71 research outputs found

    ECONOMIZED SENSOR DATA PROCESSING WITH VEHICLE PLATOONING

    Get PDF
    We present platooning as a special case of crowd-sensing framework. After offering a policy that governs platooning, we review common scenarios and components surrounding platooning. We present a prototype that illustrates efficiency of road usage and vehicle travel time derived from platooning. We have argued that beyond the commonly reported benefits of platooning, there are substantial savings in acquisition and processing of sensory data sharing the road. Our results show that data transmission can be reduced to low of 3% compared to normal data transmission using a platoon formation with sensor sharing

    A REVIEW ON PSYCHOSIS AND ANTI-PSYCHOTIC PLANTS

    Get PDF
    ABSTRACTPsychosis (schizophrenic, schizoaffective, and affective illnesses) is a group of serious illnesses that affect the mind. About 1% of the population suffersfrom psychosis worldwide and increases for those, whose closer family member have suffered with the disorder. Common symptoms of psychosisare hallucinations, delusions, flat affect, forgetfulness, alogia, avolition, and anhedonia. Currently available marketed drugs like chlorpromazine,haloperidol, clozapine, risperidone, and olanzapine have some serious adverse effects such as dizziness, diabetes, weight gain, tardive dyskinesia,neuroleptic malignant syndrome, sexual dysfunction, agitation, and sedation. There is no satisfactory remedy available for prevention and managementof psychosis. Therefore, the demand for herbal medicine is increasing. This article collects the information about the possible plants and dietarysupplements to improve symptoms of psychosis with no side effect. The present review discusses about anti-psychotic plants, its biological source,common name, and other biological activities, which are helpful for researchers to development new anti-psychotic herbal formulations.Keywords: Psychosis, Anti-psychotic drugs, Dietary supplements, Anti-psychotic plants

    Security of User Data in Local Connectivity Using Multicast Key Agreement

    Get PDF
    In this paper, we be trained team key contract approach a couple of parties need to create a usual secret key to be used to alternate understanding securely. The staff key contract with an arbitrary connectivity graph, where each and every consumer is simplest mindful of his neighbor and has no information about the existence of different customers. Additional, he has no knowledge concerning the community topology. We put into effect the existing approach with extra time efficient method and provide a multicast key generation server which is predicted in future scope with the aid of present authors. We replace the Diffie Hellman key trade protocol through a brand new multicast key exchange protocol that may work with one to 1 and one to many functionality. We additionally tend to put into effect a robust symmetric encryption for improving file safety within the process

    Detection and Identification of Camouflaged Targets using Hyperspectral and LiDAR data

    Get PDF
    Camouflaging is the process of merging the target with the background with the aim to reduce/delay its detection. It can be done using different materials/methods such as camouflaging nets, paints. Defence applications often require quick detection of camouflaged targets in a dynamic battlefield scenario. Though HSI data may facilitate detection of camouflaged targets but detection gets complicated due to issues (spectral variability, dimensionality). This paper presents a framework for detection of camouflaged target that allows military analysts to coordinate and utilise the expert knowledge for resolving camouflaged targets using remotely sensed data. Desired camouflaged target (set of three chairs as a target under a camouflaging net) has been resolved in three steps: First, hyperspectral data processing helps to detect the locations of potential camouflaged targets. It narrows down the location of the potential camouflaged targets by detecting camouflaging net using Independent component analysis and spectral matching algorithms. Second, detection and identification have been performed using LiDAR point cloud classification and morphological analysis. HSI processing helps to discard the redundant majority of LiDAR point clouds and support detailed analysis of only the minute portion of the point cloud data the system deems relevant. This facilitates extraction of salient features of the potential camouflaged target. Lastly, the decisions obtained have been fused to infer the identity of the desired targets. The experimental results indicate that the proposed approach may be used to successfully resolve camouflaged target assuming some a priori knowledge about the morphology of targets likely to be present.

    Securing User Data in Local Connectivity using Multicast Key Agreement

    Get PDF
    In this paper, we gain knowledge of crew key contract means more than one parties need to create a original secret key for use to alternate know-how securely. The staff key agreement with an arbitrary connectivity graph, where each and every consumer is most effective aware of his neighbor and has no expertise concerning the existence of alternative users. Extra, he has no expertise concerning the community topology. We implement the present procedure with extra time efficient method and provide a multicast key new release server which is expected in future scope with the aid of current authors. We exchange the Diffie Hellman key trade protocol by using a new multicast key exchange protocol that can work with one to at least one and one to many functionality. We additionally tend to enforce a robust symmetric encryption for bettering file protection in the procedure

    India after the 2014 general elections:BJP dominance and the crisis of the third party system

    Get PDF
    This article critically assesses claims that India has entered a new party system after the 2014 general elections, marked by renationalisation with the BJP as the new 'dominant' party.' To assess these claims, we examine the electoral rise of the BJP in the build-up to and since the 2014 general elections until the state assembly elections in December 2018. Overall, we argue that despite the emerging dominance of the BJP, a core feature of the third party system -a system of binodal interactions- has remained largely intact albeit in a somewhat weaker form. Furthermore, by comparing the post 2014 Indian party system with key electoral features of the first three party systems, we conclude that the rise of the BJP has thrown the third-party system into crisis, but does not yet define the consolidation of a new party system

    Robust estimation of bacterial cell count from optical density

    Get PDF
    Optical density (OD) is widely used to estimate the density of cells in liquid culture, but cannot be compared between instruments without a standardized calibration protocol and is challenging to relate to actual cell count. We address this with an interlaboratory study comparing three simple, low-cost, and highly accessible OD calibration protocols across 244 laboratories, applied to eight strains of constitutive GFP-expressing E. coli. Based on our results, we recommend calibrating OD to estimated cell count using serial dilution of silica microspheres, which produces highly precise calibration (95.5% of residuals <1.2-fold), is easily assessed for quality control, also assesses instrument effective linear range, and can be combined with fluorescence calibration to obtain units of Molecules of Equivalent Fluorescein (MEFL) per cell, allowing direct comparison and data fusion with flow cytometry measurements: in our study, fluorescence per cell measurements showed only a 1.07-fold mean difference between plate reader and flow cytometry data
    • …
    corecore