176 research outputs found

    Implicit Study of Techniques and Tools for Data Analysis of Complex Sensory Data

    Get PDF
    The utility as well as contribution of applications in Wireless Sensor Network (WSN) has been experienced by the users from more than a decade. However, with the evolution of time, it has been found that there is a massive growth of data generation even in WSN. The smaller size of sensor with limited battery life and minimal computational capability cannot handle processive such a massive stream of complex data efficiently. Although, there are various types of mining techniques being practiced today, but such tools and techniques cannot be efficiently used for analyzing such complex and massively growing data. This paper therefore discusses about the generation of large data and issues of the existing research techniques by reviewing the literatures and frequently used tools. The study finally briefs about the significant research gap that calls for need of data analytical tools in extracting knowledge from complex sensory data

    Occurrence and clinicolaboratory profile of mycoplasma infection in children hospitalized with lower respiratory tract infection – A prospective study

    Get PDF
    Background: Mycoplasma pneumoniae (MP) is a common cause of lower respiratory tract infection (LRTI) in children between 5 and 15 years of age. The clinical and laboratory findings are usually non-specific and extrapulmonary manifestations can be devastating. Objectives: The objectives of the study were to study the occurrence, clinical features, and laboratory profile of MP infection in children presenting with LRTI to a tertiary care hospital. Materials and Methods: This was a hospital-based prospective study done in the inpatient department of pediatrics of a tertiary care teaching hospital in South India from November 2014 to April 2016. Children aged 1 month–18 years, admitted with LRTI were included in the study. A pre-tested semi-structured questionnaire was used to collect history. MP infection was confirmed using mycoplasma immunoglobulin M enzyme-linked immunosorbent assay. Clinical and laboratory findings were compared between mycoplasma positive and negative groups. Results: Among a total of 268 children with LRTI, MP infection was diagnosed in 41 children (15.3%). The peak occurrence was in 9–12 years (30%) followed by 6–9 years (25.4%) and 3–6 years (21.7%) age group. MP infection was more common among malnourished (29.4%) than well-nourished children (13.1%). None of the clinical and laboratory parameters were specific for the infection. Extrapulmonary manifestations were not seen in our study. Conclusion: MP infection can occur even in children in 3–6 years age group. The clinical and laboratory findings in MP infection are non-specific necessitating empirical treatment with macrolide antibiotics in children more than 3 years of age. It is more common among malnourished children and extrapulmonary manifestations are rare in our population

    Single Secret Key Crptosystem for Secure and Efficient Exchange of Data in Cloud

    Get PDF
    Nowadays users are storing their personal data on a cloud storage because of its numerous advantages. One of the important advantage in cloud storage is sharing of data between users or between organizations. In this paper we propose a simple, flexible, efficient and secure data sharing method for the cloud users. Here we are describing a special type of public key encryption scheme where public key, master-secret key, single secret key and cipher text sizes are constant. Single secret key can be obtained by combining number of secret keys. The sender can securely share multiple files with receiver by encrypting each file using a separate public key. Then the sender will combine all the public keys to form a single secret key which is exchanged with receiver by using Diffie-Hellman algorithm. Advantage of small single secret key is user can store this decryption key on a resource constraint devices like smart cards, smart cell phones or sensor nodes. Receiver can download the number of files by using single secret key

    Spectrum Sensing Techniques for Cognitive Radio Sensor Networks (CRSN)

    Get PDF
    Cognitive radio sensor network (CRSN) is a recently emerging paradigm that aims to utilize the unique features provided by CR concept to incorporate additional capabilities to Wireless Sensor Network (WSN). A CRSN is a distributed network of wireless cognitive radio sensor nodes, which perform sensing operation on event signals and collaboratively communicate their readings over dynamically available spectrum bands in a multi-hop manner ultimately to satisfy the application-specific requirements. The realization of CRSN depends on addressing many difficult challenges, posed by the unique characteristics of both cognitive radio and sensor networks, and further amplified by their union. Spectrum sensing technique plays an important role in the design of a CRSN. The first phase of this thesis work is concentrated in identifying the suitable spectrum sensing strategy for a CRSN by analysing different spectrum sensing strategies and comparing together. The second phase involves a search for an optimum spectrum sensing scheme suitable for the resource constrained nature of CRSN by combining two or more sensing schemes together i.e. Hybrid Spectrum Sensing. The thesis concludes with a remark that hybrid spectrum sensing schemes are the most appropriate sensing schemes for CRSN under its unique constraints

    Growth Stress Induced Tunability of Dielectric Constant in Thin Films

    Full text link
    It is demonstrated here that growth stress has a substantial effect on the dielectric constant of zirconia thin films. The correct combination of parameters - phase, texture and stress - is shown to yield films with high dielectric constant and best reported equivalent oxide thickness of 0.8 nm. The stress effect on dielectric constant is twofold, firstly, by the effect on phase transitions and secondly by the effect on interatomic distances. We discuss and explain the physical mechanisms involved in the interplay between the stress, phase changes and the dielectric constant in detail.Comment: 11 pages, 5 figure

    Arabian Sea Mini Warm Pool and its Influenceon Acoustic Propagation

    Get PDF
    A systematic experiment was conducted in the eastern Arabian Sea for the first time exclusivelyto study the characteristics of the Arabian Sea mini warm pool1. The analysis revealed complexnature of the thermohaline and sonic layer distributions across the Arabian Sea mini warm pool.This mini warm pool was identified between 67.5 oE and 75 oE, where the sea surface temperaturewas in excess of 30.25 oC. At the core of this mini warm pool, warmer (>31.2 oC) and low saline(<34.6 PSU) waters were noticed. Further, very thin sonic layer (< 5 m) was noticed at the miniwarm pool core, which increased eastward and westward. In this study, the acoustic propagationcharacteristics across and outside of the core, i.e., (i) within the mini warm pool core, (ii) easternside of the mini warm pool core, and (iii) western side of the mini warm pool core, were assessedbased on the output of a range-dependant acoustic model. In general, the occurrence of this miniwarm pool was found to alter the propagation characteristics. Better propagation was obtainedwhen the simulation was carried out on the eastern side of this mini warm pool, with source nearthe coast (i.e., downslope condition

    Generative Model for Conceptual Design of Defence Equipment

    Get PDF
    Requirement study and analysis forms a key component in conceptual design of new products and systems. For complex systems like defence equipment, concept design is very important and should primarily satisfy all user requirements. Brings out a new generative model for concept design of defence systems using principles of systems engineering. A structured model and methodology is presented starting from capturing the user requirements, developing multiple solutions, short listing the candidate solutions and finally selecting one or two feasible designs. The model and process is illustrated with the help of a case study on the development of a torpedo defence system for naval ships.

    Chaining Algorithm and Protocol for Peer-to-Peer Streaming Video on Demand System

    Get PDF
    ABSTRACT As the various architectures and protocol have been implemented a tru
    corecore