Introduction
Genetic algorithms (GAs) are a powerful tool for global search and optimisation tasks of high complexity in science, technology, industry medicine, safety, economy, communication etc. They are a particular class of evolutionary algorithms, based on the mechanics of natural selection (biological evolution). It was developed by John Holland The idea behind GA’s is Darwinian evolution The most basic concept is the strong tend to adapt and survive while the weak tend to die out. That is, optimization is based on evolution, “Genetic Inheritance” and the "Survival of the fittest" concept. These algorithms employ classical operations (selection, crossover, mutation).
Genetic algorithms (GAs) can be easily modified in order to account for specific features of the given computational problem. Particularly well suited for hard problems where little is known about the underlying search space
Genetic algorithms are best for searching for new solutions and making use of solutions that have worked well in the past. It works on large population of candidate solutions that are repeatedly subjected to selection pressure (survival of the fittest) and which undergo naturally occurring genetic operators in search of improved solutions.
GENETIC ALGORITHMS We use Genetic Algorithms in following situations
When an acceptable solution representation is available
When a good fitness function is available
When it is feasible to evaluate each potential solution
When a near-optimal, but not optimal solution is acceptable.
When the state-space is too large for other methods
Genetic Algorithms vs Traditional Algorithm Genetic algorithms are different in some fundamental ways from the traditional search techniques in the following ways.
GA’s work with a coding of parameter set, not the parameter themselves.
GA’s search from a population of points, not a single point.
Application of GA operators causes information from the previous generation to be carried over to the next.
GA’s use probabilistic rules, not deterministic rules.
BASIC COMPONENTS OF GENETIC ALGORITHMS
GAs are blind without the fitness function.The Fitness Function Drives the Population Toward Better Solutions and is the most important part of the algorithm. Most Important Parameters in GAs:
Population Size
The algorithm is started with a set of solutions (represented by chromosomes) called population.
Fittness Function
Determine the fitness of each member of the populationCrossover Method
Crossover selects genes from parent chromosomes and creates a new offspring
Mutation
This is to prevent fall all solutions in population into a local optimum of solved problem
Reproduction (SELECTION)
Determine which strings are "copied" or "selected" for the mating pool and how many times a string will be "selected" for the mating pool .
GENETIC PROGRAMMING
Manipulate strings of instructions rather than strings of data. Goal: Allow computers to develop their own software
(Survival of the fittest computer programs) Genetic Programming starts with an initial population of randomly generated computer programs composed of functions and terminals appropriate to the problem domain. The functions may be standard arithmetic operations, standard programming operations, standard mathematical functions, logical functions, or domain-specific functions.
ADVANTAGES OF GENETIC ALGORITHMS
The main advantages of genetic algorithms are,
A robust search technique
GAs will produce "close" to optimal results in a
"reasonable" amount of time
Suitable for parallel processing
Some problems are deceptive
Can use a noisy fitness function
Fairly simple to develop
Makes no assumptions about the problem space
APPLICATIONS OF GENETIC ALGORITHMS
The possible applications of genetic algorithms are immense. Any problem that has a large search domain could be suitable tackled by GAs. A popular growing field is genetic programming (GP). Genetic Programming particularly used in machine learning, scientific modeling, and artificial life. Scheduling:
Facility, Production, Job, and Transportation Scheduling.
Design:
Circuit board layout, Communication Network design,keyboard layout, Parametric design in aircraft.
Machine Learning:
Designing Neural Networks, Classifier Systems, Learning rules.
Robotics:
Trajectory Planning, Path planning.
Combinatorial Optimization:
TSP, Bin Packing, Set Covering, Graph Bisection, Routing.
Image Processing:
Pattern recognition.
Business:
Economic Forecasting; Evaluating credit risks.
Detecting stolen credit cards before customer reports it is stolen.
Medical:
Studying health risks for a population exposed to toxins. CONCLUSION
Genetic algorithms (GAs) are a powerful tool for global search and optimisation tasks of high complexity in science, technology, industry medicine, safety, economy, communication etc. They are a particular class of evolutionary algorithms, based on the mechanics of natural selection (biological evolution).
Genetic algorithms (GAs) can be easily modified in order to account for specific features of the given computational problem. Particularly well suited for hard problems where little is known about the underlying search space.
Genetic algorithms are best for searching for new solutions and making use of solutions that have worked well in the past. It works on large population of candidate solutions that are repeatedly subjected to selection pressure (survival of the fittest) and which undergo naturally occurring genetic operators in search of improved solutions.
Sunday, November 16, 2008
Saturday, November 1, 2008
Non - Drug Therapy for Hypertension
NON - DRUG THERAPY FOR HYPERTENSION
1) Weight reduction :- " Excess weight at any age is associated with
more hypertension, apart fom the risk of coronary heart disease".
a) Obesity may also be associated with diabetes.
b) There is an association between diabetes and high blood pressure.
c) Calorie restriction results in a fall in high blood pressure.
d) Whether it is diet restriction plus modified fasting, it should work
without endangering the health of the person.
e) The weight reduction must be slow and steady.
f) In medical term over weight is called obesity.
g) Over weight or obesity occurs in people where food intake
exceeds the energy requirements of the body for physical
activity and growth. As a result, there is accumulation of fat
which is stored in a dispose tissue (fat cells). This storage
may be localised in certain parts of the body.
h) It is proved that harmones from pituitary, thyroid and adernal
glands along with insulin and sex harmones have an important
role in regulating the fat metabolism.
i) In the adults, an increase in body weight may reflect an increase
in fat in a dispose tissue, an accumulation of fluid or both.
j) Weight gain excess of 1kg per day almost invariably implies
excess fluid retentation
k) Caution:- Every one should appreciate that any programme
which results in weight loss more than 0.3 kg per day undoubtedly
represents large amounts fluid loss rather than fat.
The weight reduction must be slow and steady.
A person is considered over weight if he exceeds the upper range of
ideal weight for his body frame. He is considered as obese if his weight
exceeds by 9 to 10 kgs his ideal weight.
m) Caution : - Obesity (Over weight) is the commonest predisposing cause
for the following problems
1) Diabetes Mellitus ( Excessive blood sugar )
2) Hypercholesterolaemia ( High blood cholesterol ).
3) Hypertension ( High blood pressure )
4 ) Ischaemic heart disease ( heart attacks ).
5) Osteoarthritis of weight bearing joints ( Hips, knees and ankles ).
6) Lumbar and Cervical Spondylosis.
7) Varicose veins ( Dilated, tortuous veins in legs).
8) Hernias, particularly incisional hernia, after operations.
9) Galler blader stones.
Diet and exercises are the only methods to attain ideal weight.
2) Avoid Rich food : - Chocolates, softies, ice creams, oily spice foods,
tinned & stored foods( animal fat foods).
Take more fibre and less saturated fat : - Increase in use of unsaturated
fats ( sun flower oil, corn oil) can induce lower blood pressures. Take
high - fibre foods like vegetables, fruits, bran, cereals etc.
3) Restriction of salt (sodium) intake to 1g per day. Avoid permanently
mangoe pickles and other pickles.
4) Stop Smoking permanently : - smoking immediately accelerates heart
rate and shoots up blood pressure which imposes extra burden on the
heart. Heavy smoking The Nicotin in tobacco increases the tendency
of the blood to clot in arteries.
5) Reduction in Alcohol intake : - Ethanol ( ethyl alcohol) in small amounts
10 - 20 ml maximum per day) may not be harmful.
6) Regular exercise keeps healthy : - Regular , rhythmic physical activities
in the form of brisk walking, or slow jogging, performed daily , will reduce
High blood pressure by dilating blood vessels and loss of salt and water
from the body through perspiration. But if the BP is very high in the
beginning, the exercises are deffered till BP is brought under control
and doctor should be consulted before starting exercises.
7) Meditation and Yoga : - In patients with High blood pressure some
chemical substances in the body produced in excess causing High
blood pressure. Their production will be reduced by meditation, thus
lowering the BP.
Writer................ Dr. A. Jayarajan MD.
Summary by .... R.Krishnakumar.
1) Weight reduction :- " Excess weight at any age is associated with
more hypertension, apart fom the risk of coronary heart disease".
a) Obesity may also be associated with diabetes.
b) There is an association between diabetes and high blood pressure.
c) Calorie restriction results in a fall in high blood pressure.
d) Whether it is diet restriction plus modified fasting, it should work
without endangering the health of the person.
e) The weight reduction must be slow and steady.
f) In medical term over weight is called obesity.
g) Over weight or obesity occurs in people where food intake
exceeds the energy requirements of the body for physical
activity and growth. As a result, there is accumulation of fat
which is stored in a dispose tissue (fat cells). This storage
may be localised in certain parts of the body.
h) It is proved that harmones from pituitary, thyroid and adernal
glands along with insulin and sex harmones have an important
role in regulating the fat metabolism.
i) In the adults, an increase in body weight may reflect an increase
in fat in a dispose tissue, an accumulation of fluid or both.
j) Weight gain excess of 1kg per day almost invariably implies
excess fluid retentation
k) Caution:- Every one should appreciate that any programme
which results in weight loss more than 0.3 kg per day undoubtedly
represents large amounts fluid loss rather than fat.
The weight reduction must be slow and steady.
A person is considered over weight if he exceeds the upper range of
ideal weight for his body frame. He is considered as obese if his weight
exceeds by 9 to 10 kgs his ideal weight.
m) Caution : - Obesity (Over weight) is the commonest predisposing cause
for the following problems
1) Diabetes Mellitus ( Excessive blood sugar )
2) Hypercholesterolaemia ( High blood cholesterol ).
3) Hypertension ( High blood pressure )
4 ) Ischaemic heart disease ( heart attacks ).
5) Osteoarthritis of weight bearing joints ( Hips, knees and ankles ).
6) Lumbar and Cervical Spondylosis.
7) Varicose veins ( Dilated, tortuous veins in legs).
8) Hernias, particularly incisional hernia, after operations.
9) Galler blader stones.
Diet and exercises are the only methods to attain ideal weight.
2) Avoid Rich food : - Chocolates, softies, ice creams, oily spice foods,
tinned & stored foods( animal fat foods).
