60 research outputs found

    MonteCarlo and Analytical Methods for Forced Outage Rate Calculations of Peaking Units

    Get PDF
    All generation facilities have to report their generator un-availabilities to their respective Independent System Operators (ISOs). The un-availability of a generator is determined in terms of its probability of failure. Generators may serve the role of two kinds, base units which operates all the time and the others are peaking units which operate only for periods of time depending on load requirement. Calculation of probability of failure for peaking units using standard formulas gives pessimistic results owing to its time spent in the reserve shut down state. Therefore the normal two state representation of a generating unit is not adequate. A four state model was proposed by an IEEE committee to calculate the forced outage rate (unavailability) of such units. This thesis examines the representation of peaking units using a four-state model and performs the analytical calculations and Monte Carlo simulations to examine whether such a model does indeed represent the peaking units properly

    New RP-HPLC Technique was Development and Validation of Effective and Economical Tool for Quantitative Estimation of Naproxen in Dosage Forms

    Get PDF
    A New RP-HPLC technique was development and validation of effective and economical tool for quantitative estimation of Naproxen in dosage forms rapid, reproducible and selective reverse phase HPLC method has been developed for the estimation of  Naproxen in dosage form.It was resolved by using a mobile phase of Potassium dihydrogen phosphate: methanol in the ratio 30:70 v/v  at a flow rate of 0.8 ml/min. on  HPLC system using UV - Visible detector at the wavelength of  287 nm. The column used was C18 (4.6 x 150mm, 3 mm, Make: Zorbax) .The linearity range was found to be 10-50 ?g/ml. The proposed new method is found to be economic, sensitive, precise, rapid and reproducible. Keywords:, Naproxen, RP-HPLC, new method development, validatio

    Synthesis, Spectral and Antibacterial Studies of Copper(II) Tetraaza Macrocyclic Complexes

    Get PDF
    A novel family of tetraaza macrocyclic Cu(II) complexes [CuLX2] (where L = N4 donor macrocyclic ligands) and (X = Cl−, NO3 −) have been synthesized and characterized by elemental analysis, magnetic moments, IR, EPR, mass, electronic spectra and thermal studies. The magnetic moments and electronic spectral studies suggest square planar geometry for [Cu(DBACDT)]Cl2 and [Cu(DBACDT)](NO3)2 complexes and distorted octahedral geometry to the rest of the ten complexes. The biological activity of all these complexes against gram-positive and gram-negative bacteria was compared with the activity of existing commercial antibacterial compounds like Linezolid and Cefaclor. Six complexes out of twelve were found to be most potent against both gram-positive as well as gram-negative bacteria due to the presence of thio group in the coordinated ligands

    Unequal Error Protection for Wireless Imaging

    No full text
    This thesis work was to examine the unequal error protection (UEP) scheme for joint photographic experts group (JPEG) 2000 images over an additive white Gaussian noise (AWGN) and a Rayleigh fading channel. The JPEG 2000 standard provides an effective image compression that result in increasing effect of transmission errors. To mitigate this problem, the UEP scheme was used to protect the region of interest (ROI) with a strong (63, 36) Bose Chadhuri Hocquenghem (BCH) code whereas the background (BG) with a weaker (7, 4) Hamming code. ROI is one of the features supported by the JPEG 2000 standard that allows compressing a specified portion of image with a better quality than the BG of the image. In case of equal error protection (EEP) scheme every information block was protected with a single code. This approach used both qualitative and quantitative performance comparisons between UEP and EEP schemes in evaluating the simulation results. Three test images of Lena, Elaine and Mandrill were taken in this thesis. They were compressed and tested over computer simulated AWGN and Rayleigh fading channel models for a range of signal to noise ratio (SNR) values with both UEP and EEP schemes. The qualitative performance comparisons involved the image perceptual quality and the quantitative performance comparisons were based on the statistical average peak signal to noise ratio (PSNR) values of the reconstructed image. The conclusions revealed that UEP scheme exhibits a notable growth in both qualitative and quantitative performance compared to conventional EEP scheme that was measured in terms of required SNR and decodable received images

    Unequal Error Protection for Wireless Imaging

    No full text
    This thesis work was to examine the unequal error protection (UEP) scheme for joint photographic experts group (JPEG) 2000 images over an additive white Gaussian noise (AWGN) and a Rayleigh fading channel. The JPEG 2000 standard provides an effective image compression that result in increasing effect of transmission errors. To mitigate this problem, the UEP scheme was used to protect the region of interest (ROI) with a strong (63, 36) Bose Chadhuri Hocquenghem (BCH) code whereas the background (BG) with a weaker (7, 4) Hamming code. ROI is one of the features supported by the JPEG 2000 standard that allows compressing a specified portion of image with a better quality than the BG of the image. In case of equal error protection (EEP) scheme every information block was protected with a single code. This approach used both qualitative and quantitative performance comparisons between UEP and EEP schemes in evaluating the simulation results. Three test images of Lena, Elaine and Mandrill were taken in this thesis. They were compressed and tested over computer simulated AWGN and Rayleigh fading channel models for a range of signal to noise ratio (SNR) values with both UEP and EEP schemes. The qualitative performance comparisons involved the image perceptual quality and the quantitative performance comparisons were based on the statistical average peak signal to noise ratio (PSNR) values of the reconstructed image. The conclusions revealed that UEP scheme exhibits a notable growth in both qualitative and quantitative performance compared to conventional EEP scheme that was measured in terms of required SNR and decodable received images

