706 research outputs found

    Building robust m-commerce payment system on offline wireless network

    Get PDF
    Mobile commerce is one of the upcoming research area with focus on mobile payment systems. Unfortunately, the current payment systems is directly dependent on fixed infrastructure of network (cellular network), which fails to facilitate optimal level of security for the payment system. The proposed system highlights a novel approach for building a secure, scalable, and flexible e-payment systems in the distributed scenario of wireless adhoc network in offline mode of communication for enhanced security on transaction and payment process. The proposed system uses Simple Public Key Infrastructure for providing the security in payment processes. The performance analysis of the proposed model shows that the system is highly robust and secure ensuring anonymity, privacy, non-repudiation offline payment system over wireless adhoc network

    Depth and Zoom Estimation for PTZ Camera Using Stereo Vision

    Get PDF
    Depth perception comes naturally to humans. However in a Computer Vision scenario estimation of distance between object and camera is an area still under research. This thesis aims to use binocular stereo vision to reconstruct a 3D scene from 2D images of the scene taken by a pair of cameras and use it to estimate the distance of the object from the camera. Further, this estimated distance is used to calculate the Zoom of a PTZ camera. Although there are various ways to determine the distance of an object from the camera using Sensors, Lasers and other such external devices, the method used in this thesis is independent of the use of such external devices and uses only image processing techniques to determine the distance. Results obtained and the process are clearly outlined

    Tool handle design for power GRIP

    Get PDF
    The use of tools is still widely appreciated in industries at various levels. The range of their application varies from a simple task like hammering to a complicated, complex and precision-demanding tasks such as that of surgical scalpels. Hence, it becomes highly essential to design the tool for ‘comfort’ from the perspective of user. The aim of this study is to design a tool handle for a task involving a simple power grip such as hammer. The focus of this study is mainly confined to identify the right cross-section and profile of the tool handle, based on subjective experimentation of a group of subjects and find the approximate dimension and shape(of both cross-section and profile) which outstands in subject’s perception of comfort. In this study, a new criteria for decision making has been employed during a brief subjective analysis to find out the better cross- section shape among the various possible shapes for the handle. The shape of the profile has been reverse engineered from an existing tool handle using a CAD software which was been rated high in market. At various turns during this study, new simplified approaches were used to accomplish certain tasks which can be considered as reasonable approximation to standard methods. The final step is to evaluate the design which has been perceived most comfortable by the subjects, using a subjective analysis through hand-mapping of discomfort

    Reliable OSPM schema for secure transaction using mobile agent in micropayment system

    Get PDF
    The paper introduces a novel offline payment system in mobile commerce using the case study of micro-payments. The present paper is an extension version of our prior study addressing on implication of secure micropayment system deploying process oriented structural design in mobile network. The previous system has broad utilization of SPKI and hash chaining to furnish reliable and secure offline transaction in mobile commerce. However, the current work has attempted to provide much more light weight secure offline payment system in micro-payments by designing a new schema termed as Offline Secure Payment in Mobile Commerce (OSPM). The empirical operation are carried out on three types of transaction process considering maximum scenario of real time offline cases. Therefore, the current idea introduces two new parameters i.e. mobile agent and mobile token that can ensure better security and comparatively less network overhead

    Analysing security risk of a cloud computing system to produce a model for secured business environment

    Get PDF
    These days, almost all the medium and big size of businesses is using the cloud computing system to run their business across the globe and around the clock. It becomes popular and of huge application due to its characteristics such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. This is an affordable and effective place for businesses to sell and promote their goods and services. However the security problems for the cloud computing system are very significant. It can ruin the rapid development of cloud computing. In Business, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. The data privacy and service availability in cloud computing are the key security problem. The internet also provides opportunities for fraudulent behaviour and unauthorized access to business and client data. Attacks on the computer system of a business can have immediate and ongoing effects, such as targeting customers for identity crimes or infecting website visitors with malicious software. Due to having combination of various types of models in the cloud computing, the single security method cannot solve its security problem. Various traditional and new technologies and strategies together need to consider for protecting a cloud computing system totally. The aim of this paper is to bring into the deep sight of the cloud computing systems working and then to analyse the cloud computing security problem and its strategy according to the cloud computing concepts and characters. In addition to that, we are identifying the higher vulnerabilities in this type of systems and the most important threats found in the literature study related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with the possible solutions

    THE IMPORTANCE OF ANTIBIOTICS IN A VARIOUS UNIQUE METASTASIS ALONG WITH CYTOTOXIC THERAPY AT TERTIARY CARE HOSPITAL: A PROSPECTIVE COHORT STUDY

    Get PDF
    Objective: Rare cancers are creating a massive challenge to the world. It has associated with genetic mutations or socio-environmental factors, which includes genes, smoking, alcohol, ionizing radiation exposure, organic-inorganic chemicals, air and water pollution, viruses, and bacteria. When 15 cases per 1,00,000 people per year, we can consider it as a rare case as per the National Cancer Institute This study aim is the importance of antibiotics in various unique metastasis along with cytotoxic therapy at tertiary care hospital. Methods: The inclusion criteria of our study include a person who is suffering from rare metastasis at an early stage. We excluded the data that are those who are suffering from the typical type of cancers, multiple co-morbid conditions. This study was carried out the Prospective Cohort Study conducted between June 2018 to March 2020. Results: Number of 20 rare cancers we consider for final analysis, the overall antibiotics use in this study 18 antibiotics they prescribed in overall cases, prescribed cytotoxic drugs are 23. the chi-square test value is P=0.001, the confidence interval(CI) is 95%, the likelihood ratio is 54.4, odd’s ratio is 2.0(CI 95%, P=0.711), Male patients more than the female patients. Conclusion: Cancer is a complex disorder, which is occurred through gene proliferation and socio-environmental factors. Rare metastasis is challenging to physicians and patients, however as per our observation, cytotoxic therapy with antibiotics can reduce the risk of rare metastasis and as well improved therapeutic adhesion, and we need clear supporting evidence on it through clinical trials

    Noise Removal in Microarray Images Using Variational Mode Decomposition Technique

    Get PDF
    Microarray technology allows the simultaneous monitoring of thousands of genes in parallel. Based on the gene expression measurements, microarray technology have proven powerful in gene expression profiling for discovering new types of diseases and for predicting the type of a disease. Enhancement, Gridding, Segmentation and Intensity extraction are important steps in microarray image analysis. This paper presents a noise removal method in microarray images based on Variational Mode Decomposition (VMD). VMD is a signal processing method which decomposes any input signal into discrete number of sub-signals (called Variational Mode Functions) with each mode chosen to be its band width in spectral domain. First the noisy image is processed using 2-D VMD to produce 2-D VMFs. Then Discrete Wavelet Transform (DWT) thresholding technique is applied to each VMF for denoising.  The denoised microarray image is reconstructed by the summation of VMFs.  This method is named as 2-D VMD and DWT thresholding method. The proposed method is compared with DWT thresholding and BEMD and DWT thresholding methods. The qualitative and quantitative analysis shows that 2-D VMD and DWT thresholding method produces better noise removal than other two methods
    corecore