103 research outputs found

    Geotechnical characteristics of effluent contaminated cohesive soils

    Get PDF
    In developing countries like Pakistan, raw industrial effluents are usually disposed-off directly into open lands or in water bodies resulting in soil contamination. Leachate formation due to rainfalls in openly dumped solid waste also adds to soil contamination. In this study, engineering behavior of soils contaminated by two industrial effluents, one from paper industry (acidic) and another from textile industry (basic), has been investigated. Laboratory testing revealed significant effects of effluent contamination on engineering behavior of tested soils. Liquid limit, plasticity index, optimum moisture content and compression index of tested soils were found to increase with effluent contaminant, indicating a deterioration in the engineering behavior of soils. Whereas maximum dry density, undrained shear strength and coefficient of consolidation of the contaminated soils showed a decreasing trend. The dilapidation in engineering characteristics of soils due to the addition of industrial effluents could pose serious threats to existing and future foundations in terms of loss of bearing capacity and increase in settlement. Keywords: soil contamination, industrial waste, engineering behavior, effluent waste, leachate. First published online: 28 Nov 201

    A Quantum Key Distribution Network Through Single Mode Optical Fiber

    Full text link
    Quantum key distribution (QKD) has been developed within the last decade that is provably secure against arbitrary computing power, and even against quantum computer attacks. Now there is a strong need of research to exploit this technology in the existing communication networks. In this paper we have presented various experimental results pertaining to QKD like Raw key rate and Quantum bit error rate (QBER). We found these results over 25 km single mode optical fiber. The experimental setup implemented the enhanced version of BB84 QKD protocol. Based upon the results obtained, we have presented a network design which can be implemented for the realization of large scale QKD networks. Furthermore, several new ideas are presented and discussed to integrate the QKD technique in the classical communication networks.Comment: This paper has been submitted to the 2006 International Symposium on Collaborative Technologies and Systems (CTS 2006)May 14-17, 2006, Las Vegas, Nevada, US

    Generalization of Quantum Key Distribution Protocol

    Get PDF
    Summary Quantum Key Distribution (QKD) is a secure key sharing technology with unconditional security. Certain well-known protocols for QKD have been presented, which claim their security by means of higher eavesdropping error-rates. A generalized quantum key distribution protocol that can be optimized for arbitrary number of bases and dimensions of photon states is presented in this paper. The protocol can provide higher eavesdropping error-rates than the well-known existing QKD protocols like . The higher error-rate makes it possible for Alice and Bob to share secure keys on relatively large distances

    Investigating performance constraints for blockchain based secure e-voting system

    Get PDF
    Voting is one of the fundamental pillars of modern democracy. Continuous efforts have been made to strengthen the processes and methods involved to achieve verifiable, transparent voting systems. In recent years, blockchain has been increasingly used to address multi-dimensional challenges across widespread application domains including healthcare, finance and e-voting. However, achieving an efficient solution via use of blockchain requires consideration of a range of factors such as block generation rate, transaction speed, and block size which have a profound role in determining the overall performance of the solution. Current research into this aspect of blockchain is focused on Bitcoin with the objective to achieve comparable performance as of existing online payment systems such as VISA. However, there exists a gap in literature with respect to investigating performance constraints for wider application domains. In this paper, we present our efforts to address this gap by presenting a detailed study into performance and scalability constraints for an e-voting system. Specifically, we conducted rigorous experimentation with permissioned and permissionless blockchain settings across different scenarios with respect to voting population, block size, block generation rate and transaction speed. The experiments highlighted interesting observations with respect to the impact of these parameters on the overall efficiency and scalability of the e-voting model including trade-offs between different parameters as well as security and performance. present our efforts to address this gap by presenting a detailed study into performance and scalability constraints for an e-voting system. Specifically, we conducted rigorous experimentation with permissioned and permissionless blockchain settings across different scenarios with respect to voting population, block size, block generation rate and transaction speed. The experiments highlighted interesting observations with respect to the impact of these parameters on the overall efficiency and scalability of the e-voting model including trade-offs between different parameters as well as security and performance

    Empirical Analysis of Transaction Malleability within Blockchain-based e-Voting

    Get PDF
    Blockchain is a disruptive technology that has been used to address a wide range of challenges in diverse domains including voting, logistics, healthcare and finance. Transaction malleability is one of the critical threats for blockchain, which can facilitate double-spending attacks by tampering with the state of a blockchain. This paper investigates the potential of transaction malleability attack within a blockchain-based application (e-voting) with the aim to identify settings which can lead to a successful transaction malleability attack. Therein, we aim to highlight conditions which can cause transaction malleability attack so as to help develop appropriate protection mechanisms. In particular, a successful execution of transaction malleability attack is presented which was conducted on a blockchain testbed hosting an e-voting application. The experiments identified significance of parameters such as network delay and block generation rate to successfully execute transaction malleability attack and have highlighted directions for future research

    Descriptive Analysis of Human Emotions Based on Eye pupils

    Get PDF
    Facial emotional expressions are viewed as the most descriptive way to understand the human’s state of temperament during confronting communication. In this work numerous statistical approaches have been applied on human eye pupil with static images of Chicago face dataset (CFD) to analyze and classify the considered categories for emotions which are Happy, Fear, Anger and Neutral. The aim of this study is to develop the specific architecture for image processing domain after applying different enhancement techniques on human eye pupil for analysis & recognition of the facial expressions. This work is divided into three phases initially in the first phase data preprocessing is performed to prepare according to the requirement of work and also the color images are converted in to negative by applying the pixel intensity controlled mechanism. Second phase define the boundary to compute the feature by using Circular Hough Transform algorithm. Lastly statistical approaches are applied on extracted features to corporate the central point of pupil. This corporation the central point presents the effects of emotions. While comparing peoples of different Age groups it is concluded that pupil constricted on Anger at different levels on different age groups. If further it is discussed about cross cultural and gender wise comparison then Happy Emotion effects most and resulted towards dilated pupil same like that Anger emotion effects most on constricting the pupil size

    Surgical correction of aorto-pulmonary window: a rare and lethal cause of pulmonary hypertension

    Get PDF
    Aorto-pulmonary window is a relatively rare congenital cardiac malformation with an overall incidence of 0.1%. Pulmonary hypertension develops quickly if the lesion is left untreated hence early surgical intervention is warranted after diagnosis. The surgery for correction of APW has evolved over years, currently an open repair on cardiopulmonary bypass (CPB) with a single patch technique yields good results. Mortality is affected by association of pulmonary hypertension and other cardiac malformations. We present a case of an infant with a large type II APW with a relatively low pulmonary vascular resistance. Hospital stay was complicated because of pulmonary arterial disease making it an important reason for correction in the first few months of life
    • …
    corecore