scispace - formally typeset
Search or ask a question

Showing papers by "Narula Institute of Technology published in 2015"


Journal ArticleDOI
TL;DR: In this paper, an approach to resolve the long-drawn problem of numerical instability for evaluating two-electron integrals with an extended basis inside a finite domain is presented, and the present values of electron densities corresponding to the disappearance of different spectral lines obtained within the framework of an ion-sphere potential show excellent agreement with Orion laser experiments in Al plasma and with recent theories.
Abstract: In this work, the controversy between the interpretations of recent measurements on dense aluminum plasma created with the Linac coherent light source (LCLS) x-ray free electron laser (FEL) and the Orion laser has been addressed. In both kinds of experiments, heliumlike and hydrogenlike spectral lines are used for plasma diagnostics. However, there exist no precise theoretical calculations for He-like ions within a dense plasma environment. The strong need for an accurate theoretical estimate for spectral properties of He-like ions in a strongly coupled plasma environment leads us to perform ab initio calculations in the framework of the Rayleigh-Ritz variation principle in Hylleraas coordinates where an ion-sphere potential is used. An approach to resolve the long-drawn problem of numerical instability for evaluating two-electron integrals with an extended basis inside a finite domain is presented here. The present values of electron densities corresponding to the disappearance of different spectral lines obtained within the framework of an ion-sphere potential show excellent agreement with Orion laser experiments in Al plasma and with recent theories. Moreover, this method is extended to predict the critical plasma densities at which the spectral lines of H-like and He-like carbon and argon ions disappear. Incidental degeneracy and level-crossing phenomenamore » are being reported for two-electron ions embedded in strongly coupled plasma. Thermodynamic pressure experienced by the ions in their respective ground states inside the ion spheres is also reported.« less

42 citations


Journal ArticleDOI
TL;DR: In this paper, an analytical model of gate-engineered junctionless surrounding gate MOSFET (JLSRG) has been proposed to uncover its potential benefit to suppress short-channel effects (SCEs).
Abstract: In this work, an analytical model of gate-engineered junctionless surrounding gate MOSFET (JLSRG) has been proposed to uncover its potential benefit to suppress short-channel effects (SCEs). Analytical modelling of centre potential for gate-engineered JLSRG devices has been developed using parabolic approximation method. From the developed centre potential, the parameters like threshold voltage, surface potential, Electric Field, Drain-induced Barrier Lowering (DIBL) and subthershold swing are determined. A nice agreement between the results obtained from the model and TCAD simulation demonstrates the validity and correctness of the model. A comparative study of the efficacy to suppress SCEs for Dual-Material (DM) and Single-Material (SM) junctionless surrounding gate MOSFET of the same dimensions has also been carried out. Result indicates that TM-JLSRG devices offer a noticeable enhancement in the efficacy to suppress SCEs by as compared to SM-JLSRG and DM-JLSRG device structures. The effect of different length ratios of three channel regions related to three different gate materials of TM-JLSRG structure on the SCEs have also been discussed. As a result, we demonstrate that TM-JLSRG device can be considered as a competitive contender to the deep-submicron mainstream MOSFETs for low-power VLSI applications.

34 citations


Proceedings ArticleDOI
09 Jul 2015
TL;DR: The result is compared with Differential Evolution algorithm and it is evident from the comparison that DE finds better solution and takes much lesser number of evaluations to find optimum solution.
Abstract: In this paper, we optimize probability of detection and probability of false alarm in cognitive radio network to minimize probability of error of a particular SU in a centralized cognitive radio network using Genetic algorithm (GA). Our objective is to minimize probability of error and find out optimum values of probability of occupancy detection or probability of detection and probability of false alarm. We use Genetic Algorithm to solve this optimization problem. The result is compared with Differential Evolution algorithm and it is evident from the comparison that DE finds better solution and takes much lesser number of evaluations to find optimum solution.

22 citations


Journal ArticleDOI
TL;DR: In this article, the authors presented an enzymatic preparation of wax esters in presence of immobilized lipases from different microbial origin e.g., RM-IM, TL IM, NS40013 and NS 435.

