371 research outputs found

    Cyclostationarity Based Sonar Signal Processing

    Get PDF
    AbstractThis paper presents a reliable method for target vessel identification in passive sonar by exploiting the underlying periodicity of propeller noise signal, using the principles of cyclostationarity. In conventional signal processing methods, random signals are treated as statistically stationary and the parameters of the underlying physical mechanism that generates the signal would not vary in time. However, for most manmade signals, some parameters vary periodically with time and this requires that random signals be modeled as cyclostationary. In the field of sonar, the propeller noise signal generated by underwater vessels is cyclostationary. As a ship propagates in the sea, noise generated during the collapse of cavitation-induced bubbles are modulated by the rotating propeller shaft and this results in characteristic amplitude modulated random noise signal, which can be detected using passive sonar. Processing these signals, the number of blades and the shaft frequency of the propeller can be identified. In this work, cyclostationary processing technique is introduced for processing propeller noise signal and it is observed to provide better noise immunity. A detailed comparison with the conventional DEMON processing is also presented

    Login History and CaRP for User Authentication

    Get PDF
    Password is main vulnerability in computer security. Passwords are commonly guessed by machine programs running dictionary attacks. Passwords main used for the authentication method in spite of security weaknesses. User authentication obviously practical issue. According to the view of a service provider this problem needs to be resolved within real-world constraints such as the available hardware and software infrastructures. According to user’s view user friendliness is a basic requirement Click based graphical password scheme provides a different approach to address the familiar image hotspot problem. Graphical password systems such as PassPoints, that frequently leads to weak password choices. So to provide user friend-liness and also the protection from various security attacks. In this, graphical password scheme, the click event is performed on various points on same or different images. DOI: 10.17762/ijritcc2321-8169.15064

    A Novel method for user authentication by CaRP And Login History

    Get PDF
    Cyber security is the main challenge nowadays. Many authentication techniques are available for these, for unwanted access for more secure data is prohibited. Graphical and text password are used for user authentication process. Sometimes text passwords are not secured and graphical password are more secure but vulnerable to shoulders surfing attack. The click event on various points for user friend-lines and protection from various security attacks. In system, login history image file combined CaRP for user authentication to enhancing the more security level primitives .The image file contain details of login and logout for date, time all related information. The file is encrypted by DES algorithm and send that file on mail. It is higher security primitives for the user. online guessing attack, relay attacks and if combined with dual technology for shoulder surfing attack are new concepts are available. DOI: 10.17762/ijritcc2321-8169.15075

    Photovoltaic Grid Integrated System Based on MPPT Technique By using MATLAB/SIMULINK

    Get PDF
    This paper provides an easy accurate method of modeling photovoltaic arrays. The methodis comfortable to obtain the parameters of the array model using information from the datasheet. The electric system consists of a photovoltaic module (PV) module, a DC/DC converter and a DC/AC converter to release the grid connection. A maximum-power point tracking (MPPT) technique is used to extract maximum amount of power from solar cells. The photovoltaic model is established using basic circuit equations of the Photovoltaic (P-V) cells including the effects of solar radiation and temperature changes. One-diode equivalent circuit is used in order to study I-V and P-V characteristics of a typical 36W solar module and draws results according to values changes of the temperature and solar irradiation which is observed in MATLABSIMULINK. Hence, the P-V module has nonlinear characteristics, and the Photovoltaic system characteristic curves such as current-voltage (I-V) and power-voltage (P-V) characteristics are drawn according to values change in temperature and solar radiation which is observed in MATLAB-SIMULINK

    Neural Network System Identification and Controlling of Multivariable System

    Get PDF
    Most of the industrial processes are multivariable in nature. Here Greenhouse system is considered which is the important application in agricultural process. Greenhouse is to improve the environmental conditions in which plants are grown .In this paper we have proposed identification of greenhouse system using input and output data sets to estimate the best model and validate the model. For MIMO systems, Neural Network System identification provides a better alternative to find their system transfer function. The results were analyzed and the model is obtained. From this obtained model ,the system is controlled by conventional method. By these method we can identify the model and control the complicated systems like Greenhouse

