4 resultados para COMPUTERIZED TOMOPGRAPHY
em Cochin University of Science
Resumo:
Photoconductivity (PC) processes may be the most suitable technique for obtaining information about the states in the gap. It finds applications in photovoItaics, photo detection and radiation measurements. The main task in the area of photovoltaics, is to increase the efficiency of the device and also to develop new materials with good optoelectronic properties useful for energy conversion, keeping the idea of cost effectiveness. Photoconduction includes generation and recombination of carriers and their transport to the electrodes. So thermal relaxation process, charge carrier statistics, effects of electrodes and several mechanisms of recombination are involved in photoconductivity.A major effect of trapping is to make the experimentally observed decay time of photocurrent, longer than carrier lifetime. If no trapping centers are present, then observed photocurrent will decay in the same way as the density of free carriers and the observed decay time will be equal to carrier lifetime. If the density of free carriers is much less than density of trapped carriers, the entire decay of photocurrent is effectively dominated by the rate of trap emptying rather than by the rate of recombination.In the present study, the decay time of carriers was measured using photoconductive decay (PCD) technique. For the measurements, the film was loaded in a liquid Helium cryostat and the temperature was controlled using Lakshore Auto tuning temperature controller (Model 321). White light was used to illuminate the required area of the sample. Heat radiation from the light source was avoided by passing the light beam through a water filter. The decay current. after switching off the illumination. was measured using a Kiethely 2000 multi meter. Sets of PCD measurements were taken varying sample temperature, sample preparation temperature, thickness of the film, partial pressure of Oxygen and concentration of a particular element in a compound. Decay times were calculated using the rate window technique, which is a decay sampling technique particularly suited to computerized analysis. For PCD curves with two well-defined regions, two windows were chosen, one at the fast decay region and the other at the slow decay region. The curves in a particular window were exponentially fitted using Microsoft Excel 2000 programme. These decay times were plotted against sample temperature and sample preparation temperature to study the effect of various defects in the film. These studies were done in order to optimize conditions of preparation technique so as to get good photosensitive samples. useful for photovoltaic applications.Materials selected for the study were CdS, In2Se3, CuIn2Se3 and CuInS2• Photoconductivity studies done on these samples are organised in six chapters including introduction and conclusion.
Resumo:
In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.
Resumo:
Cancer treatment is most effective when it is detected early and the progress in treatment will be closely related to the ability to reduce the proportion of misses in the cancer detection task. The effectiveness of algorithms for detecting cancers can be greatly increased if these algorithms work synergistically with those for characterizing normal mammograms. This research work combines computerized image analysis techniques and neural networks to separate out some fraction of the normal mammograms with extremely high reliability, based on normal tissue identification and removal. The presence of clustered microcalcifications is one of the most important and sometimes the only sign of cancer on a mammogram. 60% to 70% of non-palpable breast carcinoma demonstrates microcalcifications on mammograms [44], [45], [46].WT based techniques are applied on the remaining mammograms, those are obviously abnormal, to detect possible microcalcifications. The goal of this work is to improve the detection performance and throughput of screening-mammography, thus providing a ‘second opinion ‘ to the radiologists. The state-of- the- art DWT computation algorithms are not suitable for practical applications with memory and delay constraints, as it is not a block transfonn. Hence in this work, the development of a Block DWT (BDWT) computational structure having low processing memory requirement has also been taken up.
Resumo:
Efficient optic disc segmentation is an important task in automated retinal screening. For the same reason optic disc detection is fundamental for medical references and is important for the retinal image analysis application. The most difficult problem of optic disc extraction is to locate the region of interest. Moreover it is a time consuming task. This paper tries to overcome this barrier by presenting an automated method for optic disc boundary extraction using Fuzzy C Means combined with thresholding. The discs determined by the new method agree relatively well with those determined by the experts. The present method has been validated on a data set of 110 colour fundus images from DRION database, and has obtained promising results. The performance of the system is evaluated using the difference in horizontal and vertical diameters of the obtained disc boundary and that of the ground truth obtained from two expert ophthalmologists. For the 25 test images selected from the 110 colour fundus images, the Pearson correlation of the ground truth diameters with the detected diameters by the new method are 0.946 and 0.958 and, 0.94 and 0.974 respectively. From the scatter plot, it is shown that the ground truth and detected diameters have a high positive correlation. This computerized analysis of optic disc is very useful for the diagnosis of retinal diseases