Take more fibre and less saturated fat : - Increase in use of unsaturated
fats ( sun flower oil, corn oil) can induce lower blood pressures. Take
high - fibre foods like vegetables, fruits, bran, cereals etc.
3) Restriction of salt (sodium) intake to 1g per day. Avoid permanently
mangoe pickles and other pickles.
4) Stop Smoking permanently : - smoking immediately accelerates heart
rate and shoots up blood pressure which imposes extra burden on the
heart. Heavy smoking The Nicotin in tobacco increases the tendency
of the blood to clot in arteries.
5) Reduction in Alcohol intake : - Ethanol ( ethyl alcohol) in small amounts
10 - 20 ml maximum per day) may not be harmful.
6) Regular exercise keeps healthy : - Regular , rhythmic physical activities
in the form of brisk walking, or slow jogging, performed daily , will reduce
High blood pressure by dilating blood vessels and loss of salt and water
from the body through perspiration. But if the BP is very high in the
beginning, the exercises are deffered till BP is brought under control
and doctor should be consulted before starting exercises.
7) Meditation and Yoga : - In patients with High blood pressure some
chemical substances in the body produced in excess causing High
blood pressure. Their production will be reduced by meditation, thus
lowering the BP.
Writer................ Dr. A. Jayarajan MD.
Summary by .... R.Krishnakumar.
Over Weight Children Prone to Diabetes
OVER WEIGHT CHILDREN PRONE TO DIABETES
Childhood obesity is seen in 40% of children according
to several surveys.
Obesity leads to type - 2 diabetes, hypertension and
dyslipidemia ( excess of fat in blood ). Once those
complications develop they become permanent.They lead
to major health problems and needs continous care.
Medication becomes continous and life long.
childhood obesity is precipiating type - 2 diabetes
in the teenage group.
All of us are born with an average birth weight of
2.5kg to 3kg.
we increase in height as we grow and reach a standard
weight when we become adults, unless we fall into the
trap of obesity.
We double our birth weight at three months( that is we
reach 5kg - 6kg).We double the weight at one year(10-12kg).
The next doubling is when we are five years old ( 20-24kg).
The next doubling is at 15 years of age (40 - 50 kg).
After that there is a slow increase depending on the height
we reach.
We stabilise our weight between 60kgs and 80kg depending
on our height.
If we do not take care, we put on weight easily and this
leads to serious permanent health problem early in life.
It is very easy to put on weight but very difficult to
lose it. so it is wise not to put on weight.
Childhood obesity is seen in 40% of children according
to several surveys.
Obesity leads to type - 2 diabetes, hypertension and
dyslipidemia ( excess of fat in blood ). Once those
complications develop they become permanent.They lead
to major health problems and needs continous care.
Medication becomes continous and life long.
childhood obesity is precipiating type - 2 diabetes
in the teenage group.
All of us are born with an average birth weight of
2.5kg to 3kg.
we increase in height as we grow and reach a standard
weight when we become adults, unless we fall into the
trap of obesity.
We double our birth weight at three months( that is we
reach 5kg - 6kg).We double the weight at one year(10-12kg).
The next doubling is when we are five years old ( 20-24kg).
The next doubling is at 15 years of age (40 - 50 kg).
After that there is a slow increase depending on the height
we reach.
We stabilise our weight between 60kgs and 80kg depending
on our height.
If we do not take care, we put on weight easily and this
leads to serious permanent health problem early in life.
It is very easy to put on weight but very difficult to
lose it. so it is wise not to put on weight.
Fruits and Broccoli Fight Type 2 Diabetes
Fruits and broccoli could help
fight Type 2 diabetes
CONTRARY TO the belief that fruits
will enhance blood sugar levels and
aggravate problems associated with
diabetes, a team of scientists from
united kingdom has found that greater
intake of fruits and vegetables will
fact decrease the risk of Type 2
diabetes.
The UK research study showed that
higher plasma vitamin C level, and,
to a lesser extent, fruit vegetable
intake, were associated with a
decreased risk of Type 2 diabetes
that commonly affect adults.
Type 2 diabetes need not take insulin
injections as against those suffering
from Type 1 or insulin dependent
diabetes. More than 20,000 men and
women were studied as part of the
research. Since fruits and vegetables
are the main sources of vitamin C,
the study suggests that eating even
a small quantity of fruits and
vegetables may be beneficial and that
the protection against diabetes
increases progressively with the
quantity of fruit and vegetables
consumed.The Georgia university
researchers of USA tested extracts
24 common herbs and spices and found
that many contained high levels of
inflammation - inhibiting antioxidant
compounds known as polyphenols.Some
of thecommon herbs and spices may help
block the inflammation believed to
drive diabetes and other chronic
diseases.Broccoli contains a chemical
called sulforaphane which works wonders
with the circulatory system.
fight Type 2 diabetes
CONTRARY TO the belief that fruits
will enhance blood sugar levels and
aggravate problems associated with
diabetes, a team of scientists from
united kingdom has found that greater
intake of fruits and vegetables will
fact decrease the risk of Type 2
diabetes.
The UK research study showed that
higher plasma vitamin C level, and,
to a lesser extent, fruit vegetable
intake, were associated with a
decreased risk of Type 2 diabetes
that commonly affect adults.
Type 2 diabetes need not take insulin
injections as against those suffering
from Type 1 or insulin dependent
diabetes. More than 20,000 men and
women were studied as part of the
research. Since fruits and vegetables
are the main sources of vitamin C,
the study suggests that eating even
a small quantity of fruits and
vegetables may be beneficial and that
the protection against diabetes
increases progressively with the
quantity of fruit and vegetables
consumed.The Georgia university
researchers of USA tested extracts
24 common herbs and spices and found
that many contained high levels of
inflammation - inhibiting antioxidant
compounds known as polyphenols.Some
of thecommon herbs and spices may help
block the inflammation believed to
drive diabetes and other chronic
diseases.Broccoli contains a chemical
called sulforaphane which works wonders
with the circulatory system.
Fruits Can Make You Obese
FRUITS CAN MAKE YOU OBESE
A study has shown that fructose the
natural sugar found in fresh fruits
is also a cause for obesity.
Many fruits are very high in sugar
content and snacking on them all day
can lead to obesity eventually.
Especially in the abdominal area,
resulting in a pot belly.
FRUIT SUGAR TABLE
HIGH SUGAR LOW SUGAR
Apples, Berries
Cherries, Watermelon
Grapes, Melons
Mangoes, Tomatoes
Pears, Apricots
Pineapple, Grapefruit
Pomegranates, Guava
Bananas, Limes
Figs, Oranges
Prunes, Papayas
Dried Fruits Peaches
Fruits like apples,pears, oranges,
and others are not flattening but
heaps of natural sugar content,
which like all things - is good in
small amounts. The problem arises
if you eat 20 pieces of fruit.
The recommended serving is 1 -3
pieces per day. Other items to be
slowed down on are juices and jams
which are also high in fructose
content. According to Dr Dhiraj
palena, general physician and
nutrition consultant. " Fruit
juices contain as much, if not
more, carbohydrates and energy
than sweetened cold drinks.
It is when one adds table sugar
to fruits in salads or juices
that increases the level of sugar
in the dish, causing flattening
problems.Eating the skin of the
fruit which has important nutrients
can help negate sugar content.
Fructose(fruit sugar) is less harmful
than sucrose(table sugar).Fruit sugar
is better than table sugar. By eating
sucrose our bodies go out of sync with
the sugar processed in the body
extremely fast. Fructose is broken
down more slowly which allows the
body more time to react.
A study has shown that fructose the
natural sugar found in fresh fruits
is also a cause for obesity.
Many fruits are very high in sugar
content and snacking on them all day
can lead to obesity eventually.
Especially in the abdominal area,
resulting in a pot belly.
FRUIT SUGAR TABLE
HIGH SUGAR LOW SUGAR
Apples, Berries
Cherries, Watermelon
Grapes, Melons
Mangoes, Tomatoes
Pears, Apricots
Pineapple, Grapefruit
Pomegranates, Guava
Bananas, Limes
Figs, Oranges
Prunes, Papayas
Dried Fruits Peaches
Fruits like apples,pears, oranges,
and others are not flattening but
heaps of natural sugar content,
which like all things - is good in
small amounts. The problem arises
if you eat 20 pieces of fruit.
The recommended serving is 1 -3
pieces per day. Other items to be
slowed down on are juices and jams
which are also high in fructose
content. According to Dr Dhiraj
palena, general physician and
nutrition consultant. " Fruit
juices contain as much, if not
more, carbohydrates and energy
than sweetened cold drinks.
It is when one adds table sugar
to fruits in salads or juices
that increases the level of sugar
in the dish, causing flattening
problems.Eating the skin of the
fruit which has important nutrients
can help negate sugar content.
Fructose(fruit sugar) is less harmful
than sucrose(table sugar).Fruit sugar
is better than table sugar. By eating
sucrose our bodies go out of sync with
the sugar processed in the body
extremely fast. Fructose is broken
down more slowly which allows the
body more time to react.
Snoring and Sleep Apnoea
Snoring and sleep apnoea
Sleep apnoea is a sleeping disorder
that stops a person's breathing upto
hundreds of times each night.It occurs
when the airway collapses and air flow
to the lungs is blocked.Breathing pauses
can last from a few seconds to minutes,
depriving various organs like the brain
and heart of oxygen supply during sleep.
SYMPTOMS : - Though snoring is a primary
symptom of sleep apnoea,not all snorers
suffer from the disorder.
Snoring is the noise caused by air
passing through a partially obstructed
upper air way tract.
The common causes are deviated nasal
septum,growths in the nose,adenoids and
large tonsils,large soft palate and
elongated uvula, large tongue, tumours
and developmental abnormalities of the
lower jaw.
Snoring is three times more common in
obese people.
SNORING HARMFUL ? -> Severe snoring
will be a bigger problem- sleep opnoea.
Left untreated,it can destroy life.
ENT examination is carried.
The patient may have to undergo a PSG
(Polysomnography) test where various
parameters are checked while the patient
is asleep.
TREATMENT OPTIONS : - There are several
self-help methods like weight reduction,
regular exercise, and sleeping on your
side instead of your back.