    Automatic vehicle license plate number detection using machine learning

    No full text
    In today’s world, vehicles are the most significant form of transportation. Detection of vehicle number plates is important to identify a specific vehicle. In order to obtain accurate identification of a specific number plate tag of the vehicle, accuracy rate and high precision are critical. Vehicle number plates can be used by law enforcement agencies to track vehicles with traffic cameras that can capture and scan all vehicles in moving traffic. This research proposes a novel system to process digital images of vehicles to capture the license plate number and also identify the type of vehicle using a TensorFlow based algorithm to improve vehicle identification accuracy. The program developed in this study provided a high level of differences for vehicle identification. The program used Python machine learning and TensorFlow deep learning libraries. This approach used the following phases of development: discovery of the vehicle number plate tag, location of the vehicle number plate tag, identification of state of the vehicle number plate tag, reading the number on the vehicle number plate tag, and recognition of the vehicle shape to determine the vehicle type. The proposed method of this work has a correct classification rate of 94.7% in vehicle type identification and 94.4% in license plate number detection, which is much higher than the previous standard methods compared to the proposed method of this work

    Security Testing for Web Applications in SDLC

    No full text
    Context: In Web applications, the Software vulnerability can be reduced by applying security testing in all phases of the software development life cycle (SDLC). Lot of vulnerabilities might occur if the security testing is applied in the last phase of SDLC. In order to mitigate these vulnerabilities, a lot of rework is required that involves reverse engineering in the development and design phases. To overcome this situation, organizations are shifting from security testing (performed in last phase) towards security testing in the early phases of SDLC. Objectives: The main objectives of this thesis are to gather the benefits and challenges of security testing in the last phase versus security testing in every phase of the SDLC. After gathering, authors want to compare both implementations because these days most organizations are shifting from last phase to every phase of SDLC. Justification to the reason can be achieved by this comparison. Methods: In order to satisfy the objectives of this thesis, a literature review and interviews were conducted. The literature review was conducted by gathering benefits and challenges of last phase and every phase of SDLC. Authors have applied coding technique to the data gathered from literature review. By using the results from literature review, a set of questions were framed. Based on these questions, interviews in various organizations were performed. To analyze the practitioner’s data we used Sorting and Coding technique. Then, we conducted a comparative analysis to compare both results. Results: Application of security testing in the last phase of the SDLC results in a lot of rework which in turn leads to instability in managing the cost, time and resources in an organisation. In order to overcome this, more and more organisations are introducing security testing at each and every phase of SDLC. Conclusions: It can be concluded that every phase of security testing in SDLC has more benefits than applying in last phase of SDLC. To evaluate this process more research is needed to acquire more knowledge of security testing in all phases of SDLC. Through literature review and interviews conducted, it is evident that security testing at early phases causes a reduction in rework which in turn leads to more efficient management of cost, time and resources of a project.+91 897740464

    Security Testing for Web Applications in SDLC

    No full text
    Context: In Web applications, the Software vulnerability can be reduced by applying security testing in all phases of the software development life cycle (SDLC). Lot of vulnerabilities might occur if the security testing is applied in the last phase of SDLC. In order to mitigate these vulnerabilities, a lot of rework is required that involves reverse engineering in the development and design phases. To overcome this situation, organizations are shifting from security testing (performed in last phase) towards security testing in the early phases of SDLC. Objectives: The main objectives of this thesis are to gather the benefits and challenges of security testing in the last phase versus security testing in every phase of the SDLC. After gathering, authors want to compare both implementations because these days most organizations are shifting from last phase to every phase of SDLC. Justification to the reason can be achieved by this comparison. Methods: In order to satisfy the objectives of this thesis, a literature review and interviews were conducted. The literature review was conducted by gathering benefits and challenges of last phase and every phase of SDLC. Authors have applied coding technique to the data gathered from literature review. By using the results from literature review, a set of questions were framed. Based on these questions, interviews in various organizations were performed. To analyze the practitioner’s data we used Sorting and Coding technique. Then, we conducted a comparative analysis to compare both results. Results: Application of security testing in the last phase of the SDLC results in a lot of rework which in turn leads to instability in managing the cost, time and resources in an organisation. In order to overcome this, more and more organisations are introducing security testing at each and every phase of SDLC. Conclusions: It can be concluded that every phase of security testing in SDLC has more benefits than applying in last phase of SDLC. To evaluate this process more research is needed to acquire more knowledge of security testing in all phases of SDLC. Through literature review and interviews conducted, it is evident that security testing at early phases causes a reduction in rework which in turn leads to more efficient management of cost, time and resources of a project.+91 897740464
    • …
    corecore