Time filter

Source Type

Jangde P.,Sri Satya Sai Institute of Science and Technology | Mishra D.K.,Acropolis Institute of Technology And Research
Proceedings - 2011 2nd International Conference on Intelligent Systems, Modelling and Simulation, ISMS 2011 | Year: 2011

Medical facilities are vital ingredients which can make or break lives. In such critical matters, proper management of Private Health Information (PHI) of each individual is very necessary. In many foreign countries, Information Technology has made a revolutionary impact in the medical sector too, providing with absolute paperless hospitals. Several emergency facilities are available, and doctors too use a tablet PC or a palmtop for complete patient's record retrieval and for diagnosis and treatment. No more files needs to be managed for individual patients. Thus, the hospital server is most vulnerable to all the threats pertaining to information thefts, frauds, unauthorized modification or any other crime. In such a scenario, the server and its information safety is a crucial concern for all the hospital management, as any invalid access can cost a life or even more. © 2011 IEEE.

Sethi K.K.,Acropolis Institute of Technology And Research | Mishra D.K.,Sri Aurobindo Institute of Technology | Mishra B.,Mahatma Gandhi Chitrakoot Gramoday University
Proceedings - 3rd International Conference on Intelligent Systems Modelling and Simulation, ISMS 2012 | Year: 2012

Knowledge representation opaque model like ANN has advantage of accuracy and limitation of interpretability. Transparent models like decision tree, decision table and rules represent knowledge in more understandable form and can easily be integrated with other learning system. Converting an opaque model like ANN to transparent model is called rule extraction. Lot of work has been done in the field of rule extraction like "SVM to Rules", "ANN to Decision Tree", "ANN to Rules" etc. We did not find any direct approach of converting ANN to decision table in our literature survey. In this paper, we proposed a novel pedagogical rule extraction technique to generate a decision table using training example set and a trained artificial neural network on it. The proposed algorithm can be used with both discrete as well as continuous input. The proposed algorithm has advantage in terms of computational performance and memory management. © 2012 IEEE.

Moghe S.,Mahakal Institute of Technology | Moghe S.,Vikram University | Acharya A.D.,Vikram University | Panda R.,Acropolis Institute of Technology And Research | And 4 more authors.
Renewable Energy | Year: 2012

Copper doped NiO thin films have been prepared using chemical spray pyrolysis technique. Investigation of these films has been done using X-ray diffraction, Atomic force microscopy, two-probe resistivity measurements and UV-visible spectroscopy. Interesting results have been obtained from the study of optical spectra. A peak corresponding to 439 nm has been observed in the absorption spectra for 1%, 5% and 10% copper doped samples. The area of the peak increases with the increase in copper concentration. This result is consistent with the AFM data. The resistivity results show that the activation energy decreases with the increase in the copper concentration. The low temperature conduction has been explained by variable range-hopping mechanism, which fits very well for the whole temperature range and again is consistent with the absorbance data. Value addition to this study is the observation of higher absorption in the visible region, thereby a tendency towards tunability for applications. © 2012 Elsevier Ltd.

Shaikh Z.,Acropolis Institute of Technology And Research | Mishra D.K.,Acropolis Institute of Technology And Research
Proceedings - 2nd International Conference on Computational Intelligence, Modelling and Simulation, CIMSim 2010 | Year: 2010

The growth of the Internet has prompted tremendous opportunities for cooperative computation, where people are jointly conducting computation tasks based on the private inputs they each supplies. These computations can occur between mutually untrusted parties, or even between competitors. For example, customers might send to a remote database queries that contain private information; two competing financial organizations might jointly invest in a project that must satisfy both organizations private and valuable constraints, and so on. Today, to conduct such computations, one entity must usually know the inputs from all the participants; however if nobody can be trusted enough to know all the inputs, privacy will become a primary concern. This problem is referred to as Secure Multiparty Computation Problem (SMC) in the literature. Research in the SMC area has been focusing on only a limited set of specific SMC problems, while privacy concerned cooperative computations call for SMC studies in a variety of computation domains. Before we can study the problems, we need to identify and define the specific SMC problems for those computation domains. We have developed a scaffold to facilitate this problem-discovery task. Based on our framework, we have identified and defined a number of SMC problems for a range of computation domains. The goal of this paper is not only to present our results, but also to serve as a guideline so other people can identify useful SMC problems in their own computation fields. During computation of inputs, we had also considered the factor, what if trusted third parties are malicious? Considering different probabilities for the malicious users, we have tried to find out the correctness of the result and percentage of system acceptability. We then tried to increase the number of TTP's in order to get the accuracy of the result. The aim of our proposed work is to identify what probability of malicious users will lead to the system in an unacceptable state. © 2010 IEEE.

Bhati R.,Acropolis Institute of Technology And Research
2010 IEEE International Conference on Communication Control and Computing Technologies, ICCCCT 2010 | Year: 2010

In this paper we have proposed a new way to achieve the optimum learning rate that can reduce the learning time of the multi layer feed forward neural network. The effect of optimum numbers of inner iterations and numbers of hidden nodes on learning time and recognition rate has been shown. The Principal Component Analysis and Multilayer Feed Forward Neural Network are applied in face recognition system for feature extraction and recognition respectively. The paper shows that the recognition rate and training time are dependent on numbers on hidden nodes. In this approach we have used variable learning rate and demonstrated its superiority over constant learning rate. We have used ORL database for all the experiments. ©2010 IEEE.

