293 research outputs found

    Approximation by gradients

    Get PDF

    Localization of Copy-Move Forgery in speech signals through watermarking using DCT-QIM

    Get PDF
    Digital speech copyright protection and forgery identification are the prevalent issues in our advancing digital world. In speech forgery, voiced part of the speech signal is copied and pasted to a specific location which alters the meaning of the speech signal. Watermarking can be used to safe guard the copyrights of the owner. To detect copy-move forgeries a transform domain watermarking method is proposed. In the proposed method, watermarking is achieved through Discrete Cosine Transform (DCT) and Quantization Index Modulation (QIM) rule. Hash bits are also inserted in watermarked voice segments to detect Copy-Move Forgery (CMF) in speech signals. Proposed method is evaluated on two databases and achieved good imperceptibility. It exhibits robustness in detecting the watermark and forgeries against signal processing attacks such as resample, low-pass filtering, jittering, compression and cropping. The proposed work contributes for forensics analysis in speech signals. This proposed work also compared with the some of the state-of-art methods

    Localization of Copy-Move Forgery in speech signals through watermarking using DCT-QIM

    Get PDF
    Digital speech copyright protection and forgery identification are the prevalent issues in our advancing digital world. In speech forgery, voiced part of the speech signal is copied and pasted to a specific location which alters the meaning of the speech signal. Watermarking can be used to safe guard the copyrights of the owner. To detect copy-move forgeries a transform domain watermarking method is proposed. In the proposed method, watermarking is achieved through Discrete Cosine Transform (DCT) and Quantization Index Modulation (QIM) rule. Hash bits are also inserted in watermarked voice segments to detect Copy-Move Forgery (CMF) in speech signals. Proposed method is evaluated on two databases and achieved good imperceptibility. It exhibits robustness in detecting the watermark and forgeries against signal processing attacks such as resample, low-pass filtering, jittering, compression and cropping. The proposed work contributes for forensics analysis in speech signals. This proposed work also compared with the some of the state-of-art methods

    EFFECTIVE IMPLEMENTATION TECHNIQUES OF RECONFIGURABLE ANTENNAS FOR COGNITIVE RADIO ENVIRONMENTS

    Get PDF
    : The growing demand for the wireless connectivity has insisted a new communication technique to exploit the usage of spectrum in an efficient way. Cognitive Radio has been introduced as a resource for the effective usage of the spectrum by means of exploiting existence of spectrum holes. The notion of Reconfigurability has turn into an essential aspect of recent, radio-frequency, agile systems for wireless as well as space communications. Reconfigurable antennas are necessary to cover various wireless services that are spanned on extensive frequency range and they have multi-functional properties like sensing the spectrum and communicate at a stretch, hence are better suited for the Cognitive Radio (CR) environments.  This paper explains the basic concepts, effective design and implementation techniques of various types of reconfigurable antennas, methods of Reconfigurability along with their applications. The Reconfigurability can be achieved either in terms of frequency, radiation pattern or polarization by implementing suitable switching mechanism. The switching methods in the design of reconfigurable antenna for cognitive radio environments have been presented. Reconfigurability of the antenna have made the Cognitive Radio so popular as it conveniently  utilizes the unused  spectrum both for sensing and communicating without disturbing the licensed users

    MIDDLEWARE INTEREST GROUPS THROUGH PEER TO PEER NETWORK FILE PASSING SYSTEM

    Get PDF
    Middleware Interest-Groups Efficient file query is important to the over all performance of peer-to-peer (P2P) file passing system. However, few current works are able to cluster peers based on both peer interest and physical proximity. Although structured P2Ps provide higher file query efficiency than structured P2Ps, it is difficult to realize it due to their file strictly defined topologies. First, of files that are frequently requested by a group of physically close nodesin their location. It builds an overlay for each group that connects lower capacity to higher capacity nodes for distributed file passing while avoiding node overload and performance. Increases file sharing without any restrictions, and information passing using bloom filter

    Effect of Fe on the Martensitic Transition, Magnetic and Magnetocaloric Properties in Ni-Mn-In Melt-spun Ribbons

