1,135 research outputs found

    Discrimination of form in images corrupted by speckle

    Get PDF
    The problem investigated is that of a human observer having to distinguish between certain specified geometrical forms corrupted by speckle-an idealization of the problem of a scientist studying a synthetic aperture radar map. Specifically, the cases of two simple alternative forms and of two and four orientations of a simple form have been considered. A theoretical model is developed for the observer's decision process by analogy with optimal receiver theory, and the probability of a correct decision is related to form parameters like size, contrast, and looks. These calculations are verified by psychophysical experiments using computer-simulated pictures

    Efficient And Control Data Procedure Authentication In Cloud Storage

    Get PDF
    Modern experimental software, for example, "Guaranteed Access to Data" and "Evidence of Inability to Obtain Data" have been implemented to address this problem, but have made it possible to analyze data sets for these reasons insufficient. Users can no longer access the cloud for their data; just how to ensure the integrity of external data becomes an uphill challenge.  Strong supporting data. In addition, the heroes of these programs often become the record holders and always focus on finding a dishonest company based on the cloud even though people also act in a reckless way. This document recommends an open audit plan with strong data support forces and regulatory trials for potential conflicts. Specifically, we design a variables list to remove restrictions on the use of the name in tagging in existing programs and to better facilitate the dynamic handling of data. In order to properly address the issue and ensure that no party is likely to act inappropriately without being noticed, we address the issue of harassment and ensure an exchange of views to formulate appropriate provisions, to ensure that any disputes arise that can be resolved. Security research shows that our strategy is likely to be stable, and a performance analysis shows that there is a wealth of robust data and related legal disputes

    Consistent Information For IoT In Elegant System With The Hold Up Of Cloud

    Get PDF
    This adds to the search query for data labels, and is an important way to make all cipher models available in the refrigerator before selling to cloud computing, or perhaps more than any information on select if not development is not fully reliable. We framed our plans by attacking selected key data. We conducted the survey results slowly and appeared on a database of supporting data and data providers. We recognize different actions and keywords in our designs. These words are ideal for files, but they do mean things that people use. In addition, using branding agents and file folders, the component program is suitable for general publishing offices and enjoys user development. Unlike current employees allowed by a new search system, our options can satisfy the process of dismissal and granulation at the same time. Unlike the analysis of historical data, our system allows the search for permission and the use of data to generate data to reset data. Monitoring skills are a clear indication of the level of care in the system and in addition to the number of certified employees. This is why the right to preparation is so important for any prison, for example the year. Our ABKS-UR techniques are designed for the design and extraction of global data in real-world realities, with the ease of reading, with respect to integration

    Low-Power, Low-Cost, & High-Performance Digital Designs : Multi-bit Signed Multiplier design using 32nm CMOS Technology

    Get PDF
    Binary multipliers are ubiquitous in digital hardware. Digital multipliers along with the adders play a major role in computing, communicating, and controlling devices. Multipliers are used majorly in the areas of digital signal and image processing, central processing unit (CPU) of the computers, high-performance and parallel scientific computing, machine learning, physical layer design of the communication equipment, etc. The predominant presence and increasing demand for low-power, low-cost, and high-performance digital hardware led to this work of developing optimized multiplier designs. Two optimized designs are proposed in this work. One is an optimized 8 x 8 Booth multiplier architecture which is implemented using 32nm CMOS technology. Synthesis (pre-layout) and post-layout results show that the delay is reduced by 24.7% and 25.6% respectively, the area is reduced by 5.5% and 15% respectively, the power consumption is reduced by 21.5% and 26.6% respectively, and the area-delay-product is reduced by 28.8% and 36.8% respectively when compared to the performance results obtained for the state-of-the-art 8 x 8 Booth multiplier designed using 32nm CMOS technology with 1.05 V supply voltage at 500 MHz input frequency. Another is a novel radix-8 structure with 3-bit grouping to reduce the number of partial products along with the effective partial product reduction schemes for 8 x 8, 16 x 16, 32 x 32, and 64 x 64 signed multipliers. Comparing the performance results of the (synthesized, post-layout) designs of sizes 32 x 32, and 64 x 64 based on the simple novel radix-8 structure with the estimated performance measurements for the optimized Booth multiplier design presented in this work, reduction in delay by (2.64%, 0.47%) and (2.74%, 18.04%) respectively, and reduction in area-delay-product by (12.12%, -5.17%) and (17.82%, 12.91%) respectively can be observed. With the use of the higher radix structure, delay, area, and power consumption can be further reduced. Appropriate adder deployment, further exploring the optimized grouping or compression strategies, and applying more low-power design techniques such as power-gating, multi-Vt MOS transistor utilization, multi-VDD domain creation, etc., help, along with the higher radix structures, realizing the more efficient multiplier designs

