication (DFTIAT) has been proposed to authenticate an image and with its own application one can also transmit secret message or image over the network.
Abstract: In this paper a novel technique, Discrete Fourier Transformation based Image Authentication (DFTIAT) has been proposed to authenticate an image and with its own application one can also transmit secret message or image over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 × 2 of the source image in sliding window manner then convert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.

18 citations


Journal ArticleDOI
TL;DR: Using a single current feedback amplifier (CFA) device, two new variable frequency sinusoidal RC oscillators are presented and exhibit resonance characteristics at moderate Q-values under open-loop conditions.
Abstract: Using a single current feedback amplifier (CFA) device, two new variable frequency sinusoidal RC oscillators are presented. The transadmittance pole of the device (AD-844) has been utilized in the design for generating sine wave signals covering a range of 1 MHz≤f 0≤31 MHz. Under open-loop conditions, both circuits exhibit resonance characteristics at moderate Q-values (1≤Q≤9). These responses have been experimentally verified with hardware circuit implementation and PSPICE macromodel simulation.

Proceedings ArticleDOI
08 Mar 2009
TL;DR: A simple index, based on the intra-clusters and inter-cluster distance measures has been proposed in this paper, which allows the number of clusters to be determined automatically and is provided to determine the optimal cluster number of a clustered grayscale images.
Abstract: Image clustering and categorization is a means for high-level description of image content. In the field of content-based image retrieval (CBIR), the analysis of gray scale images has got very much importance because of its immense application starting from satellite images to medical images. But the analysis of an image with such number of gray shades becomes very complex, so, for simplicity we cluster the image into a lesser number of gray levels. Using K-Means clustering algorithm we can cluster an image to obtain segments. The main disadvantage of the k-means algorithm is that the number of clusters, K, must be supplied as a parameter. Again, this method does not specify the optimal cluster number. In this paper, we have provided a mathematical approach to determine the optimal cluster number of a clustered grayscale images. A simple index, based on the intra-cluster and inter-cluster distance measures has been proposed in this paper, which allows the number of clusters to be determined automatically.

Journal ArticleDOI
TL;DR: The competitive binding study in the presence of ethidium bromide suggests that the complex interacts with calf thymus DNA (CT DNA) through partial intercalation through partialintercalation of the copper complex within DNA.
Abstract: Photoinduced intramolecular electron transfer occurs in the triplet state within the complex [Htyr-Cu-phen](+) (Htyr = l-tyrosinato; phen = 1,10-phenanthroline) from tyrosine to phenanthroline. For this linked donor-acceptor system, a prominent magnetic field effect (MFE) is observed for the triplet-born radicals. The competitive binding study in the presence of ethidium bromide suggests that the complex interacts with calf thymus DNA (CT DNA) through partial intercalation. The photoexcited copper complex can oxidize DNA in a deoxygenated environment. Though the oxidation of tyrosine is thermodynamically more favorable than the oxidation of guanine, the primary electron transfer occurs from the DNA base to the phen ligand. A prominent MFE is observed for this noncovalently bound triplet-born guanine radical and phen radical anion. The process of partial intercalation of the copper complex within DNA is responsible for this rare observation.

Journal ArticleDOI
TL;DR: In this article, a witness operator was proposed for edge detection of positive-partial-transpose (PPT) entangled states, which is finer than the operator of Lewenstein et al. in some restrictions.
Abstract: Edge states lying at the edge of positive-partial-transpose- (PPT-) entangled states have a very intriguing existence and their detection is equally interesting. We present here a witness for detection of edge states. We then compare between our proposed witness operator and the witness operator proposed by Lewenstein et al. [Phys. Rev. A 62, 052310 (2000)] in terms of the efficiency in the detection of PPT entangled states. In this regard we show that this operator is finer than the operator of Lewenstein et al. in some restrictions. We also discuss about its experimental realization via Gell-Mann matrices.