    Get PDF
    The effect of Fe on the martensitic transitions, magnetic and inverse magnetocaloric effect in Ni47Mn40-xFexIn13 ribbons (x = 1, 2, 3 and 5) has been investigated. All the ribbon compositions under study have shown the presence of austenite phase at room temperature. The variation of martensitic transition with the increase in Fe-content is non-monotonic. The thermal hysteresis of the martensitic transition increased with the increase in Fe-content. The martensitic transitions shifted to lower temperatures in the presence of high magnetic fields. A maximum magnetic entropy change (∆SM) of 50 Jkg-1K-1 has been achieved in the Ni47Mn38Fe2In13 (x = 1) ribbon at 282 K for an applied field of 5 T

    Antimicrobial activity, toxicity and accumulated hard-tissue debris (AHTD) removal efficacy of several chelating agents

    Get PDF
    Aim: To evaluate the antimicrobial, toxicity and cleaning effectiveness of ethylenediaminetetraacetic acid (EDTA) and maleic acid (MA) alone and combined with cetrimide (CTR). Methodology: Cytotoxic and genotoxic effects were assessed on Chinese hamster cells V79 using the MTT, clonogenic and micronucleus assays, respectively. The bacterial inhibitory and bactericidal concentrations (MIC and MBC, respectively) were determined on a strain of Enterococcus faecalis. Antimicrobial tests were performed on a biofilm model after treatment with the chelating agents by using a biofilm eradication concentration (MBEC) and confocal laser scanning microscope (CLSM) assays. Quantification of cell biomass and percentage of live and dead cells in the biomass were assessed for each group. The percentage reduction of accumulated hard-tissue debris (AHTD) after root canal preparation and final irrigation protocols was evaluated by micro-CT. Statistical tests of one-way analysis of variance (anova), Bonferroni test, Kruskal\u2013Wallis test, Dunn\u2019s multiple comparison test and Wilcoxon matched-pairs signed-rank tests were used. Results: Cetrimide alone as well as in combination with EDTA and MA at dilutions of 1/10 and 1/100 was significantly more toxic as compared to untreated controls (P < 0.001). All tested mixtures were nontoxic at a dilution of 1/1000. EDTA retained a weak inhibitory and bactericidal effect against planktonic cells, whilst MA inhibited cells growth and killed 99.9% of the cells when diluted. CTR revealed the most prominent effect, being inhibitory and bactericidal, also when diluted. Cetrimide alone or combined with EDTA was able to remove, respectively, 40% (P < 0.01) and 60% (P < 0.001) of the entire biomass after 1 min. Conversely, MA alone and in combination with CTR did not have a significant effect on biomass reduction. After final irrigation, the AHTD volume was significantly decreased in all groups (P < 0.05). EDTA + CTR and MA + CTR were associated with a significant reduction in the percentage of AHTD on the entire root canal compared to the same solutions without surfactant. Conclusions: 7% MA was less cytotoxic in comparison with 17% EDTA. The addition of cetrimide to EDTA and MA removed accumulated hard-tissue debris effectively from the canal walls and increased their antimicrobial activity when compared to the same solutions without detergents

    Evaluation of standardisation parameters, pharmacognostic study, preliminary phytochemical screening and in vitro antidiabetic activity of Coccinia indica fruits as per WHO guidelines

    Get PDF
    Coccinia indica an annual creeper is available all over India and well known for its antidiabetic property. In the present investigation, aqueous extract, and ethanolic extract of the fruits were made using hot extraction procedure using soxhlet apparatus, decoction and maceration. The qualitative phyto-chemical screening procedure was performed on each extract. Phyto-chemical study reveals that carbohydrates, tannins, phenols, alkaloids, saponins was present in both the extracts. An attempt has been made to highlight this folk herbal medicine through present study which will assist in the identification of fresh as well as dried crude samples of fruits anatomically and physiochemically. TLC finger printing and fluorescence analysis of powdered fruits has been conducted and reported .The antidiabetic activity is conducted by enzyme inhibition (α-glycosidase) in invitro method on each extract and ethanolic extract showed significant inhibitio

    Particle density fluctuations

    Full text link
    Event-by-event fluctuations in the multiplicities of charged particles and photons at SPS energies are discussed. Fluctuations are studied by controlling the centrality of the reaction and rapidity acceptance of the detectors. Results are also presented on the event-by-event study of correlations between the multiplicity of charged particles and photons to search for DCC-like signals.Comment: Talk presented at Quark Matter 2002, Nantes, Franc
    corecore