19 citations


Journal ArticleDOI
TL;DR: In this article, a novel application of graph theory, supported by Kruskal's maximal spanning tree algorithm, is proposed to search for the optimal network topology and to optimally convert an interconnected meshed network into a radial system to achieve best operati...
Abstract: —Alteration of power network topology is often required to meet important objectives, such as restoring connectivity, minimizing power losses, maintaining stability, maximizing power transfer capability etc., and is achieved by switching of circuit breakers and other switching devices in the power network. Primary power distribution networks are often interconnected and meshed but should be transformed to radial topology to achieve various operational advantages. Distribution networks also need to be reconfigured after faults to restore power at all the load points. Reconfiguring a power network, however, is a complicated multi-constrained optimization problem, as there may exist many feasible switching combinations in a large power network. This article proposes a novel application of graph theory, supported by Kruskal's maximal spanning tree algorithm, to search for the optimal network topology and to optimally convert an interconnected meshed network into a radial system to achieve best operati...

13 citations


Proceedings ArticleDOI
20 Apr 2015
TL;DR: Inspired by Ant colony based route selection algorithm, a volunteer-concentration based adaptive mobility of the observers is implemented and some improvement on the reputation collection mechanism is suggested so that global reputation matrix can be generated quickly in a sparse network.
Abstract: Researchers have proposed to use smart-phone based opportunistic networks for post-disaster communication where the smart-phones carried by the volunteers (also known as, nodes) are used to exchange the situational information from different corners of the disaster affected areas. In such scenario, some malicious nodes may try to intercept and manipulate the sensitive situational data with the intention of corruption and fraud. One way of preventing such corruption is to detect the malicious nodes based on their reputation and avoid them during data forwarding. In our earlier work [1], we proposed a dynamic reputation estimation technique where a group of trusted, independent, roving observer were assigned to specific affected zones. They randomly monitor, estimate the behavior of nodes in terms of their cooperation pattern as well as group-biasness and periodically publish a global node reputation matrix to help other nodes in selecting a suitable unselfish, unbiased and cooperative forwarder. In this paper, we suggested some improvement on the reputation collection mechanism proposed in our earlier work so that global reputation matrix can be generated quickly in a sparse network. In a post-disaster scenario, volunteers normally work around shelters; As a result, volunteers are found to be sparsely spread across the entire affected area. Observers, being unaware of the locations of volunteers or shelters, move around randomly within their designated zones to collect reputation of volunteers. Thus, the time taken to collect the reputation of all nodes in a specific zone is found to be quite large. Our objective, in this paper, is to adapt the mobility of an observer towards the more volunteer-rich areas in that zone so that maximum volunteers can be met in minimum time and the reputations may be collected quickly. Inspired by Ant colony based route selection algorithm we have implemented volunteer-concentration based adaptive mobility of the observers. The performance of the proposed scheme is evaluated using ONE simulator [13].

12 citations


Proceedings ArticleDOI
01 Nov 2015
TL;DR: A dynamic two hops reputation technique for detection and avoidance of selfish nodes where neighbor nodes will monitor the behavior of a particular node as forwarder and receiver is proposed.
Abstract: In recent years Delay/Disruption Tolerant Network (DTN) has been identified as the most promising and challenging areas of wireless communication where sparseness and delay are particularly high. It is emerging as a promising network in the areas of disaster response, inter-planetary, vehicular, military/tactical, underwater, satellite networks. DTN is characterized by the large communication latency and lack of end to end path from source to destination. Due to intermittent connectivity in DTN, data forwarding is possible using multiple hops in "store-carry-forward" manner. So, the entire data communication is solely dependent on the cooperation of the intermediate nodes or hops. However, these intermediate nodes sometimes may become selfish due to preserve its limited resources or due to some malicious intention [1][2]. In order to increase data delivery, the detection and avoidance of such selfish nodes are foremost required. Here we are using reputation based strategy where reputation can be used as a measure to detect the cooperation pattern of a node with other nodes in the network during data communication. In this paper, we propose a dynamic two hops reputation technique for detection and avoidance of selfish nodes where neighbor nodes will monitor the behavior of a particular node as forwarder and receiver. These one hop and two hops neighbor nodes will give their feedback after data communication takes place at certain interval. However, the universal reputation matrix will be published time to time based on the cooperation pattern of nodes by the Trusted Authority (TA). The performance of the proposed scheme was evaluated on ONE simulator [3].

