2,336 research outputs found

    Defect free visible photoluminescence from laser-generated germanium nanoparticles

    Full text link
    Origin of room temperature visible photoluminescence (PL) from defect free germanium (Ge) nanoparticles have been discussed here. The Ge nanoparticles produced by laser-induced etching technique show broad visible PL around 2.0 - 2.2 eV at room temperature. Size dependent PL peak shift in Ge nanoparticles has been explained in terms of quantum confinement. Theoretical calculations of radiative lifetime using oscillator strength, which is closely related to the size of the nanostructures, suggests that the PL is originating from a radiative recombination process in quantum confined Ge nanostructures.Comment: 15 Pages, 3 figures and 1 Table. \LaTeX fil

    Intensity and Rescale Invariant Copy Move Forgery Detection Techniques

    Full text link
    In this contemporary world digital media such as videos and images behave as an active medium to carry valuable information across the globe on all fronts. However there are several techniques evolved to tamper the image which has made their authenticity untrustworthy. CopyMove Forgery CMF is one of the most common forgeries present in an image where a cluster of pixels are duplicated in the same image with potential postprocessing techniques. Various state-of-art techniques are developed in the recent years which are effective in detecting passive image forgery. However most methods do fail when the copied image is rescaled or added with certain intensity before being pasted due to de-synchronization of pixels in the searching process. To tackle this problem the paper proposes distinct novel algorithms which recognize a unique approach of using Hus invariant moments and Discreet Cosine Transformations DCT to attain the desired rescale invariant and intensity invariant CMF detection techniques respectively. The experiments conducted quantitatively and qualitatively demonstrate the effectiveness of the algorithm.Comment: Further research is active on this paper in VIT University. Hence, the paper is yet not publishe

    Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations

    Full text link
    With the increase in interchange of data, there is a growing necessity of security. Considering the volumes of digital data that is transmitted, they are in need to be secure. Among the many forms of tampering possible, one widespread technique is Copy Move Forgery CMF. This forgery occurs when parts of the image are copied and duplicated elsewhere in the same image. There exist a number of algorithms to detect such a forgery in which the primary step involved is feature extraction. The feature extraction techniques employed must have lesser time and space complexity involved for an efficient and faster processing of media. Also, majority of the existing state of art techniques often tend to falsely match similar genuine objects as copy move forged during the detection process. To tackle these problems, the paper proposes a novel algorithm that recognizes a unique approach of using Hus Invariant Moments and Log polar Transformations to reduce feature vector dimension to one feature per block simultaneously detecting CMF among genuine similar objects in an image. The qualitative and quantitative results obtained demonstrate the effectiveness of this algorithm.Comment: This paper was submitted, accepted and presented in the 3rd International Conference on RTEICT, IEEE Conferenc

    An Improved Approach to High Level Privacy Preserving Itemset Mining

    Full text link
    Privacy preserving association rule mining has triggered the development of many privacy preserving data mining techniques. A large fraction of them use randomized data distortion techniques to mask the data for preserving. This paper proposes a new transaction randomization method which is a combination of the fake transaction randomization method and a new per transaction randomization method. This method distorts the items within each transaction and ensures a higher level of data privacy in comparison to the previous approaches. The pertransaction randomization method involves a randomization function to replace the item by a random number guarantying privacy within the transaction also. A tool has also been developed to implement the proposed approach to mine frequent itemsets and association rules from the data guaranteeing the antimonotonic property.Comment: 8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS December 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis

    Micro-Raman and field emission studies of silicon nanowires prepared by metal assisted chemical etching

    Full text link
    Micro-Raman scattering and electron field emission characteristics of silicon nanowires (SiNWs) synthesized by metal assisted chemical etching (MACE) are investigated. Scanning electron microscopy images reveal the growth of well aligned vertical SiNWs. Raman shift and size relation from bond-polarizability model has been used to calculate exact confinement sizes in SiNWs. The Si optical phonon peak for SiNWs showed a downshift and an asymmetric broadening with decreasing diameter of the SiNWs due to quantum confinement of optical phonons. The field emission characteristics of these SiNWs are studied based by carrying out current-voltage measurements followed by a theoretical analysis using Fowler-Nordheim equation. The electron field emission increased with decreasing diameter of SiNWs. Field emission from these SiNWs exhibits significant enhancement in turn-on field and total emission current with decreasing nanowire size. The reported results in the current study indicate that MACE is a simple technique to prepare well-aligned SiNWs with potentials for applications in field emission devices

