1,021 research outputs found

    Feature Selection Method for Iris Recognition Authentication System

    Get PDF
    Iris-based biometric authentication is gaining importance in recent times. Iris biometric processing however, is a complex process and computationally very expensive. In the overall processing of iris biometric in an iris-based biometric authentication system, feature selection is an important task. In feature selection, we ex-tract iris features, which are ultimately used in matching. Since there is a large number of iris features and computational time increases as the number of features increases, it is therefore a challenge to develop an iris processing system with as few as possible number of features and at the same time without compromising the correctness. In this paper, we address this issue and present an approach to feature Selection Method

    The Study to Analyze the Impact of Green Supply Chain Management in India

    Get PDF
    Green supply chain management can be explained as a supply chain management system which is beneficial for the environment and which consists of designing of products , selection of raw material,manufacturing steps and delivery and preparation of final product through a stable and sustainable process.Sustainibility is the major key to supply chain ,which starts with the understanding through all the phases of production upto final distribution. This paper majorly focuses on the importance and need of term green and concepts or activities which are related to greener activities in areas like manufacturing and remanufacturing of products having a green impact ,controlling of travel costs and waste products , reverse logistics etc. The purpose is to understand the impact and also to make people aware about the major difficulties, problems and also the advantages and profits which are a part of such a great green concept if it is successfully implemented or installed during the process of supply chain management in various organisations.Keywords : Production, customer , supply chain , green , sustainability , manufacturing , materials

    On Fair and Efficient Allocations of Indivisible Public Goods

    Get PDF
    We study fair allocation of indivisible public goods subject to cardinality (budget) constraints. In this model, we have n agents and m available public goods, and we want to select k ? m goods in a fair and efficient manner. We first establish fundamental connections between the models of private goods, public goods, and public decision making by presenting polynomial-time reductions for the popular solution concepts of maximum Nash welfare (MNW) and leximin. These mechanisms are known to provide remarkable fairness and efficiency guarantees in private goods and public decision making settings. We show that they retain these desirable properties even in the public goods case. We prove that MNW allocations provide fairness guarantees of Proportionality up to one good (Prop1), 1/n approximation to Round Robin Share (RRS), and the efficiency guarantee of Pareto Optimality (PO). Further, we show that the problems of finding MNW or leximin-optimal allocations are NP-hard, even in the case of constantly many agents, or binary valuations. This is in sharp contrast to the private goods setting that admits polynomial-time algorithms under binary valuations. We also design pseudo-polynomial time algorithms for computing an exact MNW or leximin-optimal allocation for the cases of (i) constantly many agents, and (ii) constantly many goods with additive valuations. We also present an O(n)-factor approximation algorithm for MNW which also satisfies RRS, Prop1, and 1/2-Prop

    Three consecutive pregnancies having arthrogryposis multiplex congenita

    Get PDF
    Arthrogryposis Multiplex Congenita is a syndrome or disorder that presents with multiple congenital joint contractures at birth. It is X-linked recessive disorder, non-progressive and is of variable severity. Here is a case report with three consecutive pregnancies having fetus affected with Arthrogryposis Multiplex Congenita (AMC) diagnosed antenatally. Arthrogryposis Multiplex Congenita affects 1 in 3000 live births. During embryogenesis, joint development is normal. Motion is essential for the normal development of joints and surrounding structures. Fetal akinesia causes extra connective tissue to develop around the joint. This results in fixation of the joint and a further increase in the contracture. Earlier in pregnancy the contractures form, worse is the prognosis

    Accuracy of the implant impression obtained from different impression materials and techniques: review

    Get PDF
    With the predictable integration of implants, the emphasis is shifted towards precise prosthesis. Reproducing the intraoral relationship of implants through impression procedures is the first step in achieving an accurate, passively fitting prosthesis. The critical aspect is to record the three dimensional orientation of the implant as it is present intraorally, other than reproducing fine surface detail for successful implant prosthodontic treatment. The development of impression techniques to accurately record implant position has become more complicated and challenging. During the prosthetic phase of implant therapy there are numerous options available to the implantologist in relation to different impression techniques and materials available for impression making. It is critical to ensure that implant – prosthesis interface have passive fit and original position of the implant maintained in the master cast. There is no evidence supporting that one impression technique or material is better than the other. In the present article the various parameters affecting the accuracy of implant impression along with impression material and technique pertaining to different clinical situations is reviewed

    Combined surgical and prosthetic approach for rehabilitation of frontonasal defect using custom made titanium implant: a case report

    Get PDF
    Cranial vault deformities as a sequelae to trauma may be as high as 70%. The basic indications for cranioplasty are improvement of disfigured aesthetics and to provide protection to the intra-cranial contents. The possibility of producing custom-made implants opened a new era in the reconstructive surgery of the craniofacial deformities. The outcome of craniofacial bone reconstruction is thought to be dependent on surgical skills, quality of adjacent soft tissues, size and location of the bone defect and choice of repair method. The use of autologous bone for craniofacial reconstruction may be restricted due to limited amounts of donor bone. Combined surgical and prosthetic rehabilitation of these structures utilizing craniofacial implants is a viable option which offers several advantages when compared to surgical reconstructive techniques alone. Predictability and superior aesthetics are the major advantages of this technique. In addition to the advantages of good biocompatibility and mechanical strength, titanium also provides the advantage of being light in weight. This clinical report highlights the combined surgical and prosthetic approach for the successful management of frontonasal defect

    VANET: Analysis of Black hole Attack using CBR/UDP Traffic Pattern with Hash Function and GPSR Routing Protocol

    Get PDF
    With momentum of time huge development occurred in the field of MANET and VANET. As we know when new technology emerges it came with many advanages but definitely some limitation must be there. In WSN security is one of biggest challenges which we need to tackle to implement adhoc network. Main reason behind this is dynamic topology of sensing node because nodes are dynamic in nature rather than static. As technology came into existence side by side unethical activity also take place which try to access the data illegally to gain personnel profit. There are so many types of attack possibilities are there in adhoc network. Attack can be classified into active and passive. In our research article oue main concern is on black hole attack. According to this attack a malicious node with high priority number is deployed in between other nodes. Now this malicious node access the data and sends acknowledgement to source that data received. Source node will think that acknowledgement is sent by destination node but actually it is sent by malicious node.  In this research article performance analysis of the black hole attack in Vehicular Ad Hoc Network is executed
    • …
    corecore