337 research outputs found

    Denoising of MST RADAR Signal usingCWT and Overlapping Group Shrinkage

    Get PDF
    Existing algorithmsare generally denouncing the existence of clusters with large amplitude coefficients. The L1 norm as well as other distinct models of sparsity does not attract a cluster tendency (group sparsity). In the light of a minimisation of convex cost work fusing the blended norm, this work introduces the technique "overlapping group shrinking." The groups are completely overlapping in order to abstain from blocking relics. A basic minimization calculation, in light of progressive replacement, is inferred. A straightforward strategy for setting the regularization boundary, in view of constricting the noise to a predefined level, is portrayed in detail by combining OGS with one of the most powerful mathematical tool wavelet transforms. In fact, the CWT coefficients are processed by OGS to produce a noise-free signal. The CWT coefficients are also processed.The proposed approach is represented on MST RADAR signals, the denoised signals delivered by CWT combined with OGS are liberated from noise

    A CRITICAL STUDY ON THE CONCEPT OF WELFARE STATE AND WELFARE SCHEMES

    Get PDF
    The welfare state takes the accountability of security, protection and support of the economic and social well-being of its people. The government gives attention to such people of the state who are not capable of avail themselves of the minimum necessities of a good life. These are mainly like food, cloth, shelter, pension, health insurance etc. It is the moral duty of a welfare state to provide such facilities to the needy sections of the society. The welfare of its citizens remains on the main concern list of the state. Previously, India was not a welfare state because of the foreigner’s autocratic rule. India was not a welfare state under the British rule. They have no equal rights. Even their life is not safe under their rule. Whatever developments British did was in keeping with the benefits of the British colonial government. The industrialization and taxes levied by British government damaged the agro-artisan based economy. It caused poverty in India. Their policies were not in the interests of the people of India. This paper aims to examine the concept of welfare state and welfare schemes

    A STUDY ON USAGE OF OPEN EDUCATIONAL RESOURCES (OER) FORMAT TO ENHANCING THE ACADEMIC PERFORMANCE OF HIGHER SECONDARY SCHOOL STUDENTS IN RAMANATHAPURAM EDUCATIONAL DISTRICT

    Get PDF
    Open Educational Resources (OER) are freely available, openly allowed text, media, and other digital resources that are useful for instruction. The Open Educational Resources (OER) formats are used for this study with the help of the internet. The investigator as a facilitator for this study. The learning is through open educational resources in three months. The quarterly marks were used for pretest and half-yearly marks were used for the post-test score. The experimental method and single group design were employed in the study. 40 students were taken for this study. The simple random sampling has used the study. The findings were there is no significant difference between the groups. The academic performance is may increase through Open Educational Resource (OER) format learning.

    Modelling, Analysis, Fabrication and Experimental Testing of Leaf Spring Material by Hybrid Composite Materials with Natural Fiber for Electric Vehicle

    Get PDF
    Present automobiles are running with the help of fuel. But in the future, electricity plays a significant role. The generation upgrading into electricity as the main source. Leaf springs are used for suspension for automobiles. These leaf springs are manufactured with stainless steel material. This is heavy in weight, which is one of the limitations for consuming of fuel. If this material is used in electric vehicle, it consumes more electricity. To overcome this issue the material is replaced with composites. The primary goal of this endeavour is to achieve weight rebates without diminishing in reliability. A parametric study of the leaf spring by varying the three-dimensional parameters will be carried out. Fabrication of the composite specimen is based upon the ASTM standard. Modelling and analysis of composite leaf spring with SOLIDWORKS and ANSYS WORKBENCH software. Epoxy resin and E- glass fibre is reinforced with various fractions of Prosopis Juliflora (Throne powder) composites were falsification by hand layup technique. The fabricated composite material in the form of plate were cut into corresponding profiles as per ASTM standard. The objective is to examine the Stress, Strain, Deformation, Physical property, Mechanical properties, Thermal property of composite leaf spring with that of steel, CFRP

    A Literature Survey on the Cryptographic Encryption Algorithms for Secured Data Communication

