49 resultados para efficient algorithm

em Cochin University of Science


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The thesis introduced the octree and addressed the complete nature of problems encountered, while building and imaging system based on octrees. An efficient Bottom-up recursive algorithm and its iterative counterpart for the raster to octree conversion of CAT scan slices, to improve the speed of generating the octree from the slices, the possibility of utilizing the inherent parallesism in the conversion programme is explored in this thesis. The octree node, which stores the volume information in cube often stores the average density information could lead to “patchy”distribution of density during the image reconstruction. In an attempt to alleviate this problem and explored the possibility of using VQ to represent the imformation contained within a cube. Considering the ease of accommodating the process of compressing the information during the generation of octrees from CAT scan slices, proposed use of wavelet transforms to generate the compressed information in a cube. The modified algorithm for generating octrees from the slices is shown to accommodate the eavelet compression easily. Rendering the stored information in the form of octree is a complex task, necessarily because of the requirement to display the volumetric information. The reys traced from each cube in the octree, sum up the density en-route, accounting for the opacities and transparencies produced due to variations in density.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

n the recent years protection of information in digital form is becoming more important. Image and video encryption has applications in various fields including Internet communications, multimedia systems, medical imaging, Tele-medicine and military communications. During storage as well as in transmission, the multimedia information is being exposed to unauthorized entities unless otherwise adequate security measures are built around the information system. There are many kinds of security threats during the transmission of vital classified information through insecure communication channels. Various encryption schemes are available today to deal with information security issues. Data encryption is widely used to protect sensitive data against the security threat in the form of “attack on confidentiality”. Secure transmission of information through insecure communication channels also requires encryption at the sending side and decryption at the receiving side. Encryption of large text message and image takes time before they can be transmitted, causing considerable delay in successive transmission of information in real-time. In order to minimize the latency, efficient encryption algorithms are needed. An encryption procedure with adequate security and high throughput is sought in multimedia encryption applications. Traditional symmetric key block ciphers like Data Encryption Standard (DES), Advanced Encryption Standard (AES) and Escrowed Encryption Standard (EES) are not efficient when the data size is large. With the availability of fast computing tools and communication networks at relatively lower costs today, these encryption standards appear to be not as fast as one would like. High throughput encryption and decryption are becoming increasingly important in the area of high-speed networking. Fast encryption algorithms are needed in these days for high-speed secure communication of multimedia data. It has been shown that public key algorithms are not a substitute for symmetric-key algorithms. Public key algorithms are slow, whereas symmetric key algorithms generally run much faster. Also, public key systems are vulnerable to chosen plaintext attack. In this research work, a fast symmetric key encryption scheme, entitled “Matrix Array Symmetric Key (MASK) encryption” based on matrix and array manipulations has been conceived and developed. Fast conversion has been achieved with the use of matrix table look-up substitution, array based transposition and circular shift operations that are performed in the algorithm. MASK encryption is a new concept in symmetric key cryptography. It employs matrix and array manipulation technique using secret information and data values. It is a block cipher operated on plain text message (or image) blocks of 128 bits using a secret key of size 128 bits producing cipher text message (or cipher image) blocks of the same size. This cipher has two advantages over traditional ciphers. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the key avalanche effect produced in the ciphertext output is better than that of AES.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we propose a cryptographic transformation based on matrix manipulations for image encryption. Substitution and diffusion operations, based on the matrix, facilitate fast conversion of plaintext and images into ciphertext and cipher images. The paper describes the encryption algorithm, discusses the simulation results and compares with results obtained from Advanced Encryption Standard (AES). It is shown that the proposed algorithm is capable of encrypting images eight times faster than AES.