2,336 research outputs found
Defect free visible photoluminescence from laser-generated germanium nanoparticles
Origin of room temperature visible photoluminescence (PL) from defect free
germanium (Ge) nanoparticles have been discussed here. The Ge nanoparticles
produced by laser-induced etching technique show broad visible PL around 2.0 -
2.2 eV at room temperature. Size dependent PL peak shift in Ge nanoparticles
has been explained in terms of quantum confinement. Theoretical calculations of
radiative lifetime using oscillator strength, which is closely related to the
size of the nanostructures, suggests that the PL is originating from a
radiative recombination process in quantum confined Ge nanostructures.Comment: 15 Pages, 3 figures and 1 Table. \LaTeX fil
Intensity and Rescale Invariant Copy Move Forgery Detection Techniques
In this contemporary world digital media such as videos and images behave as
an active medium to carry valuable information across the globe on all fronts.
However there are several techniques evolved to tamper the image which has made
their authenticity untrustworthy. CopyMove Forgery CMF is one of the most
common forgeries present in an image where a cluster of pixels are duplicated
in the same image with potential postprocessing techniques. Various
state-of-art techniques are developed in the recent years which are effective
in detecting passive image forgery. However most methods do fail when the
copied image is rescaled or added with certain intensity before being pasted
due to de-synchronization of pixels in the searching process. To tackle this
problem the paper proposes distinct novel algorithms which recognize a unique
approach of using Hus invariant moments and Discreet Cosine Transformations DCT
to attain the desired rescale invariant and intensity invariant CMF detection
techniques respectively. The experiments conducted quantitatively and
qualitatively demonstrate the effectiveness of the algorithm.Comment: Further research is active on this paper in VIT University. Hence,
the paper is yet not publishe
Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations
With the increase in interchange of data, there is a growing necessity of
security. Considering the volumes of digital data that is transmitted, they are
in need to be secure. Among the many forms of tampering possible, one
widespread technique is Copy Move Forgery CMF. This forgery occurs when parts
of the image are copied and duplicated elsewhere in the same image. There exist
a number of algorithms to detect such a forgery in which the primary step
involved is feature extraction. The feature extraction techniques employed must
have lesser time and space complexity involved for an efficient and faster
processing of media. Also, majority of the existing state of art techniques
often tend to falsely match similar genuine objects as copy move forged during
the detection process. To tackle these problems, the paper proposes a novel
algorithm that recognizes a unique approach of using Hus Invariant Moments and
Log polar Transformations to reduce feature vector dimension to one feature per
block simultaneously detecting CMF among genuine similar objects in an image.
The qualitative and quantitative results obtained demonstrate the effectiveness
of this algorithm.Comment: This paper was submitted, accepted and presented in the 3rd
International Conference on RTEICT, IEEE Conferenc
An Improved Approach to High Level Privacy Preserving Itemset Mining
Privacy preserving association rule mining has triggered the development of
many privacy preserving data mining techniques. A large fraction of them use
randomized data distortion techniques to mask the data for preserving. This
paper proposes a new transaction randomization method which is a combination of
the fake transaction randomization method and a new per transaction
randomization method. This method distorts the items within each transaction
and ensures a higher level of data privacy in comparison to the previous
approaches. The pertransaction randomization method involves a randomization
function to replace the item by a random number guarantying privacy within the
transaction also. A tool has also been developed to implement the proposed
approach to mine frequent itemsets and association rules from the data
guaranteeing the antimonotonic property.Comment: 8 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS December 2009, ISSN 1947 5500,
http://sites.google.com/site/ijcsis
Micro-Raman and field emission studies of silicon nanowires prepared by metal assisted chemical etching
Micro-Raman scattering and electron field emission characteristics of silicon
nanowires (SiNWs) synthesized by metal assisted chemical etching (MACE) are
investigated. Scanning electron microscopy images reveal the growth of well
aligned vertical SiNWs. Raman shift and size relation from bond-polarizability
model has been used to calculate exact confinement sizes in SiNWs. The Si
optical phonon peak for SiNWs showed a downshift and an asymmetric broadening
with decreasing diameter of the SiNWs due to quantum confinement of optical
phonons. The field emission characteristics of these SiNWs are studied based by
carrying out current-voltage measurements followed by a theoretical analysis
using Fowler-Nordheim equation. The electron field emission increased with
decreasing diameter of SiNWs. Field emission from these SiNWs exhibits
significant enhancement in turn-on field and total emission current with
decreasing nanowire size. The reported results in the current study indicate
that MACE is a simple technique to prepare well-aligned SiNWs with potentials
for applications in field emission devices
Efficient Licence Plate Detection By Unique Edge Detection Algorithm and Smarter Interpretation Through IoT
Vehicles play a vital role in modern day transportation systems. Number plate
provides a standard means of identification for any vehicle. To serve this
purpose, automatic licence plate recognition system was developed. This
consisted of four major steps: Pre-processing of the obtained image, extraction
of licence plate region, segmentation and character recognition. In earlier
research, direct application of Sobel edge detection algorithm or applying
threshold were used as key steps to extract the licence plate region, which
does not produce effective results when the captured image is subjected to the
high intensity of light. The use of morphological operations causes deformity
in the characters during segmentation. We propose a novel algorithm to tackle
the mentioned issues through a unique edge detection algorithm. It is also a
tedious task to create and update the database of required vehicles frequently.