    To study the role of tranexamic acid in the management of menorrhagia

    Get PDF
    Background: Heavy menstrual bleeding is a significant case of morbidity during the reproductive years. Approximately 30% of women complain of menorrhagia and it is the main presenting problem of women consulting a gynaecologist. In addition, excessive menstrual bleeding accounts for about two-thirds of all hysterectomies. This amount of blood loss can cause disturbance of the woman’s social, occupational or sexual life, as well as medical risks such as chronic iron deficiency anemia. Objective of the study was to determine if tranexenic acid can effectively and safely reduce menstrual blood loss in menorrhagia.Methods: 100 cases selected for the study who complained of regular long/ heavy menstrual bleeding more than 7 days or blood loss more than 80ml, who are at the age of 20-45 years. This study includes measurement of menstrual blood loss, duration of bleeding, number of sanitary pad usage for two menstrual cycles who complained of regular excessive menstrual bleeding using pictogram and taken history of IUCD insertion. Abdominal, gyanecological examination and ultra sound has been done to rule out any pelvic pathology. Drug Tranexamic acid 500mg QID were given to the patients who had mean menstrual blood loss of more than 80ml based on assessment in the previous two menstrual cycles.Results: The total study shows the effect of drugs on the amount of bleeding is 41.6% (P-value <0.05), there is significant reduction is seen in number of sanitary pad usage from 5.44 to 3.96 (P- value <0.05) and there is significant reduction in duration of bleeding. There are minimal gastrointestinal side effects, and there is 32% discontinuation of treatment in our study as patient is not satisfied.Conclusions: Treatment with tranexamic acid could potentially improve quality of life of women. It is also effective treatment for menorrhagia caused by IUCD. Current clinical evidence concludes that size and type of fibroid has significant influence on effect of treatment. Tranexamic acid has been doc umented and found to have no effect on uterus with adenomyosis and endometrial poly

    Heavy landings of juveniles of Indian scad, Decapterus russelli at Munambam Fisheries Harbour

    Get PDF
    Among the carangid fishes, the Indian scad, Decapterus russelli is an important pelagic fish and a major commercial species contributing to the marine fisheries of Kerala. The fish is locally called “kozhuchala” and it forms a regular fishery. The species is often caught as by-catch in shrimp trawl nets having cod-end mesh sizes ranging from 15 mm to 20 mm that is operated in the depth range of 55- 90 m almost throughout the year. They are consumed fresh as well as sun dried form

    Study of safety and efficacy of autologous platelet rich plasma combined with fractional CO2 laser in the treatment of post acne scars: a comparative simultaneous split-face study

    Get PDF
    Background: Many treatments are available for treating post acne scars but optimized treatment does not exist still. Hence, this study was conducted with the aim to evaluate the safety and efficacy of autologous platelet rich plasma combined with fractional CO2 laser for treatment of acne scars when used in Indian skin.Methods: Thirty patients attended to the Dermatology OPD were enrolled in the study after meeting inclusion criteria. They underwent split-face therapy. They received ablative fractional carbon dioxide (CO2) laser combined with autologous platelet-rich plasma (PRP) treatment on one half of their face and ablative fractional CO2 laser with intradermal normal saline on the other half. The injections were administered immediately after laser therapy. Each participant received 4 treatments spaced by 1 month and were followed up for a period of 4 months.Results: The outcome among the study subjects were assessed using Goodman and Baron Scale at different time intervals. Significant reduction in acne scars was observed in both PRP injection site and normal saline injection site but better reduction of acne scars was noted at the PRP site. The blinded physician’s assessment and patient satisfaction was better at PRP injected side as compared to the normal saline injected side. The incidence of adverse effects and pain during the procedure was significantly lower in PRP injected side compared normal saline injected side.Conclusions: This study demonstrated that PRP should be considered as an adjuvant therapeutic option for dermatologic procedures such as fractional CO2 laser resurfacing for treatment of post acne scars as it might have additional benefit of reducing the adverse effects such as persistent erythema and edema

    Causative Broadcast Encryption for Short Cipher Text

    Get PDF
    Encryption is used in a correspondence framework to secure data in the transmitted messages from sender to receiver. To execute the encryption in addition to decryption ye transmitter and receiver ought to have comparing encryption in addition to decryption keys. For transportation precautionary measure data to group required broadcast encryption (BE). BE sanctions a sender to securely broadcast to any subset of individuals and require a trusted gathering to disperse decryption keys. Group key Authority (GKA) protocol authorizes various clients to set up an unremarkable mystery channel by means of open systems. Praising that a noteworthy goal of GKA for dominant part applications is to incite a secret channel among group individuals, yet a sender can't discard any exceptional individual from unscrambling ye figure writings. By crossing over BE and GKA thought with a crossover primitive identified with as contributory broadcast encryption (CBE). With these primitives, a group of individuals travel through an unremarkable open encryption key while every part having there decryption key. A sender outwardly seeing general society group encryption key can delineate the decryption to subset of individuals from sender's winnow. A basic approach to induce these keys is to use the general population key appropriation framework concocted by Daffier and Hellman.. Key dispersion sets are adjusted to incite keys and Elliptic Curve Cryptography (ECC) is used for the encryption and decryption of records; and this going to give the security to the archives over group correspondence
    corecore