4,753 research outputs found

    Image restoration using regularized inverse filtering and adaptive threshold wavelet denoising

    Get PDF
    Although the Wiener filtering is the optimal tradeoff of inverse filtering and noise smoothing, in the case when the blurring filter is singular, the Wiener filtering actually amplify the noise. This suggests that a denoising step is needed to remove the amplified noise .Wavelet-based denoising scheme provides a natural technique for this purpose .<br />In this paper a new image restoration scheme is proposed, the scheme contains two separate steps : Fourier-domain inverse filtering and wavelet-domain image denoising. The first stage is Wiener filtering of the input image , the filtered image is inputted to adaptive threshold wavelet denoising stage . The choice of the threshold estimation is carried out by analyzing the statistical parameters of the wavelet sub band coefficients like standard deviation, arithmetic mean and geometrical mean . The noisy image is first decomposed into many levels to obtain different frequency bands. Then soft thresholding method is used to remove the noisy coefficients, by fixing the optimum thresholding value by this method .Experimental results on test image by using this method show that this method yields significantly superior image quality and better Peak Signal to Noise Ratio (PSNR). Here, to prove the efficiency of this method in image restoration , we have compared this with various restoration methods like Wiener filter alone and inverse filter

    Compact Marx Generator using Cockroft-Walton Voltage Multipier Circuit

    Get PDF
    This paper reports a high voltage impulse generators. Generation of variable outputs impulse generator can be designed by combination of Cockcroft Walton voltage multiplier and Marx generator which can produce different high voltages. It is a portable device for field. The Marx generator is the simplest and most widely used high voltage pulse generation device. In order that equipment designed to be used on high voltage lines, and others, be able to withstand surges caused in them during operation, it is necessary to test these equipment with voltages of the form likely to be met in service. The apparatus which produces the required voltages is the impulse generator. In high voltage engineering, an impulse voltage is normally a unidirectional voltage which rises quickly without appreciable oscillations, to a peak value and then falls less rapidly to zero. A full impulse wave is one which develops its complete waveshape without flashover or puncture, whereas a chopped wave is one in which flash-over occurs causing the voltage to fall extremely rapidly. The rapid fall may have a very severe effect on power system equipment. The lightning waveform, is a unidirectional impulse of nearly double exponential in shape. That is, it can be represented by the difference of two equal magnitude exponentially decaying waveforms. In generating such waveforms experimentally, small oscillations are tolerated

    Determinants of Undernutrition among Children under Age 5 in the Puntland State of Somalia

    Get PDF
    The purpose of this study was to investigate the determinants of nutritional status among children under age 5 (0-59 months) in Puntland. Undernutrition is a global challenge, it does not only adversely affect short‐ and long‐term health and economic well‐being of children but it is also a leading contributor to death and disability globally. Undernutrition short-term effects include mortality and morbidity where long-term effects are that the children do not reach their full developmental potential and would have poor cognitive performance, which in turn has consequences on the country’s economic productivity. Nutritional status of the Somali children in Puntland is relatively poor due to many reasons such as low economic conditions of Somali households, lack of food security and severe drought that has affected the country in recent years and among other factors. This study used data from the Puntland Health and Demographic Survey 2020 which was conducted by the Department of Statistics at Puntland Ministry of Planning, Economic Development, and International Cooperation with technical support from UNFPA Somalia. The analysis used stunting, wasting, and underweight as dependent variables, while the independent variables were children, maternal, and household characteristics. Bivariate and multivariate Logistic regression models were performed to analyze the determinants of nutritional status among the children. The study showed a significant association between children’s nutritional status and most of the explanatory variables under study. Place of residence, gender of household head, wealth index, source of drinking water, source of energy for cooking, toilet facility, mother’s age, marital status, education, breastfeeding, ANC visits, BMI, work status, child’s sex, child’s age, birth order and size at birth have significant associations with children’s nutrition status. The study found that most variables in child, maternal, and household characteristics were significantly associated with stunting and wasting among children under age five.&nbsp; Based on these findings, the research recommends that a multi-sectoral approach is needed to address undernutrition in Puntland state. Combined nutrition programmes from different sectors in line with National Development Plans (NDP) need to be designed to address the underlying causes of acute and chronic malnutrition

    Assessing Question Formation in University Students of English Written Performance: An Evaluative Study

    Get PDF
    This work is a testing of writing execution formative assessment. A couple thinks about show firm confirmation that innovations planned to inspire the customer feedback that understudies get about their writing yield impressive learning grabs. The impression of understudies and their function in self-evaluation are viewed as close to an examination of' the strategies employed by teachers and the formative techniques combined in such systemic philosophies as writing. There takes after a more point by point and theoretical testing of the method for feedback, which renders a reason to a discourse of the headway of speculative models for formative evaluation and of the prospects for the change of pattern