Book ChapterDOI
15 Dec 2009
TL;DR: F fuzzy mean-entropy-skewness models are proposed for optimal portfolio selection and credibility theory is applied to evaluate fuzzy mean, skewness and entropy.
Abstract: In this paper fuzzy mean-entropy-skewness models are proposed for optimal portfolio selection Entropy is favored as a measure of risk as it is free from dependence on symmetric probability distribution Credibility theory is applied to evaluate fuzzy mean, skewness and entropy Hybrid intelligence algorithm is used for simulation Numerical examples are given in favor of each of the models

Journal ArticleDOI
TL;DR: A nonperturbative analytical solution for the time fractional nonlinear Burger's equation by using Adomian Decomposition Method (ADM) was derived in this article.
Abstract: A non-perturbative analytical solution is derived for the time fractional nonlinear Burger’s equation by using Adomian Decomposition Method (ADM). The present method performs extremely well in terms of accuracy, efficiency and simplicity.

Proceedings ArticleDOI
08 Mar 2009
TL;DR: This paper has proposed an algorithmic technique to detect the edge of any kind of true gray scale images considering the artificial features of the image as the feature set which is fed to K-Means algorithm for clustering the image and there to detect clearly the edges of the objects present in the considered image.
Abstract: Edge detection is a problem of fundamental importance in image analysis. Many approaches for edge detection have already revealed more are waiting to be. But edge detection using K-means algorithm is the most heuristic and unique approach. In this paper, we have proposed an algorithmic technique to detect the edge of any kind of true gray scale images considering the artificial features of the image as the feature set which is fed to K-Means algorithm for clustering the image and there to detect clearly the edges of the objects present in the considered image. The artificial features, which we have considered here, are mean, standard deviation, entropy and busyness of pixel intensity values.

Journal Article
TL;DR: A neural network model whose architecture combines several multilayer perceptron networks (MLPs) to realize better performance after capturing the seasonality effect in the atmospheric data is proposed.
Abstract: In this paper a neural network based method of local rainfall prediction is proposed. This method is developed based on past observations on various atmospheric parameters such as temperature, relative humidity, vapor presser, etc. We propose a neural network model whose architecture combines several multilayer perceptron networks (MLPs) to realize better performance after capturing the seasonality effect in the atmospheric data. We also demonstrate that the use of appropriate features can further improve the performance in prediction accuracy. These observations inspired us to use a feature selection MLP, FSMLP, (instead of MLP) which can select good features on-line while learning the prediction task. The FSMLP is used as a preprocessor to select good features. The combined use of FSMLP and SOFM-MLP results in a network system that uses only very few inputs but can produce good prediction.

Journal ArticleDOI
TL;DR: Some new realizations of third order lowpass (LP) Butterworth filters using the current differencing buffered amplifier (CDBA) and current feedback amplifier (CFA) type unity gain cells are presented.
Abstract: Some new realizations of third order lowpass (LP) Butterworth filters using the current differencing buffered amplifier (CDBA) and current feedback amplifier (CFA) type unity gain cells are presented. The circuits are practically active insensitive to the decvice port tracking errors (e). Effects of the device parasitic capacitances on the nominal design are insignificant which can be conveniently compensated. With suitable design alternate bandpass (BP) Butterworth characteristics may also be obtained.

Journal ArticleDOI
TL;DR: In this paper, an attempt has been made to evaluate and monitor the condition of a 6X19 Seale preformed haulage rope by nondestructive technique, which is the only means for assessment of haulage ropes in terms of local faults and loss in metallic area (LMA).
Abstract: Steel winding ropes used in aerial ropeways, deteriorate with use. Visual inspection is the most conventional method for evaluation of aerial ropes. But this method cannot evaluate the inner failure such as corrosion and other flaws. Nondestructive testing method is the only means for assessment of haulage ropes in terms of local faults (LF) and loss in metallic area (LMA). An attempt has been made in this paper to evaluate and monitor the condition of a 6X19 Seale preformed haulage rope by nondestructive technique.