Sleep apnoea is a sleeping disorder
that stops a person's breathing upto
hundreds of times each night.It occurs
when the airway collapses and air flow
to the lungs is blocked.Breathing pauses
can last from a few seconds to minutes,
depriving various organs like the brain
and heart of oxygen supply during sleep.
SYMPTOMS : - Though snoring is a primary
symptom of sleep apnoea,not all snorers
suffer from the disorder.
Snoring is the noise caused by air
passing through a partially obstructed
upper air way tract.
The common causes are deviated nasal
septum,growths in the nose,adenoids and
large tonsils,large soft palate and
elongated uvula, large tongue, tumours
and developmental abnormalities of the
lower jaw.
Snoring is three times more common in
obese people.
SNORING HARMFUL ? -> Severe snoring
will be a bigger problem- sleep opnoea.
Left untreated,it can destroy life.
ENT examination is carried.
The patient may have to undergo a PSG
(Polysomnography) test where various
parameters are checked while the patient
is asleep.
TREATMENT OPTIONS : - There are several
self-help methods like weight reduction,
regular exercise, and sleeping on your
side instead of your back.
HARMONIC FILTERATION
HARMONIC FILTERATION The increasing developments need increasing use of electricity While meeting this power demand, there causes a pollution in electrical system called Harmonics. Harmonic Analysis:- process of determining the magnitude, order and phase of the several harmonics present in a complex periodic wave. What Hazards created by Harmonics:- ----------------------------------- 1) Amplification of harmonic levels resulting from series and parallel resonance, reduction of efficiency of power generation, transmission and utilization. 2) Plant Mal-functioning. 3) Malfunctioning & Amp; failure of electronic equipments. 4) Over heating & failure of electrical motors. 5) Overloading,Overheating & failure of P.f correction capacitors. Resonance due to interaction of capacitor with harmonics. 6) Overloading & Overheating of distribution Transformers and neutral conductors. 7) Excessive measurement errors. 8) Spurious operation of Fuses, circuit Breakers & other protective Equipments. 9) Voltage glitches in computer systems resulting in losting data. Excessive flickers on VDU''''S. 10) Electromagnetic interface with TV,radio, communication & Telephone systems. 11) Damage & disruption to stand by generators & associated AVR control Equipment. 12) Interface with ripple control systems. For carrying out this analysis, the following methods are available which are all based on Fourier theorem:- 1) Analytical method - standard Fourier Analysis. 2) Graphical method - a) superposition method b) Twenty four ordinate method. To eliminate Harmonics the AIM EUROPE FILTER incorporates all of the following:- 1) Harmonic Mitigation 2) Reactive current control 3) load side transient suppression 4) Load side surge suppression. 5) Reduces the effect of supply sags & surges (flickers). How the AIM filter works:- ------------------------- 1) The AIM filter continously monitors the harmonic currents demanded by the load and generates an adaptive wave form which matches exactly the shape of the non linear portion of the load current. 2) AIM injects this adaptive current into the load point of connection only fundamental current is drawn from the source of the load. 3) Compensates from the 2nd to the 51st harmonic in a response t
OCEAN THERMAL ENERGY CONVERSION TECHNOLOGY
OCEAN THERMAL ENERGY CONVERSION TECHNOLOGYPresent a source of energy which is the son of the sun and ocean.
OTEC is an energy that converts solar radiation into usable energy.
Ocean thermal energy conversion or OTEC can produce a significant
amount of power because of the difference between the warm surface
of sea water and the deep cold ocean water.
The oceans cover a little more than 70 percent of earths surface.
This makes it the world''s largest solar energy collector and energy
storage sytem.
On an average day,60 million square kilometers of tropical seas absorb
an amount of solar radiational equal in heat content to about 250 billion
barrels of oil.
OTEC, Ocean Thermal Energy conversion is an energy technology that converts
solar radiation to electric power.
The oceans are thus a vast renewable resource, with potential to help us
produce billions of watts of electric power.
The cold seawater used in the OTEC process is also rich in nutrients and it
can be used to culture both marine organisms and plant life near the shore
or on land.
The idea behind OTEC is the use of all natural collectors,thesea,instead of
artificial collector.
Warm water is collected on the surface of the tropical ocean and pumped by
a warm water pump. The water is pumped through boiler, where some of the
water is used to heat the working fluid, usually propane or some similar
material.If it is cooler you can use a material with a lower boiling point
like ammonia.
The propane vapour expands through a turbine which is coupled to a generator
that generating electric power.
Cold water from the bottom is pumped through condensers,where the vapour
returns to the liquid state. The fluid is pumped back into the boiler.
There are two different kinds of OTEC power plants, the Land based and the
floating plant.
Land - based power plant : The land based pilot plant will consist of
a building. This building will contain the heat exchangers,turbines,
generators and controls.
It will connected to the ocean via several pipes, and an enormous fish
farm (100 football arenas) by other pipes.
Warm water is collected through a screened enclosure close to the shore.
A long pipe laid on the slope collects cold water. Power and fresh water
are generated in the building by the equipment.
Used water is first circulated into the marine culture pond (fish farm)
and then discharges by the third pipe into the ocean, downstream from the
warm inlet.
This is done so that the outflow does not reenter the plant, since re-use
of warm water would lower the available temperature difference.
Floating power plant : works in the same way as the land based the apparent
difference is that the floating plant is floating.
Closed - cycle, open -cycle and hybrid - cycle : - There are three types of
OTEC designs: open cycle,closed cycle, and hybrid cycle.
In an open cycle, seawater is the working fluid. Warm seawater is pumped into
flash evaporator where pressure as low as 0.03 bar cause the water to boil
at temperatures of 22 centigrades. This steam expands through a low pressure
turbine connected to a generator to create power.The steam then passes
through a condenser using cold seawater from the depths of the ocean to
condense the steam into desalinised water.
In a closed cycle, a low boiling point liquid such as ammonia or another
type of refrigerant is used as the working fluid in a Rankine cycle
(common steam cycle).
The heat from warm seawater flowing through an evaporator vaporises the
working fluid.
The vapour expands through a turbine, and then flows into a condenser
where cold seawater condenses it into a liquid.
OTEC is an energy that converts solar radiation into usable energy.
Ocean thermal energy conversion or OTEC can produce a significant
amount of power because of the difference between the warm surface
of sea water and the deep cold ocean water.
The oceans cover a little more than 70 percent of earths surface.
This makes it the world''s largest solar energy collector and energy
storage sytem.
On an average day,60 million square kilometers of tropical seas absorb
an amount of solar radiational equal in heat content to about 250 billion
barrels of oil.
OTEC, Ocean Thermal Energy conversion is an energy technology that converts
solar radiation to electric power.
The oceans are thus a vast renewable resource, with potential to help us
produce billions of watts of electric power.
The cold seawater used in the OTEC process is also rich in nutrients and it
can be used to culture both marine organisms and plant life near the shore
or on land.
The idea behind OTEC is the use of all natural collectors,thesea,instead of
artificial collector.
Warm water is collected on the surface of the tropical ocean and pumped by
a warm water pump. The water is pumped through boiler, where some of the
water is used to heat the working fluid, usually propane or some similar
material.If it is cooler you can use a material with a lower boiling point
like ammonia.
The propane vapour expands through a turbine which is coupled to a generator
that generating electric power.
Cold water from the bottom is pumped through condensers,where the vapour
returns to the liquid state. The fluid is pumped back into the boiler.
There are two different kinds of OTEC power plants, the Land based and the
floating plant.
Land - based power plant : The land based pilot plant will consist of
a building. This building will contain the heat exchangers,turbines,
generators and controls.
It will connected to the ocean via several pipes, and an enormous fish
farm (100 football arenas) by other pipes.
Warm water is collected through a screened enclosure close to the shore.
A long pipe laid on the slope collects cold water. Power and fresh water
are generated in the building by the equipment.
Used water is first circulated into the marine culture pond (fish farm)
and then discharges by the third pipe into the ocean, downstream from the
warm inlet.
This is done so that the outflow does not reenter the plant, since re-use
of warm water would lower the available temperature difference.
Floating power plant : works in the same way as the land based the apparent
difference is that the floating plant is floating.
Closed - cycle, open -cycle and hybrid - cycle : - There are three types of
OTEC designs: open cycle,closed cycle, and hybrid cycle.
In an open cycle, seawater is the working fluid. Warm seawater is pumped into
flash evaporator where pressure as low as 0.03 bar cause the water to boil
at temperatures of 22 centigrades. This steam expands through a low pressure
turbine connected to a generator to create power.The steam then passes
through a condenser using cold seawater from the depths of the ocean to
condense the steam into desalinised water.
In a closed cycle, a low boiling point liquid such as ammonia or another
type of refrigerant is used as the working fluid in a Rankine cycle
(common steam cycle).
The heat from warm seawater flowing through an evaporator vaporises the
working fluid.
The vapour expands through a turbine, and then flows into a condenser
where cold seawater condenses it into a liquid.
Thursday, October 30, 2008
NANOTECHNOLOGY FOR CRITICAL ENDEAVOR IN CANCER
NANOTECHNOLOGY FOR CRITICAL ENDEAVOR IN CANCER Nanotechnology provides the sized materials that can be synthesized and function in the same general size range and Biological structures. Attempts are made to develop forms of anticancer therapeutics based on nanomaterials. Dentritic polymer nanodevices serves as a means for the detection of cancer signatures, and the targeted delivery of anti - cancer therapeutics ( cis-platin , methotrexate, and taxol) and contrast agents to tumor cells. Initial studies documednted the synthesis and function of a targeting module, several drug delivery componets, and two imaging/contrast agents.
STEGANOGRAPHY
STEGANOGRAPHY Steganography is a fascinating and effective method of hiding data that has been used throughout history. steganography is technique which employs a secured information transfer. Steganography is one of the fundamental ways by which data can be kept confidential. Due to increase in the risk of hacking a secured Transmission of information became matter of high priority. Steganography is an art and science of hiding that communication is happening. Classical steganography systems depend on keeping the encoding system secret ,but modern Steganography is detectable only if secret information is known e.g. a secret code. Steganography provides an effective way to hide the information by converting information and encoding it in a picture form. The data which is to be transmitted is compressed and embedded into a image and if the image is hacked or interpreted by a third party user will open up in any image previewer but not displaying the data. This protects the data from being invisible and hence be secure during transmission. The user in the receiving end receives the data after being deembedded , decompressed and under going CRC verification. Data is received only if the user uses anothe piece of code to retrieve the data from the image.
