785 research outputs found

    Tool handle design for power GRIP

    Get PDF
    The use of tools is still widely appreciated in industries at various levels. The range of their application varies from a simple task like hammering to a complicated, complex and precision-demanding tasks such as that of surgical scalpels. Hence, it becomes highly essential to design the tool for ‘comfort’ from the perspective of user. The aim of this study is to design a tool handle for a task involving a simple power grip such as hammer. The focus of this study is mainly confined to identify the right cross-section and profile of the tool handle, based on subjective experimentation of a group of subjects and find the approximate dimension and shape(of both cross-section and profile) which outstands in subject’s perception of comfort. In this study, a new criteria for decision making has been employed during a brief subjective analysis to find out the better cross- section shape among the various possible shapes for the handle. The shape of the profile has been reverse engineered from an existing tool handle using a CAD software which was been rated high in market. At various turns during this study, new simplified approaches were used to accomplish certain tasks which can be considered as reasonable approximation to standard methods. The final step is to evaluate the design which has been perceived most comfortable by the subjects, using a subjective analysis through hand-mapping of discomfort

    Randomized clinical study comparing safety and efficacy of adjuvant intrathecal clonidine versus normal saline along with bupivacaine anaesthesia in lower limb surgery patients

    Get PDF
    Background: Various adjuvants have been used in intrathecal anesthesia to avoid intraoperative visceral and somatic pain and prolong postoperative analgesia. Clonidine, partially selective α2-agonist, is being evaluated as a neuraxial adjuvant with intrathecal bupivacaine. The objective of the study was to evaluate and compare safety and efficacy of intrathecal clonidine as adjuvant to bupivacaine with control normal saline.Methods: American Society of Anesthesiologist grade 1 and 2 patients (60 patients) were randomly divided into two groups of 30 patients each for lower limb surgeries. Study group injected with intrathecal 3ml of 0.5% Bupivacaine heavy (15mg) + 1µg/kg of clonidine and control group injected with 3ml of 0.5% Bupivacaine heavy (15mg) + equivalent dose of normal saline. The onset and duration of sensory and motor block, duration of analgesia, and the incidence of side effects in both groups were observed and compared.Results: Time for 2 segment regressions in study group was 186.17±25.92 minutes compared to control was 103.20±19.15 minutes (p value<0.001). Total duration of analgesia in control was 226.50±35.69 minutes and in the study group was 465.67±100.37 minutes (p value<0.001). The average duration of motor block in control group was 181.17±26.12 minutes compared to study group was 217.80±41.51 minutes (p value<0.001). The small dose of intrathecal clonidine is not significantly associated with systemic side effects such as bradycardia and hypotension.Conclusions: Clonidine added to bupivacaine for intrathecal anesthesia effectively increases the duration of sensory block, duration of motor block and duration of analgesia and does not produce any significant hemodynamic changes. No significant side effects are associated with it

    An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem

    Get PDF
    Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers.  Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.

    Analysing security risk of a cloud computing system to produce a model for secured business environment

    Get PDF
    These days, almost all the medium and big size of businesses is using the cloud computing system to run their business across the globe and around the clock. It becomes popular and of huge application due to its characteristics such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. This is an affordable and effective place for businesses to sell and promote their goods and services. However the security problems for the cloud computing system are very significant. It can ruin the rapid development of cloud computing. In Business, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. The data privacy and service availability in cloud computing are the key security problem. The internet also provides opportunities for fraudulent behaviour and unauthorized access to business and client data. Attacks on the computer system of a business can have immediate and ongoing effects, such as targeting customers for identity crimes or infecting website visitors with malicious software. Due to having combination of various types of models in the cloud computing, the single security method cannot solve its security problem. Various traditional and new technologies and strategies together need to consider for protecting a cloud computing system totally. The aim of this paper is to bring into the deep sight of the cloud computing systems working and then to analyse the cloud computing security problem and its strategy according to the cloud computing concepts and characters. In addition to that, we are identifying the higher vulnerabilities in this type of systems and the most important threats found in the literature study related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with the possible solutions

