505 research outputs found

    Matlab Code For Identification Of Graphics Objects In Aircraft Displays

    Get PDF
    This paper is aimed at understanding, utilizing and improving the existing system and automating the graphics testing process. The paper involves developing an automation design for automating the graphics testing process involved in software testing of aircraft displays. The paper comes under software development; there are so many steps in software development like Requirement analysis, Design, Implementation, Testing and evolution. So testing is the one of the step which comes under software development. We are designing an automation tool in graphics testing. Graphic testing tests the display devices. The main motivation of this project is to save the time because current approach involves user to read each and every message box which gets popped up while executing script. This approach involves a lot of manual effort and a person has to physically present and do the test execution and also there is possibility of mistakes when a non-trained person working on it. So to make initial test set up as fast as possible, with no errors and with no manual effort we are developing an automation tool. The tool includes techniques of image comparison, optical character recognition and template matching. Our automation should be able to handle all kinds of text and digits. Implementing a design which is able to recognize characters which pops up from window and takes a decision of pass/fail based on the recognized characters, while doing testing automatically, for that we use optical character recognition and template matching is mainly used for object recognition. Image comparison is used to capture an image and do the executions process automatically

    Modelling client puzzles and denial-of-service resistant protocols

    Get PDF
    Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition

    NUCLEOTIDE CYCLASES AND CYCLIC NUCLEOTIDE BINDING PROTEINS IN MYXOCOCCUS XANTHUS.

    Get PDF
    Myxococcus xanthus vegetative cells contained significant amounts of nucleotide cyclase activities and cyclic neucleotide binding proteins. The guanylate cyclase activity was distributed between the 100,000g supernatant and pellet fractions, required divalent cation and exhibited an apparent K(,m) of 1.0mM. Adenylate cyclase activity was detected both in the 100,000g supernatant and pellet. The supernatant enzyme had an apparent K(,m) of 220(mu)M with a Hill coefficient of 1.9, whereas that of pellet fraction had an apparent K(,m) of 72(mu)M and a Hill coefficient of 1.0. The enzymes differed in their pH optima and divalent cation requirements. Three binding activities, one specific for guanosine 3\u27,5\u27-monophosphate (cGMP) and two specific for adenosine 3\u27,5\u27-monophosphate (cAMP) have been partially purified. The cylic GMP binding activity exhibited high specificity and affinity towards cGMP with a K(,D) of 42nM. Scatchard analysis of the data indicated a single class or binding sites. The two cAMP binding activities were physically distinct as indicated by their cellular locations and dissociation constants. The cytoplasmic binding protein exhibited a K(,D) of 57nM whereas that of the periplasm had a lower affinity with a K(,D) of (mu)M. During development, the nucleotide cyclases and cyclic nucleotide binding proteins exhibited changes in activities that are consistent with the previous proposal for the involvement of cyclic nucleotides in development (McCurdy, Ho and Dobson, 1978).Dept. of Biological Sciences. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis1982 .D495. Source: Dissertation Abstracts International, Volume: 43-07, Section: B, page: 2186. Thesis (Ph.D.)--University of Windsor (Canada), 1982

    SMS based Home Automation using CAN Protocol

    Get PDF
    In this paper a SMS Based Home Automation System using CAN Protocol is presented. To save the much of the electrical energy, implemented this design. By sitting at the same he/ she can control the lights and other devices without putting much effort. The concept is implemented by making use CAN protocol, LPC 2129 etc. The experimental results show that this network system has high safety, stability with practical significance, market value and it is affordable to a common people

    SNEDDS AS LIPID-BASED NANOCARRIER SYSTEMS: CONCEPTS AND FORMULATION INSIGHTS

    Get PDF
    Approximately 40 % of newly discovered chemical entities have low solubility and possess low bioavailability after oral administration. Lipid-based drug delivery systems (LBDDS) have recently become very popular because of their remarkable ability to deliver drugs with poor absorption using lipids as carriers. Self-emulsifying drug delivery (SEDDS) systems are one type of LBDDS employed for the incorporation of hydrophobic drugs. SEDDS are classified into self-micro emulsifying drug delivery systems (SMEDDS) and self-nano emulsifying drug delivery systems (SNEDDS) based on the droplet size of the dispersed phase. The present review focus on the mechanism of drug absorption from lipid-based nanocarriers systems, in vitro assessment of self-emulsification, insights of SNEDDS, factors affecting the formulation of SNEDDS, and its applications

    A Survey on Confidentiality and Authentication in Content Based Publish/Subscribe System