NANOTECHNOLOGY
NANOTECHNOLOGY The shotgun marriage of chemistry and engineering called " Nanotechnology" is ushering in the era of self - replicating machinery and self assembling consumer goods made from raw atoms. Utilizing the well understood chemical properties of atoms and molecules , nanotechnology proposes the construction of novel molecular devices possessing extraordinary properties. The single electron transistor or SET is new type of switching devices that uses controlled electron tunneling to amplify current. By using the "Electron beam lithography" and " Electromigration ", the research leads to the designing of a single atom transistor with the help of meticulously synthesized semiconductor crystals called "quantum dots", which embodies the electrons confined in a channel and resembles same in its properties as an real atom. This paper presents a scenario on existing and ongoing studies on Nano ELECTRONICS with the theoretical methods relevant to their understanding. Most of the preceding discussion is premised upon the implicit assumption. That future quantum effect Nano Electronic Devices will be fabricated in Nano Meter scale using molecules. Conductance quantization in ballistic regime has been described under various conditions. The behaviour of " Coulomb Island" through which the electrons can only enter by tunneling through one of the insulators is presented. At last, the SET presents that it is the different construction is which is based on helical logic, atomic scale motion of electrons in an applied rotating electric field.
TECHNOLOGY FOR ANTI MONEY LAUNDERING
TECHNOLOGY FOR ANTI MONEY LAUNDERING Money laundering is one of the biggest concerns of the financial industry across the world. Lack of standard practices and inadequacy of data has led to systemic weakness that allow money laundering activities to slip through. To combat money laundering, enterprises are deploying solutions that can help them move away from event based detection to one that recognizes patterns. It is end - to - end anti money laundering solution that enables banks and financial institutions to achieve regulatory compiance,mitigate risks, safegaurd reputation and retain customer loyalty. It helps enterprises comply with AML regulations,both locally and globally in a cost - effective manner. It is highly configurable and flexible with advanced detection techniques to track and sift out fraudulent transactions. The entire industry has developed around providing software to analyse transactions in an attempt to identify transactions or patterns of transactions, called structuring. which requires a suspicious Activity Reports(SAR) filing, or other patterns that qualify for SAR reporting. Financial institutions face penalities for failing to properly file Cash Transaction Reports(CTR) and SAR reports, including heavy fines and regulatory restrictions. These software applications effectively monitor bank customer transactions on a daily basis and using customer historical information and accept profile, provide a " whole picture" to the bank management. Transaction management can include cash deposits, withdrawls and wire transfers. In the bank circles, these applications are known as "AML SOFTWARE". For institutions with millions of customers and thousands of cusomer - contact employees, traditional ways of knowing their customers must be supplemented by technology. Thus this paper aims to (i) Avoid dependency on people (ii) Volume of transactions (iii) Structure of transactions (iv) Multiple mode of transactions (v) Ease of data analysis.
IRIDIUM SATELLITE SYSTEM
IRIDIUM SATELLITE SYSTEM The credentials part of the paper lies in the applications part where the applications of ISS as alert system for natural disasters like EARTHQUAKE and TSUNAMI with which the casualties can be drastically reduced. Iridium is a satellite based wireless personal communication network designed to permit a wide range of mobile telephone services including voice, data,networking facsimile, geolocation, fax capabilities and paging. The iridium project, which sounds like something out of star wars, has its main objective to allow handheld mobiles to be used from anywhere on the planet, with the call being routed directly from handset to handset via one or more of the satellites. With complete coverage of Earth''s oceans, airways and polar Regions, Iridium delivers essential services to users who need communication access to and from remote areas. This paper unleashes the system facts such as network coverage, satellite constellation of ISS system and its operation along with advantages and applications also the innovative application of ISS as TSUNAMI,EARTHQUAKE alert system.
THERMO ELECTRIC COOLERS
THERMOELECTRIC COOLERS Conventional air conditioners used in homes and industries rely on refrigerants such as hydro fluorocarbon, which is a threat to ozone layer of the earth. On the other hand thermoelectric coolers are environment friendly, compact and affordable. Thermoelectric (TE) coolers, also known as peltier coolers, offer effective,practical options for heat management in compact optoelectronic devices such as dense - wavelength - division- multiplexing(DWDM) components and charge - coupled - device (CCD) detectors. In many cases, TE coolers offer significant advantages over more conventional cooling methods because they offer active cooling, precise controllability,no moving parts, small size, and ability to control below ambient temperature. The paper also discuss the necessary materials required in constructing a thermoelectric cooler and suggesting few measures to increase the efficiency with reference to material sciences and unleashes many advantages such as "electrically quiet operation'', ''operation in any orientation'', ''spot cooling'', ''environment friendly'' and most important ''ability to generate electricity''. Although there is a variety of applications that use thermoelectric devices,all of them are based on the same principle.
NETWORK SECURITY AND NETWORK PRIVACY
NETWORK SECURITY AND NETWORK PRIVACY
A network is set of devices or nodes by communication
links. A network must be able to meet certain number of
criteria and one of them is security.
Network security issues including protecting data from
unauthorised access, there are enemies to the data and also
to the data which is transmitted through network and the
most common enemies are hackers,unaware staff, snoops,
viruses, Trojan horse program, vandals.
Hackers are computer enthusiast who takes pleasure in
gaining access to other people''s computersor network.
unaware staff are employees who focus on their specific job
duties often overlook standard n\w security rules Employees
Known as" snoops " gaining unauthorised access to confidential
data to provide competitors with otherwise inaccessible
information . what can these enemies do ?
Viruses are computer programs that are written by unauthorised
programmers and are designed to replicate themselves and infect
computers when triggered by a specific event.
Some viruses are more destructive and cause such problems as
deleting files from a hard drive or slowing down a system.
Trojan horse programs are actually enemies in disguise Trojans
can delete data and open up computers to additional attacks.
Innumerable types of networks attacks have been documented
and they are dos attacks, access attacks.
ACCESS ATTACKS are conducted to exploit vulnerabilities.
Prevent access to part or all of a computer system.Social
engineering is the increasingly prevalent act of obtaining
network security information thru non - technical means.
Spasm is the most commonly used term for unsolicited electronic
mail or the action of broadcasting unsolicited advertising
messages via e - mail.
Spam is usually harmless but it can be a nuisance,taking up the
recipient'time and storage space.
Organisations have extensive choice of technologies, ranging
from anti - virus software packages to dedicated network security
hardware,such as firewalls and intrusion detection systems , to
provide protection for all areas of the network.
Anti virus software is a virus protection software is packaged
with most computers and can counter most virus threats if the
software is regularly updated And correctly maintained security
policies or rules that are electronically programmed and stored
within security equipment to control such areas access.
A network is set of devices or nodes by communication
links. A network must be able to meet certain number of
criteria and one of them is security.
Network security issues including protecting data from
unauthorised access, there are enemies to the data and also
to the data which is transmitted through network and the
most common enemies are hackers,unaware staff, snoops,
viruses, Trojan horse program, vandals.
Hackers are computer enthusiast who takes pleasure in
gaining access to other people''s computersor network.
unaware staff are employees who focus on their specific job
duties often overlook standard n\w security rules Employees
Known as" snoops " gaining unauthorised access to confidential
data to provide competitors with otherwise inaccessible
information . what can these enemies do ?
Viruses are computer programs that are written by unauthorised
programmers and are designed to replicate themselves and infect
computers when triggered by a specific event.
Some viruses are more destructive and cause such problems as
deleting files from a hard drive or slowing down a system.
Trojan horse programs are actually enemies in disguise Trojans
can delete data and open up computers to additional attacks.
Innumerable types of networks attacks have been documented
and they are dos attacks, access attacks.
ACCESS ATTACKS are conducted to exploit vulnerabilities.
Prevent access to part or all of a computer system.Social
engineering is the increasingly prevalent act of obtaining
network security information thru non - technical means.
Spasm is the most commonly used term for unsolicited electronic
mail or the action of broadcasting unsolicited advertising
messages via e - mail.
Spam is usually harmless but it can be a nuisance,taking up the
recipient'time and storage space.
Organisations have extensive choice of technologies, ranging
from anti - virus software packages to dedicated network security
hardware,such as firewalls and intrusion detection systems , to
provide protection for all areas of the network.
Anti virus software is a virus protection software is packaged
with most computers and can counter most virus threats if the
software is regularly updated And correctly maintained security
policies or rules that are electronically programmed and stored
within security equipment to control such areas access.
CRYPTOGRAPHY
Cryptography is the science of keeping data secure .
When the Internet provides essential communication
between tens of millions of people and is beign increasingly
used as tool for commerce, security becomes tremendously
important issue to deal with it.
In the age of Universal electronic connectivity,Viruses
and hackers, of electronic eavesdropping and electronic fraud ,
network security has assumed increasing importance.
Cryptography is an ancient technology that has matured rapidly
in the last twenty years such that, despite its age, it is increasingly
becoming a fault line for the schism between the individual need
to protect one''s privacy and the state''s need to protect both
individuals and themselves.
The capabilities of today''s Cryptosystems present a new source
of power for both governments and individuals: individuals have
enhanced powers to keep their secrets safe from the individual .
The power of modern encryption creates a struggle where both
the individual and the state are working to limit the technological
power of the other.
When the Internet provides essential communication
between tens of millions of people and is beign increasingly
used as tool for commerce, security becomes tremendously
important issue to deal with it.
In the age of Universal electronic connectivity,Viruses
and hackers, of electronic eavesdropping and electronic fraud ,
network security has assumed increasing importance.
Cryptography is an ancient technology that has matured rapidly
in the last twenty years such that, despite its age, it is increasingly
becoming a fault line for the schism between the individual need
to protect one''s privacy and the state''s need to protect both
individuals and themselves.
The capabilities of today''s Cryptosystems present a new source
of power for both governments and individuals: individuals have
enhanced powers to keep their secrets safe from the individual .
The power of modern encryption creates a struggle where both
the individual and the state are working to limit the technological
power of the other.
