2,708 research outputs found
Comparative study of voice print Based acoustic features: MFCC and LPCC
Voice is the best biometric feature for investigation and authentication. It has both biological and behavioural features. The acoustic features are related to the voice. The Speaker Recognition System is designed for the automatic authentication of speaker's identity which is truly based on the human's voice. Mel Frequency Cepstrum coefficient (MFCC) and Linear Prediction Cepstrum coefficient (LPCC) are taken in use for feature extraction from the provided voice sample. This paper provides a comparative study of MFCC and LPCC based on the accuracy of results and their working methodology. The results are better if MFCC is used for feature extraction
Synthesis of novel benzo[4,5]imidazo[1,2-a]pyrimido- [4,5-d]pyrimidine derivatives as potent antimicrobial agents
445-453Synthesis of novel benzo[4,5]imidazo[1,2-a]pyrimido[4,5-d] pyrimidines 5/6 has been achieved by reaction of 2-amino-4-aryl-4,10-dihydrobenzo[4,5]imidazo[1,2-a]pyrimidine-3-carbonitriles 4 with formaldehyde/urea. The key intermediate 4, is obtained by reaction of 2-aminobenzaldehyde 1 with aromatic aldehyde and malononitrile by a three-component one-pot process. The newly synthesized title compounds 5/6 have been evaluated for their in vitro antimicrobial activity. Compounds 5 and 6 exhibit potent antimicrobial activity compared to that of standard drugs
Epidemiological Profile of Complete Suicidal Poisoning Cases Autopsied at Autopsy Centre, RIMS, Ranchi
Background: Suicidal behaviour is any deliberate action that has potentially life-threatening consequences, such as taking a drug overdose, deliberately consuming poison, hanging, drowning, burn etc. The aim of this study was to illustrate the epidemiological profile of complete suicidal poisoning cases autopsied at Department of Forensic Medicine and Toxicology, Rajendra Institute of Medical Sciences, Ranchi, India.Methods: All cases autopsied at autopsy centre of department of forensic medicine and toxicology between April 2013 to October 2014 evaluated. Data obtained from the Information regarding the socio-demographic, mode of suicides, time of incidence, place of incidence, occupation, etc were gathered from the police papers like inquest report, dead body challan etc, and through detailed interviews of the relatives, neighbours, friends, and police officials accompanying the dead bodies.Results: Total 3492 cases were autopsied, out of which only 180 cases were due to acute self-poisoning, suicidal in nature. This was 5.2% of the total cases autopsied at centre. The ratio of male and female suicide by poisoning was almost equal (M: F = 1.22: 1). The majority of victims were married, unemployed, from joint family and middle economic class. The most important agents of poisoning were agrochemical pesticides among these majorities were due to organophosphate.Conclusion: More than 50% of victims from both male and female were in between 15 years to 30 years. The maximum victims were consumed poison at evening (between 4 PM to 8 PM) during summer season. The Agrochemicals were the preferred agents with organophosphates alone responsible for about 50% of suicidal mortalities followed by aluminium phosphide
Structure Related to Morphine
Synthesis of 2-N-heptyl-5,9-dimethyl-6,7-benzomorphan from 3,4-lutidine was effected in three step process and only a-form could be obtained through phosphoric acid cyclisation. This a-form of benzomorphan was converted in three steps to a-2N-hepthyl-2-hydroxy-5,9-dimethyl-6,7-benzomorphan, which was also synthesised from alternative route. Infrared spectrum of the base confirmed the presence of a-from
Bio- Matric Intelligent ATM System
Now a day, peoples have multiple bank accounts so money transactions play a vital role in the nature of trade. Today, ATMs and Credit cards are used for this purpose, the authentication of these transactions are unsecure. To overcome this shortcoming of money transactions, we proposes the idea of using fingerprints of customers as login multiple banking password in place of traditional pin number. Here, if the fingerprint is recognized, then it display the multiple banking screen. Then we can choose the bank which we need for transaction. The remaining feature are same as i.e., a reference fingerprint of the nominee or a close family member of the customer can be used if the customer is not available in case of emergencies. This proposed business model helps the society, mainly the rural people, by enhancing the security using Fingerprint recognition in Digital image processing. As the fingerprint of every person is unique and unchangeable, this biometric feature is used over the others
Comparative study for modal analysis of circular plates with various cutouts and end conditions