10 citations


Proceedings ArticleDOI
01 Nov 2015
TL;DR: In this article, the authors proposed a sequential combined mean-median filter (SCMMF) based on combination of arithmetic mean and median technique to remove salt and pepper noise.
Abstract: Salt and pepper noise removal is extremely challenging task when the noise density is very high in the corrupted image Usually the existing filters are not capable of removing this noise above 70% density This paper proposes a Sequentially Combined Mean-Median Filter (SCMMF) based on combination of arithmetic mean and median technique A binary flag image is generated with the help of identified noisy pixels which are first replaced by a value calculated by plus (+) operation with nearest pixels intensities The remaining noisy pixels are then replaced by neighbourhood mean operations Finally the image quality is enhanced by the median of the corresponding window Border operation is also incorporated to preserve the image size Experimental results show that SCMMF is outstanding from visual qualitative judgments for a number of standard images Moreover, this combined filter outperform over the existing with respect to MSE, PSNR, and SSIM comparison even at 92% noise density level

10 citations


Book ChapterDOI
01 Jan 2015
TL;DR: This paper proposes a reputation-based strategy to detect non-cooperative or selfish nodes and to select proper forwarder node for improving overall packet delivery of the network and ensures data integrity.
Abstract: A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that form a dynamic network without the need for any infrastructure. Due to the dynamic nature of MANET, it is prone to different kinds of malicious attacks. In order to pursue secure communication in such networks, there are many research solutions proposed for detecting and avoiding such malicious activities. As we know, MANET works properly if participating nodes cooperate in routing and forwarding. However, a node may decide not to cooperate just to save its resources but still use network to relay its traffic. In this scenario, we propose a reputation-based strategy to detect non-cooperative or selfish nodes and to select proper forwarder node for improving overall packet delivery of the network. Moreover, our proposed solution ensures data integrity. We have also done survey and performance analysis on some existing malicious attacks detection and prevention techniques available. The entire simulation has been done using the Network Simulator (NS-2) (http://www.isi.edu/nsnam/ns/) and simulation results show better delivery compared to some of other existing techniques discussed in the papers by Khamayseh et al. (J Netw 7(1):116–125, 2012), Marti et al. (Proceedings of International Conference on Mobile Computing and Networking (MOBICOM’OO), 255–265, 2000), Woungang et al. (Proceedings of IEEE Conference, 2012) and Hu et al. (IEEE J Sel Areas Commun 24(2):307–380, 2006).

9 citations


Journal ArticleDOI
TL;DR: In this paper, the analytical form of the electrostatic potential felt by a slowly moving test charge in quantum plasma is developed, which is composed of two parts: the Debye-Huckel screening term and the near-field wake potential.
Abstract: The analytic form of the electrostatic potential felt by a slowly moving test charge in quantum plasma is developed. It has been shown that the electrostatic potential is composed of two parts: the Debye-Huckel screening term and the near-field wake potential. The latter depends on the velocity of the test charge as well as on the number density of the plasma electrons. Rayleigh-Ritz variational calculation has been done to estimate precise energy eigenvalues of hydrogen-like carbon ion under such plasma environment. A detailed analysis shows that the energy levels gradually move to the continuum with increasing plasma electron density while the level crossing phenomenon has been observed with the variation of ion velocity.

8 citations


Proceedings ArticleDOI
02 Apr 2015
TL;DR: In this paper, the effect of music on human body and mind was studied and it was shown that this particular type of music gives a complete different physiology, which can possibly be used as a tool to deal with different medical problems such as stress management or hypertension.
Abstract: In this article, we study the effect of music on human body and mind. As a parameter for measurement of the physiological condition we choose the heart rate variability signals taken from subjects listening to a particular type of music, which is Rabindra Sangeet (love chapter) in our case. The subjects are allowed to listen to the music for a fixed time span and then we take easements of HRV signals with our own ECG machine. For data analysis the Poincare plot in spherical coordinate is used. Each of the plots obtained from second order differences form a single cluster looking almost like an ellipse having some outliers. We observe that the volume of the cluster is reduced remarkably in the data of the on music state as compared to the data of pre music state; further the amount of reduction is not the same for all the subjects. This proves that music has some definite common effect on human physiology. Our study shows that this particular type of music gives a complete different physiology. This can possibly be used as a tool to deal with different medical problems such as stress management or hypertension.