PILLCAM WIRELESS CAPSULE TECHNOLOGY PART -2
WIRELESS CAPSULE TECHNOLOGY
PART - 2
Procedure : A person must fast for 10 hours prior to
undergoing capsule endoscopy for small intestine, but
can eat four hours after swallowing the capsule.
Lewis says he schedules patients early in the morning,
so they can eatlunch and dinner. Wire leads with sensors
on the end are affixed to the patient''s abdomen and
connected to a data recording device worn on a belt around
the waist.
The pillCam SB takes about eight hours to move through the
small intestine, taking two pictures per second with its
single camera.During this time, the person can leave the
doctor''s office and go about a regular routine while wearing
the sensors and recorder. Later, the person returns to hand
over the sensors and data recorder.
The physician downloads about 57,000 color images into a
computer, which compresses them to form a video. The physician
then views the video on a monitor to determine the next step
in treatment. A two - hour fast is required before taking the
pillCam ESO, which views the esophagus. Wire leads with sensors
are placed on the patient''s chest and connected to a recording
device. The person swallows the capsule with water while lying
flat on the back.Every two minutes over a six- minute period,
the person is raised by 30 -degree angles until sitting upright,
then remains upright for an additional 15 minutes to make sure
the capsule has traveled through the entire esophagus.
The gradual rise to a sitting position slows down the movement
of the PillCam ESO, giving it additional time to take pictures.
In contrast to the pillcam SB, which moves slowly through the
snake-like turns of the small intestine over several hours,
the pillCam ESO " moves through the esophagus in minutes,"
says Cooper.
Given Imaging added a second miniature camera to the ESO capsule,
putting one camera at either end, to take about 2,600 total
color images of the esophagus.
USES:
a) Physicians use the pillcam ESO to look for conditions such as
gastroesophageal reflux disease (GERD). GERD occurs when
a muscle valve in the esophagus malfunctions, allowing stomach
acid to flow up into the esophagus and cause heartburn.
Left untreated, GERD may lead to a precancerous condition
called Barret''s esophagus.
b) Use of the pillCam ESO for patients " Who are reticent to have
an upper endoscopy but are still concerned that they may
develop such as Barret''s esophagus."
Capsule endoscopy, as with traditional endoscopy,can help
guide treatment.
c) The pillcam SB, which views the small intestine, can help determine
the cause of persistent abdominal pain, unexplained rectal bleeding,
or diarrhea. Physicians use it to detect polyps,cancer, and other
causes of bleeding and anemia, such as Crohn''s disease, a chronic
inflammation of the digestive tract that can cause abdominal cramps,
diarrhea, and anemia.
d) The PillCam can see lesions that indicate sources of gastrointesinal
bleeding.
e) Crohn''s disease is not apparent on X -rays but can be detected with
the use of the pillCam.
f) The pillCam SB allows doctors to see the entire 20 - foot - long
small intestine; The battery has an eight- hour life expectancy,
which generally is long enough to photograph the small intestine.
PART - 2
Procedure : A person must fast for 10 hours prior to
undergoing capsule endoscopy for small intestine, but
can eat four hours after swallowing the capsule.
Lewis says he schedules patients early in the morning,
so they can eatlunch and dinner. Wire leads with sensors
on the end are affixed to the patient''s abdomen and
connected to a data recording device worn on a belt around
the waist.
The pillCam SB takes about eight hours to move through the
small intestine, taking two pictures per second with its
single camera.During this time, the person can leave the
doctor''s office and go about a regular routine while wearing
the sensors and recorder. Later, the person returns to hand
over the sensors and data recorder.
The physician downloads about 57,000 color images into a
computer, which compresses them to form a video. The physician
then views the video on a monitor to determine the next step
in treatment. A two - hour fast is required before taking the
pillCam ESO, which views the esophagus. Wire leads with sensors
are placed on the patient''s chest and connected to a recording
device. The person swallows the capsule with water while lying
flat on the back.Every two minutes over a six- minute period,
the person is raised by 30 -degree angles until sitting upright,
then remains upright for an additional 15 minutes to make sure
the capsule has traveled through the entire esophagus.
The gradual rise to a sitting position slows down the movement
of the PillCam ESO, giving it additional time to take pictures.
In contrast to the pillcam SB, which moves slowly through the
snake-like turns of the small intestine over several hours,
the pillCam ESO " moves through the esophagus in minutes,"
says Cooper.
Given Imaging added a second miniature camera to the ESO capsule,
putting one camera at either end, to take about 2,600 total
color images of the esophagus.
USES:
a) Physicians use the pillcam ESO to look for conditions such as
gastroesophageal reflux disease (GERD). GERD occurs when
a muscle valve in the esophagus malfunctions, allowing stomach
acid to flow up into the esophagus and cause heartburn.
Left untreated, GERD may lead to a precancerous condition
called Barret''s esophagus.
b) Use of the pillCam ESO for patients " Who are reticent to have
an upper endoscopy but are still concerned that they may
develop such as Barret''s esophagus."
Capsule endoscopy, as with traditional endoscopy,can help
guide treatment.
c) The pillcam SB, which views the small intestine, can help determine
the cause of persistent abdominal pain, unexplained rectal bleeding,
or diarrhea. Physicians use it to detect polyps,cancer, and other
causes of bleeding and anemia, such as Crohn''s disease, a chronic
inflammation of the digestive tract that can cause abdominal cramps,
diarrhea, and anemia.
d) The PillCam can see lesions that indicate sources of gastrointesinal
bleeding.
e) Crohn''s disease is not apparent on X -rays but can be detected with
the use of the pillCam.
f) The pillCam SB allows doctors to see the entire 20 - foot - long
small intestine; The battery has an eight- hour life expectancy,
which generally is long enough to photograph the small intestine.
PILLCAM WIRELESS CAPSULE TECHNOLOGY
WIRELESS CAPSULE TECHNOLOGY
PILLCAM
Wireless Capsule Endoscopy
Introduction
Endoscopy is a diagnostic medical procedure used to assess
the interior surfaces of an organ by inserting a tiny tube into
the body, often,but not necessarily, through a natural body
aperture.. Through the endoscope lesions and other surface
conditions can be observed.
The instrument may have a rigid or a flexible tube that not only
provides an image for visual inspection and photography, but
also enables in making biopsics and retrieval of foreign objects
from the body. Endoscopy is the vehicle for minimally invasive
surgery.
Many endoscopic procedures are relatively painless and, at worst,
associated with mild discomfort, even though patients are sedated
for most procedures. Complications are rare (only 5% of all operations)
but can include perforation of the organ under inspection
with the endoscope or biopsy instrument. If that occurs open surgery
may be required to repair the injury. Earlier Method :
Earlier methods used a fibre which was inserted and helped in
transmitting the pictures of digestive track.
Endoscopes consists of three tubes; a light emitting fibre, a fibre
which transmits the image to the physician and tube which can
be used for the administration of drugs as well as having the
ability to hold a brush or incisor instrument for the removal of
damaged body tissue or for taking tissue samples.
In the earlier endoscopy methods, a half inch diameter tube is sent
inside the body through throat. If there is any difficulty with the
patient in swallowing the tube, his/her throat is sprayed with a
sedative, which makes the job easier and less painful.
Disavantages of earlier methods :
Physical : Introduction of unsterilised instruments into the body
is always a possibility. Inexperienced handling of the endoscope,
both rigid and flexible, or the equipment supported it can lead to
punctured organs with variable effects.
Dyes : Contrast agents or dyes (such as those used in a CT scan)
that are used for imaging can cause allergic reactions.Iodine in
these dyes is also a cause of allergic reactions,the dyes are specially
harmful to the kidneys.
Sedation : Experienced anesthesiologists will provide sedation
only in required amounts to keep the patient comfortable.
Over sedation can result in dangerously low blood pressure and
nausea and vomiting.
DISEASES TESTED BY ENDOSCOPY :
a) Ulcers b) Cancer c) Internal Bleeding d) Gastrointestinal
disorders
Revolution in Endoscopy :
In 1981, an Israeli physician, Dr. Gavriel Iddan, began
development of a video camera that would fit inside a pill.
It took 20 years for technology to catch up with Dr. Iddan.
In 2001, the FDA approved the given Diagnostic Imaging
system. 11 x 26 mm capsule weighs only 4gms and contains
a color video camera and wireless radiofrequency transmitter,
4LED lights, and enough battery power to take 50,000 color
images during an 8 - hour journey through the digestive tract.
About the size of a large vitamin, the capsule is made of specially
sealed biocompatible material that is resistant to stomach acid
and powerful digestive enzymes.
Another name for this new technique is wireless Capsule Endoscopy.
What is Capsule Endoscopy?
The Pillcam Capsules are miniaturized disposable color video
cameras encased in a plastic shell, which incorporate one or more
specially developed imaging devices based on complementary metal
oxide semiconductor (CMOS) technology.
Other components include optics; white - light emitting doides for
illumination, and an application specific integrated circuit device
for control and image transmission,low power silver oxide batteries,
an antenna and other discrete electronic components. The RAPID
software when used with the Pillcam SB capsule, creates a graphic
representation of the patients gastrointestinal tract, helping
physicians assess the location of the pillcam SB capsule within the
body when an image is captured and assisting them in directing
treatment to the affected area. The company is selling pillcam
capsules designed for visualization of two areas of the gastrintestinal
tract: the small bowel and the csophagus.
The Pillcam SB capsule transmits images at a rate of two images
per second for approximately eight hours, resulting in approximately
50,000 images, at which time the operation is stopped and recording ceases.
The pillcam SB capsule is used with a range of indications
of the small intestine, including obscure bleeding, suspected crohn''s
disease,iron deficiency anemia and suspected small bowel tumors.
The pillcam ESO capsule contains an imaging device and light
source at both ends of the capsule and is designed to capture up
to 14 images per second as it passes down the esophagus. The pillcam
ESO capsule can be used only with DataRecorder 2.0 or newer
versions and RAPID 3.0 or newer versions. The AGILE patency
system consists of the AGILE patency capsule, a dissolvable
capsule the same size as the pillcam with a radio frequency
identification (RFID) tag packed ina lactose and barium powder.