This problem is solved by the use of Internet of things(IOT) where an online
database can be created and updated from any module instantly. Also, through
IoT, we connect all the cameras in a geographical area to one server to create
a universal eye which drastically increases the probability of tracing a
vehicle over having manual database attached to each camera for identification
purpose.Comment: Paper has been submitted to SocPros17, 7th international conference
on soft computing and problem solving, Scopus indexed. If accepted paper will
be published in AISC series SPRINGER. Some of the extended/modified selected
quality papers will be published in a Special Issue of 'Swarm and
Evolutionary Computation journal, Elsevier (SCI). 10 page
Oriented collisions for cold synthesis of superheavy nuclei
The conditions of optimum orientations (lowest barrier and largest
interaction radius) for deformed colliding nuclei are introduced in "cold"
fusion of superheavy nuclei. Also, the role of (octupole and) hexadecupole
deformations is studied. We have used the proximity potential and applied our
method to Ca-induced reactions.Comment: 4 pages, 4 figures and 1 tabl
High Capacity, Secure (n, n/8) Multi Secret Image Sharing Scheme with Security Key
The rising need of secret image sharing with high security has led to much
advancement in lucrative exchange of important images which contain vital and
confidential information. Multi secret image sharing system (MSIS) is an
efficient and robust method for transmitting one or more secret images
securely. In recent research, n secret images are encrypted into n or n+ 1
shared images and stored in different database servers. The decoder has to
receive all n or n+1 encrypted images to reproduce the secret image. One can
recover partial secret information from n-1 or fewer shared images, which poses
risk for the confidential information encrypted. In this proposed paper we
developed a novel algorithm to increase the sharing capacity by using (n, n/8)
multi-secret sharing scheme with increased security by generating a unique
security key. A unrevealed comparison image is used to produce shares which
makes the secret image invulnerable to the hackersComment: Accepted and Presented in International Conference on Intelligent
Computing and Control (I2C2) IEEE conference, June 201
Estimation of Mean in Presence of Non Response Using Exponential Estimator
This paper considers the problem of estimating the population mean using
information on auxiliary variable in presence of non response. Exponential
ratio and exponential product type estimators have been suggested and their
properties are studied. An empirical study is carried out to support the
theoretical results.Comment: 11 page
Automated Region Masking Of Latent Overlapped Fingerprints
Fingerprints have grown to be the most robust and efficient means of
biometric identification. Latent fingerprints are commonly found at crime
scenes. They are also of the overlapped kind making it harder for
identification and thus the separation of overlapped fingerprints has been a
conundrum to surpass. The usage of dedicated software has resulted in a manual
approach to region masking of the two given overlapped fingerprints. The region
masks are then further used to separate the fingerprints. This requires the
user's physical concentration to acquire the separate region masks, which are
found to be time-consuming. This paper proposes a novel algorithm that is fully
automated in its approach to region masking the overlapped fingerprint image.
The algorithm recognizes a unique approach of using blurring, erosion, and
dilation in order to attain the desired automated region masks. The experiments
conducted visually demonstrate the effectiveness of the algorithm.Comment: Accepted and presented in I-PACT international IEEE conference on
21st and 22nd Apri
- …