1,354 research outputs found

    Removal of ocular artifacts from EEG signals using adaptive threshold PCA and Wavelet transforms

    Get PDF
    It becomes more difficult to identify and analyze the Electroencephalogram (EEG) signals when it is corrupted by eye movements and eye blinks. This paper gives the different methods how to remove the artifacts in EEG signals. In this paper we proposed wavelet based threshold method and Principal Component Analysis (PCA) based adaptive threshold method to remove the ocular artifacts. Compared to the wavelet threshold method PCA based adaptive threshold method will gives the better PSNR value and it will decreases the elapsed time

    Improved Power Eminence Without A Bridge With Computer-Based Inverters

    Get PDF
    Buck-boost converter is designed without bridging in DCM for single control loop and for inherent PFC. This DC voltage is given to half of the VSI Bridge to obtain multiple output DC voltage. VSI half-bridge is designed in continuous conduction mode to reduce component fatigue. The single-phase AC supply is fed to a pair of back-to-back connected strut transformers to eliminate the diode bridge rectifier, thus reducing conduction losses and improving power quality at the front end. Boosted buck converter operation without bridges in intermittent connection mode ensures inherent PFC operation and reduces control complexity. The performance of the proposed multi-output SMPS under variable input voltages and loads is evaluated by simulating this circuit in a MATLAB/Simulink environment, and the results obtained by simulation are validated experimentally

    Identification of Faulty Software Binaries from End-to-End Tests

    Get PDF
    Software products are built from a number of interacting binaries that are rolled out asynchronously, at differing schedules and paces. When there is a problem with a software product such as a failure or sub-par performance, identifying the binaries that are the source of a product failure or sub-par performance is difficult with end-to-end tests. Additionally, an apparently failing test can be a false positive that does require any code changes to fix, yet that demands human attention. This disclosure describes techniques to automatically determine, from end-to-end tests of a software product, code binaries that are at the root of product failure or sub-par performance. For each failure signal, a history is maintained of post-triage manual feedback. The history is used to generate a confidence metric, referred to as a cube score, of a new failure being a true positive. Probable false positive test failures can be filtered out, reducing developer effort to address the apparent test failure

    Portable TPM based user Attestation Architecture for Cloud Environments

    Get PDF
    Cloud computing is causing a major shift in the IT industry. Research indicates that the cloud computing industry segment is substantial and growing enormously. New technologies have been developed, and now there are various ways to virtualize IT systems and to access the needed applications on the Internet, through web based applications. Users, now can access their data any time and at any place with the service provided by the cloud storage. With all these benefits, security is always a concern. Even though the cloud provides accessing the data stored in cloud storage in a flexible and scalable manner, the main challenge it faces is with the security issues. Thus user may think it2019;s not secure since the encryption keys are managed by the software, therefore there is no attestation on the client software integrity. The cloud user who has to deploy in the reliable and secure environment should be confirmed from the Infrastructure as a Service (IaaS) that it has not been corrupted by the mischievous acts. Thus, the user identification which consists user ID and password can also be easily compromised. Apart from the traditional network security solutions, trusted computing technology is combined into more and more aspects of cloud computing environment to guarantee the integrity of platform and provide attestation mechanism for trustworthy services. Thus, enhancing the confidence of the IaaS provider. A cryptographic protocol adopted by the Trusted Computing Group enables the remote authentication which preserves the privacy of the user based on the trusted platform. Thus we propose a framework which defines Trusted Platform Module (TPM), a trusted computing group which proves the secure data access control in the cloud storage by providing additional security. In this paper, we define the TPMbased key management, remote client attestation and a secure key share protocol across multiple users. Then we consider some of the challenges with the current TPM based att

    Investigating Open Issues in Swarm Intelligence for Mitigating Security Threats in MANET

    Get PDF
    The area of Mobile Adhoc Network (MANET) has being a demanded topic of research for more than a decade because of its attractive communication features associated with various issues. This paper primarily discusses on the security issues, which has been still unsolved after abundant research work. The paper basically stresses on the potential features of Swarm Intelligence (SI) and its associated techniques to mitigate the security issues. Majority of the previous researches based on SI has used Ant Colony Optimization (ACO) or Particle Swarm Optimization (PSO) extensively. Elaborated discussion on SI with respect to trust management, authentication, and attack models are made with support of some of the recent studies done in same area. The paper finally concludes by discussing the open issues and problem identification of the review

