194 research outputs found

    An Efficient Hidden Markov Model for Offline Handwritten Numeral Recognition

    Full text link
    Traditionally, the performance of ocr algorithms and systems is based on the recognition of isolated characters. When a system classifies an individual character, its output is typically a character label or a reject marker that corresponds to an unrecognized character. By comparing output labels with the correct labels, the number of correct recognition, substitution errors misrecognized characters, and rejects unrecognized characters are determined. Nowadays, although recognition of printed isolated characters is performed with high accuracy, recognition of handwritten characters still remains an open problem in the research arena. The ability to identify machine printed characters in an automated or a semi automated manner has obvious applications in numerous fields. Since creating an algorithm with a one hundred percent correct recognition rate is quite probably impossible in our world of noise and different font styles, it is important to design character recognition algorithms with these failures in mind so that when mistakes are inevitably made, they will at least be understandable and predictable to the person working with theComment: 6pages, 5 figure

    On-Chip Generation of Functional Tests with Reduced Delay and Power

    Full text link
    This paper describes different methods on-chip test generation method for functional tests. The hardware was based on application of primary input sequences in order to allow the circuit to produce reachable states. Random primary input sequences were modeled to avoid repeated synchronization and thus yields varied sets of reachable states by implementing a decoder in between circuit and LFSR. The on-chip generation of functional tests require simple hardware and achieved high transition fault coverage for testable circuits. Further, power and delay can be reduced by using Bit Swapping LFSR (BS-LFSR). This technique yields less number of transitions for all pattern generation. Bit-swapping (BS) technique is less complex and more reliable to hardware miscommunications

    Genetic Variability in Gladiolus for Growth and Flowering Characters (Gladiolus hybridus Hort.)

    Get PDF
    Gladiolus Sylvia x Melody exhibited early corm-sprouting (6.82 days). The hybrid Melody x Summer Sunshine (84.63 cm), followed by American Beauty x Pricella (84.12 cm) were tall. Maximum stem girth was observed in American Beauty x Summer Sunshine (35.31 mm), followed by Vedanapoli x Magic (33.71mm) and American Beauty x Melody (33.47 mm). Number of leaves per plant was higher in Melody x Magic (9.62), followed by Salvia x Magic (9.49) and Melody x Vedanapoli (9.42). The length was maximum (67.32 cm) in Melody x Summer Sunshine followed by Summer Sunshine x Pricella (67.57 cm), American Beauty x Vedanapoli (67.00 cm) and Vedanapoli x Pricella (66.06 cm). The hybrid Salvia x Melody was earliest to initiate flower bud (60.58 days) and first floret opening (69.04 days). The total duration of flowering was maximum in Vedanapoli x Magic

    On-chip Generation of Functional Tests with Reduced Delay and Power

    Get PDF
    This paper describes different methods  on-chip test generation method for functional tests. The hardware was based on application of primary input sequences in order to allow the circuit to produce reachable states. Random primary input sequences were modeled to avoid repeated synchronization and thus yields varied sets of reachable states by implementing a decoder in between circuit and LFSR. The on-chip generation of functional tests require simple hardware and achieved high transition fault coverage for testable circuits. Further, power and delay can be reduced by using Bit Swapping LFSR (BS-LFSR). This technique yields less number of transitions for all pattern generation. Bit-swapping (BS) technique is less complex and more reliable to hardware miscommunications

    An Authenticated Bit Shifting and Stuffing (BSS) Methodology for Data Security

    Get PDF
    Providing security to the data means the third party cannot interpret the actual information. When providing authentication to the data then only authorized persons can interpret the data. One of the methodology to provide security is cryptography. But in previous paper we have proposed a methodology for the cryptography process is BSS. In Bit Shifting and Stuffing (BSS) system to represent a printable character it needs only seven bits as per its ASCII value. In computer system to represent a printable character it requires one byte, i.e. 8 bits. So a printable character occupies 7 bits and the last bit value is 0 which is not useful for the character. In BSS method we are stuffing a new bit in the place of unused bit which is shifting from another printable character. To provide authentication a four bit dynamic key is generated for every four characters of the encrypted data and the key is also maintained in the data itself. While decryption the key is retrieved from the data and check whether the data is corrupted or not

    A Case Study Regarding the WIFI Bluetooth-based Implementation in Smart Narrow Field Communication

    Get PDF
    A Smart Narrow Field Communication (SNFC) deals with the wireless tag system which is developed through devices. Generally, on the internet it is hard to read long contents of the URL Present. On the internet these URL can be converted into QR code and NFC (Near Field Communication). First of all a device which is useful for wireless applications is given a name and considered as a tag. This device is used for recognizing a target content. Both of these are taken into a relation the URL are maintained on our cloud system along with the device name. Not only the device name the system also considers other user contents like gender and age in order to identify the target content. In Smart Narrow Field Communication all common device can be used as a tag. Ex: WIFI router, Bluetooth mouse etc. keywords: WIFI tag, Bluetooth tag mouse, Smart Narrow Field Communication, NFC, QR code