Book ChapterDOI
01 Jan 2015
TL;DR: This paper attempted to improve the efficiency of cognitive radio by performing adaptive noise cancellation and adaptive threshold in the energy detector.
Abstract: Over the years the usage of wireless communication systems has increased rapidly leading to scarcity of bandwidth. Hence the concept of utilizing the existing system to its fullest has become very important. Cognitive radio is a technique based on this concept which identifies the unutilized white spaces in the spectrum, and are allotted to the secondary user in a non-interfering manner. The energy detection technique does not work at low SNR. In this paper we attempted to improve the efficiency by performing adaptive noise cancellation and adaptive threshold in the energy detector.

Journal ArticleDOI
TL;DR: In this article, precise energy eigenvalues of bound 1sns (1Se) [n = 1-6] states and the resonance parameters i.e. positions and widths of 1Se states due to 2sns[n = 2-5] and 2pnp[n=2-5], configuration of confined helium below N = 2 ionization threshold of He+ have been estimated.
Abstract: Bound and resonance states of helium atom have been investigated inside a quantum dot by using explicitly correlated Hylleraas type basis set within the framework of stabilization method. To be specific, precise energy eigenvalues of bound 1sns (1Se) [n = 1-6] states and the resonance parameters i.e. positions and widths of 1Se states due to 2sns [n = 2-5] and 2pnp [n = 2-5] configuration of confined helium below N = 2 ionization threshold of He+ have been estimated. The two-parameter (Depth and Width) finite oscillator potential is used to represent the confining potential representing the quantum dot. It has been explicitly demonstrated that electronic structure properties become a sensitive function of the dot size. It is observed from the calculations of ionization potential that the stability of an impurity ion within quantum dot may be manipulated by varying the confinement parameters. A possibility of controlling the autoionization lifetime of doubly excited states of two-electron ions by tuning the width of the quantum cavity is also discussed here.

Book ChapterDOI
01 Jan 2015
TL;DR: A new way of representation of dinucleotides is introduced by two-dimensional coordinates (x, y) in the Euclidean plane and the similarity/dissimilarity matrix obtained under above two measures is compared by the method of correlation coefficient.
Abstract: In this paper, we have introduced a new way of representation of dinucleotides. They are directly represented by two-dimensional coordinates (x, y) in the Euclidean plane. By writing \(z=x\times y\), ultimately the representation is given by three-dimensional coordinates (x, y, z). Based on the variances of cumulative values \( x ' ,y ' ,z ' \) of x, y, and z respectively, a measure is determined to compare coding sequences of β-globin genes of 11 species. We have also used another measure for similar comparison of sequences. This is based on the probability distribution of dinucleotides occurring in the sequence. Finally, we have compared the similarity/dissimilarity matrix obtained under above two measures by the method of correlation coefficient.

Book ChapterDOI
01 Jan 2015
TL;DR: A ANN based technique for the design of Fuzzy Membership Function (FMF) of FHR is presented and used in FuzzY Unordered Rule Induction Algorithm (FURIA) in order to classify the CTG, showing significant improvement in classification over non FMF based technique.
Abstract: The Cardiotocograph (CTG) is being used by the obstetricians since 1960s as a means for recording (graphy) the heart beat (cardio) and the uterine contraction pressure (toco) of the mother, to evaluate the well being of the fetus. One of the major features of fetal heart rate (FHR) is its baseline,the accurate classification which is of utmost importance as all the other parameters of CTG rely on it. Inherent vagueness in the assessment given by the physicians can probably be modeled using fuzzy logic. It is one of the most trusted tools to handle uncertainty intrinsically present in the linguistic expression of human. The main challenge in designing a fuzzy logic based system is to design its membership function. In this paper we have presented a ANN based technique for the design of Fuzzy Membership Function (FMF) of FHR and used it in Fuzzy Unordered Rule Induction Algorithm (FURIA) in order to classify the CTG. The results obtained show significant improvement in classification over non FMF based technique.

