12 resultados para wearable, computing, body, area, network, bluetooth, android, wristOx2
em Cochin University of Science
Resumo:
A novel compact wideband antenna for wireless local area network (WLAN) applications in the 2.4 GHz band are presented. The proposed low profile antenna of dimensions 15 x 14.5 x 1.6 mm offers 18.6% bandwidth and an average gain of~5 dBi. The antenna can be excited directly using a 50 coaxial probe
Resumo:
A novel compact wideband antenna for wireless local area network (WLAN) applications in the 2.4 GHz band is presented. The proposed low profile antenna of dimensions 15 x 14.5 x 1.6 mm offers 18.6% bandwidth and an average gain of -5 dBi. The antenna can be excited directly using a 50 coaxial probe
Resumo:
A compact ultra-wideband (UWB) printed slot antenna is described, suitable for integration with the printed circuit board (PCB) of a wireless, universal, serial-bus dongle. The design comprises of a near-rectangular slot fed by a coplanar waveguide (CPW) printed on a PCB of size 20 × 30 mm2. It has a large bandwidth covering the 3.1–10.6 GHz UWB band, with omnidirectional radiation patterns. Further, a notched band centered at 5.45 GHz wireless local area network bands is obtained within the wide bandwidth by inserting a narrow slot inside the tuning stub. Details of the antenna design are described, and the experimental results of the constructed prototype are presented. The time domain studies on the antenna shows a linear phase response throughout the band except at the notched frequency. The transient analysis of the antenna indicates very little pulse distortion confirming its suitability for high speed wireless connectivity.
Resumo:
This work presents a wideband low-distortion sigmadelta analog-to-digital converter (ADC) for Wireless Local Area Network (WLAN) standard. The proposed converter makes use of low-distortion swing suppression SDM architecture which is highly suitable for low oversampling ratios to attain high linearity over a wide bandwidth. The modulator employs a 2-2 cascaded sigma-delta modulator with feedforward path with a single-bit quantizer in the first stage and 4-bit in the second stage. The modulator is designed in TSMC 0.18um CMOS technology and operates at 1.8V supply voltage. Simulation results show that, a peak SNDR of 57dB and a spurious free dynamic range (SFDR) of 66dB is obtained for a 10MHz signal bandwidth, and an oversampling ratio of 8.
Resumo:
Microarray data analysis is one of data mining tool which is used to extract meaningful information hidden in biological data. One of the major focuses on microarray data analysis is the reconstruction of gene regulatory network that may be used to provide a broader understanding on the functioning of complex cellular systems. Since cancer is a genetic disease arising from the abnormal gene function, the identification of cancerous genes and the regulatory pathways they control will provide a better platform for understanding the tumor formation and development. The major focus of this thesis is to understand the regulation of genes responsible for the development of cancer, particularly colorectal cancer by analyzing the microarray expression data. In this thesis, four computational algorithms namely fuzzy logic algorithm, modified genetic algorithm, dynamic neural fuzzy network and Takagi Sugeno Kang-type recurrent neural fuzzy network are used to extract cancer specific gene regulatory network from plasma RNA dataset of colorectal cancer patients. Plasma RNA is highly attractive for cancer analysis since it requires a collection of small amount of blood and it can be obtained at any time in repetitive fashion allowing the analysis of disease progression and treatment response.
