2,708 research outputs found

    Comparative study of voice print Based acoustic features: MFCC and LPCC

    Full text link
    Voice is the best biometric feature for investigation and authentication. It has both biological and behavioural features. The acoustic features are related to the voice. The Speaker Recognition System is designed for the automatic authentication of speaker's identity which is truly based on the human's voice. Mel Frequency Cepstrum coefficient (MFCC) and Linear Prediction Cepstrum coefficient (LPCC) are taken in use for feature extraction from the provided voice sample. This paper provides a comparative study of MFCC and LPCC based on the accuracy of results and their working methodology. The results are better if MFCC is used for feature extraction

    Synthesis of novel benzo[4,5]imidazo[1,2-a]pyrimido- [4,5-d]pyrimidine derivatives as potent antimicrobial agents

    Get PDF
    445-453Synthesis of novel benzo[4,5]imidazo[1,2-a]pyrimido[4,5-d] pyrimidines 5/6 has been achieved by reaction of 2-amino-4-aryl-4,10-dihydrobenzo[4,5]imidazo[1,2-a]pyrimidine-3-carbonitriles 4 with formaldehyde/urea. The key intermediate 4, is obtained by reaction of 2-aminobenzaldehyde 1 with aromatic aldehyde and malononitrile by a three-component one-pot process. The newly synthesized title compounds 5/6 have been evaluated for their in vitro antimicrobial activity. Compounds 5 and 6 exhibit potent antimicrobial activity compared to that of standard drugs

    Epidemiological Profile of Complete Suicidal Poisoning Cases Autopsied at Autopsy Centre, RIMS, Ranchi

    Get PDF
    Background: Suicidal behaviour is any deliberate action that has potentially life-threatening consequences, such as taking a drug overdose, deliberately consuming poison, hanging, drowning, burn etc. The aim of this study was to illustrate the epidemiological profile of complete suicidal poisoning cases autopsied at Department of Forensic Medicine and Toxicology, Rajendra Institute of Medical Sciences, Ranchi, India.Methods: All cases autopsied at autopsy centre of department of forensic medicine and toxicology between April 2013 to October 2014 evaluated. Data obtained from the Information regarding the socio-demographic, mode of suicides, time of incidence, place of incidence, occupation, etc were gathered from the police papers like inquest report, dead body challan etc, and through detailed interviews of the relatives, neighbours, friends, and police officials accompanying the dead bodies.Results: Total 3492 cases were autopsied, out of which only 180 cases were due to acute self-poisoning, suicidal in nature. This was 5.2% of the total cases autopsied at centre. The ratio of male and female suicide by poisoning was almost equal (M: F = 1.22: 1). The majority of victims were married, unemployed, from joint family and middle economic class. The most important agents of poisoning were agrochemical pesticides among these majorities were due to organophosphate.Conclusion: More than 50% of victims from both male and female were in between 15 years to 30 years. The maximum victims were consumed poison at evening (between 4 PM to 8 PM) during summer season. The Agrochemicals were the preferred agents with organophosphates alone responsible for about 50% of suicidal mortalities followed by aluminium phosphide

    Structure Related to Morphine

    Get PDF
    Synthesis of 2-N-heptyl-5,9-dimethyl-6,7-benzomorphan from 3,4-lutidine was effected in three step process and only a-form could be obtained through phosphoric acid cyclisation. This a-form of benzomorphan was converted in three steps to a-2N-hepthyl-2-hydroxy-5,9-dimethyl-6,7-benzomorphan, which was also synthesised from alternative route. Infrared spectrum of the base confirmed the presence of a-from

    Bio- Matric Intelligent ATM System

    Get PDF
    Now a day, peoples have multiple bank accounts so money transactions play a vital role in the nature of trade. Today, ATMs and Credit cards are used for this purpose, the authentication of these transactions are unsecure. To overcome this shortcoming of money transactions, we proposes the idea of using fingerprints of customers as login multiple banking password in place of traditional pin number. Here, if the fingerprint is recognized, then it display the multiple banking screen. Then we can choose the bank which we need for transaction. The remaining feature are same as i.e., a reference fingerprint of the nominee or a close family member of the customer can be used if the customer is not available in case of emergencies. This proposed business model helps the society, mainly the rural people, by enhancing the security using Fingerprint recognition in Digital image processing. As the fingerprint of every person is unique and unchangeable, this biometric feature is used over the others

