1,957 research outputs found

    An Efficient Vein Pattern-based Recognition System

    Full text link
    This paper presents an efficient human recognition system based on vein pattern from the palma dorsa. A new absorption based technique has been proposed to collect good quality images with the help of a low cost camera and light source. The system automatically detects the region of interest from the image and does the necessary preprocessing to extract features. A Euclidean Distance based matching technique has been used for making the decision. It has been tested on a data set of 1750 image samples collected from 341 individuals. The accuracy of the verification system is found to be 99.26% with false rejection rate (FRR) of 0.03%.Comment: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis

    Vortices in Superfluid Fermi Gases through the BEC to BCS Crossover

    Get PDF
    We have analyzed a single vortex at T=0 in a 3D superfluid atomic Fermi gas across a Feshbach resonance. On the BCS side, the order parameter varies on two scales: kF−1k_{F}^{-1} and the coherence length ξ\xi, while only variation on the scale of ξ\xi is seen away from the BCS limit. The circulating current has a peak value jmaxj_{max} which is a non-monotonic function of 1/kFas1/k_F a_s implying a maximum critical velocity ∼vF\sim v_F at unitarity. The number of fermionic bound states in the core decreases as we move from the BCS to BEC regime. Remarkably, a bound state branch persists even on the BEC side reflecting the composite nature of bosonic molecules.Comment: 4 Pages, 4 Figure

    Different Attacks in the Network: A Review

    Full text link
    Network security is protection of the files which can be stored information in network against hacking, misuse. Network security involves the authorization or access to data which is controlled by the network administrator. Users are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Today anyone person can become a hacker which downloading tools from the internet. Nowadays security is becoming vital in case of networking because everyday a new kind of attack is generated which leads to compromise our network and have security in network is decreasing because of increase in number of attacks. In this paper we have shown the comparison between different types of attacks in a network in a tabular form

    Virtual Customer: Communication for E-Business

    Full text link
    Volume 2 Issue 7 (July 2014

    Clinical and radiological outcome of 3- and 4-part proximal humerus fracture managed with J nails in elderly osteoporotic individuals

    Get PDF
    Background: Proximal humeral fracture is 3rd most common fracture in elderly population. Selection of appropriate implant is always challenging to get optimum results in these osteoporotic bones. Though locking plates are gold standard, major complications range from 9% to 36%. To study clinical and radiological outcome of J nail technique for Neer’s three or four part proximal humeral fractures in patients more than 60 years age.Methods: We retrospectively studied 60 patients of 3 or 4 part proximal humeral fractures, >60 years of age treated with J nail technique from the period of 2015 to 2017. J nails were made using 2 mm 12 inches blunt tip Lambrinudi wires. At final follow-up, clinical outcome was assessed using constant score and radiological evaluation was done according to the Bahr criteria.Results: The mean constant score at final follow-up was 90. The postoperative reduction was excellent in 98% of patients and remained excellent in 90%. The mean postoperative neck shaft angle was 135.0° and final neck shaft angle was 131.4°. No deep infection was seen. No avascular necrosis of humeral head was found till follow up to 2 years.Conclusions: Our study suggests that the functional and radiological outcomes obtained with J nailing are excellent and similar to locking plates and percutaneous Kirschner wire fixation with many other advantages of being simple, minimally invasive, avoiding muscle transfixation and no pin site infections
    • …
    corecore