    Audit And Several Access Control And Consensually For Cloud Storage

    Get PDF
    Our Design Is Suitable For Devices With Limited Resources. If Someone In The Group Intentionally Discloses The Secret Address To The Public To The Victim, He Or She Can Do So With His Private Key.  The User Leaves The User Object, While The Console Simply Deletes Their Primary Key Combination, Which Means That The Personal Keys Are Associated With Permanent Features. To Explain This Attack, A Reliable Example Is Provided. We Demonstrated Safety In Our Software Under Diffie-Hellman Divisible Co Positioning (DCDH). Unfortunately, The ABE Plan Requires High Computational Overheads While Implementing And Understanding Tagged File Systems. This Defect Becomes More Serious For Cleaning Machines Due To The Limited Use Of Materials. In This Way, We Focus On Designing The Club Penguin-ABE Guide With Well Defined Cancellation Of The Storage System. Our Experience Shows That Local Equipment Prices Are Very Low And Can Be Improved. We Try To Create An Example Of A Collaborative Attack By Users Who Have Worked With Existing Users. In Addition, We Are Building A Plan For Club Penguin-ABE To Take Advantage Of The Risks By Increasing The Existing Plan And Validating Our Plan To Become A Safe CPA According To Selected Models

    IN VITRO ANTIOXIDANT ACTIVITY OF ETHANOLIC EXTRACT OF TERMINALIA CATAPPA LEAVES

    Get PDF
    Objectives: Free radicals are the important role in causing various kinds of diseases. Free radicals neutralized with the help of antioxidants, so the aimof this study is to find out the antioxidant potential of ethanolic extract of Terminalia catappa Linn. leaves by in vitro models.Methods: The plant material is collected, authenticated, dried, and grind into powder. The powdered plant material is subjected to successivelySoxhlet extraction with a solvent of ethanol. Ethanol extract of leaves were taken and the extract is subjected to reducing power assay, H assay,nitric oxide assay, and 2,2-diphenylpicrylhydrazyl (DPPH) assay by using standardized methods.Results: The results of all the assays proved that the ethanolic extract of T. catappa has an antioxidant potential on a dose-dependent manner. Thehighest percentage of reducing power (78.04%) is recorded at 500 μg/ml, 500 µg/ml have a (56.4%) of scavenging activity, (74.68%) activity ofnitrous oxide production and DPPH percentage of inhibition is (99.6%). The results were compared with the antioxidant activity of standard ascorbicacid.Conclusion: The study proves that the ethanolic extract of T. catappa leaves is a good source of antioxidants, and future medicated world choose thisphytochemical constituent rich plant for their drug preparation after the deepness of research. In all the methods the plant leaves has been found topossess the antioxidant activity. which may be the responsible for various therapeutic properties. The current study showing that T.catappa is havinghigh quantity of phytochemicals and a worthy source of natural antioxidants. Using this kind of herbal medicine we can lead the life with harmlessdrug for harmful illness.Keywords: Terminalia catappa, Reducing power assay, Hydrogen peroxide assay, Nitric oxide assay and 2-2-diphenyl-1-picrylhydrazylassay

    Antidiabetic effect of 2 nitro benzimidazole in alloxan induced diabetic rats

    Get PDF
    Background: The objective of study was to evaluate the antidiabetic activity of 2 nitro benzimidazole in alloxan induced diabetes in rats.Methods: Alloxan induced diabetic rats (n = 6) were administered 2 nitro benzimidazole (15 mg/kg, p.o.) or vehicle (gum acacia solution) or standard drug glibenclamide (10 mg/kg) for 7days. Blood samples were collected from the tail vein and blood glucose levels were estimated on days 1, and 7 at 0, 2, 4 and 6 hr after administration of drug by a glucometer. Results: The test drug 2 nitro benzimidazole induced significant reduction (P < 0.001) of blood glucose levels in alloxan induced diabetic rats at 2nd and 4 hr comparable with glibenclamide on the 1 and 7th days. The results were analyzed for statistical significance using one-way ANOVA, followed by Dunnet's test. P < 0.05 was considered significant.Conclusion: 2 nitro benzimidazole exhibited significant antihyperglycemic activity in alloxan-induced diabetic rats comparable to that of the standard drug glibenclamide

    A comparative study of safety and efficacy of tiotropium bromide with salbutamol in moderate persistent bronchial asthma in a tertiary care hospital

    Get PDF
    Background: The objective of this study was to compare the safety and efficacy of tiotropium bromide with salbutamol in moderate persistent cases of bronchial asthma at tertiary care hospital. Methods: This was an open label, randomized parallel group study done in Government General Hospital, Srikakulam for a period of 12 weeks. Group-1 was given tiotropium bromide metered dose inhalational therapy 18mcg once daily in 50 patients. Group-2 was given salbutamol metered dose inhalational therapy 100mcg thrice daily in 30 patients. Results: Symptomatic improvement was observed in l two groups. At end point, mean FEV1 in tiotropium bromide treatment group improved by 149.96% compared with 135.16% salbutamol treatment group. At end point, mean FVC value in tiotropium bromide treatment group improved by 145.71% compared with 122.34% in salbutamol group. Mean FEV1 / FVC also improved by 155.41% in tiotropium bromide group compared with 105.41 % in salbutamol group.Conclusion: The present study proved tiotropium provide superior safety and efficacy relative to control drug in bronchial asthma patients in both clinical assessment score and spirometrically.
    • …
    corecore