    Efficient Licence Plate Detection By Unique Edge Detection Algorithm and Smarter Interpretation Through IoT

    Full text link
    Vehicles play a vital role in modern day transportation systems. Number plate provides a standard means of identification for any vehicle. To serve this purpose, automatic licence plate recognition system was developed. This consisted of four major steps: Pre-processing of the obtained image, extraction of licence plate region, segmentation and character recognition. In earlier research, direct application of Sobel edge detection algorithm or applying threshold were used as key steps to extract the licence plate region, which does not produce effective results when the captured image is subjected to the high intensity of light. The use of morphological operations causes deformity in the characters during segmentation. We propose a novel algorithm to tackle the mentioned issues through a unique edge detection algorithm. It is also a tedious task to create and update the database of required vehicles frequently. This problem is solved by the use of Internet of things(IOT) where an online database can be created and updated from any module instantly. Also, through IoT, we connect all the cameras in a geographical area to one server to create a universal eye which drastically increases the probability of tracing a vehicle over having manual database attached to each camera for identification purpose.Comment: Paper has been submitted to SocPros17, 7th international conference on soft computing and problem solving, Scopus indexed. If accepted paper will be published in AISC series SPRINGER. Some of the extended/modified selected quality papers will be published in a Special Issue of 'Swarm and Evolutionary Computation journal, Elsevier (SCI). 10 page

    Oriented collisions for cold synthesis of superheavy nuclei

    Full text link
    The conditions of optimum orientations (lowest barrier and largest interaction radius) for deformed colliding nuclei are introduced in "cold" fusion of superheavy nuclei. Also, the role of (octupole and) hexadecupole deformations is studied. We have used the proximity potential and applied our method to Ca-induced reactions.Comment: 4 pages, 4 figures and 1 tabl

    High Capacity, Secure (n, n/8) Multi Secret Image Sharing Scheme with Security Key

    Full text link
    The rising need of secret image sharing with high security has led to much advancement in lucrative exchange of important images which contain vital and confidential information. Multi secret image sharing system (MSIS) is an efficient and robust method for transmitting one or more secret images securely. In recent research, n secret images are encrypted into n or n+ 1 shared images and stored in different database servers. The decoder has to receive all n or n+1 encrypted images to reproduce the secret image. One can recover partial secret information from n-1 or fewer shared images, which poses risk for the confidential information encrypted. In this proposed paper we developed a novel algorithm to increase the sharing capacity by using (n, n/8) multi-secret sharing scheme with increased security by generating a unique security key. A unrevealed comparison image is used to produce shares which makes the secret image invulnerable to the hackersComment: Accepted and Presented in International Conference on Intelligent Computing and Control (I2C2) IEEE conference, June 201

    Estimation of Mean in Presence of Non Response Using Exponential Estimator

    Full text link
    This paper considers the problem of estimating the population mean using information on auxiliary variable in presence of non response. Exponential ratio and exponential product type estimators have been suggested and their properties are studied. An empirical study is carried out to support the theoretical results.Comment: 11 page

    Automated Region Masking Of Latent Overlapped Fingerprints

    Full text link
    Fingerprints have grown to be the most robust and efficient means of biometric identification. Latent fingerprints are commonly found at crime scenes. They are also of the overlapped kind making it harder for identification and thus the separation of overlapped fingerprints has been a conundrum to surpass. The usage of dedicated software has resulted in a manual approach to region masking of the two given overlapped fingerprints. The region masks are then further used to separate the fingerprints. This requires the user's physical concentration to acquire the separate region masks, which are found to be time-consuming. This paper proposes a novel algorithm that is fully automated in its approach to region masking the overlapped fingerprint image. The algorithm recognizes a unique approach of using blurring, erosion, and dilation in order to attain the desired automated region masks. The experiments conducted visually demonstrate the effectiveness of the algorithm.Comment: Accepted and presented in I-PACT international IEEE conference on 21st and 22nd Apri
    • …
    corecore