1,327 research outputs found

    Enhanced diffusion and ordering of self-propelled rods

    Get PDF
    Starting from a minimal physical model of self propelled hard rods on a substrate in two dimensions, we derive a modified Smoluchowski equation for the system. Self -propulsion enhances longitudinal diffusion and modifies the mean field excluded volume interaction. From the Smoluchowski equation we obtain hydrodynamic equations for rod concentration, polarization and nematic order parameter. New results at large scales are a lowering of the density of the isotropic-nematic transition and a strong enhancement of boundary effects in confined self-propelled systems.Comment: 4 pages, 2 figure

    ACHIEVING AVAILABILITY AND DATA INTEGRITY PROOF IN HIERARCHICAL ATTRIBUTE ENCRYPTION SCHEME USING HYBRID CLOUD

    Get PDF
    It has been widely observed that the concept of cloud computing has become one of the major theory in the world of IT industry. Data owner decides to release their burden of storing and maintaining the data locally by storing it over the cloud. Cloud storage moves the owner’s data to large data centers which are remotely located on which data owner does not have any control. However, this unique feature of the cloud poses many new security challenges. One of the important concerns that need to be addressed is access control and integrity of outsourced data in cloud. Number of schemes has been proposed to achieve the access control of outsourced data like hierarchical attribute set based encryption [HASBE] by extending cipher-text-policy attribute set based encryption [CP-ABE]. Even though HASBE scheme achieves scalability, flexibility and fine grained access control, it fails to prove the data integrity in the cloud. Hence integrity checking concept has been proposed for HASBE scheme to achieve integrity. Though the scheme achieves integrity it fails to provide the availability of data to the user even when fault had occurred to data in the cloud. However, the fact that owner no longer have physical possession of data indicates that they are facing a potentially formidable risk for missing or corrupted data, because sometimes the cloud service provider deletes the data which are either not used by client from long-time and which occupies large space in the cloud without the knowledge or permission of data owner. Hence in order to avoid this security risk, in this paper we propose a hybrid cloud concept. Hybrid cloud is a cloud computing environment in which an organization provides and manages some internal resources and external resources. A hybrid cloud is a composition of at least one private cloud and at least one public cloud. This concept provides the availability and data integrity proof for HASBE scheme

    Deep Learning frameworks for Image Quality Assessment

    Get PDF
    Technology is advancing by the arrival of deep learning and it finds huge application in image processing also. Deep learning itself sufficient to perform over all the statistical methods. As a research work, I implemented image quality assessment techniques using deep learning. Here I proposed two full reference image quality assessment algorithms and two no reference image quality algorithms. Among the two algorithms on each method, one is in a supervised manner and other is in an unsupervised manner. First proposed method is the full reference image quality assessment using autoencoder. Existing literature shows that statistical features of pristine images will get distorted in presence of distortion. It will be more advantageous if algorithm itself learns the distortion discriminating features. It will be more complex if the feature length is more. So autoencoder is trained using a large number of pristine images. An autoencoder will give the best lower dimensional representation of the input. It is showed that encoded distance features have good distortion discrimination properties. The proposed algorithm delivers competitive performance over standard databases. If we are giving both reference and distorted images to the model and the model learning itself and gives the scores will reduce the load of extracting features and doing post-processing. But model should be capable one for discriminating the features by itself. Second method which I proposed is a full reference and no reference image quality assessment using deep convolutional neural networks. A network is trained in a supervised manner with subjective scores as targets. The algorithm is performing e�ciently for the distortions that are learned while training the model. Last proposed method is a classiffication based no reference image quality assessment. Distortion level in an image may vary from one region to another region. We may not be able to view distortion in some part but it may be present in other parts. A classiffication model is able to tell whether a given input patch is of low quality or high quality. It is shown that aggregate of the patch quality scores is having a high correlation with the subjective scores

    Influence of Ni doping on the electronic structure of Ni_2MnGa

    Full text link
    The modifications in the electronic structure of Ni_{2+x}Mn_{1-x}Ga by Ni doping have been studied using full potential linearized augmented plane wave method and ultra-violet photoemission spectroscopy. Ni 3d related electron states appear due to formation of Ni clusters. We show the possibility of changing the minority-spin DOS with Ni doping, while the majority-spin DOS remains almost unchanged. The total magnetic moment decreases with excess Ni. The total energy calculations corroborate the experimentally reported changes in the Curie temperature and the martensitic transition temperature with x.Comment: 4 pages, 4 figures, accepted in Phys. Rev.