    Software Reliability Using SPRT: Burr Type III Process Model

    Get PDF
    Increased dependence on software systems elicited the assessment of their reliability, a crucial task in software development. Effective tools and mechanisms are required to facilitate the assessment of software reliability. Classical approaches like hypothesis testing are significantly time consuming as the conclusion can only be drawn after collecting huge amounts of data. Statistical method such as Sequential Analysis can be applied to arrive at a decision quickly. This paper implemented Sequential Probability Ratio Test (SPRT) for Burr Type III model based on time domain data. For this, parameters were estimated using Maximum Likelihood Estimation to apply SPRT on five real time software failure datasets borrowed from different software projects. The results exemplify that the adopted model has given a rejection decision for the used datasets

    Multiple Feature Fuzzy c-means Clustering Algorithm for Segmentation of Microarray Images

    Get PDF
    Microarray technology allows the simultaneous monitoring of thousands of genes. Based on the gene expression measurements, microarray technology have proven powerful in gene expression profiling for discovering new types of diseases and for predicting the type of a disease. Gridding, segmentation and intensity extraction are the three important steps in microarray image analysis. Clustering algorithms have been used for microarray image segmentation with an advantage that they are not restricted to a particular shape and size for the spots. Instead of using single feature clustering algorithm, this paper presents multiple feature clustering algorithm with three features for each pixel such as pixel intensity, distance from the center of the spot and median of surrounding pixels. In all the traditional clustering algorithms, number of clusters and initial centroids are randomly selected and often specified by the user.  In this paper, a new algorithm based on empirical mode decomposition algorithm for the histogram of the input image will generate the number of clusters and initial centroids required for clustering.   It overcomes the shortage of random initialization in traditional clustering and achieves high computational speed by reducing the number of iterations. The experimental results show that multiple feature Fuzzy C-means has segmented the microarray image more accurately than other algorithms

    Clustering Algorithm Combined with Hill Climbing for Classification of Remote Sensing Image

    Get PDF
    Clustering is an unsupervised classification method widely used for classification of remote sensing images.  As the spatial resolution of remote sensing images getting higher and higher, the complex structure is the simple objects becomes obvious, which makes the classification algorithm based on pixels being losing their advantages. In this paper, four different clustering algorithms such as K-means, Moving K-means, Fuzzy K-means and Fuzzy Moving K-means are used for classification of remote sensing images. In all the traditional clustering algorithms, number of clusters and initial centroids are randomly selected and often specified by the user. In this paper, a hill climbing algorithm for the histogram of the input image will generate the number of clusters and initial centroids required for clustering.   It overcomes the shortage of random initialization in traditional clustering and achieves high computational speed by reducing the number of iterations. The experimental results show that Fuzzy Moving K-means has classified the remote sensing image more accurately than other three algorithms.DOI:http://dx.doi.org/10.11591/ijece.v4i6.660

    Dissection of Mobility Model Routing Protocols in MANET on QoS Criterion

    Get PDF
    Essential difficulties in Mobile Ad Hoc Networks (MANET) are routing selection and Quality of Service(QoS) support. Several different approaches have been described in the literature, and a number of performance simulations have been produced, in an attempt to tackle this challenging problem. In this study, we take a close look at the relative merits of several popular routing protocols. In this research, we looked into how changing QoS parameters in tandem with routing protocol choices affected network throughput. Typical measures for measuring network efficiency include average throughput, packet delivery ratio (PDR), average delay, and power usage. NS-3 is used to run the simulations

    Nanoindentation studies on waveguides inscribed in chalcogenide glasses using ultrafast laser

    Get PDF
    Optical straight waveguides are inscribed in GeGaS and GeGaSSb glasses using a high repetition-rate sub-picosecond laser. The mechanical properties of the glasses in the inscribed regions, which have undergone photo induced changes, have been evaluated by using the nanoindentation technique. Results show that the hardness and elastic modulus of the photo-modified glasses are significantly lower as compared to the other locations in the waveguide, which tend to be similar to those of the unexposed areas. The observed mechanical effects are found to correlate well with the optical properties of the waveguides. Further, based on the results, the minimum threshold values of hardness and elastic modulus for the particular propagation mode of the waveguide (single or multi), has been established
    corecore