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Polymer materials find application in optical storage technology, namely in the development of high information density and fast access type memories. A new polymer blend of methylene blue sensitized polyvinyl alcohol (PVA) and polyacrylic acid (PAA) in methanol is prepared and characterized and its comparison with methylene blue sensitized PVA in methanol and complexed methylene blue sensitized polyvinyl chloride (CMBPVC) is presented. The optical absorption spectra of the thin films of these polymers showed a strong and broad absorption region at 670-650 nm, matching the wavelength of the laser used. A very slow recovery of the dye on irradiation was observed when a 7:3 blend of polyvinyl alcohol/polyacrylic acid at a pHof 3.8 and a sensitizer concentration of 4.67 10 5 g/ml were used. A diffraction efficiency of up to 20% was observed for the MBPVA/alcohol system and an energetic sensitivity of 2000 mJ/cm2 was obtained in the photosensitive films with a spatial frequency of 588 lines/mm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Polymer materials find application in optical storage technology, namely in the development of high information density and fast access type memories. A new polymer blend of methylene blue sensitized polyvinyl alcohol (PVA) and polyacrylic acid (PAA) in methanol is prepared and characterized and its comparison with methylene blue sensitized PVA in methanol and complexed methylene blue sensitized polyvinyl chloride (CMBPVC) is presented. The optical absorption spectra of the thin films of these polymers showed a strong and broad absorption region at 670-650 nm, matching the wavelength of the laser used. A very slow recovery of the dye on irradiation was observed when a 7:3 blend of polyvinyl alcohol/polyacrylic acid at a pHof 3.8 and a sensitizer concentration of 4.67 10 5 g/ml were used. A diffraction efficiency of up to 20% was observed for the MBPVA/alcohol system and an energetic sensitivity of 2000 mJ/cm2 was obtained in the photosensitive films with a spatial frequency of 588 lines/mm.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tribasic lead sulphate is tried as a practical curing agent for polychloroprene. The cure characteristics of the compounds as well as the technical properties of the vulcanizates show that it can act as a potential curative.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A genetic algorithm has been used for null steering in phased and adaptive arrays . It has been shown that it is possible to steer the array null s precisely to the required interference directions and to achieve any prescribed null depths . A comparison with the results obtained from the analytic solution shows the advantages of using the genetic algorithm for null steering in linear array patterns

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Zeolite Y-encapsulated ruthenium(III) complexes of Schiff bases derived from 3-hydroxyquinoxaline-2-carboxaldehyde and 1,2- phenylenediamine, 2-aminophenol, or 2-aminobenzimidazole (RuYqpd, RuYqap and RuYqab, respectively) and the Schiff bases derived from salicylaldehyde and 1,2-phenylenediamine, 2-aminophenol, or 2-aminobenzimidazole (RuYsalpd, RuYsalap and RuYsalab, respectively) have been prepared and characterized. These complexes, except RuYqpd, catalyze catechol oxidation by H2O2 selectively to 1,2,4-trihydroxybenzene. RuYqpd is inactive. A comparative study of the initial rates and percentage conversion of the reaction was done in all cases. Turn over frequency of the catalysts was also calculated. The catalytic activity of the complexes is in the order RuYqap > RuYqab for quinoxaline-based complexes and RuYsalap > RuYsalpd > RuYsalab for salicylidene-based complexes. The reaction is believed to proceed through the formation of a Ru(V) species.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the first use of polystyrene-supported poly(amidoamine) (PAMAM) dendrimers as heterogeneous basic organocatalysts for carbon–carbon bond formation. Polystyrene-supported PAMAM dendrimers of first, second and third generations have been used as reusable base catalysts in Knoevenagel condensations of carbonyl compounds with active methylene compounds. The reactions proceed in short periods of time and with 100% selectivity. This novel catalyst eliminates the use of aromatic and halogenated solvents, as well as complex purification processes. The catalysts can be recycled ten times.