Proceedings ArticleDOI
06 Mar 2009
TL;DR: A robust scheme to segment unconstrained handwritten Bangla words into characters using a combination of basic strokes based on the concept of downside movement of stroke is proposed.
Abstract: To take care of variability involved in the writing style of different individuals in this paper we propose a robust scheme to segment unconstrained handwritten Bangla words into characters. Online handwriting recognition refers to the problem of interpretation of handwriting input captured as a stream of pen positions using a digitizer or other pen position sensor. For online recognition of word the segmentation of word into basic strokes is needed. For word segmentation, at first, we divide the word image into two different zones. The upper zone is taken as the 1/3rd of the height of the total image. Now, based on the concept of downside movement of stroke in this upper zone we segment each word into a combination of basic strokes. We segment at a pixel where the slope of six consecutive pixels satisfies certain angular value. We tested our system on 5500 Bangla word data and obtained 81.13% accuracy on word data from the proposed system.

Journal ArticleDOI
TL;DR: This work introduces a new kind of local cloning operation to generate two mixed three qubit entangled states between these partners from a W-type state initially shared by them.
Abstract: In this work we describe a protocol by which one can secretly broadcast W-type state among three distant partners. This work is interesting in the sense that we introduce a new kind of local cloning operation to generate two mixed three qubit entangled states between these partners from a W-type state initially shared by them.

Proceedings ArticleDOI
23 Jul 2009
TL;DR: A novel “Discrete Cosine Transformation based Image Authentication & Secret Message Transmission Scheme” (DCTIASMTT) has been proposed to authenticate a multimedia image and at the same time some ubiquitous secret message or image can be transmitted over the mobile network.
Abstract: In this paper a novel “Discrete Cosine Transformation based Image Authentication & Secret Message Transmission Scheme” (DCTIASMTT) has been proposed to authenticate a multimedia image and at the same time some ubiquitous secret message or image can be transmitted over the mobile network. Instead of direct embedding a message or image within the source image, choose a window of size 2x2 of the source image and then convert it from spatial domain to frequency domain using Discrete Cosine Transformation (DCT). The bits of the authenticating message or image are then embedded at LSB of the transformed image (excluding first pixel). Inverse DCT has been performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through reverse procedure. The experimental results have been discussed and compared with the existing steganographic algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with STools.

Proceedings ArticleDOI
06 Mar 2009
TL;DR: A security model is proposed which imposes the concept of secrecy over privacy for text messages which combines cryptography, steganography, and along with that an extra layer of security has been imposed in between them.
Abstract: Of late in the field of Information Security, we have plenty of security tools which are made to protect the transmission of multimedia objects. But approaches for the security of text messages are comparatively less. In this paper, a security model is proposed which imposes the concept of secrecy over privacy for text messages. This model combines cryptography, steganography (taken as security layers) and along with that an extra layer of security has been imposed in between them. This newly introduced extra layer of security changes the format of normal encrypted message and the security layer followed by it embeds the encrypted message behind a multimedia cover object.

Proceedings ArticleDOI
23 Jul 2009
TL;DR: An algorithm for creating a corpus for opinion mining research field based on a corpus of reviews based on regular expressions and its possible applications in the field of Opinion Mining is proposed.
Abstract: This paper is meant for a heuristic approach for the refinements of corpus based on regular expressions and its possible applications in the field of Opinion Mining. Corpus which is the plural form of ‘corpora’ is nothing but the collection of linguistic data. And here the proposed work is based on a corpus of reviews; more specifically product reviews. The reviews are in the html files which are easily available in popular review sites like Cnet.com. The revolution in information and technologies has given a new era in the development of language industries. The versatility in technological development, along with the translations available in different languages has lead to use of this corpus for specific machine learning mechanism as well as various automatic translation applications. But the prime objective of researchers as well as the naive users is to give a fast developing technique of machine learning systems that should be both exact and effective. Most of the time it becomes a very tedious job to create exact dataset for the work due to the crisis of accurate corpus regarding respective research work. And that is why; we have proposed an algorithm for creating a corpus for opinion mining research field.

Proceedings ArticleDOI
07 Mar 2009
TL;DR: This paper has described how this approach enables any naive user to extract Indian regional language based document from a web document efficiently which is quite similar to a standard search engine.
Abstract: Extracting specific information from a collection of documents is called Information Extraction (IE). In general, the information on the web is well structured in HTML or XML format. And the work of IE from structured documents (in HTML or XML), basically uses learning techniques for pattern matching in the content. In this paper, we have proposed a novel approach for interactive information extraction technique. Here, we have described how this approach enables any naive user to extract Indian regional language based document from a web document efficiently which is quite similar to a standard search engine. It is just similar to a pre-programmed information extraction engine.