Book ChapterDOI
01 Jan 2015
TL;DR: This is the novel approach that the authors have proposed for compression of image using compression ratio (CR) without losing the PSNR, quality ofimage using lesser bandwidth.
Abstract: Image compression is a very important useful technique for efficient transmission as well as storage of images. The demand for communication of multimedia data through the telecommunication network and accessing the multimedia data through internet by utilizing less bandwidth for communication is growing explosively. Basically the image data comprise of significant portion of multimedia data and they occupy maximum portion of communication bandwidth for multimedia communication. Therefore the development of efficient image compression technique is quite necessary. The 2D Haar wavelet transform along with Hard Thresholding and Run Length Encoding is one of the efficient proposed image compression technique. JPEG2000 is a standard image compression method capable of producing very high quality compressed images. Conventional Run Length Encoding(CRLE),Optimized Run Length Encoding(ORLE),Enhanced Run Length Encoding(ERLE) are different types of RLES applied on both proposed method of compression and JPEG2000. Conventional Run Length Encoding produces efficient result for proposed method whereas Enhanced Run Length Encoding produces efficient result in JPEG2000 compression. This is the novel approach that the authors have proposed for compression of image using compression ratio (CR) without losing the PSNR, quality of image using lesser bandwidth.


Proceedings ArticleDOI
01 Feb 2015
TL;DR: The proposed algorithm can not only be used to easily estimate the baseline using overlapping window but can also be adopted in an automated system for the interpretation of CTG.
Abstract: One of the major features of fetal heart rate (FHR) is its baseline, the accurate classification of which is of utmost importance as all the other parameters of cardiotography (CTG) rely on it. Though guidelines for interpretation had been put forward by different organizations, they not only lack uniformity, but also are not definite, hence, difficult to implement in automated systems. We aim to propose a standardized baseline estimation algorithm addressing these issues. Baseline was calculated within continuous sliding window of duration 10 minutes and varying slide-lengths. The best slide-length is chosen and the corresponding baseline value is compared with the one obtained with discreet window as suggested by NICHD [1] and the estimate given by three experienced physicians. The results are analyzed using standard statistical methods such as confidence level, error margin, standard error etc. at a Confidence Level of 95%. The results of the algorithm and mathematical calculations incorporated in this work is found encouraging. Thus the proposed algorithm can not only be used to easily estimate the baseline using overlapping window but can also be adopted in an automated system for the interpretation of CTG.

Proceedings ArticleDOI
01 Jan 2015
TL;DR: In this article, the authors determine proper algorithm of the Phasor Measuring Unit and detection of fault within a specified time when disturbance occurs in the system, and the signal is reconstructed at time domain of fundamental frequency tone and dynamic phasors of the system.
Abstract: In order to prevent large scale cascading failure, continuous measuring and monitoring of the system in real time is necessary for secure and reliable operation of the interconnected Power Grid system. The actual analog signal has to be sampled to establish the fundamental frequency within a specific frequency zone. With the help of that frequency, the signal is reconstructed at time domain of fundamental frequency tone and dynamic phasors of the system are estimated by using Phasor Measuring Unit. The objective of this paper is to determine proper algorithm of the Phasor Measuring Unit and detection of fault within a specified time when disturbance occurs in the system.

Proceedings ArticleDOI
01 Nov 2015
TL;DR: Variability of baseline has been calculated and the results obtained were found to be comparable with clinician's observation and can be incorporated into CTG machine for self interpretation if the results in a larger study are found satisfactory.
Abstract: Cardiotocograph is a non-invasive technique whereby fetal heart rate and uterine pressure against time is recorded. While the usefulness of this procedure is beyond question, the specificity and predictive accuracy has of late been subject to a lot of controversy. The main reason for its poor specificity has arisen due to dichotomy of opinion when examined by different clinicians. The issue has further been complicated due to different guidelines developed by various obstetrician bodies. Baseline and variability are two main components of a trace upon which a wholesome impression about the fetus is made by visual inspection. An automated interpretation system is needed to decipher the early signs of fetal hypoxia thus avoiding further compromise. Our objective is to develop a reliable algorithm to calculate variability in the light of NICHD guidelines. Variability of baseline has been calculated in 3 consecutive windows of 10 min each. For validation, results the variability of baseline have been compared with observations made by 3 clinicians. Various statistical methods such as confidence interval, paired sample t-test and Bland-Altman approach were used to measure the accuracy of the result. The results obtained were found to be comparable with clinician's observation. So, it can be incorporated into CTG machine for self interpretation if the results in a larger study are found satisfactory.