Jain V.,Acropolis Institute of Technology And Research | Khan N.A.,Acropolis Institute of Technology And Research
Proceedings of the 2014 Conference on IT in Business, Industry and Government: An International Conference by CSI on Big Data, CSIBIG 2014 | Year: 2014

The routing algorithm is one of key researches of interconnection networks and wireless sensor networks (WSN) design. WSNs are application specific, hence lots of attention has been given to routing protocol. Since the life time of sensor nodes depend on available power, therefore in order to prolong the age of sensor nodes, it is necessary to design efficient routing protocols. The routing protocols designed for Sensor Networks are being divided into three main categories depending on the approaches used. They are Data Centric, Hierarchical and location based. This paper has been concentrated on the performance analysis of the two most prominent data centric protocols, Directed Diffusion and SPIN routing protocol. The performance analysis are examined using NS-2 which is the main network simulator, NAM (Network Animator), TCL (Tool Command Language), AWK (post processing script) and were compared in terms of performance parameters like End-to-End Delay, Throughput, Control Overhead and Packet Delivery Ratio (PDR). The research work demonstrated here is established by results based on performance analysis of DDIFF and SPIN routing protocol. It has been discovered that under all four parameter considering static as well as mobile environment, DDIFF performs better than SPIN routing protocol. © 2014 IEEE.

Mishra V.,Acropolis Institute of Technology And Research | Chaitanya G.,Acropolis Institute of Technology And Research
Proceedings of the 2014 Conference on IT in Business, Industry and Government: An International Conference by CSI on Big Data, CSIBIG 2014 | Year: 2014

In the field of communication, demand for the spectrum is increasing very rapidly which force developers to use the spectrum as efficiently as possible and smart antenna is one the emerging technologies which can fill the requirement. Smart antennas as systems of antennas include huge variety of techniques that tries to increase the received signal strength, suppress the interfering signals, and hence increase the overall SNR of the system. Paper includes the analysis and comparison of Least Mean Square (LMS), Recursive Least Square (RLS) and Sample Matrix Inversion (SMI) algorithm on the basis of number of antenna elements, spacing between the elements for smart antenna and number of samples. Radiation pattern has been obtained for the specified adaptive beam forming algorithm by providing system with signal of interest (SOI) and Signal Noise of Interference (SNOI). © 2014 IEEE.

Acharya A.D.,Vikram University | Sarwan B.,Vikram University | Panda R.,Acropolis Institute of Technology And Research | Shrivastava S.B.,Vikram University | Ganesan V.,UGC-DAE Consortium for Scientific Research
Superlattices and Microstructures | Year: 2014

In this work, we explore the influence of Ag dopant concentration (i.e. 0-2 wt.%) on the opto-electric properties of Ag doped ZnO thin solid films synthesized by chemical spray pyrolysis technique. Several analytical tools such as XRD, AFM, SEM and dc-two probe technique were used. Structural studies reveal that with increasing the doping level, more dopant atoms occupy the zinc lattice sites but after a certain level, they form neutral defects and become ineffective as dopant impurities. 1 wt.% of Ag doping was the optimum for enhancing electrical conduction and beyond that the distortion caused in the lattice inhibits further conduction. Distinct changes including a red shift and narrowing of band gap with increasing Ag content was observed. The low temperature conduction has been explained by variable range hoping (VRH) mechanism. The possible distribution of Ag in the Ag-ZnO thin films has been tentatively discussed. © 2014 Elsevier Ltd. All rights reserved.

Mankar J.V.,Acropolis Institute of Technology And Research | Malviya P.K.,Acropolis Institute of Technology And Research
International Conference on Communication and Signal Processing, ICCSP 2014 - Proceedings | Year: 2014

To analyze lung sound by auscultation method requires substantial clinical experience, a fine stethoscope and good listening skills. The lung itself cannot generate sound if there is no airflow; pressure differences between structures within the thorax. The type of lung sound can be known by listening to the lung sound. The timing, repeatability and shape of crackles are important parameter for diagnosis. In this paper, we aim to detect and classify crackle to find deformities in lungs. © 2014 IEEE.

Acharya A.D.,Vikram University | Moghe S.,Vikram University | Panda R.,Acropolis Institute of Technology And Research | Shrivastava S.B.,Vikram University | And 4 more authors.
Thin Solid Films | Year: 2012

Cd doped ZnO (Cd:ZnO) thin films on the glass substrate prepared by chemical spray pyrolysis technique have been characterized for their optical and electrical properties. The X-ray diffraction and atomic force microscopy results indicate that the crystalline quality degrade due to higher Cd doping in ZnO. The activation energy was found to be decreased when Cd concentration increased. The absorption edge of Cd:ZnO film was found to be red shifted. The direct modulation of band gap caused by Zn/Cd substitution is responsible for the red shift effect in absorption edge of ZnO. The low temperature conduction has been explained by variable range hoping mechanism, which fits very well in the temperature range from 108 K to 301 K. The interaction between Cd and defects in ZnCdO alloy to understand the important roles of Cd in the formation of native defects has also been tentatively discussed. © 2012 Elsevier B.V.

Loading Acropolis Institute of Technology And Research collaborators
Loading Acropolis Institute of Technology And Research collaborators