REFERENCES:
www.medicalnewstoday.com
PILLCAM
Wireless Capsule Endoscopy
Introduction
Endoscopy is a diagnostic medical procedure used to assess
the interior surfaces of an organ by inserting a tiny tube into
the body, often,but not necessarily, through a natural body
aperture.. Through the endoscope lesions and other surface
conditions can be observed.
The instrument may have a rigid or a flexible tube that not only
provides an image for visual inspection and photography, but
also enables in making biopsics and retrieval of foreign objects
from the body. Endoscopy is the vehicle for minimally invasive
surgery.
Many endoscopic procedures are relatively painless and, at worst,
associated with mild discomfort, even though patients are sedated
for most procedures. Complications are rare (only 5% of all operations)
but can include perforation of the organ under inspection
with the endoscope or biopsy instrument. If that occurs open surgery
may be required to repair the injury. Earlier Method :
Earlier methods used a fibre which was inserted and helped in
transmitting the pictures of digestive track.
Endoscopes consists of three tubes; a light emitting fibre, a fibre
which transmits the image to the physician and tube which can
be used for the administration of drugs as well as having the
ability to hold a brush or incisor instrument for the removal of
damaged body tissue or for taking tissue samples.
In the earlier endoscopy methods, a half inch diameter tube is sent
inside the body through throat. If there is any difficulty with the
patient in swallowing the tube, his/her throat is sprayed with a
sedative, which makes the job easier and less painful.
Disavantages of earlier methods :
Physical : Introduction of unsterilised instruments into the body
is always a possibility. Inexperienced handling of the endoscope,
both rigid and flexible, or the equipment supported it can lead to
punctured organs with variable effects.
Dyes : Contrast agents or dyes (such as those used in a CT scan)
that are used for imaging can cause allergic reactions.Iodine in
these dyes is also a cause of allergic reactions,the dyes are specially
harmful to the kidneys.
Sedation : Experienced anesthesiologists will provide sedation
only in required amounts to keep the patient comfortable.
Over sedation can result in dangerously low blood pressure and
nausea and vomiting.
DISEASES TESTED BY ENDOSCOPY :
a) Ulcers b) Cancer c) Internal Bleeding d) Gastrointestinal
disorders
Revolution in Endoscopy :
In 1981, an Israeli physician, Dr. Gavriel Iddan, began
development of a video camera that would fit inside a pill.
It took 20 years for technology to catch up with Dr. Iddan.
In 2001, the FDA approved the given Diagnostic Imaging
system. 11 x 26 mm capsule weighs only 4gms and contains
a color video camera and wireless radiofrequency transmitter,
4LED lights, and enough battery power to take 50,000 color
images during an 8 - hour journey through the digestive tract.
About the size of a large vitamin, the capsule is made of specially
sealed biocompatible material that is resistant to stomach acid
and powerful digestive enzymes.
Another name for this new technique is wireless Capsule Endoscopy.
What is Capsule Endoscopy?
The Pillcam Capsules are miniaturized disposable color video
cameras encased in a plastic shell, which incorporate one or more
specially developed imaging devices based on complementary metal
oxide semiconductor (CMOS) technology.
Other components include optics; white - light emitting doides for
illumination, and an application specific integrated circuit device
for control and image transmission,low power silver oxide batteries,
an antenna and other discrete electronic components. The RAPID
software when used with the Pillcam SB capsule, creates a graphic
representation of the patients gastrointestinal tract, helping
physicians assess the location of the pillcam SB capsule within the
body when an image is captured and assisting them in directing
treatment to the affected area. The company is selling pillcam
capsules designed for visualization of two areas of the gastrintestinal
tract: the small bowel and the csophagus.
The Pillcam SB capsule transmits images at a rate of two images
per second for approximately eight hours, resulting in approximately
50,000 images, at which time the operation is stopped and recording ceases.
The pillcam SB capsule is used with a range of indications
of the small intestine, including obscure bleeding, suspected crohn''s
disease,iron deficiency anemia and suspected small bowel tumors.
The pillcam ESO capsule contains an imaging device and light
source at both ends of the capsule and is designed to capture up
to 14 images per second as it passes down the esophagus. The pillcam
ESO capsule can be used only with DataRecorder 2.0 or newer
versions and RAPID 3.0 or newer versions. The AGILE patency
system consists of the AGILE patency capsule, a dissolvable
capsule the same size as the pillcam with a radio frequency
identification (RFID) tag packed ina lactose and barium powder.
REFERENCES:
www.medicalnewstoday.com
DIGITAL IMAGE PROCESSING
Image processing is processing of the image so as to
eveal the inner details of the image for further investigation .
With the advent of digital computers, Digital Image processing
has started revolutionizing the world with its diverse
applications. The field of Image processing continues,it has
since the early 1970''s, on a path of dynamic growth in terms of
popular and scientific interest and number of commercial
applications. Considering the advances in the last 30 years
resulting in routine application of image processing to problems
in medicine,entertainment,law enforcement,and many others.
The discipline of Digital Image Processing covers a vast area of
Scientific and engineering Knowledge.
Modern digital technology has made it possible to manipulate
multi - dimensional signals with systems that range from simple
digital circuits to advanced parallel computers. It''s built on a
foundationof one - and two -dimensional signal processing theory
and overlaps with such disciplines as Artificial Intelligence
(Scene understanding), information theory(image coding),
statistical pattern recognition(image classification),communication
theory(image coding and transmission), and microelectronics (image
sensors, image processing hardware).
Image processing has revolutionized in various fields. Examples
include mapping internal organs in medicine using various scanning
technologies(image reconstruction from projections), automatic finger
print recognition(pattern recognition and image coding) and
HDTV (video coding).
eveal the inner details of the image for further investigation .
With the advent of digital computers, Digital Image processing
has started revolutionizing the world with its diverse
applications. The field of Image processing continues,it has
since the early 1970''s, on a path of dynamic growth in terms of
popular and scientific interest and number of commercial
applications. Considering the advances in the last 30 years
resulting in routine application of image processing to problems
in medicine,entertainment,law enforcement,and many others.
The discipline of Digital Image Processing covers a vast area of
Scientific and engineering Knowledge.
Modern digital technology has made it possible to manipulate
multi - dimensional signals with systems that range from simple
digital circuits to advanced parallel computers. It''s built on a
foundationof one - and two -dimensional signal processing theory
and overlaps with such disciplines as Artificial Intelligence
(Scene understanding), information theory(image coding),
statistical pattern recognition(image classification),communication
theory(image coding and transmission), and microelectronics (image
sensors, image processing hardware).
Image processing has revolutionized in various fields. Examples
include mapping internal organs in medicine using various scanning
technologies(image reconstruction from projections), automatic finger
print recognition(pattern recognition and image coding) and
HDTV (video coding).
SMART CARD
Smart card which are nothing but small plastic cards
the size of a credit card, but with one difference, Instead
of just having embossed lettering and a magnetic strip to contain
information, they also have a computer chip. This chip is an
Integrated Circuit (IC) that can hold vast amounts of information
and provide users with multiple applications. Smart cards will
replace keys, documents, human actions, cash, and sometimes
even palmtops and laptops. The same card will be used as an ID
card,driver''s licence, key to the house and office, access to home
entertainment, a wallet, and has got many many more advantages
and features.
the size of a credit card, but with one difference, Instead
of just having embossed lettering and a magnetic strip to contain
information, they also have a computer chip. This chip is an
Integrated Circuit (IC) that can hold vast amounts of information
and provide users with multiple applications. Smart cards will
replace keys, documents, human actions, cash, and sometimes
even palmtops and laptops. The same card will be used as an ID
card,driver''s licence, key to the house and office, access to home
entertainment, a wallet, and has got many many more advantages
and features.
ULTRA -THIN TELEVISION
ULTRA -THIN TV
If your daily trip to work involves commuting for long spells,
by bus or train, you might, today, be carrying a folded newspaper
to while away the tedium. Tommorow it could be a folded television
set.Many of us are still agonizing over whether our next television
set should be a Plasma or a Liquid Crystal (LCD) screen, assuming
we can afford to buy either.
Competing technologies are already being challenged by a brash, ultra
slim and amazingly sharp newcomer, that might well push us into the
next era of high - defination display technology.
It is called Organic Light Emmiting Diode or OLED and among other
Characteristics, it can be rolled out as a flexible, rather than
a rigid sheet. Which means, that some time in the coming decade,
we can expect to fold roll-up a portable TV and carry it in a pocket
or purse for viewing while ''on the go''.Recently, Sony announced that
it will be putting on sale, sometime in december this year.
The XEL -l has a 11 inch (28cm) screen;it is just 3mm thick and
weighs less than 2kg. Its high definition (1920 by 1080 pixel)
screen has an amazing and hitherto unachievable ratio of 1,000,000:1.
It will cost 200,000 yen, that is, around Rs 67,000/-.
That, straight way reduces the power overhead and allows manufacturers
to reduce the effective thickness of the monitor screen. An OLED is
created by placing a series of carbon -based organic thin films,
sandwiched between two conductors.
OLED technology has a compelling attraction for the display industry.
It can be manufactured in the form of flexible or near- flexible
sheets - holding out the hope that some time in the future,TV makers
will roll out television screens by the meter, much as textiles are
manufactured today.
If your daily trip to work involves commuting for long spells,
by bus or train, you might, today, be carrying a folded newspaper
to while away the tedium. Tommorow it could be a folded television
set.Many of us are still agonizing over whether our next television
set should be a Plasma or a Liquid Crystal (LCD) screen, assuming
we can afford to buy either.
Competing technologies are already being challenged by a brash, ultra
slim and amazingly sharp newcomer, that might well push us into the
next era of high - defination display technology.
It is called Organic Light Emmiting Diode or OLED and among other
Characteristics, it can be rolled out as a flexible, rather than
a rigid sheet. Which means, that some time in the coming decade,
we can expect to fold roll-up a portable TV and carry it in a pocket
or purse for viewing while ''on the go''.Recently, Sony announced that
it will be putting on sale, sometime in december this year.
The XEL -l has a 11 inch (28cm) screen;it is just 3mm thick and
weighs less than 2kg. Its high definition (1920 by 1080 pixel)
screen has an amazing and hitherto unachievable ratio of 1,000,000:1.
It will cost 200,000 yen, that is, around Rs 67,000/-.
