42 research outputs found

    Visual and Surface Properties of CdTe Thin Films on CdS/FTO Glass Substrates

    Get PDF
    Cadmium telluride (CdTe) thin film material was deposited ontop of Cadmium Sulfide (CdS) substrate using vacuum evaporation technique. The sample was characterized using X-ray diffraction(XRD) and UV-VIS-NIR spectroscopy. XRD studies revealed that the sample was polycrystalline in nature. The SEM image showed that the sample is columnar in structure and the grains are uniform. Optical band gap of the CdTe thin film was estimated from transmittance and reflectance data and it was found 1.53eV.The structural, optical and surface properties of the film showed that the CdTe thin film materials can be used for fabrication of CdTe thin film solar cell

    ARTIFICIAL INTELLIGENCE AND PARTICLE SWARM OPTIMIZATION ALGORITHM FOR OPTIMIZATION PROBLEM IN MICROGRIDS

    Get PDF
    The modern heuristic techniques mainly include the application of the artificial intelligence approaches such as genetic algorithm, particle swarmoptimization algorithm, ant colony optimization, stochastic diffusion search, differential evolution, etc. The main aspect of these techniques is theirflexibility for solving the optimization problems that have different mathematical constraints. In a power system area, the competition between theelectric utilities is gradually increased due to the deregulation of the electrical markets. For this reason, the generation expansion problem presentsitself as an important issue that needs to be considered in order to achieve reasonable economic decisions.Keywords: Genetic algorithm, Particle swarm optimization, Artificial intelligence

    Efficacy of Pluronic F-127 gel containing green tea catechin extract on chronic periodontitis – A clinical study

    Get PDF
    Purpose: To evaluate the efficacy of pluronic F-127 gel containing green tea catechin extract as a local drug delivery system in the treatment of chronic periodontitis. Methods: A total of 20 chronic periodontitis patients participated as per the set inclusion and exclusion criteria. Complete scaling and root planing (SRP) was done for all subjects and pluronic F-127 gel containing green tea catechin was applied on one site. The contralateral site received SRP alone. The plaque index (PI), gingival index (GI), and probing pocket depth (PPD) were recorded at baseline and on the 28th day. Results: At the 28th-day follow-up, green tea catechin tooth sites showed significantly lower mean scores (GI = 0.55, p = 0.30 and PPD = 3.35 mm) than the corresponding SRP tooth sites (GI = 1.25, PI = 1.15, and PPD = 4.40 mm) (p < 0.05). Conclusion: When compared to scaling and root planing alone, the local drug delivery gel containing green tea catechin as an adjuvant was more effective in reducing the clinical parameters of periodontitis. Keywords: Adjuvant therapy, Camellia sinensis, Local drug delivery, Periodontal pocke

    A Combined Scheme Based on Artificial Immune System for Selective Forwarding Attack Detection in Event Driven Wireless Sensor Networks

    Get PDF
    In general, the wireless sensor networks (WSNs) can be easily targeted by attacks due to their open nature. Among these attacks, the selective forwarding attack is particularly challenging to detect within WSNs. In this type of attack, malicious nodes deliberately discard received data packets, making it difficult to identify such attacks. Existing methods for selective forwarding attacks often suffer from low accuracy or high algorithm complexity, when dealing with Distributed Denial of Service attacks (DDoS). We propose an artificial immune system based on the danger model to detect network attacks. Our approach combines variational mode decomposition (VMD) and LSTM to identify selective forwarding attacks among other DoS attacks. We determine an optimal danger threshold and compare the outcomes to confirm the presence of attacks. This approach improves detection accuracy while minimizing computation requirements. The simulation results demonstrate that our proposed method achieves a low missing detection rate (MDR) of 0.6% and maintains a false detection rate (FDR) below 3.3%. Furthermore, in comparison with previous works, our system produces low algorithm complexity, making it more efficient in practical implementations

    Dual Tree Complex Wavelet Transform-based Image Security Using Steganography

    No full text
    Modern communication media requires high level of protection system for securing the multimedia data from hackers. The most important objective of this manuscript is to develop a simple and efficient methodology for protecting the information from hackers. In this paper, the level of image security is improved by integrating the steganography and cryptography techniques in order to produce the secured image. In this manuscript, secured image is produced by applying Dual Tree Complex Wavelet Transform(DT-CWT). Further, cryptography algorithm is applied on the steganography image if the level of information entropy lies beyond the threshold value. Mean Square Error (MSE),Peak Signal to Noise Ratio (PSNR) and Mean Absolute Error (MAE) are the metrics which are used to evaluate the performance of the proposed method in this manuscript. The proposed image security methodology achieves 47.04 dB of PSNR, 165.86 of MSE and 31.66% of MAE on bone image dataset
    corecore