    Get PDF
    The basic security mechanism such as authentication and confidentiality is highly challenging in a content based publish/subscribe system. Authentication of publisher and subscribers is difficult to achieve due to loose coupling of publisher and subscriber. The authentication and confidentiality of publisher and subscribers of events ensured by adapting the pairing based cryptography mechanism. Furthermore, an algorithm to cluster subscriber according to their subscriptions preserves a weak notion of subscription confidentiality. DOI: 10.17762/ijritcc2321-8169.150519

    Real Time Tele Health Monitoring System

    Get PDF
    Now a day’s providing healthcare to people anywhere in the world is not economical and patient should visit the doctor to take up the treatment, which is a difficult task in many situations. So the developed model will integrate the patients' medical records with their daily measurements of physiological parameters (including the last checkup records) by making use of ARM processor and RS 232 etc. This can be used as a diagnosis reference for physicians, reducing the time required to modify prescriptions and enabling the nursing staff to fully understand the patients' physiological conditions. By using video conferencing, healthcare practitioners and patients can reduce the costs associated with regular office visits. To provide remote patient monitoring in which electronic devices will transmit patient health information to doctor’s computer and android mobile, enabling them to monitor the patient's condition without being physically present near to the patient's bed

    SPACE VECTOR BASED THREE PHASE GRID CONNECTED PHOTOVOLTAIC SYSTEM

    Get PDF
    Solar energy has become a very potential new energy; Connected directly with grid-connected photovoltaic (PV) systems does not require bulk and lossy battery. Distributed generation and on-site supply of PV system reduces losses of transmission and distribution, and mitigates environment pollution. This paper establishes a Dynamic model of grid-connected PV system by Matlab/Simulink with d-and q-axis as coordinates which is synchronously rotating with the grid voltage to reflect the characteristics of the system accurately. Based on the accurate modeling system, optimum control and fault analysis are studied. The simulation and analysis verify the effectiveness of the proposed algorithm, and demonstrate that the proposed control system has good static performance

    Development and evaluation of RTE (Ready To Eat) extruded snack using egg albumin powder and cheese powder

    Get PDF
    Extruded snacks were prepared from flour blends made with corn flour, rice flour and egg albumin powder / Cheese powder in a proportion of 35-50 : 35-50 : 5-30 respectively, and moisture was adjusted to 17-20.  Different formulations were extruded at 80 ± 5℃ (heater I) and 75-105℃ (heater II) temperature, 300-350 r m-1 screw speed, 100 ± 10℃ die temperature,  3 mm exit diameter of circular die and 15 ± 2 kg h-1 feed rate.  Sensory acceptability, physical parameters and nutrient analysis along with storage stability of the products was conducted.  The protein content of the RTE extruded snack improved by 20% to 50% in experimental samples prepared using egg albumin powder and cheese powder.  The physical parameters showed improved expansion ratio compared to control samples with good sensory properties.  Storage studies showed increase in moisture content in the extrudates on storage which can be improved using packaging materials with better barrier properties.  The use of egg albumin powder / cheese powder in an RTE snack product could make a great contribution to food security in developing countries. Keywords: Egg albumin powder, Cheese powder, Extrusion, RTE extruded snack&nbsp

    Surgical site infections post cesarean section

    Get PDF
    Background: Surgical site infections are among the most common hospital acquired infections. They make upto 14-16% of inpatient infections. Objective of present study was to evaluate the risk factors associated with surgical site infections and the bacteria causing wound infections in obstetric operations and the antibiotic sensitivity and resistance pattern of the pathogens isolated.Methods: 100 women with wound infection during hospital stay or within 30 days following surgery. Pus samples were collected from the wound site with help of sterile swabs under aseptic precautions and immediately transported to microbiology laboratory for culture and sensitivity.Results: Most of the patients belonged to the age group of 21-25 years, contributing to 55% of the cases. Majority of the women are from rural areas (71%). 57% of the cases were unbooked. 90% of the SSI were seen in emergency surgeries. Anaemia (48%) was the most common medical risk factor followed by hypertensive disorders 25%. The risk of post operative infection has been shown to be proportional to volume of blood loss during cesarean section and duration of surgery. Staphylococcus aureus to be predominant organism of wound infection of which 21% were MRSA followed by Klebsiella and E.coli. The gram negative isolates were 100% resistant to ampicillin followed by 22.5% to third generation cephalosporins and aminoglycosides.Conclusions: Proper assessment of risk factors that predispose to SSI is critical for the development of strategies for reducing the incidence of SSI and for identifying high risk patients requiring intensive postoperative surveillance.
    • …
    corecore