    NEED AND IMPORTANCE OF VYAYAMA IN PRESENT ERA: A CRITICAL REVIEW

    Get PDF
    Ayurveda dealing as a science of life speaks about physical, mental and social health. In Ayurvedic science Vyayama is included in daily regimen for the purpose of staying healthy. As per World Health Organization data, lack of physical activity is responsible for 6% deaths globally. Exercise helps in metabolism of free fatty acids and plays an important role to overcome obesity and obesity related disorders like type 2 diabetes and cardiac disease like CVD (cardiovascular disease) and many more other disorders like breast cancer, colon cancer, dementia and depression. In Ayurvedic aspect Vyayama stimulate Agni which prevents formation of Ama so it is helpful in prevention of many disorder. In this review it is described that Vyayama or physical activity is necessary for an individual in today’s life and Vyayama or physical activity works for staying healthy and longevity

    STUDY ON THE ENHANCEMENT OF THE PROPERTIES OF CONCRETE BY OPTIMIZING THE PROPOTIONS OF HYBRID MINERAL ADMIXTURES

    Get PDF
    Since advent of civilization various types of cementitous materials have been used for constructiuon practices. The arrival of Ordinary Portland Cement changed the construction activities completely. However, because of several drawbacks associated with properties of cement and manufactured building materials using OPC as well as the cost factor attempts one mode to utilize other materials for economical constructions and improved mortar and concrete characteristics. Now attempts were made to utilize these waste materials or industrial byproducts in construction activities to solve the environmental pollution problems, and safer and economical construction. In this paper Fly Ash and Silica Fume has been used as a hybrid mineral admixture as a replacement material for cement..The physical and chemical properties of Fly Ash and Silica Fume has been studied and these materials are replaced for cement by the following proportions 25%F.A-5%S.F, 20%F.A-10%S.F,15%F.A-15%S.F and 10%F.A-20%S.F. Specimens have been casted to determine the mechanical properties such as compressive strength, split tensile strength and flexural strength to find out the optimum proportions of the admixture and durability properties like acid attack, sulphate attack and chloride attack to find out the resistance offered by the mineral admixtures in concrete which can undergo deterioration due to various salts

    A clinical study of pediatric hypomelanotic dermatoses at tertiary care center

    Get PDF
    Background: Hypopigmentary and depigmentary lesions are frequently encountered in pediatric age group which can be alarming and distressing to parents. They may be insignificant or denote an underlying multisystem disorder. Hence, a thorough medical history, clinical, Wood’s lamp examination, and an interdisciplinary consultation may aid in the correct diagnosis of these dermatoses. Objectives: The objectives of the study were to study the various hypopigmentary and depigmentary dermatoses in children attending the outpatient department of a tertiary care center in South India. Materials and Methods: A descriptive study was conducted at the outpatient department of dermatology at the tertiary care center of South India, where 121 patients aged between 0 and 18 years presenting with hypopigmentary and depigmentary skin lesions from August 2018 to August 2019 were included in the study irrespective of gender. A detailed history, clinical examination, and basic investigations were done. Results: Out of 121 children included in our study, 67 (55.37%) were girls and 54 (44.62%) were boys. The mean age of the study group was 9.8 years. The most common dermatosis observed was pityriasis alba (28.9%), followed by primary disorders of hypopigmentation (vitiligo, lichen striatus, nevus depigmentosus, nevus anemicus, halo nevus, hypomelanosis of Ito, progressive macular hypomelanosis, and blaschkoid dermatitis), post-inflammatory hypopigmentation (19.8%), pityriasis versicolor (8.2%), Hansen’s disease (3.3%), and morphea (2.4%). Conclusion: The most common hypomelanotic dermatosis noted in the present study was pityriasis alba followed by primary disorders of hypopigmentation and depigmentation. Most of the dermatoses were either self-limiting or benign in nature and required only reassurance and managed with only medical line of management. These diseases may be the reason for undue concern and anxiety in parents; hence, a thorough evaluation and management of these dermatoses are necessary
    • …
    corecore