The applicational use of structural members in engineering and technology may take the form of a circular plate, for such members it becomes important to predict the vibrational characteristics when operated closer to resonance phenomena. In addition to, the effect of the cutout in the circular plate has a significant effect on modal characteristics. The part of the research work entitled in this paper emphasizes on the modal analysis of a circular plate with clamped boundary condition determined by the characteristics equation and mode shapes of the plate using FEM. The effects of inclusion of cut-out on the vibrational characteristics are discussed. The subject of the analysis was a circular plate considered with certain modifications i.e. free circular plate without cutout clamped on the outer periphery, circular plate with cut-out clamped on the outer periphery, circular plate with cutout clamped on the outer and inner periphery. The methodology applied to conventional material based circular plate is extended to Glass epoxy circular plate with the same set of modifications. The values of natural frequencies for various cases are tabulated and corresponding mode shapes are illustrated
Self-Organized Dynamical Equilibrium in the Corrosion of Random Solids
Self-organized criticality is characterized by power law correlations in the
non-equilibrium steady state of externally driven systems. A dynamical system
proposed here self-organizes itself to a critical state with no characteristic
size at ``dynamical equilibrium''. The system is a random solid in contact with
an aqueous solution and the dynamics is the chemical reaction of corrosion or
dissolution of the solid in the solution. The initial difference in chemical
potential at the solid-liquid interface provides the driving force. During time
evolution, the system undergoes two transitions, roughening and
anti-percolation. Finally, the system evolves to a dynamical equilibrium state
characterized by constant chemical potential and average cluster size. The
cluster size distribution exhibits power law at the final equilibrium state.Comment: 11 pages, 5 figure
A Bio-Crypto Protocol for Password Protection Using ECC
In information security the following security parameters like, integrity , non repudiation and confidentiality , authentication must be satisfied. To avoid thievery of organization resources it needs be secured in more efficient way and there is always demand for different levels of security attacks include virus , brute force and Eveadroper in business that organizations make use of voice biometrics an attractive low-cost. Voice biometrics is the cheapest among the other biometrics and used all levels for management to buy readily available metric and it is the way of identifying individuals remotely with high level of accuracy . In this work, we have been designed a new password- authentication approach that provides security using voice biometrics for authentication and uses the device itself into an authenticator which uses voice itself as its passwords and we are primarily interested in keys that can be temporally reproduced on the same device from the same user’s voice. Public and private keys are generated randomly from the user's voice and stored in the voice file(.wav).This Method uses voice recognition , include the operation of register( recording feature ) or voice prints and storing of one or more voice passwords into the database. It uses ECDSA to perform the authentication process that matching the voice sample with the database. The recognition, entity makes the database to decide that the sample is matched to perform an operation or not. Our proposed approach generates cryptographic keys from voice input itself and this algorithm developed an adhoc basis. It can effectively defend attacks specially brute force attack in system networks
Community-Specific BMI Cutoff Points for South Indian Females
Objective. To analyze multiparameters related to total body composition, with specific emphasis on obesity in South Indian females, in order to derive community-specific BMI cutoff points. Patients and Methods. A total number of 87 females (of age 37.33 ± 13.12 years) from South Indian Chennai urban population participated in this clinical study. Body composition analysis and anthropometric measurements were acquired after conducting careful clinical examination. Results. BMI demonstrated high significance when normal group (21.02 ± 1.47 kg/m2) was compared with obese group (29.31 ± 3.95 kg/m2), P < 0.0001. BFM displayed high significance when normal group (14.92 ± 4.28 kg) was compared with obese group (29.94 ± 8.1 kg),
P < 0.0001. Conclusion. Community-specific BMI cutoffs are necessary to assess obesity in different ethnic groups, and relying on WHO-based universal BMI cutoff points would be a wrong strategy
- …