That, straight way reduces the power overhead and allows manufacturers
to reduce the effective thickness of the monitor screen. An OLED is
created by placing a series of carbon -based organic thin films,
sandwiched between two conductors.
OLED technology has a compelling attraction for the display industry.
It can be manufactured in the form of flexible or near- flexible
sheets - holding out the hope that some time in the future,TV makers
will roll out television screens by the meter, much as textiles are
manufactured today.
GESTURECAM
GESTURECAM Smart camera, or an intelligent camera, is an embedded vision system which captures and processes image to extract application specific information in real time. Smart cameras are used in many applications such as automatic contriol systems, machine vision systems, automatic video surveillance systems and human computer interfaces.What makes a smart camera ''smart'' is a special processing unit inside the camera which performs application specific information processing, for example, skin color detection and motion detection for surveillance purpose. The design of smart camera as an embedded system is challenging because on one hand video processing has insatiable demand for performance and power, and on the other hand embedded systems place considerable constraints on the design.To build Gesturecam, an FPGA-based smart camera that can recognize simple pre-defined head and hand gestures. The design of GestureBrowser, an extension to the Mozilla Firefox browser which uses the Gesturecam to Capture and recognize a user''s head and hand gesture commands to control web navigation. The GestureBrowser idea is a step further toward next generation natural human computer interaction. Also presented is a proof of concept work for the GestureBrowser idea, usinga webcam as image capture device.
PLASMONICS
PLASMONICS With increasing quest for transporting large amounts of data at a fast speed along with miniaturization, both electronics and photonics are facing limitations. photonic components such as fiber-optic cables can carry a lot of data but are bulky compared to electronic circuits. Electronic components such as wires and transistors can be incredibly small but carry less data. A problem holding back the progress of computing is that with mismatched capacities and sizes, the two technologies are hard to combine in a circuit. Photonic components such as fiber optic cables can carry a lot of data but are bulky compared to electronic circuits. Electronic components such as wires and transistors carry less data but can be incredibly small. Researchers can cobble them together, but single technology that has the capacity of photonic and smallness of electronics would be the best bridge of all. Researchers are pioneering such a technology called ''plasmonics''. Plasmonics, also called ''light on a wire'', would allow transmission of data at optical frequencies along the surface of a tiny metallic wire, despite the fact the data travels in the form of electron density distributions rather than photons.
ULTRA WIDE BAND TECHNOLOGY
ULTRA WIDE BAND TECHNOLOGY Offices have cables running everywhere and we''d be left with a big, tangled mess. So cables have become the bane offices,homes etc. this led to the emerging our devices. In addition to improving safety as a result of eliminating the clutter of wires and hazardous connections, wireless technology offers many convenient advantages. For example, when you are travelling with your lap top,PDA,MP3 Player and other devices, you no longer to worry about bringing along all of your connecting cables.Blue tooth being most inexpensive,low interference, automatic and low energy consuming technology of the available wireless technologies has become most popular.But Bluetooth is able to cover only a distance of 30 - 100ft and is able to transfer only photos sound files and videos. When it comes to larger files can''t handle and hence to over come these limitations there emerged a new technology "ultra wide band". Like all the other wireless technologies UWB also uses the radio waves. It uses a band of 3GHZ - 10 GHZ.
DATA MINING
DATA MINING In today''''s competitive global business environment, understanding and managing enterprise information is crucial for making timely decisions and responding to changing business conditions. Many companies are realizing a business advantageby leveraging one of their key assets - business data. There is tremendous amount of data generated by day - day business operational applications. Data Warehousing has emerged as an increasingly popular and powerful concept of applying information technology to turn these huge islands of data into meaningful information for better business decisions. Having a place to store all data, however leads to a problem of how to find what is needed in all that data. Well, the solution to this is a process called Data mining. Data mining is the analysis of data and the use of software techniques for finding patterns and regularities in sets of data. It is the process of searching and sorting data to find relationships within it. So the future of data warehousing lies in their accessibility from the Internet.
PIPELINED ARCHITECTURE AND STREAMING PIPELINE CONTROL
PIPELINED ARCHITECTURE AND STREAMING PIPELINE CONTROL In olden days the processors used were slow.For a small single operation, we have to execute number of instructions. An example of such situation is addition of two numbers. To add two numbers, 3 instructions are to be executed: 1) Reading data 2) Performing operation 3) Storing the result. For this, alot of time is taken. To decrease the execution time, pipelining technique is used. Pipelineing is an implementation tecnique in which multiple instructions are overlapped in execution. Today, pipelining is key to make processors fast. The pipelining approach takes much less time, as compared to step by step execution. A typical operation of ''loadword'' takes 8 ns for execution. To load 3 words into memory, it takes 24ns of time in step by step execution and by using pipelining architecture it takes hardly 13 to 14ns of time. This show for a larger number of instructions, the execution time will be drastically reduced. Under ideal conditions, the speed up from pipelining equals the number of pipe stages. Pipelining improves performance by increasing instruction throughout, as opposed to decreasing the execution time of an individual instruction, but instruction throughout is the important metric because real programs execute billions of instructions.
PLASMATRON FUEL CONVERTERS
PLASMATRON FUEL CONVERTERS The next step in the Automobile industry may not be the third generation hybrid vehicles but lies in the development of the existing Internal combustion engine technology by improving the efficiency of the engine with less fuel consumption and reduction of the harmful exhaust gases making vechicles more Eco-friendly. Systems using recently developed compact plasmatron fuel converters in conjunction with state-of the-art engines and after treatment catalysts could provide new opportunites for obtaining substantial emissions reductions. Plasmatron fuel converters provide a rapid response; compact means to transform a wide range of hydrocarbon fuels into hydrogen rich gas. For diesel engines, use of compact plasmatron reformers to produce hydrogen- rich gas for the regeneration of NOx absorber/adsorbers for diesel engine exhaust after treatment could provide significant advantages. Plasma based reformers are robust, fast response and have wide operating capability. Possibilities for use of compact plasmatron fuel converter for onboard hydrogen generation that could provide new oppotunities for improved spark ignition engine and diesel engine emissions control.
BLU -RAY DISC TECHNOLOGY
BLU - RAY DISC TECHNOLOGY The thrust for an advanced format of data storage in optical storage media has led to the evolution of BLU-RAY DISC (BD). Blu-ray, also known as Blu -ray Disc (BD) is the name of the next- generation optical disc format and is the successor of present generation optical discs (2nd generation) like CD''s, DVD''s HD-DVD''s. The Blu ray technology has changed the very definition of optical storage media by phenomenally improvised technology. Gone are the days when the quotation was "The sky is the limit." Now a data up to a 100 GB can be stored on a Blu-ray disc which exactly looks like a normal DVD or CD, thus leading to a revolution in the history of optical storage medium. The necessity for a next generation discs had eventually begun in 1994 even before the commercialization of the DVD in 1996. The then scientists predicted the limitations of the DVD format and begun working on BD even before DVD''s release. Due to the advanced technology used in BD''s they have high storage capacity,advanced security,privacy features and their high A/V quality O/P of the media files make them quite unique and edge over its competitors like HD -DVD''s and DVD''s. Presented the design, purpose, along with the technical and structural aspects of Blu - rays discs (BD) in comparison with with HD -DVD, DVD'' and CD''s in terms of capacity,data transfer rates etc along with their advantages and disadvantages.
BLUE EYES TECHNOLOGY
BLUE EYES TECHNOLOGY Blue Eyes technology aims at creating computational Machines with perceptual and sensory abilities like those of human beigns. Blue Eyes system is thus a versatile system which can be modified to cater to the working environment. The Blue Eyes system has hardware with software loaded on it Blue Eyes systemcan be applied in every working environment requiring permanent operator''s attention for it. The hardware comprises of data acquisition unit and central system unit. The heart of Data acquisition unit is ATMEL 89C52 microcontroller Bluetooth technology is used for communication and coordination between the two units.Blue eye system can be applied in every working environment which requires pemanent operator''s attention. Blue eyes sytem provides technical means for monitoring and recording human operator''s physiological condition. A blue eyes is a project aiming to be a means of stress reliever driven by the advanced, technology of syudying the facial expressions for judgment of intensity of stress handled. In totality blue eyes aims at adding perceptual abilities which would end up in a healthy stress free environment and can be applied in every working environment requiring permanent operator''s attention
DATA COMPRESSION AND ENCODING USING COLORS (A NEW APPROACH FOR CODING
DATA COMPRESSION AND ENCODING USING COLORS Any color is the combination of three primary colors Red, Green
and Blue in fixed quantities. A color is stored in a computer in
form of three numbers representing the quantities of Red, Green
and Blue respectively.
This representation is called RGB representation which is used in
computers to store images in BMP, JPEG and PDF formats. Here each
pixel is represented as values for Red, Green and Blue.
RGB color model is an additive model in which Red, green and Blue
are combined in various ways to produce other colors.
By using appropriate combination of Red, Green and Blue intensities,
many colors can be represented. Typically, 24 bits are used to store
a color pixel. This is usually apportioned with 8 bits each for red,
green and blue, giving a range of 256 possible values, or intensities,
for each hue.With this system,16 777 216 discrete combinations of hue
and intensity can be specified.
Each color can vary between the minimum (no color) and maximum (full
intensity).If all the colors are at minimum the result is black.
If all the colors are at the maximum, the result is white.
Numeric representations:
1) color science talks about colors in the range 0.0 (minimum) to
1.0 (maximum).Most color formulae take these values.For instance,
full intensity red is (1.0,0.0,0.0).
2) The color values may be written as percentages, from 0% (minimum)
to 100% (maximum).Full intensity red is 100%, 0%,0%.
3) The color values may also be written as numbers in the range 0 to
255,simply by multiplying the range 0.0 to 1.0 by 255.Full intensity
red is (255,0,0).
Color sensor circuit and operation :
|------------------------------ RGB color filter
|
|----------------------------- Photo diode
reflective or |----------------- current to voltage
voltage converter
transmitted _ _ _ -
Color light ---------& gt;| |---> -->|--------> | _ _ _ _
| || | |
------------>| |---> -->| -------> | |
| | | \/ \/
| | |
-------------->| |---> -->|--------->
| | |
|-| - ---- |
color sensor
--------> ---> ---->
A light to analog - voltage-color sensor comprises an array of photo
diodes behind color filters and an integrated current to voltage conversion
circuit(usually a transimpedence amplifier).