    Get PDF
    Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population has internet access (June 2018). Hence, it is obvious that huge volume of data is exchanged among the users over the internet. As a result, everybody is worried about data security while transmission of any confidential data. In this proposed paper, several cryptographic algorithms are discussed based on concepts of encryption and decryption. Cryptography algorithms provide the mechanisms necessary to implement accountability, accuracy and confidentiality in secured communication. This is further preceded with the widespread adoption of secure protocols such as secure Internet Protocol and virtual private networks. Efficient cryptographic processing, therefore, will become increasingly vital to good system improvement results. Cryptographic algorithms provide many key building block for network security related services. Cyber attacks (intrusion) were up 44% globally during Q1 2018, and the speed of attacks continues to increase exponentially. 75% of organizations have experienced a breach, but only 25–35% believes they are equipped to deal with these intrusions effectively

    An Empirical Study On Text Summarization Techniques By Integrating NLP With Machine And Deep Learning Techniques

    Get PDF
    From the past few decades, data storage in multiple sources is getting more attention. Due to either time constraints in the current scenario or busy life in the co-operate world irrespective of the age factor, people did attract towards reading the in short news to get acquainted with the national and international news especially in their regional languages. So, the proposed paper has conducted an empirical study on the regional language "Telugu," summarization that generates a brief note of huge texts stored in multiple databases. In the early days, text summarization does perform with traditional NLP approaches, with the advancement of Artificial Intelligence; it has spread its wings to the world of NLP also, to summarize the text smartly. Smart Text Summarization technique can reduce the time and work a lot for any human to understand the exact purpose of that document. However, the real complexity arises while developing such an abstract summary by choosing the required words or phrases that fit the whole document. Some kinds of texts also were used to find its sensitivity which is frequently used in social media texts, reviews, and e-commerce sites to know the exact view of the customer or the person

    CLOUD ENVIRONMENT USING MANY PHRASAL WORDS CONCEALMENT PRESERVING TO PERFORM SAFE SEARCH

    Get PDF
    Using the development of cloud computing, it's increasingly popular for data entrepreneurs to delegate their data to public cloud servers while enabling data clients to retrieve this data. For privacy concerns, secure searches over encoded cloud data have motivated several research works beneath the single owner model. However, most cloud servers used don't merely serve one owner rather, they support multiple entrepreneurs to speak about the benefits created by cloud computing. In this particular paper, we advise schemes to deal with Privacy safeguarding Ranked Multi-keyword Search in the Multi-owner model (PRMSM). To allow cloud servers to complete secure search lacking the knowledge of the specific data of both keywords and phrases and trapdoors, we methodically create a manuscript secure search protocol. To put searching results and preserve the privacy of relevance scores between key phrases and files, we advise a manuscript Additive Order and Privacy Safeguarding Function family. To prevent the attackers from eaves shedding secret keys and pretending to get legal data clients posting searches, we advise a manuscript dynamic secret key generation protocol plus a new data user authentication protocol. Additionally, PRMSM supports efficient data user revocation. Extensive experiments on real-world datasets browse the effectiveness and efficiency of PRMSM

    Investigations on the Hardware Components and Internetworking Architectures of Wireless Sensor Network for Environmental Monitoring

    Get PDF
    Nowadays, the applications of these networks are copious, varied and the applications in agriculture are still budding. One interesting purpose is in environmental monitoring and greenhouse control, where the crop conditions such as weather and soil do not depend on natural agents. To control and observe the environmental factors, sensors and actuators are necessary. Under these conditions, these devices must be used to make a distributed measure, scattering sensors all over the greenhouse using distributed clustering mechanism. This paper evaluates the investigations on the hardware components and internetworking architectures of wireless sensor network

    The Effect of Heat Treatment on the Dry sliding Wear Behaviour of as cast and Grain Refined and Modified, Gravity cast A356

    Get PDF
    ABSTRACT: In this study, Al-Si alloy A356 grain refined and modified using Al-5Ti-1B and Al-10Sr respectively was cast in pre-heated permanent mold using liquid metallurgy route. They were further heat treated (T6) by solutionising at 540 0 C, quenched in water at 70 0 C and aged for 5 hours at 180 0 C. They were tested for hardness and wear resistance as per relevant ASTM standards. A quantum rise in wear resistance was observed in Grain refined, Modified and heat treated A356 compared to as cast A356, Grain refined and modified A356. The improvement in wear resistance may be attributed to the refined microstructure, grain refinement and modification and improved hardness due to heat treatment
    • …
    corecore