4,164 research outputs found

    Trace Element Estimation – Methods & Clinical Context

    Get PDF
    Understanding the effects of trace metals on human health is as complex as it is fascinating. As mentioned earlier, the high concentrations may prove toxic, as also, depletion in the concentration of the essential trace elements may cause various metabolic instabilities due to enzyme dysfunction. In the era of rapid industrialization and technological advances, it is imperative to watch keenly for contamination of the environment and its vital composition from heavy metal wastes emanating out of industries. Many metabolic disorders in man are accompanied by alterations in the concentration of one or more trace elements in some body fluid, especially blood serum or plasma It is thus important to update ourselves with various techniques available for such determinations, their operational aspects, advantages / disadvantages etc. More recently, element analysis from hair and nail has been stated as the best indices of such contamination and has also been discussed in this article

    A Novel Search Technique of Motion Estimation for Video Compression

    Get PDF
    Video Compression is highly demanded now a days as due to the fact that in the field of entertainment, medicine and communication there is high demand for digital video technology. For the effective removal of temporal redundancy between the frames for better video compression Motion estimation techniques plays a major role. Block based motion estimation has been widely used for video coding. One such method is the Hierarchical Search Technique for BMA. By amalgamating the three different search algorithms like New three step search, New Full search and New Cross diamond search a novel hierarchical search methodology is proposed. Sub- sampling the original image into additional two levels is done and thereby the New Diamond search algorithm and a new three-step search algorithm are used in the bottom two levels and the Full Search is performed on the highest level where the complexity is relatively low. In terms of PSNR with reduced complexity this new proposed algorithm showed better performance

    Enhanced Logarithmic Search Technique for Motion Estimation with Three Step Reduction

    Get PDF
    Video compression is the one which has highest demand in the area of video processing Motion estimation ME is the basic of Video compression There are several algorithms to estimate the motion estimation of current block in reference frame In the view of this a new novel technique has been proposed in namely Logarithmic Search with Three Step Reduction LSTSR which is computationally more efficient than many of the existing techniques Simulation result shows that it performs better than that of Three Steps Search TSS New Three Step Search NTSS and reduces the checking points by almost 50 than that of TS

    Evolutionary Computing and Second generation Wavelet Transform optimization: Current State of the Art

    Get PDF
    The Evolutionary Computation techniques are exposed to number of domains to achieve optimization. One of those domains is second generation wavelet transformations for image compression. Various types of Lifting Schemes are being introduced in recent literature. Since the growth in Lifting Schemes is in an incremental way and new types of Lifting Schemes are appearing continually. In this context, developing flexible and adaptive optimization approaches is a severe challenge. Evolutionary Computing based lifting scheme optimization techniques are a valuable technology to achieve better results in image compression. However, despite the variety of such methods described in the literature in recent years, security tools incorporating anomaly detection functionalities are just starting to appear, and several important problems remain to be solved. In this paper, we present a review of the most well-known EC approaches for optimizing Secondary level Wavelet transformations

    Enhancing COVID-19 Diagnosis: A Multi-Modal Approach Utilizing the CNN Algorithm in Automated Applications

    Get PDF
    Rapidly identifying COVID-19 patients is essential for effective disease control and management. To address this need, we have developed an automated application that utilizes multi-modal data, including Chest X-ray, Electrocardiogram (ECG), and CT scan images, for precise COVID-19 patient identification. This application comprises a two-stage process, starting with a web-based questionnaire and then the submission of medical images for verification. Leveraging various ML and DL techniques, including CNN, KNN, Logistic Regression, Decision Tree, and NaiveBayes, We conducted extensive model training and validation for LSTM, InceptionV3, SVM, Resnet, and MobileNet. The CNN algorithm emerged as the top-performing method across all modalities, demonstrating exceptional accuracy, precision, recall, F-score, and a minimal false prediction rate. Confusion matrices were employed for comprehensive result evaluation. This study highlights the potential of multi-modal data analysis, particularly the CNN algorithm, for efficiently and accurately identifying COVID-19 patients

    Stephen Gill Pens Poetry for Personal Therapy

    Get PDF
    About 300 years before Christ, Aristotle describes catharsis  in his Poetics to show the impact of true tragedy on the audience. In the nineteenth century, Josef Breuer, the companion of Sigmund Freud, was the first to use Aristotelian concept in the realm of psychology. One template of catharsis is the use of a musical instrument for a tired person to feel relaxed. In literature, one example is Oedipus Rex in which Oedipus unknowingly marries his biological mother. Another example is Shakespeare’s Romeo and Juliet. It is often said that reading any work about murder or to see it on the television can be a healing therapy.

    Network Security in Organizations using Intrusion Detection System based on Honeypots

    Get PDF
    The role of the Internet is increasing and many technical, commercial and business transactions are conducted by a multitude of users that use a set of specialized / sophisticated network applications. Today we face threats of the network which cause enormous damage to the community day by day to the Internet. In this context, the task of network monitoring and surveillance is of utmost relevance and honeypots are promising tools for information and understanding of "areas of interest" of the attackers, and the possible relationship between blackhat teams. In this situation, people are increasingly trying to prevent their network security using traditional mechanisms, including firewalls, Intrusion Detection System, etc. Among them honeypot is a versatile tool for a practitioner security, of course, they are tools that are intended to be attacked or interacted with other information about the attackers, their motives and tools. In this paper, we describe a comparative analysis of various IDS and their usefulness on various aspects. Two major categories of HoneyPot viz. low interaction honeypot and high-interaction honeypot have also been discussed in detail. In this paper, low-interaction honeypot is used as a traffic filter. Activities such as port scanning can be effectively detected by the weak interaction honeypot and stop there. Traffic that cannot be processed by the weak interaction honeypot is delivered over high-interaction honeypot. In this case, the weak interaction honeypot is used as a proxy for high-interaction honeypot then offer optimal realism

    The Pace of Digital Libraries: Academic libraries perspective

    Get PDF
    Digital libraries are playing a prominent role in information services in general and information retrieval in particular. Users are giving more preference to digital than print resources. The metamorphosis of libraries from traditional to digital, information services to access providers, Document custodians to Knowledge managers forced library professionals to evolve themselves as information providers. The topics like a user-centric digital library system, leverage of social media in digital library services and other aspects are discussed in detail
    • …
    corecore