270 research outputs found

    Mouse Simulation Using Two Coloured Tapes

    Full text link
    In this paper, we present a novel approach for Human Computer Interaction (HCI) where, we control cursor movement using a real-time camera. Current methods involve changing mouse parts such as adding more buttons or changing the position of the tracking ball. Instead, our method is to use a camera and computer vision technology, such as image segmentation and gesture recognition, to control mouse tasks (left and right clicking, double-clicking, and scrolling) and we show how it can perform everything as current mouse devices can. The software will be developed in JAVA language. Recognition and pose estimation in this system are user independent and robust as we will be using colour tapes on our finger to perform actions. The software can be used as an intuitive input interface to applications that require multi-dimensional control e.g. computer games etc.Comment: 5 page

    First report of Echthrogaleus denticulatus (Smith 1874) on the pelagic thresher shark (Alopias pelagicus Nakamura 1935) from Indian EEZ of Andaman Sea

    Get PDF
    The present study reports the occurrence of the pandarid parasite, Echthrogaleus denticulatus as an ectoparasite on the pelagic thresher shark (Alopias pelagicus) from the Indian EEZ of Andaman Sea. A total of 36 parasite specimens were found aggregated near the cloacal aperture of eight pelagic thresher sharks caught as bycatch by multifilament tuna longliner MFV Blue Marlin during July 2015 and February 2016 voyages in Andaman and Nicobar waters. This is the first report of ectoparasite from the Indian EEZ of the Andaman Sea

    A Review on Separable Reversible Data Hiding in Encrypted Image

    Get PDF
    This work proposes a new system for separable reversible data hiding in color images encrypted with the approach of adding the matrix. In the proposed scheme, Take color image input and provide the encryption key to encrypt the picture image and then compressed encrypted with various algorithms. Due to the compression of the image to create a sparse space to accommodate the additional data, integrated data using the key data hiding. If the receiver has the encryption key, you can decrypt the received data to obtain the image only. If the receiver has the data hiding key, it can extract data only. If the receiver is both the key to hidden data and the encryption key, it can extract the additional data and recover the original content without any errors using the spatial correlation in the natural image if the amount of data extra is great

    Comparison of blocking and hierarchical ways to find cluster

    Get PDF
    Master of ScienceDepartment of Computing and Information SciencesWilliam H. HsuClustering in data mining is a process of discovering groups in a set of data such that the similarity within the group is maximized and the similarity among the groups is minimized. One way of approaching clustering is to treat it as a blocking problem of minimizing the maximum distance between any two units within the same group. This method is known as Threshold blocking. It works by applying blocking as a graph partition problem. Chameleon is a hierarchical clustering algorithm, that based on dynamic modelling measures the similarity between two clusters. In the clustering process, to merge two cluster, we check if the inter-connectivity and closeness between two clusters are high relative to the internal inter-connectivity of the clusters and closeness of items within the clusters. This way of merging of cluster using the dynamic model helps in discovery of natural and homogeneous clusters. The main goal of this project is to implement a local implementation of CHAMELEON and compare the output generated from Chameleon against Threshold blocking algorithm suggested by Higgins et al with its hybridized form and unhybridized form

    Omnidirectional transport and navigation of Janus particles through a nematic liquid crystal film

    Full text link
    We create controllable active particles in the form of metal-dielectric Janus colloids which acquire motility through a nematic liquid crystal film by transducing the energy of an imposed perpendicular AC electric field. We achieve complete command over trajectories by varying field amplitude and frequency, piloting the colloids at will in the plane spanned by the axes of the particle and the nematic. The underlying mechanism exploits the sensitivity of electro-osmotic flow to the asymmetries of the particle surface and the liquid-crystal defect structure. We present a calculation of the dipolar force density produced by the interplay of the electric field with director anchoring and the contrasting electrostatic boundary conditions on the two hemispheres, that accounts for the dielectric-forward (metal-forward) motion of the colloids due to induced puller (pusher) force dipoles. These findings open unexplored directions for the use of colloids and liquid crystals in controlled transport, assembly and collective dynamics.Comment: 11 pages, 9 figure

    Introducing Nonuniform Sparse Proximal Averaging Network for Seismic Reflectivity Inversion

