553 research outputs found

    Design and Implementation of S-MARKS: A Secure Middleware for Pervasive Computing Applications

    Get PDF
    As portable devices have become a part of our everyday life, more people are unknowingly participating in a pervasive computing environment. People engage with not a single device for a specific purpose but many devices interacting with each other in the course of ordinary activity. With such prevalence of pervasive technology, the interaction between portable devices needs to be continuous and imperceptible to device users. Pervasive computing requires a small, scalable and robust network which relies heavily on the middleware to resolve communication and security issues. In this paper, we present the design and implementation of S-MARKS which incorporates device validation, resource discovery and a privacy module

    An Approach for Ensuring Robust Support for Location Privacy and Identity Inference Protection

    Get PDF
    The challenge of preserving a user\u27s location privacy is more important now than ever before with the proliferation of handheld devices and the pervasive use of location based services. To protect location privacy, we must ensure k-anonymity so that the user remains indistinguishable among k-1 other users. There is no better way but to use a location anonymizer (LA) to achieve k-anonymity. However, its knowledge of each user\u27s current location makes it susceptible to be a single-point-of-failure. In this thesis, we propose a formal location privacy framework, termed SafeGrid that can work with or without an LA. In SafeGrid, LA is designed in such a way that it is no longer a single point of failure. In addition, it is resistant to known attacks and most significantly, the cloaking algorithm it employs meets reciprocity condition. Simulation results exhibit its better performance in query processing and cloaking region calculation compared with existing solutions. In this thesis, we also show that satisfying k-anonymity is not enough in preserving privacy. Especially in an environment where a group of colluded service providers collaborate with each other, a user\u27s privacy can be compromised through identity inference attacks. We present a detailed analysis of such attacks on privacy and propose a novel and powerful privacy definition called s-proximity. In addition to building a formal definition for s-proximity, we show that it is practical and it can be incorporated efficiently into existing systems to make them secure

    Accretion Processes for General Spherically Symmetric Compact Objects

    Get PDF
    We investigate the accretion process for different spherically symmetric space-time geometries for a static fluid. We analyse this procedure using the most general black hole metric ansatz. After that, we examine the accretion process for specific spherically symmetric metrics obtaining the velocity of the sound during the process and the critical speed of the flow of the fluid around the black hole. In addition, we study the behaviour of the rate of change of the mass for each chosen metric for a barotropic fluid.Comment: 10 pages, 15 figures, v2 accepted for publication in 'European Physical Journal C

    Image Analysis Algorithms for Single-Cell Study in Systems Biology

    Get PDF
    With the contiguous shift of biology from a qualitative toward a quantitative field of research, digital microscopy and image-based measurements are drawing increased interest. Several methods have been developed for acquiring images of cells and intracellular organelles. Traditionally, acquired images are analyzed manually through visual inspection. The increasing volume of data is challenging the scope of manual analysis, and there is a need to develop methods for automated analysis. This thesis examines the development and application of computational methods for acquisition and analysis of images from single-cell assays. The thesis proceeds with three different aspects.First, a study evaluates several methods for focusing microscopes and proposes a novel strategy to perform focusing in time-lapse imaging. The method relies on the nature of the focus-drift and its predictability. The study shows that focus-drift is a dynamical system with a small randomness. Therefore, a prediction-based method is employed to track the focus-drift overtime. A prototype implementation of the proposed method is created by extending the Nikon EZ-C1 Version 3.30 (Tokyo, Japan) imaging platform for acquiring images with a Nikon Eclipse (TE2000-U, Nikon, Japan) microscope.Second, a novel method is formulated to segment individual cells from a dense cluster. The method incorporates multi-resolution analysis with maximum-likelihood estimation (MAMLE) for cell detection. The MAMLE performs cell segmentation in two phases. The initial phase relies on a cutting-edge filter, edge detection in multi-resolution with a morphological operator, and threshold decomposition for adaptive thresholding. It estimates morphological features from the initial results. In the next phase, the final segmentation is constructed by boosting the initial results with the estimated parameters. The MAMLE method is evaluated with de novo data sets as well as with benchmark data from public databases. An empirical evaluation of the MAMLE method confirms its accuracy.Third, a comparative study is carried out on performance evaluation of state-ofthe-art methods for the detection of subcellular organelles. This study includes eleven algorithms developed in different fields for segmentation. The evaluation procedure encompasses a broad set of samples, ranging from benchmark data to synthetic images. The result from this study suggests that there is no particular method which performs superior to others in the test samples. Next, the effect of tetracycline on transcription dynamics of tetA promoter in Escherichia coli (E. coli ) cells is studied. This study measures expressions of RNA by tagging the MS2d-GFP vector with a target gene. The RNAs are observed as intracellular spots in confocal images. The kernel density estimation (KDE) method for detecting the intracellular spots is employed to quantify the individual RNA molecules.The thesis summarizes the results from five publications. Most of the publications are associated with different methods for imaging and analysis of microscopy. Confocal images with E. coli cells are targeted as the primary area of application. However, potential applications beyond the primary target are also made evident. The findings of the research are confirmed empirically