Journal ArticleDOI
TL;DR: Satisfactory experimental verifications on electronic tunability of some wave shaping applications by the integrator and a double-integrator feedback loop (DIFL) based sinusoid oscillator with linear variation range of 60 KHz~1.8 MHz at low THD of 2.1% are verified.
Abstract: A new electronically tunable differential integrator (ETDI) and its extension to voltage controlled quadrature oscillator (VCQO) design with linear tuning law are proposed; the active building block is a composite current feedback amplifier with recent multiplication mode current conveyor (MMCC) element. Recently utilization of two different kinds of active devices to form a composite building block is being considered since it yields a superior functional element suitable for improved quality circuit design. The integrator time constant and the oscillation frequency are tunable by the control voltage of the MMCC block. Analysis indicates negligible phase error for the integrator and low active -sensitivity relative to the device parasitic capacitances. Satisfactory experimental verifications on electronic tunability of some wave shaping applications by the integrator and a double-integrator feedback loop (DIFL) based sinusoid oscillator with linear variation range of 60 KHz~1.8 MHz at low THD of 2.1% are verified by both simulation and hardware tests.

Book ChapterDOI
24 Sep 2015
TL;DR: The proposed algorithm detects double faults anywhere in the chip satisfying the dynamic fluidic constraints and improves the fault diagnosis time to an extent.
Abstract: This paper presents a rigorous offline double fault diagnosis as well as a detection technique for Digital Microfluidic Biochips (DMFBs). Due to the underlying mixed technology biochips exhibit unique failure mechanisms and defects. Thus, offline and online test mechanisms are required to certify the dependability of the system. In this paper, the proposed algorithm detects double faults anywhere in the chip satisfying the dynamic fluidic constraints and improves the fault diagnosis time to an extent.

Proceedings ArticleDOI
09 Jul 2015
TL;DR: The tree merging algorithm has been shown to be suitable for applying to news report documents or econometric information and is applied together with existing approaches for limiting pruning and access costs for reducing misclassification error.
Abstract: A tree model is constructed for the econometric problem domain and for topic modeling of news reports using a clustering approach. Here segments are represented as discretized intervals defined on econometric variables for speeding up the construction of regression tree. This discretization is achieved from variances defined on variables with predictability for that generated for calculating category utility values defined on correlated variables where the discretization method proposed has the aim to satisfy a constraint of minimum entropy distribution of values of the predictor variable among the categories. An algorithm is proposed for tree merging which is used for incrementally incorporating information for new time intervals with the existing model to generate updated tree model for maintaining logical consistency. The tree merging algorithm has been shown to be suitable for applying to news report documents or econometric information. This is accomplished with a proposed Pruning procedure for maintaining logical consistency in the merged tree which is applied together with existing approaches for limiting pruning and access costs for reducing misclassification error.

Book ChapterDOI
01 Jan 2015
TL;DR: A slightly new concept inspired by real-life application is designed in the paper showing the positive aspect of the involved nodes in the network.
Abstract: Due to lack of features of traditional network characteristics, DTN becomes one of the promising research paradigms of wireless network. As there are intermittent connectivity and store-carry-forward features, end-to-end acknowledgement is not possible. DTN is also named as ‘opportunistic network’. But interestingly, intermediate nodes may always not behave fairly. Sometimes, due to limited resources (bandwidth and memory) intermediate nodes may behave ‘selfish’. Intermediate nodes may also behave unfairly to next hop node intentionally. This behaviour is known as ‘misbehaving behaviour’. Recent studies on ‘selfish node’ and ‘misbehaving node’ show us the negative impact on network performance (delivery ratio, delivery cost, delivery latency). So we design a slightly new concept inspired by real-life application in our paper showing the positive aspect of the involved nodes in the network. Apart from participating in data forwarding, node may behave as ‘traffic node’ trying to show the right path towards destination.

Book ChapterDOI
01 Jan 2015
TL;DR: A comparative analysis is implemented on the Cuckoo Search algorithm with using five standard benchmark functions and experiment results can be used for better performances on optimization.
Abstract: Cuckoo Search (CS), has been developed by Yang and Deb [1] is one of the newly added bio inspired algorithm which is mostly used to solve optimization problems. This is based on metaheuristic search algorithm. Cuckoo Search is named as its principle is based on reproduction strategy of Cuckoo bird. In this paper a comparative analysis is implemented on the algorithm with using five standard benchmark functions and experiment results can be used for better performances on optimization.