    IMPACT OF STRESS ON TYPE 2 DIABETES MELLITUS MANAGEMENT

    Get PDF
    Background: Type 2 diabetes mellitus (T2DM) is one among the major health and socioeconomic problems worldwide. It is, however, not a somatic illness for which just symptomatic treatment will suffice. Stress is an important factor in not only causing diabetes onset or exacerbation, but also in hampering proper treatment by interfering with the treatment adherence of patients. Hence, it becomes important for physicians to acquaint themselves with the effects of stress on T2DM in order to ensure proper treatment of the latter. Objective: Documentation of effect of stress on the management of T2DM. Subjects and methods: The research was a cross-sectional study on the patients attending Sri Muthukumaran Medical College, Hospital and Research Institute, Mangadu. A total of 400 people, who werepre-established diabetic patients of the hospital of age greater than 30 years, were chosen for the study. The stress levels of the patients were assessed with the Perceived Stress Scale (PSS) and treatment adherence using a questionnaire prepared exclusively for the study. Based on the data, a statistical relationship was framed between the degree of control (treatment adherence) and the stress levels of the patients. Results: - The FBS levels were a direct reflection of the stress levels (P<0.05). - Stress had a major impact on treatment adherence among the diabetic subjects: Increased levels of stress decreased the adherence (P<0.001). - The glycemic index (HbA1C level) was found to be linked to both treatment adherence and stress. Increased adherence kept it at bay (P<0.05) while stress proved abysmal to glycemic control. Conclusion: T2DM is the result of an interplay between various factors; environmental, psychiatric and somatic. Hence, a holistic treatment approach is required, one that involves stress management, education and mental health awareness along with pharmacological treatment, to fully control the disease

    Analysis of Key Management Schemes for Secure Group Communication and Their Classification

    Get PDF
    Secure Group Communication is very critical for applications like board-meetings, group discussions and teleconferencing. Managing a set of secure group keys and group dynamics are the fundamental building blocks for secure group communication systems. Several group key management techniques have been proposed so far by many researchers. Some schemes are information theoretic and some are complexity theoretic in nature. Users in the secure group may negotiate with each other to derive a common group key or may compute the group key on their own. Some schemes involve a trusted Key Distribution Center (KDC), which generates and distributes initial pieces of information, whereas in other schemes users themselves select their private information. Storage at each user and communication cost among members of the group vary from scheme to scheme. Here, in this paper we discuss some of the key management schemes proposed earlier based on the considerations mentioned above. We also analyze the schemes with respect to storage, communication and computation costs

    Genetic algorithm for optimal weapon allocation in multilayer defence scenario

    Get PDF
    Several heuristic optimisation techniques have been studied in the past to determine the most effective mix of weapons and their allocation to enemy targets in a multilayer defence scenario. This paper discusses a genetic algorithm approach to arrive at improved solutions with reduced computational time. The most important aspect of the new approach is the mapping of the nonlinear optimisation problem into a discrete problem. The results demonstrate that if the problem mapping is correct, even a primitive algorithm can yield high quality results to a complex optimisation problem

    Analysis of Key Management Schemes for Secure Group Communication and Their Classification

    Get PDF
    Secure Group Communication is very critical for applications like board-meetings, group discussions and teleconferencing. Managing a set of secure group keys and group dynamics are the fundamental building blocks for secure group communication systems. Several group key management techniques have been proposed so far by many researchers. Some schemes are information theoretic and some are complexity theoretic in nature. Users in the secure group may negotiate with each other to derive a common group key or may compute the group key on their own. Some schemes involve a trusted Key Distribution Center (KDC), which generates and distributes initial pieces of information, whereas in other schemes users themselves select their private information. Storage at each user and communication cost among members of the group vary from scheme to scheme. Here, in this paper we discuss some of the key management schemes proposed earlier based on the considerations mentioned above. We also analyze the schemes with respect to storage, communication and computation costs

    Shadows of Time: Content creation for the Performance art installation

    Get PDF
    Shadows of Time is a non-linear narrative video installation which would be used as a backdrop for the larger performance event. The content creation for the performance was undergone a series of process to achieve the style which was decided by the team. The installation will showcase only the photographs of architectural details of Tombs which would depict symbolically the different phases of her life such as Hayat Bakshi’s timeline, her husband’s death, her thoughts about future following her death and finally showcasing the present scenario. In the process, I explored various style of image processing, methods and processes of filmmaking, different kind of treatments in order to achieve the required output as per the decided framework. The result is an eight-minute video narrative projection without dialogues along with the composed music and set design. The final installation event would be a collaboration with the performance artists along with other interactive installations contributed by other members in the team
    corecore