    Two improved lossless image compression methods.

    Get PDF

    Two improved lossless image compression methods.

    Get PDF

    Optimizing 3d printed metallic object’s postprocessing : a case of gamma‐tial alloys

    Get PDF
    Gamma‐TiAl (γ‐TiAl) alloys can be used in high‐end products relevant to the aerospace, defense, biomedical, and marine industries. Fabricating objects made of γ‐TiAl alloys needs an additive manufacturing process called Electron Beam Melting (EBM) or other similar processes because these alloys are difficult‐to‐cut materials. An object fabricated by EBM exhibits poor surface finish and must undergo postprocessing. In this study, cylindrical specimens were fabricated by EBM and post‐processed by turning at different cutting conditions (cutting speed, depth of cut, feed rate, insert radius, and coolant flowrate). The EBM conditions were as follows: average powder size 110 μm, acceleration voltage 60 kV, beam current 10 mA, beam scanning speed 2200 mm/s, and beam focus offset 0.20 mm. The surface roughness and cutting force were recorded for each set of cutting conditions. The values of the cutting conditions were set by the L36 Design of Experiment approach. The effects of the cutting conditions on surface roughness and cutting force are elucidated by constructing the possibility distributions (triangular fuzzy numbers) from the experimental data. Finally, the optimal cutting conditions to improve the surface finish of specimens made of γ‐TiAl alloys are determined using the possibility distributions. Thus, this study’s outcomes can be used to develop intelligent systems for optimizing additive manufacturing processes. © 2021 by the authors. Licensee MDPI, Basel, Switzerland

    Implementation of a grid-tied emergency back-up power supply for medium and low power application

    Get PDF
    Emergency back-up power supply units are necessary in case of grid power shortage, considerably poor regulation and costly establishment of a power system facility. In this regard, power electronic converters based systems emerge as consistent, = properly controlled and inexpensive electrical energy providers. This paper presents an implemented design of a grid-tied emergency back-up power supply for medium and low power applications. There are a rectifier-link boost derived DC-DC battery charging circuit and a 4-switch push-pull power inverter (DC-AC) circuit, which are controlled by pulse width modulation (PWM) signals. A changeover relay based transfer switch controls the power flow towards the utility loads. During off-grid situations, loads are fed power by the proposed system and during on-grid situations, battery is charged by an AC-link rectifier-fed boost converter. Charging phenomenon of the battery is controlled by a relay switched protection circuit. Laboratory experiments are carried out extensively for different loads. Power quality assessments along with back-up durations are recorded and analyzed. In addition, a cost allocation affirms the economic feasibility of the proposed framework in case of reasonable consumer applications. The test-bed results corroborate the reliability of the research work
    corecore