437 research outputs found

    Denoising of MST RADAR Signal usingCWT and Overlapping Group Shrinkage

    Get PDF
    Existing algorithmsare generally denouncing the existence of clusters with large amplitude coefficients. The L1 norm as well as other distinct models of sparsity does not attract a cluster tendency (group sparsity). In the light of a minimisation of convex cost work fusing the blended norm, this work introduces the technique "overlapping group shrinking." The groups are completely overlapping in order to abstain from blocking relics. A basic minimization calculation, in light of progressive replacement, is inferred. A straightforward strategy for setting the regularization boundary, in view of constricting the noise to a predefined level, is portrayed in detail by combining OGS with one of the most powerful mathematical tool wavelet transforms. In fact, the CWT coefficients are processed by OGS to produce a noise-free signal. The CWT coefficients are also processed.The proposed approach is represented on MST RADAR signals, the denoised signals delivered by CWT combined with OGS are liberated from noise

    GSM BASED INTELLIGENT WIRELESS MOBILE PATIENT MONITORING SYSTEM USING ZIGBEE COMMUNICATION

    Get PDF
    Miniaturization of biomedical sensors helped the fast development and popularization of information processing and wireless data transmission technology, the research of wireless Medical Monitoring System has became a hot topic. By utilizing the wireless technique to transmit information between medical sensor and monitoring control center, the free space of patients is enlarged, and the efficiency of the modern management of hospitals is improved. Besides, the problem of the lack of unremitted real-time care for every patient, which is caused by the shortage of health care members, is also solved. Therefore, the portable wireless medical monitoring products will become popular in the future market. This paper deals with one of such Medical Application of Wireless Networks

    A Literature Survey on the Cryptographic Encryption Algorithms for Secured Data Communication

    Get PDF
    Security has become a buzzword over the current years. As per Wikipedia, 55.1% of global population has internet access (June 2018). Hence, it is obvious that huge volume of data is exchanged among the users over the internet. As a result, everybody is worried about data security while transmission of any confidential data. In this proposed paper, several cryptographic algorithms are discussed based on concepts of encryption and decryption. Cryptography algorithms provide the mechanisms necessary to implement accountability, accuracy and confidentiality in secured communication. This is further preceded with the widespread adoption of secure protocols such as secure Internet Protocol and virtual private networks. Efficient cryptographic processing, therefore, will become increasingly vital to good system improvement results. Cryptographic algorithms provide many key building block for network security related services. Cyber attacks (intrusion) were up 44% globally during Q1 2018, and the speed of attacks continues to increase exponentially. 75% of organizations have experienced a breach, but only 25–35% believes they are equipped to deal with these intrusions effectively

    Convective Heat and Mass Transfer of Two Fluids in a Vertical Channel

    Get PDF
    A mathematical model for convective heat and mass transfer of two immiscible fluids in a vertical channel of variable width with thermo-diffusion, diffusion-thermal effects is presented. The governing boundary layer equations generated for momentum, angular momentum, energy and species concentration are solved with appropriate boundary conditions using Galeriken finite element method. The effects of the pertinent parameters are studied in detail. Furthermore, the rate of heat transfer, mass transfer and shear stress near both walls is analyzed

    Study of serum cortisol levels in complicated and uncomplicated Plasmodium vivax malaria patients

    Get PDF
    Background: Malaria results in pathological changes in various body organs, as the parasite invade and multiply in circulating red blood cells. Despite of advances in diagnostic and treatment modalities, worldwide incidences of malaria are significant. Current study was conducted to investigate serum cortisol level changes as a promising biomarker for risk prediction in malaria and to study adrenal insufficiency in malaria patients.Methods: Current investigation was a prospective observational study, conducted on complicated and uncomplicated Plasmodium vivax malaria patients. Serum cortisol levels in patients were investigated through immunoassay using direct chemiluminescent technology and were statistically correlated with Plasmodium vivax malaria infection.Results: Results of present investigation revealed that on day 1 there was significant difference in mean serum cortisol levels between the Plasmodium vivax malaria patients and control group and cortisol levels were significantly higher in complicated Plasmodium vivax malaria patients compared to uncomplicated cases on day 1 and 7. Cortisol levels were observed to be normal on day 1 and 7 in uncomplicated malaria cases and in patients with bleeding manifestations, renal failure and jaundice. In 10 out of 15 cases of cerebral malaria, significant increase in serum cortisol levels were observed on day 1, while on day 7 levels were normal in all 15 cases.Conclusions: Rise in serum cortisol level had a positive correlation with temperature and thus can be useful to predict the severity of disease in Plasmodium vivax malaria patients. No cortisol insufficiency was observed in during active and convalescent stages of illness

    Effective Image Clustering with Differential Evolution Technique

    Get PDF
    The paper presents a novel approach of clustering image datasets with differential evolution (DE) technique. The differential evolution is a parallel direct search population based optimization method. From our simulations it is found that DE is able to optimize the quality measures of clusters of image datasets. To claim the superiority of DE based clustering we have compared the outcomes of DE with the classical K-means and popular Particle Swarm Optimization (PSO) algorithms for the same datasets. The comparisons results reveal the suitability of DE for image clustering in all image datasets

    Analysis of Legacy System in Software Application Development: A Comparative Survey

    Get PDF
    Software evolution is one of the challenging issues in today’s business environment. It is necessary for the organizations, which make use of Information, and Communication Technologies will have to align their business processes to compete with global business. The existing large software systems (“legacy” systems) have never been built to cope with the current business requirement for their poor coding, design structures, logic and documentation. Moreover, Legacy applications have various problems such as lack of up to-date documentation, skilled man power, resources of the Legacy applications, and high maintenance costs. Even though the Legacy system is obsolete, it contains detailed business rules and in continuous use, because it satisfies the users' needs and forms the backbone of the information flow of organization. One of the possible solutions is to refactor or modernize those systems into a new platform. It is necessary to analyse the existing legacy system for better understanding the business logic and its functionalities. This paper analyses various techniques proposed for understanding Legacy systems in existence

    Graded Reliance Based Routing Scheme for Wireless Sensor Networks

    Get PDF
    In this paper Graded Reliance based routing algorithm is proposed to deal with defective nodes in Wireless Sensor Networks (WSN’s).The algorithm is intended to validated or build evidence that, by dynamically learning from previous experience and adapting the changes in the operational environment the application performance can be maximized and also enhance operative agility. Quality of service and social network measures are used to evaluate the confidence score of the sensor node. A dynamic model-based analysis is formulated for best reliance composition, aggregation, and formation to maximize routing performance. The results indicate that reliance based routing approaches yields better performance in terms of message delivery ratio and message delay without incurring substantial message overhead

    Note on a bumper catch of Threadfin sea catfish in shore seine

    Get PDF
    For past several years catfish did not form a fishery at Karwar located in the Uttara Kannada District of Karnataka. However, during the routine observations on the fish landings at Aligadda Fish Landing Centre, Karwar, an unusual bumper catch of about 3 tons of cat fish Arius arius was recorded from shore seine (Yendi bale) in the early hours of 28th July 2018. locally known as "Billi Shade", the catch was so heavy that it was difficult to drag the net to the shore and the haul was partially harvested at sea itself. The net operated by around 40 fishers at a depth of less than 8 metres, was 400 m in length
    corecore