Resumo:
Post-transcriptional gene silencing by RNA interference is mediated by small interfering RNA called siRNA. This gene silencing mechanism can be exploited therapeutically to a wide variety of disease-associated targets, especially in AIDS, neurodegenerative diseases, cholesterol and cancer on mice with the hope of extending these approaches to treat humans. Over the recent past, a significant amount of work has been undertaken to understand the gene silencing mediated by exogenous siRNA. The design of efficient exogenous siRNA sequences is challenging because of many issues related to siRNA. While designing efficient siRNA, target mRNAs must be selected such that their corresponding siRNAs are likely to be efficient against that target and unlikely to accidentally silence other transcripts due to sequence similarity. So before doing gene silencing by siRNAs, it is essential to analyze their off-target effects in addition to their inhibition efficiency against a particular target. Hence designing exogenous siRNA with good knock-down efficiency and target specificity is an area of concern to be addressed. Some methods have been developed already by considering both inhibition efficiency and off-target possibility of siRNA against agene. Out of these methods, only a few have achieved good inhibition efficiency, specificity and sensitivity. The main focus of this thesis is to develop computational methods to optimize the efficiency of siRNA in terms of “inhibition capacity and off-target possibility” against target mRNAs with improved efficacy, which may be useful in the area of gene silencing and drug design for tumor development. This study aims to investigate the currently available siRNA prediction approaches and to devise a better computational approach to tackle the problem of siRNA efficacy by inhibition capacity and off-target possibility. The strength and limitations of the available approaches are investigated and taken into consideration for making improved solution. Thus the approaches proposed in this study extend some of the good scoring previous state of the art techniques by incorporating machine learning and statistical approaches and thermodynamic features like whole stacking energy to improve the prediction accuracy, inhibition efficiency, sensitivity and specificity. Here, we propose one Support Vector Machine (SVM) model, and two Artificial Neural Network (ANN) models for siRNA efficiency prediction. In SVM model, the classification property is used to classify whether the siRNA is efficient or inefficient in silencing a target gene. The first ANNmodel, named siRNA Designer, is used for optimizing the inhibition efficiency of siRNA against target genes. The second ANN model, named Optimized siRNA Designer, OpsiD, produces efficient siRNAs with high inhibition efficiency to degrade target genes with improved sensitivity-specificity, and identifies the off-target knockdown possibility of siRNA against non-target genes. The models are trained and tested against a large data set of siRNA sequences. The validations are conducted using Pearson Correlation Coefficient, Mathews Correlation Coefficient, Receiver Operating Characteristic analysis, Accuracy of prediction, Sensitivity and Specificity. It is found that the approach, OpsiD, is capable of predicting the inhibition capacity of siRNA against a target mRNA with improved results over the state of the art techniques. Also we are able to understand the influence of whole stacking energy on efficiency of siRNA. The model is further improved by including the ability to identify the “off-target possibility” of predicted siRNA on non-target genes. Thus the proposed model, OpsiD, can predict optimized siRNA by considering both “inhibition efficiency on target genes and off-target possibility on non-target genes”, with improved inhibition efficiency, specificity and sensitivity. Since we have taken efforts to optimize the siRNA efficacy in terms of “inhibition efficiency and offtarget possibility”, we hope that the risk of “off-target effect” while doing gene silencing in various bioinformatics fields can be overcome to a great extent. These findings may provide new insights into cancer diagnosis, prognosis and therapy by gene silencing. The approach may be found useful for designing exogenous siRNA for therapeutic applications and gene silencing techniques in different areas of bioinformatics.
Resumo:
compact multihand planar octagonal-shaped microstrip antenna simultaneously suitable for mobile communication and blue tooth application is presented. The antenna provides sufficient isolation benveen the two operating bands and an area reduction of -29 % with respect to a circular patch operating in the same band
Resumo:
Internet today has become a vital part of day to day life, owing to the revolutionary changes it has brought about in various fields. Dependence on the Internet as an information highway and knowledge bank is exponentially increasing so that a going back is beyond imagination. Transfer of critical information is also being carried out through the Internet. This widespread use of the Internet coupled with the tremendous growth in e-commerce and m-commerce has created a vital need for infonnation security.Internet has also become an active field of crackers and intruders. The whole development in this area can become null and void if fool-proof security of the data is not ensured without a chance of being adulterated. It is, hence a challenge before the professional community to develop systems to ensure security of the data sent through the Internet.Stream ciphers, hash functions and message authentication codes play vital roles in providing security services like confidentiality, integrity and authentication of the data sent through the Internet. There are several ·such popular and dependable techniques, which have been in use widely, for quite a long time. This long term exposure makes them vulnerable to successful or near successful attempts for attacks. Hence it is the need of the hour to develop new algorithms with better security.Hence studies were conducted on various types of algorithms being used in this area. Focus was given to identify the properties imparting security at this stage. By making use of a perception derived from these studies, new algorithms were designed. Performances of these algorithms were then studied followed by necessary modifications to yield an improved system consisting of a new stream cipher algorithm MAJE4, a new hash code JERIM- 320 and a new message authentication code MACJER-320. Detailed analysis and comparison with the existing popular schemes were also carried out to establish the security levels.The Secure Socket Layer (SSL) I Transport Layer Security (TLS) protocol is one of the most widely used security protocols in Internet. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL I TLS. But recent attacks on RC4 and HMAC have raised questions about the reliability of these algorithms. Hence MAJE4 and MACJER-320 have been proposed as substitutes for them. Detailed studies on the performance of these new algorithms were carried out; it has been observed that they are dependable alternatives.
Resumo:
Prawn culture by traditional method forms an important occupation for the people in these areas, especially in the Vypeen island. Though short term studies have been made on various aspects of prawn culture field and its ecology, a study of detailed nature covering perennial, seasonal, fields and canals between coconut plantation is lacking from these areas. This study will also enable to assess the relative productivity of different systems during different seasons and the influence of the environment on the production potentials. Therefore the present study is taken upto throw more light on the ecological characteristics of these fields with special emphasis on its primary, secondary and tertiary production. The present area of investigation includes the prawn culture fields adjacent to Cochin backwater. The Cochin backwater (O9° 58'N 76° 28'E) is a shallow semi-enclosed body of water of tropical estuary. A narrow gut, about 450 M wide forms its main connection with the Arabian sea and this region is subjected to regular tidal influenceertiary production.