    Get PDF
    We consider the problem of seismic reflectivity inversion, which pertains to the high-resolution recovery of interface locations and reflection coefficients from seismic measurements, which are vital for estimating the subsurface structure. We develop two model-based neural networks within the framework of deep-unfolding . First, we propose a nonuniform minimax concave penalty regularized formulation for reflectivity inversion and unfold the resulting iterative algorithm into a network. Second, we propose a nonuniform sparse model that relies on a combination of regularizers (composite regularization) and develop the nonuniform sparse proximal averaging network (NuSPAN). We demonstrate the efficacy of the proposed approaches over the benchmark techniques through numerical experiments on synthetic 1-D seismic traces and 2-D wedge models. We also report validations on the 2-D Marmousi2 simulated model and 3-D real field measurements from the Penobscot 3D survey off the coast of Nova Scotia, Canada. The accuracy of the proposed approaches is higher than the state-of-the-art techniques in terms of amplitude and support recovery. Further, for Marmousi2, the proposed deep-unfolding networks result in 600× faster inference than the fast iterative shrinkage-thresholding algorithm (FISTA). In terms of combined training and inference times, the learned iterative shrinkage-thresholding algorithm (LISTA) is the fastest. The inference speed-up is significant given that the volume of data is typically large in seismic signal processing

    Report on morphological abnormality in Scylla serrata

    Get PDF
    Morphological abnormalities most commonly reported in crabs are alterations in carapace (mainly number and shape of antero-lateral teeth), chelipeds, walking legs and shape of the abdomen. Uran, a fishing village in Raigad district of Maharashtra, supports a good fishery of Scylla serrata commonly known as giant mud crab, found in the coastal estuarine and mangrove areas

    Evaluating the validity of Golden Proportion, RED (Recurring Aesthetic Dental) Proportion and Golden Percentage in Maharashtrian Population

    Get PDF
    Context: A pleasing dental aesthetics is achieved by the maxillary anterior teeth. Restoring harmonious proportion between widths of maxillary anterior teeth is an important part of aesthetic dentistry. RED proportion and Golden Percentage are new guidelines introduced in this regards.Aims: The purpose of this study was to evaluate the validity of Golden Proportion, RED proportion and Golden Percentage in maxillary anterior teeth in Maharashtrian population.Methods and Material: Dentulous stone casts of maxillary arch were made of college students who met the inclusion criteriae. Total of 100 students representing Maharashtrian population were included. The width of the anterior teeth was measured using digital calliper.Statistical analysis used: The data obtained from all the above methods was entered into Microsoft Excel sheet and statistically analyzed using SPSS statistical package(SPSS 18; IBM Corp, Armonk, NY).Results: Golden Proportion and RED proportion failed to validate in Maharashtrian population and so were considered unfavourable methods to determine the width of upper anterior teeth.Conclusions: By adjusting the percentage Golden proportion theory could be applied to the Maharashtrian population for better aesthetics taking into consideration the ethnicity of the population

    In vitro effect of Withania somnifera, AYUSH-64, and remdesivir on the activity of CYP-450 enzymes: Implications for possible herb−drug interactions in the management of COVID-19

    Get PDF
    Ayurvedic medicines Withania somnifera Dunal (ashwagandha) and AYUSH-64 have been used for the prevention and management of COVID-19 in India. The present study explores the effect of Ashwagandha and AYUSH-64 on important human CYP enzymes (CYP3A4, CYP2C8, and CYP2D6) to assess their interaction with remdesivir, a drug used for COVID-19 management during the second wave. The study also implies possible herb−drug interactions as ashwagandha and AYUSH-64 are being used for managing various pathological conditions. Aqueous extracts of ashwagandha and AYUSH-64 were characterized using LC-MS/MS. A total of 11 and 24 phytoconstituents were identified putatively from ashwagandha and AYUSH-64 extracts, respectively. In addition, in silico studies revealed good ADME properties of most of the phytoconstituents of these herbal drugs and suggested that some of these might possess CYP-450 inhibitory activity. In vitro CYP-450 studies with human liver microsomes showed moderate inhibition of CYP3A4, 2C8, and 2D6 by remdesivir, while ashwagandha had no inhibitory effect alone or in combination with remdesivir. AYUSH-64 also exhibited a similar trend; however, a moderate inhibitory effect on CYP2C8 was noticed. Thus, ashwagandha seems to be safe to co-administer with the substrates of CYP3A4, CYP2C8, and CYP2D6. However, caution is warranted in prescribing AYUSH-64 along with CYP2C8 substrate drugs. Furthermore, preclinical and clinical PK studies would be helpful for their effective and safer use in the management of various ailments along with other drugs
    corecore