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cryptosystem using linear codes was developed in 1978 by Mc-Eliece. Later in 1985 Niederreiter and others developed a modified version of cryptosystem using concepts of linear codes. But these systems were not used frequently because of its larger key size. In this study we were designing a cryptosystem using the concepts of algebraic geometric codes with smaller key size. Error detection and correction can be done efficiently by simple decoding methods using the cryptosystem developed. Approach: Algebraic geometric codes are codes, generated using curves. The cryptosystem use basic concepts of elliptic curves cryptography and generator matrix. Decrypted information takes the form of a repetition code. Due to this complexity of decoding procedure is reduced. Error detection and correction can be carried out efficiently by solving a simple system of linear equations, there by imposing the concepts of security along with error detection and correction. Results: Implementation of the algorithm is done on MATLAB and comparative analysis is also done on various parameters of the system. Attacks are common to all cryptosystems. But by securely choosing curve, field and representation of elements in field, we can overcome the attacks and a stable system can be generated. Conclusion: The algorithm defined here protects the information from an intruder and also from the error in communication channel by efficient error correction methods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Analog-to digital Converters (ADC) have an important impact on the overall performance of signal processing system. This research is to explore efficient techniques for the design of sigma-delta ADC,specially for multi-standard wireless tranceivers. In particular, the aim is to develop novel models and algorithms to address this problem and to implement software tools which are avle to assist the designer's decisions in the system-level exploration phase. To this end, this thesis presents a framework of techniques to design sigma-delta analog to digital converters.A2-2-2 reconfigurable sigma-delta modulator is proposed which can meet the design specifications of the three wireless communication standards namely GSM,WCDMA and WLAN. A sigma-delta modulator design tool is developed using the Graphical User Interface Development Environment (GUIDE) In MATLAB.Genetic Algorithm(GA) based search method is introduced to find the optimum value of the scaling coefficients and to maximize the dynamic range in a sigma-delta modulator.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present work investigates on the applicability of metal promoted sulphated zirconia catalysts for the hydroxylation of phenol under mild conditions. The percentage conversion and product distribution was highly sensitive towards the reaction parameters like the catalyst composition, reaction temperature, H202/ phenol ratio and the solvent used.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Three enzymes, α-amylase, glucoamylase and invertase, were immobilized on acid activated montmorillonite K 10 via two independent techniques, adsorption and covalent binding. The immobilized enzymes were characterized by XRD, N2 adsorption measurements and 27Al MAS-NMR spectroscopy. The XRD patterns showed that all enzymes were intercalated into the clay inter-layer space. The entire protein backbone was situated at the periphery of the clay matrix. Intercalation occurred through the side chains of the amino acid residues. A decrease in surface area and pore volume upon immobilization supported this observation. The extent of intercalation was greater for the covalently bound systems. NMR data showed that tetrahedral Al species were involved during enzyme adsorption whereas octahedral Al was involved during covalent binding. The immobilized enzymes demonstrated enhanced storage stability. While the free enzymes lost all activity within a period of 10 days, the immobilized forms retained appreciable activity even after 30 days of storage. Reusability also improved upon immobilization. Here again, covalently bound enzymes exhibited better characteristics than their adsorbed counterparts. The immobilized enzymes could be successfully used continuously in the packed bed reactor for about 96 hours without much loss in activity. Immobilized glucoamylase demonstrated the best results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, a novel application of solid acid catalysts in the Beckmann rearrangement of E,E-cinnamaldoxime in the synthesis of an important heterocyclic compound; isoquinoline is reported. E,E-Cinnamaldoxime under ambient reaction conditions on zeolite catalysts underwent Beckmann rearrangement to produce isoquinoline in yields of ca. 86–95%. Cinnamonitrile and cinnamaldehyde were formed as by-products. LaH-Y zeolite produces maximum amount of the desired product (yield 95.6%). However, the catalysts are susceptible for deactivation due to the basic nature of the reactants and products, which neutralize the active sites. H-Y zeolite is more susceptible (22% deactivation in 10 h) for deactivation compared to the cerium-exchanged counterpart (18% deactivation in 10 h). Thus, the optimal protocol allows isoquinoline to be synthesised in excellent yields through the Beckmann rearrangement of cinnamaldoxime. The reaction is simple, effective, does not involve any other additives, and environmentally benign.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The School of Management Studies, CUSAT