2,989 research outputs found

    Effect of Copper Oxide on Dielectric and Magnetic Properties of Substituted Sr-M Hexaferrite

    Get PDF
    Effect of CuO addition on the hexagoal ferrite (SrCo1.3Ti1.3Fe9.4O12-d) has been investigated. (Co-Ti-Sr)- M hexaferrite compositions were synthesized by sol-gel auto combustion method. Pure ferrite phase was achieved after cacination at 1200°C. However the addition of copper oxide resulted in decomposition of hexagonal ferrite phase into CoFe2O4 phase. In case of 1.5 weight % CuO added specimen, the material was composed of cobalt ferrite and CuO based phases. Densification study shows that bulk density increases with increase of CuO as well as grain size also increases. Permittivity of the ferrites increases with increase in CuO addition and it was highest in 1.5 weight% CuO containing sample. This is due to formation of cubic ferrite phase

    Hire the Experts: Combinatorial Auction Based Scheme for Experts Selection in E-Healthcare

    Full text link
    During the last decade, scheduling the healthcare services (such as staffs and OTs) inside the hospitals have assumed a central role in healthcare. Recently, some works are addressed in the direction of hiring the expert consultants (mainly doctors) for the critical healthcare scenarios from outside of the medical unit, in both strategic and non-strategic settings under monetary and non-monetary perspectives. In this paper, we have tried to investigate the experts hiring problem with multiple patients and multiple experts; where each patient reports a preferred set of experts which is private information alongwith their private cost for consultancy. To the best of our knowledge, this is the first step in the direction of modeling the experts hiring problem in the combinatorial domain. In this paper, the combinatorial auction based scheme is proposed for hiring experts from outside of the hospitals to have expertise by the preferred doctors set to the patients.Comment: 7 Page

    Novel Schemes for Authentication

    Get PDF
    Authentication is one of the most basic process to provide security to any resource and application from unauthorized access. It covers two security goals confidentiality and integrity. Passwords are used as private identity for an individual. The password also has to be protected from several threats like stealing, shoulder surfing, eavesdropping and guessing. The most common method used for user Authentication is textual password using alphanumeric usernames and alphanumeric passwords. The issues which should be kept in mind while choosing a password is the how strong the password is and how good it is to memorize. Sometimes the stronger passwords are not easier to remember and easier passwords are not so secure. One more criteria for a good password, that should satisfy is, the password should be easy to type, such that any intruder, if any, is there beside you should not be able guess it or any camera behind you can’t capture the actual movements. To overcome the drawbacks of traditional textual schemes the new methods like graphical passwords are used. The easiness in remembering them and a strong resistance towards the brute force and dictionary attacks made them more popular. In this project, we have concentrated to protect our password from the above threats and to develop a system which has a strong resistant to above stated threats. We have implemented a varying password scheme which provides a better resistant to shoulder surfing, eavesdropping and guessing. This is an untraditional approach to use a not very complex and not very strong password in unsafe environments like public places. We have implemented the virtual keyboard and to make it more effective we are using multilingual keys. And also a hybrid system is designed by mixing three schemes: textual passwords, Recognition based passwords and Recall based password. All three are working together to remove the drawbacks of each scheme

    A rapid and reproducible method for isolating genomic DNA from a few crop plants suitable for polymerase chain reaction-based genotyping

    Get PDF
    As most of the molecular markers in crop molecular breeding programmes are successful based on polymerase chain reaction (PCR), the isolated genomic DNA must be suitable for the same. Though PCR is a robust method and in most of the cases requires only a minute amount of genomic DNA as template, removal of potential PCR-inhibitory factors is quite important. The present work reports the optimization of a rapid genomic DNA isolation method, suitable for PCR-based genotyping of plants. As very minute amount of the genomic DNA isolated in this rapid method was found to be sufficient for PCR, a researcher is capable to go for several hundred independent PCR from single isolation. The method was validated in 4 different crops (wheat, tomato, brinjal and cauliflower) using different PCR-based molecular markers. In case of wheat, genomic DNA isolated in this method was found to be suitable PCR using the specific marker for the detection of the Lr34 gene. For tomato, genomic DNA isolated in this method was successfully used with the molecular markers for the detection of resistance alleles for yellow leaf curl disease and root knot disease. In case of brinjal, the isolated genomic DNA was found to be suitable for simple sequence repeat (SSR) marker assay. In a similar way, genomic DNA isolated in this method from cauliflower leaves was observed to be suitable for amplifying a gene of ~1.5 kb length. Thus, this method will be quite helpful to expedite marker assisted selection of plants in plant molecular breeding programmes

    FPGA Implementation of Advanced Encryption Standard

    Get PDF
    Security is a crucial parameter to be recognized with the improvement of electronic communication. Today most research in the field of electronic communication includes look into on security concern of communication. At present most by and large consumed and recognized standard for encryption of data is the Advanced Encryption Standard. AES was transformed to supplant the developing Data Encryption Standard. The AES calculation is fit for handling cryptographic keys which are of 256, 128, & 192 bits to encode & unscramble data in squares of 128 bits. The center of the calculation is made up of four key parts, which manage 8 bit data pieces. The whole 128 bit data to the calculation is dealt with into a 4 x 4 grid termed a state, to obtain the 8 bit square. Considering the complex nature of advance encryption standard (AES) algorithm, it requires a huge amount of hardware resources for its practical implementation. The extreme amount of hardware requirement makes its hardware implementation very burdensome. During this research, a FPGA scheme is introduced which is highly efficient in terms of resource utilization. In this scheme implementation of AES algorithm is done as a finite state machine (FSM). VHDL is used as a programming language for the purpose of design. Data path and control unit are designed for both cipher and decipher block, after that respective data path and control unit are integrated using structural modeling style of VHDL. Xilinx_ISE_14.2 software is being used for the purpose of simulating and optimizing the synthesizable VHDL code. The working of the implemented algorithm is tested using VHDL test bench wave form of Xilinx ISE simulator and resource utilization is also presented for a targeted Spartan3e XC3s500e FPGA
    corecore