Light falls on each of the photodiodes is converted into a photocurrent,the
magnitude of which is dependent on both the brightnesses wavelength(wavelength
due to the color filter) of the incident light.
The photocurrents from each of the three photodiodes are converted to VRout,
VGout,VBout using a current- to- voltage converter.
Thus we get three output voltage levels for a single color.
The maximum possible output voltage is given the value 255 on scale and the
whole length is divided into 256 equal parts(pixel length).
The output of sensor is exactly computer representation and can be directly
fed into computer using interfacing circuits(multiplier).
Color sensing: A light source and an object are kept very near to each other.
Light reflects on the object and falls on the sensor''s lenses. Then sensor
operation takes place and three output voltages are obtained for Red,Blue and
Green respectively.
Data security: Data printed using color code can be made secured by using
an encoding technique. Key(X,Y,Z) can be used for encoding purpose.
For example ,if we have to print a color representing(R,G,B), instead of
printing that color (R+X,G+Y, B+Z) can be printed. X,Y, Z values can be
positive or negative integers.Confidential data can be transmitted using
this "Key'' concept.
Data encoding and Compression using ASCII :- ASCII codes represent text in
computers, communications equipment, and other devices that work with text.
Using ASCII, 128 characters are encoded. Each character is represented
by 7 bits.
Data encoding :- In RGB 256 color mode, a pixel is represented by 24 bits,
in which 8 bits represent the intensity of each color.For example, a color
(80,121,150) is represented as (01010000 01111001 10010110).
Data compression: - using seven sub cubes contain 256* 256* 156 * 7/8 =
14680064 colors. There are nearly 10000000 English words and templates
used in MS word (Including all fonts and formats).Then any other word
which has more than 3 letters ( or characters) can be defined by a color
which requires three 8 bit numbers to be represented.
Thus data can be compressed to a large extent and more efficient and
error free.
and Blue in fixed quantities. A color is stored in a computer in
form of three numbers representing the quantities of Red, Green
and Blue respectively.
This representation is called RGB representation which is used in
computers to store images in BMP, JPEG and PDF formats. Here each
pixel is represented as values for Red, Green and Blue.
RGB color model is an additive model in which Red, green and Blue
are combined in various ways to produce other colors.
By using appropriate combination of Red, Green and Blue intensities,
many colors can be represented. Typically, 24 bits are used to store
a color pixel. This is usually apportioned with 8 bits each for red,
green and blue, giving a range of 256 possible values, or intensities,
for each hue.With this system,16 777 216 discrete combinations of hue
and intensity can be specified.
Each color can vary between the minimum (no color) and maximum (full
intensity).If all the colors are at minimum the result is black.
If all the colors are at the maximum, the result is white.
Numeric representations:
1) color science talks about colors in the range 0.0 (minimum) to
1.0 (maximum).Most color formulae take these values.For instance,
full intensity red is (1.0,0.0,0.0).
2) The color values may be written as percentages, from 0% (minimum)
to 100% (maximum).Full intensity red is 100%, 0%,0%.
3) The color values may also be written as numbers in the range 0 to
255,simply by multiplying the range 0.0 to 1.0 by 255.Full intensity
red is (255,0,0).
Color sensor circuit and operation :
|------------------------------ RGB color filter
|
|----------------------------- Photo diode
reflective or |----------------- current to voltage
voltage converter
transmitted _ _ _ -
Color light ---------& gt;| |---> -->|--------> | _ _ _ _
| || | |
------------>| |---> -->| -------> | |
| | | \/ \/
| | |
-------------->| |---> -->|--------->
| | |
|-| - ---- |
color sensor
--------> ---> ---->
A light to analog - voltage-color sensor comprises an array of photo
diodes behind color filters and an integrated current to voltage conversion
circuit(usually a transimpedence amplifier).
Light falls on each of the photodiodes is converted into a photocurrent,the
magnitude of which is dependent on both the brightnesses wavelength(wavelength
due to the color filter) of the incident light.
The photocurrents from each of the three photodiodes are converted to VRout,
VGout,VBout using a current- to- voltage converter.
Thus we get three output voltage levels for a single color.
The maximum possible output voltage is given the value 255 on scale and the
whole length is divided into 256 equal parts(pixel length).
The output of sensor is exactly computer representation and can be directly
fed into computer using interfacing circuits(multiplier).
Color sensing: A light source and an object are kept very near to each other.
Light reflects on the object and falls on the sensor''s lenses. Then sensor
operation takes place and three output voltages are obtained for Red,Blue and
Green respectively.
Data security: Data printed using color code can be made secured by using
an encoding technique. Key(X,Y,Z) can be used for encoding purpose.
For example ,if we have to print a color representing(R,G,B), instead of
printing that color (R+X,G+Y, B+Z) can be printed. X,Y, Z values can be
positive or negative integers.Confidential data can be transmitted using
this "Key'' concept.
Data encoding and Compression using ASCII :- ASCII codes represent text in
computers, communications equipment, and other devices that work with text.
Using ASCII, 128 characters are encoded. Each character is represented
by 7 bits.
Data encoding :- In RGB 256 color mode, a pixel is represented by 24 bits,
in which 8 bits represent the intensity of each color.For example, a color
(80,121,150) is represented as (01010000 01111001 10010110).
Data compression: - using seven sub cubes contain 256* 256* 156 * 7/8 =
14680064 colors. There are nearly 10000000 English words and templates
used in MS word (Including all fonts and formats).Then any other word
which has more than 3 letters ( or characters) can be defined by a color
which requires three 8 bit numbers to be represented.
Thus data can be compressed to a large extent and more efficient and
error free.
Monday, October 27, 2008
SOME TRAINS FLY
MAGLEVS Transportation is one factor that influence our way of life most and has got a direct impact on a country''s economy. It was found that the trains with wheels accelerate beyond a certain limit. It exerts heavy dynamic head on the track and at high speeds the wheels begin slipping against the track. This led the scientists to think and develop MAGLEV trains. Magnetic levitation trains popularly known as ''Maglevs'', is the latest development in the locomotive industry. Maglevs does not run on wheels. Therefore they do not have any mechanical limitations to acieve high speed. There are two types of Maglevs: 1) One is the electro-magnetic suspension system, which uses the magnetic attraction principle. 2) Other is the electro-dynamic suspension system, which uses the repulsion priniciple to levitate the Train from the guide way. The magnetic train floats on a magnetic field and is propelled by a linear induction motor. It is similar to electric motor except tat its stator windings underneath. It is powered by four 440V batteries. Magnets on train are super conducting where as rails are ohmic. The principle on which the maglev works is that " Like poles repel and unlike poles attract each other". Maglev is an elegant technology with many advantages over conventional means of transit. Because the maglev vechicles never touch the guide way, they make little noise and incur low maintenance costs.
LEISURE
Progress of an individual as well as of a nation depends on hard work.
At the same time one must not forget the excellent value of leisure,
because it leaves pleasing views of one's hard work.
Work without leisure is like racing for a mad career.
The energy of man is limited and if he spends too much of it,he will
soon feel tired.
Indeed man made machines too cannot work for a long stretch of
time and is given rest at regular intervals,otherwise they go out of
order.Human work must be compulsorily be followed by a period of
rest.If rest is not taken then we will be in tension,due to tension we will
loose attention.When attention is lost confusion is developed .Due to
confusion we will feel irritation and spoil personal relation.When naturally
personal relation is lost,ultimately we will not get co-operation and make
things complication.Then our blood pressure (BP) may rise to caution
and have to take medication.
How-ever one can pass of one's short period leisure or rest divinely over a
game of chess,carroms,listening to excellent music and songs or physical
activity like playing table tennis,volley ball or any other short duration games.
Stress or tension is the root cause for developing ninety percent of diseases .
To avoid stress or tension,cut seventy five percent salts,fats and oils in our food and
Practice daily physical exercises or yoga,pranayam(breathing exercises) and meditation.
Visit atleast once in fifteen days to picnics and once in a quarterly to long distance
site seeing places,which gives tonic to the brain for relaxation.Leisure gives strength
to mind and body and keep them naturally beautiful.The best means of spending leisure
is reading the books,watching natural forests and animals on tv channels and to wonder
in the lovely islands of robinson crusoe or muse through strange and exciting adventures
of john brown at a school.Gladly absorb in the stories of inventions and discoveries to
reminisee.
Thus the value of leisure should never be disgraced and if our leisure time is properly
utilised it will help us to develop our mind and soul.
At the same time one must not forget the excellent value of leisure,
because it leaves pleasing views of one's hard work.
Work without leisure is like racing for a mad career.
The energy of man is limited and if he spends too much of it,he will
soon feel tired.
Indeed man made machines too cannot work for a long stretch of
time and is given rest at regular intervals,otherwise they go out of
order.Human work must be compulsorily be followed by a period of
rest.If rest is not taken then we will be in tension,due to tension we will
loose attention.When attention is lost confusion is developed .Due to
confusion we will feel irritation and spoil personal relation.When naturally
personal relation is lost,ultimately we will not get co-operation and make
things complication.Then our blood pressure (BP) may rise to caution
and have to take medication.
How-ever one can pass of one's short period leisure or rest divinely over a
game of chess,carroms,listening to excellent music and songs or physical
activity like playing table tennis,volley ball or any other short duration games.
Stress or tension is the root cause for developing ninety percent of diseases .
To avoid stress or tension,cut seventy five percent salts,fats and oils in our food and
Practice daily physical exercises or yoga,pranayam(breathing exercises) and meditation.
Visit atleast once in fifteen days to picnics and once in a quarterly to long distance
site seeing places,which gives tonic to the brain for relaxation.Leisure gives strength
to mind and body and keep them naturally beautiful.The best means of spending leisure
is reading the books,watching natural forests and animals on tv channels and to wonder
in the lovely islands of robinson crusoe or muse through strange and exciting adventures
of john brown at a school.Gladly absorb in the stories of inventions and discoveries to
reminisee.
Thus the value of leisure should never be disgraced and if our leisure time is properly
utilised it will help us to develop our mind and soul.
Subscribe to:
Comments (Atom)