Book ChapterDOI
01 Jan 2015
TL;DR: In this paper, noise is added randomly to the image to get back the information of the processed image which has been distorted and the effect of those parameters over an image is studied.
Abstract: Enhancement is one of the challenging factors in image processing. The objective of enhancement is to improve the structural appearance of an image without any degradation in the input image. The enhancement techniques make the identification of key features easier by removing noise. One of the methods to enhance an image is the stochastic resonance (SR). In SR, noise is added randomly to the image to get back the information of the processed image which has been distorted. But the parameter choice of SR is too difficult to realize. In our paper we study the effect of those parameters over an image.

Book ChapterDOI
01 Jan 2015
TL;DR: The aim of this paper is to design a multiplier circuit based on Vedic sutras and method for DSP operations based on ancient Vedic mathematics is contemplated.
Abstract: Digital signal processing (DSP) operations are very important part of engineering as well as medical discipline. Designing of DSP operations have many approaches. For the designing of DSP operations, multiplication plays a important role to perform signal processing operations such as convolution and correlation. The aim of this paper is to design a multiplier circuit based on Vedic sutras and method for DSP operations based on ancient Vedic mathematics is contemplated. In this paper, we have given the design up to multipliers based on Vedic multiplication sutra ‘Urdhva-Tiryakbhyam’ the design of 4 × 4 has been sketched in DSCH2 and all the outputs have been given. The layout of those circuits has also been generated by Microwind. The internal circuit diagram of all the blocks has been explained. The noise power have been calculated by T-Spice-13 in 45 nm Technology. This algorithm is implemented in MATLAB and also compared with the inbuilt functions in MATLAB.

Book ChapterDOI
01 Jan 2015
TL;DR: The proposed smart phone-based ad hoc opportunistic network can be built to rescue people from different affected areas and some authorized carrier nodes can be allocated to deliver messages and shared group keys can be assigned for encryption-decryption purposes.
Abstract: When a major disaster strikes, large parts of the critical infrastructure can be completely debilitated for weeks. In such situations the principal need is to quickly re-establish minimal communication infrastructures for support of rescue operations. For this purpose smart phone-based ad hoc opportunistic network can be built to rescue people from different affected areas. Relief workers from different agencies divide into small groups based on different categories of needs. In such sensational environments secure and immediate group communication among small groups and to the remote monitoring system is urgent as there can be some malicious nodes that intend to intercept and alter sensitive data for the purpose of corruption. To implement group communication using Delay Tolerant Network (DTN) some authorized carrier nodes can be allocated to deliver messages and shared group keys can be assigned for encryption-decryption purposes. The performance of the proposed scheme is evaluated on ONE simulator (The Opportunistic Network Environment Simulator) version 1.4.1.

Book ChapterDOI
01 Jan 2015
TL;DR: In this article, an improved technique called 3D Poincare plot with proper delay has been applied to properly distinguish the pre-music and on-music state of some normal healthy subjects.
Abstract: The two-dimensional (2D) Poincare plot of HRV signal reflects the effect of different external stimuli on ANS. The classification is generally done by fitting an ‘ellipse’ on the dense region of the constructed Poincare plot of HRV signal. However, 2D Poincare plot sometimes fails to describe the proper behaviour of the system. One such example is 2D Poincare plot of HRV signal in pre-music and on-music condition. In fact, 2D Poincare plots in pre and on-music condition look almost similar for few subjects. So a proper classification tool is sought for. In this article, an improved technique called ‘3D Poincare plot with proper delay’ has been applied to properly distinguish the pre-music and on-music state of some normal healthy subjects.

Proceedings ArticleDOI
16 Mar 2015
TL;DR: A data model for the management of information exchanged during trust negotiation, considered to be structured or may be converted to a structured format, and modeled as probabilistic data is proposed.
Abstract: This paper proposes a data model for the management of information exchanged during trust negotiation The information exchanged during trust negotiation has been considered to be structured or may be converted to a structured format Uncertainty associated with such information transfer has been modeled as probabilistic data Updating of message has been explained using a particular application domain Effect of associating uncertainty to individual attributes and computation of overall uncertainty for a record has also been shown