Resumo:
In order to check the damage caused by the parasites, even though it is difficult in open waters, a proper understanding of the seasonal variation in the distribution of the parasite and other factors like age of the host, sex of the host, which affect distribution of parasite is a must. Although several workers have carried out investigations on the taxonomy of metazoan parasites of marine and brackish water Fishes of India, very little attempt is made to correlate such investigations with the host and the environment. In this thesis such an attempt is made by the researcher. In chapter one the literature related to the prevalence, mean intensity of infection, and histopathological changes caused by the metazoan parasites, in particular by helminths, copepods and isopods, was reviewed. Chapter two contains observations on the distribution pattern of parasites in relation to the season, sex, and size of the host. It was found that the prevalence rate of radiorynchus_indicus infecting the alimentary canal of Tachysurugs mgacuglatus, Ergasilus sp. infecting the gills of T maculatus, and Lernaeeniicus ramosus found on the body surface of Qeimgipteirfugs jagonicus was higher during monsoon season. But agarna malayi found in the opercular chamber and Ehilometra cephalus infecting the gonads of valamugil speiglari showed a higher prevalence rate during the postmonsoon season. This was discussed on the basis of the hydrographical characteristics prevailing in the study area during the three different seasons. It was also observed that the sex of the host did not influence significantly the distribution pattern of the parasites. The reasons for this were also discussed. Invariably, the size of the host was found to influence the parasite distribution pattern. It was observed that the prevalence rate showed an increase with increase in size of the fish. This was discussed on the basis of food habits of the host, along with other aspects An attempt was made in chapter three to study the histopathological effects of‘ the various parasites on their respective sites of attachments on host Fishes. It was found that except Rhadinorhyhchugs indicus, all other parasites produced damages of varying intensity, in the form of hypertrophy, rhyperplasia, haemorrhage, tissue disruption and ulcers. Interestingly, E. indicus, an acantho— cephalid with a powerful proboscis for attachment was found not to cause any serious damage to the intestine of the host Fish. All these aspects are included in the third and final chapter of the thesis.
Resumo:
Biometrics deals with the physiological and behavioral characteristics of an individual to establish identity. Fingerprint based authentication is the most advanced biometric authentication technology. The minutiae based fingerprint identification method offer reasonable identification rate. The feature minutiae map consists of about 70-100 minutia points and matching accuracy is dropping down while the size of database is growing up. Hence it is inevitable to make the size of the fingerprint feature code to be as smaller as possible so that identification may be much easier. In this research, a novel global singularity based fingerprint representation is proposed. Fingerprint baseline, which is the line between distal and intermediate phalangeal joint line in the fingerprint, is taken as the reference line. A polygon is formed with the singularities and the fingerprint baseline. The feature vectors are the polygonal angle, sides, area, type and the ridge counts in between the singularities. 100% recognition rate is achieved in this method. The method is compared with the conventional minutiae based recognition method in terms of computation time, receiver operator characteristics (ROC) and the feature vector length. Speech is a behavioural biometric modality and can be used for identification of a speaker. In this work, MFCC of text dependant speeches are computed and clustered using k-means algorithm. A backpropagation based Artificial Neural Network is trained to identify the clustered speech code. The performance of the neural network classifier is compared with the VQ based Euclidean minimum classifier. Biometric systems that use a single modality are usually affected by problems like noisy sensor data, non-universality and/or lack of distinctiveness of the biometric trait, unacceptable error rates, and spoof attacks. Multifinger feature level fusion based fingerprint recognition is developed and the performances are measured in terms of the ROC curve. Score level fusion of fingerprint and speech based recognition system is done and 100% accuracy is achieved for a considerable range of matching threshold
Resumo:
Due to the advancement in mobile devices and wireless networks mobile cloud computing, which combines mobile computing and cloud computing has gained momentum since 2009. The characteristics of mobile devices and wireless network makes the implementation of mobile cloud computing more complicated than for fixed clouds. This section lists some of the major issues in Mobile Cloud Computing. One of the key issues in mobile cloud computing is the end to end delay in servicing a request. Data caching is one of the techniques widely used in wired and wireless networks to improve data access efficiency. In this paper we explore the possibility of a cooperative caching approach to enhance data access efficiency in mobile cloud computing. The proposed approach is based on cloudlets, one of the architecture designed for mobile cloud computing.