    A STUDY ON ATTRITION AND RETENTION STRATEGIES OF MICROFINANCE SECTOR IN BANGALORE

    Get PDF
    This article explores the critical issues of attrition and retention strategies within the context of Microfinance Sector, Title: A Study on Attrition and Retention Strategies in the Microfinance Sector.The microfinance sector plays a pivotal role in extending financial services to the underserved and economically vulnerable populations.This study aims to investigate the factors contributing to attrition and the strategies employed for retaining talent in the microfinance sector. The study employs a mixed-methods approach, which includes both quantitative and qualitative data gathering methodologies. Primary data is gathered through surveys, interviews, and focus group discussions with microfinance employees and managers from a diverse range of organizations across various geographies. Secondary data is also analysed from industry reports and existing literature. The findings reveal that attrition in the microfinance sector is affected by a complex interplay of factors, including low remuneration, limited career growth opportunities, job stress, and work-life balance issues. Furthermore, the study identifies several successful retention strategies implemented by microfinance institutions, such as training and development programs, performance incentives, employee engagement initiatives, and effective leadership. This study adds to the current body of information by offering insights into the unique issues that microfinance organisations encounterin retaining their workforce and the innovative strategies they have adopted to address these challenges. The outcomes of this study can be used by microfinance organizations, policymakers, and industry stakeholders to develop and implement more effective retention strategies, ultimately improving the sustainability and social impact of microfinance operations. In conclusion, understanding attrition and retention dynamics in the microfinance sector is crucial for fostering a stable and motivated workforce, which in turn can enhance the sector's capacity to serve its target clientele and drive financial inclusion

    Single Dose Pharmacokinetics of Efavirenzin Healthy Indian Subjects

    Get PDF
    Background & Objective: Access to antiretroviral therapy in India is improving. Efavirenz (EFV) is a commonly used non-nucleoside reverse transcriptase inhibitor used to treat HIV infection. No information is available on the pharmacokinetics of EFV in Indian subjects. The aim of this study was to obtain information on single dose pharmacokinetics of efavirenz (EFV) in healthy Indian subjects. Methods: Sixteen adult healthy volunteers (8 males and 8 females) were administered a single oral tablet of 600 mg EFV after an overnight fast. Blood samples were collected at 1, 2, 3, 4, 5, 6, 10, 24 and 48 hours post dosing. Plasma EFV concentrations were estimated by HPLC, and certain pharmacokinetic variables were calculated. Results: Plasma EFV concentrations were higher in females than males at all the time points, the differences being significant at 1 (p<0.001) and 2 (p=0.05) hours. Females had significantly higher peak concentration (Cmax) of EFV than males (p=0.05) (3.11 & 1.90 μg/ml). The inter-individual variability in Cmax and AUC0-48 were 42 and 45% respectively. Conclusions: This study provides basic information on the pharmacokinetics of EFV in Indian subjects. Females had higher peak levels of EFV than males. Inter-subject variability was high. Further studies are necessary to describe the pharmacokinetic profile of EFV under steady state conditions in Indian patients on antiretroviral treatment

    Comparison of short-term outcomes following open and laparoscopic resections for colorectal malignancies

    Get PDF
    Background: The laparoscopic approach for colorectal cancers are still a matter of controversy. In the present study, we tried to compare the laparoscopy with open methods of colorectal resections.Methods: Retrospective study where patients diagnosed with colorectal cancer in our hospital from year 2014 January to December 2016 were taken. Total number of cases were 69 of which, the total number of right colon cases were 26. Out of twenty-six, 12 underwent open procedure and 14 underwent laparoscopic resections. Total number of left colon cancers were 09. Of these, 2 underwent open and 7 underwent laparoscopic procedure. Thirty-four (34) rectal cancers were included in the study. Of these, 12 underwent open rectal procedures and 22 underwent laparoscopic resections. Multiple parameters like duration of surgery, post-operative complications, postoperative stay, pathological T staging, lymph node yield, positive nodes, distal resection margins, circumferential radial margins were compared.Results: Operating time was significantly shorter in open procedure than laparoscopic surgery in both rectal resection and right hemicolectomies. The postoperative stay was significantly shorter in laparoscopic right hemicolectomy compared to open procedure. All other parameters like post-operative complications, T stage, lymph node yield, positive nodes, distal resection margins and CRMs were comparable in both groups. The lymph node yield was similar in upfront and post neoadjuvant carcinoma rectum cases.Conclusions: Laparoscopic colorectal resections have similar rates of complication, with shorter hospital stays with no compromise on oncological clearance with respect to lymph node yield, CRMs, distal resection margins compared to open procedures
    • …
    corecore