    AWARENESS AND USAGE OF SWAYAM COURSES AMONG LIBRARY AND INFORMATION SCIENCE STUDENTS: A SURVEY

    Get PDF
    The Government of India initiated SWAYAM (Study Webs of Active-learning for Young Aspiring Minds), where the objective of the programme is to take the best teaching and learning resources to all with no costs. To find out the awareness and usage of SWAYAM courses among Library and Information science students, survey method of research used. To collect data from selective Universities students a structured questionnaire was prepared. The results show that most of the responses received from Annamalai University, majority respondents are aware of SWAYAM course. Respondents are aware of these courses through their teachers. 74.73% of respondents replied that their University providing orientation programme on SWAYAM. Half of the respondents prefer Word file format for submitting their assignment. More than 82% of respondents are spending 1-3 hours for SWAYAM course. Half of the respondents are agreed SWAYAM courses help to gain new knowledge and supports life-long learning. Further, the result reveals that the numbers of students continue their enrolled courses and only less number were discontinued due to some reason

    Predicting Factors Contributing to Road Traffic Accident and Implying Driver’s Driving Behavior in Addis Ababa City,

    Get PDF
    This study tries to uncover which factor could be associated with Addis Ababa City rode traffic accident and implicate drivers driving behaviors based on the data collected from post-accident. Which is the capital city of Ethiopia. The main objective of this research is Appling data mining technique to explore on factors that could associated with drivers related factors with road traffic accident to provide an insight way to reduce road traffic accident. The data was collected from road traffic accident from the real-world data collected at accident time in Addis Ababa City/Ethiopia. Totally 4285 datasets with 20 attributes were used. Which includes relevant attributes contains information about road, driver, vehicles and accident and other related variables. Finally, in the result implies novel association rules were identified, especially the male drivers’ behaviors has indicated associated with speed driving behaviors and this implies need further investigated with behavioral science approach for more specific result

    Open Access E-books in Islam: A Case Study of Directory of Open Access Books

    Get PDF
    The present study aims to explore the currents trends of open access e-books available through the Directory of Open Access Books (DOAB) in the subject field of Islam. The DOAB was selected as a source for data collection during July 2020. The findings reveal that 263 e-books are available on Islam, which contributes only (0.94 percent) of the total share of e-books (27,697) available in DOAB. The results reveal that the maximum number of e-books is available on Religion (111), History (42), Sociology (34), and Political Science (27). The publishing trends show that majority of these e-books were published by Transcript Verlag (28), followed by Pressess de I\u27ifpo (23) and Brill (18), respectively. The licensing authority reveals that the highest number of e-books (105) on Islam is available through Open Education License for Books.The linguistic assessment shows that (44.86 percent) of e-books have been published in the English language followed by French (38.78 percent) and German (12.92 percent), respectively. The majority of these books (28.51 percent) are published before 2000. In contrast, authorship trends reveal that majority of the e-books are by a single author (68.87 percent) followed by two authors (20.53 percent) and three authors (9.50 percent). The maximum number of e-books (24.71 percent) has 201-400 pages while as, (51.33 percent) of e-books do not have page numbering

    A Novel Technique for Cloud Computing Data Security and Public Auditing

    Get PDF
    In prior years, the fast improvement of cloud storage services makes it simpler than at any other time for cloud clients to disseminate information (data) with everyone. To ensure client's trust in the dependability of their public information on the cloud, various strategies have been proposed for information trustworthiness assessing with spotlights on different viable components, secure data destructing, public integrity auditing and so forth.. Since it is not achievable to execute full lifecycle protection security, access control turns into a testing assignment, particularly when we share delicate information on cloud servers. To handle this issue, proposed framework presents a key strategy trait based encryption with time-determined properties (KP-TSABE), another safe information self-destructing framework in distributed computing. Moreover open respectability inspecting frameworks presented for cloud information sharing administrations that check the uprightness of client's delicate information being put away in the cloud. In the KP-TABE plan, each figure content is marked with a period interim while the private key is connected with a period moment. The figure message just is unscrambled if both the time instant is in the permitted time interim and traits which are connected with the figure content guarantee the key's entrance structure. Also, Third Party Auditing (TPA) is acquainted with help clients to assess the danger of their subscribed cloud data administrations. The review result from TPA would likewise be useful for the cloud administration suppliers to upgrade cloud-based administration stage

    Secure Data Sharing with Data Partitioning in Big Data

    Get PDF
    Hadoop is a framework for the transformation analysis of very huge data. This paper presents an distributed approach for data storage with the help of Hadoop distributed file system (HDFS). This scheme overcomes the drawbacks of other data storage scheme, as it stores the data in distributed format. So, there is no chance of any loss of data. HDFS stores the data in the form of replica’s, it is advantageous in case of failure of any node; user is able to easily recover from data loss unlike other storage system, if you loss then you cannot. We have implemented ID-Based Ring Signature Scheme to provide secure data sharing among the network, so that only authorized person have access to the data. System is became more attack prone with the help of Advanced Encryption Standard (AES). Even if attacker is successful in getting source data but it’s unable to decode it
    • 

    corecore