    Comparative study for modal analysis of circular plates with various cutouts and end conditions

    Get PDF
    The applicational use of structural members in engineering and technology may take the form of a circular plate, for such members it becomes important to predict the vibrational characteristics when operated closer to resonance phenomena. In addition to, the effect of the cutout in the circular plate has a significant effect on modal characteristics. The part of the research work entitled in this paper emphasizes on the modal analysis of a circular plate with clamped boundary condition determined by the characteristics equation and mode shapes of the plate using FEM. The effects of inclusion of cut-out on the vibrational characteristics are discussed. The subject of the analysis was a circular plate considered with certain modifications i.e. free circular plate without cutout clamped on the outer periphery, circular plate with cut-out clamped on the outer periphery, circular plate with cutout clamped on the outer and inner periphery. The methodology applied to conventional material based circular plate is extended to Glass epoxy circular plate with the same set of modifications. The values of natural frequencies for various cases are tabulated and corresponding mode shapes are illustrated

    Self-Organized Dynamical Equilibrium in the Corrosion of Random Solids

    Full text link
    Self-organized criticality is characterized by power law correlations in the non-equilibrium steady state of externally driven systems. A dynamical system proposed here self-organizes itself to a critical state with no characteristic size at ``dynamical equilibrium''. The system is a random solid in contact with an aqueous solution and the dynamics is the chemical reaction of corrosion or dissolution of the solid in the solution. The initial difference in chemical potential at the solid-liquid interface provides the driving force. During time evolution, the system undergoes two transitions, roughening and anti-percolation. Finally, the system evolves to a dynamical equilibrium state characterized by constant chemical potential and average cluster size. The cluster size distribution exhibits power law at the final equilibrium state.Comment: 11 pages, 5 figure

    A Bio-Crypto Protocol for Password Protection Using ECC

    Get PDF
    In  information  security the  following security parameters like, integrity , non repudiation and confidentiality , authentication   must be satisfied.  To avoid thievery of organization resources  it needs be secured in more efficient way  and there is always demand  for different levels of security attacks include virus , brute force and Eveadroper  in business that  organizations make use of voice biometrics an attractive low-cost. Voice biometrics is the  cheapest  among the  other biometrics and used all levels for management to buy readily available metric and it is the way of  identifying individuals remotely  with high level of accuracy . In this work, we have been designed a  new  password- authentication approach  that provides security  using voice biometrics for authentication and uses the device  itself into an authenticator which uses  voice itself as its passwords and we are primarily interested in keys that can be temporally reproduced on the same device from the same user’s voice. Public and private keys are generated  randomly from the user's voice  and stored in the voice file(.wav).This Method uses voice recognition , include the operation of  register( recording feature ) or voice prints  and  storing of one or more voice passwords into the  database. It uses ECDSA to perform the authentication process that matching the  voice sample  with the database. The recognition, entity makes the database  to decide that  the sample is matched to perform an operation or not. Our proposed approach  generates cryptographic keys from voice input itself and this algorithm developed an adhoc basis. It can effectively defend  attacks specially brute force attack in system networks

    Community-Specific BMI Cutoff Points for South Indian Females

    Get PDF
    Objective. To analyze multiparameters related to total body composition, with specific emphasis on obesity in South Indian females, in order to derive community-specific BMI cutoff points. Patients and Methods. A total number of 87 females (of age 37.33 ± 13.12 years) from South Indian Chennai urban population participated in this clinical study. Body composition analysis and anthropometric measurements were acquired after conducting careful clinical examination. Results. BMI demonstrated high significance when normal group (21.02 ± 1.47 kg/m2) was compared with obese group (29.31 ± 3.95 kg/m2), P < 0.0001. BFM displayed high significance when normal group (14.92 ± 4.28 kg) was compared with obese group (29.94 ± 8.1 kg), P < 0.0001. Conclusion. Community-specific BMI cutoffs are necessary to assess obesity in different ethnic groups, and relying on WHO-based universal BMI cutoff points would be a wrong strategy
    corecore