Proceedings ArticleDOI
01 Dec 2009
TL;DR: In this paper, the differentially fed circular microstrip antenna in inverted configuration was investigated and the simulation results for different configurations were compared and presented in a simulation paper, where the authors showed that the inverted configuration exhibits wider gain than the conventional differentially feed design.
Abstract: This paper investigates the differentially fed circular microstrip antenna in inverted configuration. Compared to single fed microstrip antennas, the differentially fed configuration offers wider impedence bandwidth, symmetric copolarized radiation and lower cross-polarized radiation. Moreover, the inverted configuration of the differentially fed design exhibits wider gain than conventional differentially fed design. Simulation results for different configurations are compared and presented in this paper.

Proceedings ArticleDOI
01 Jan 2009
TL;DR: In this article, a twin cylinder, constant speed, direct injection CI (diesel) engine was run on jatropha biodiesel and diesel fuel blends and the engine was directly coupled to a hydraulic dynamometer whose load was varied by adjusting load wheel on the top of the engine.
Abstract: A twin cylinder, constant speed, direct injection CI (diesel) engine was run on jatropha biodiesel and diesel fuel blends. The engine was directly coupled to a hydraulic dynamometer whose load was varied by adjusting load wheel on the top of the engine. The test results were recorded for pure diesel, pure biodiesel (B100) and different diesel/biodiesel blends. The performance characteristics shows that brake specific fuel consumption (BSFC) decreases rapidly with increase of load up to 4.0 to 4.5 kW (55% to 62% of full load) and then decreases slowly. This result also indicates that BSFC increases when the percentage of biodiesel in the blends is increased. Brake thermal efficiency also increases from high biodiesel blends to pure diesel fuel. Each fuel curve shows maximum efficiency reaches at the load range of 5.0 to 5.5 kW (68% to 75% of full load). Pure diesel has maximum efficiency 29.6%, where as pure biodiesel has maximum efficiency of 21.2%. The exhaust gas temperature increases with the load for all fuel blends. Pure biodiesel gives higher exhaust temperature (320°C) than pure diesel (260°C). The exhaust gas temperature increases with the higher percentage of biodiesel blends in different fuel blends. The probable reason for that is biodiesel contains oxygen atoms which make the combustion process complete and hence more energy is released. In respect of emission characteristics, carbon mono-oxide (CO) and hydrocarbon emissions are improved with the addition of biodiesel to diesel. But these emissions increase with the increase of load for all fuel blends. NOx emission increases with load as well as percentage of blending of biodiesel in the diesel fuel.Copyright © 2009 by ASME

Proceedings ArticleDOI
01 Jan 2009
TL;DR: In this paper, the exact solution of linear fractional relaxation-oscillation equation is obtained by the decomposition method of Adomian and also by He's variational method for fractional order α, for 1 < α ≤ 2.
Abstract: Exact solution of linear fractional relaxation-oscillation equation is obtained by the decomposition method of Adomian and also by He’s variational method for fractional order α, for 1 < α ≤ 2. Surface plots of the above solution are drawn for different values of fractional order α and time t. Amplitude of the oscillation increases with α but it decreases as time increases.© 2009 ASME

Proceedings ArticleDOI
28 Dec 2009
TL;DR: An algorithm for exhaustive search of GIS Mobile query (point-in-area function) finds the status of a given coordinate point with respect to an area using a set of coordinates without any geometric relationship.
Abstract: In this paper we propose an algorithm for exhaustive search of GIS Mobile query (point-in-area function). This algorithm search the status of a given coordinate point with respect to an area (described as a set of coordinates without any geometric relationship). In the exhaustive search algorithm proposed previously, there were a number of undetermined points (which does not support the range of scale), which are close to boundary co-ordinates. But in this paper a better approach is introduced by which much accurate result can be obtained.