http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
$I_{\lambda}$-convergence in intuitionistic fuzzy $n$-normed linear space
Nabanita Konwar,Pradip Debnath 원광대학교 기초자연과학연구소 2017 ANNALS OF FUZZY MATHEMATICS AND INFORMATICS Vol.13 No.1
The notion of lacunary ideal convergence in intuitionistic fuzzy normed linear space (IFNLS) was introduced by the present corresponding author [P. Debnath, Lacunary ideal convergence in intuitionistic fuzzy normed linear spaces, Comput. Math. Appl., 63 (2012), 708-715] and an open problem in that paper was whether every lacunary $I$-convergent sequence is lacunary $I$-Cauchy. Further, a new concept of convergence of sequences in an intuitionistic fuzzy $n$-normed linear space (IFnNLS) was given in [M. Sen, P. Debnath, Lacunary statistical convergence in intuitionistic fuzzy $n$-normed linear spaces, Math. Comput. Modelling, 54 (2011), 2978-2985]. With the help of this new definition of convergence, the main aim of this paper is to introduce the concept of $I_{\lambda}$-convergence in an IFnNLS, where $I$ is an ideal of a family of subsets of positive integers $\mathbb{N}$. We also define $I_{\lambda}$-limit points and $I_{\lambda}$-cluster points and establish relations between them. Finally we introduce the notion of $I_{\lambda}$-Cauchy sequence in IFnNLS. We improve and extend some existing results and give a positive answer to the open problem mentioned above in the setting of an IFnNLS.
The Study of Cyanobacterial Flora from Geothermal Springs of Bakreswar, West Bengal, India
Debnath, Manojit,Mandal, Narayan Chandra,Ray, Samit The Korean Society of Phycology 2009 ALGAE Vol.24 No.4
Geothermal springs in India, formed as a result of volcanic or tectonic activities, are characterized by high temperature and relatively abundant reduced compounds. These thermal springs are inhabited by characteristic thermophilic organisms including cyanobacteria. Cyanobacteria are among the few organisms that can occupy high temperature aquatic environments including hot springs. In alkaline and neutral hot springs and streams flowing from them cyanobacteria can form thick colourful mats that exhibit banding patterns. The present investigation involves study of mat forming cyanobacterial flora from hot springs located in Bakreswar, West Bengal, India. The important species found are Synechococcus bigranulatus, S. lividus, Gloeocapsa gelatinosa, G. muralis, Phormidium laminosum, P. frigidum, Oscillatoria princes, O. fragilis, Lyngbya lutea, Pseudanabaena sp., Calothrix thermalis, and Fischerella thermalis. Their distribution pattern in relation to physico-chemical parameters of spring water has also been studied. Three cyanobacterial strains of the above mentioned list were grown in culture and their pigment content and nitrogen fixing capacity were also studied. Nitrogen fixing capacities of Calothrix thermalis, Nostoc sp. (isolated in culture) and Fischerella thermalis are 5.14, 0.29, and 2.60 n mole $C_2H_4/{\mu}g$ of Chl-${\alpha}$/hr respectively. Carotenoid : Chlorophyll-${\alpha}$ ratio of four mat samples collected from Kharkunda, Suryakunda, Dudhkunda and bathing pool are 2.45, 1.60, 1.48, and 1.34, respectively. Higher value of Carotenoid : Chlorophyll-${\alpha}$ ratio coincided with higher temperature.
Hiding sensitive information in JPEG
Debnath Bhattacharyya,Ronnie Caytiles,Yvette Gelogo,Minkyu Choi,Tai-hoon Kim 한국정보기술학회 2011 Proceedings of KIIT Conference Vol.2011 No.5
Nowadays, the number data thieves and hackers have increased. There is a need to design a system that enables the internet users to exchange their secret and private data safely across the internet. Steganography is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party, the goal of steganography is to hide the data from a third party. The propose Steganography method hides files in a JPEG image. This paper describes the methods used by the application of this kind of Steganography.
Debnath Bhattacharyya,Eali Stephen Neal Joshua,N.Thirupathi Rao 한국컴퓨터게임학회 2021 한국컴퓨터게임학회논문지 Vol.34 No.2
In the following years, technology has progressed in so many ways that it has provided the cyber society with a resource that only computers can excel at, such as the art of counterfeit of media, which was before unavailable. Deepfakes are a term used to describe this kind of deception. The majority of well-documented Deep Fakes are produced using Generative Adversarial Network (GAN) Models, which are essentially two distinct Machine Learning Models that perform the roles of attack and defence. These models create and identify deepfakes until they reach a point where the morphing no longer detects the deepfakes anymore. Using this algorithm/model, it is possible to discover and create new media that has a similar demographic to the training set, resulting in the development of the ideal Deep Fake media. Because the alterations are carried out utilising advanced characteristics, they cannot be seen with the human eye. However, it is completely feasible to develop an algorithm that can automatically identify this kind of tampering carried out via the internet. This not only enables us to broaden the scope of our search beyond a single media item, but also beyond a large library of mixed media. The more it learns, the better it becomes as artificial intelligence takes over in full force with automation. In order to create better deep fakes, new models are being developed all the time, making it more difficult to distinguish between genuine and morphing material.
DFT processing for Image Data Hiding
Debnath Bhattacharyya,Ronnie Caytiles,Yvette Gelogo,Mi-Jeon Yang,Tai-hoon Kim 한국정보기술학회 2011 Proceedings of KIIT Conference Vol.2011 No.5
The discrete Fourier transform (DFT) is a specific kind of discrete transform, used in Fourier analysis. It transforms one function into another, which is called the frequency domain representation, or simply the DFT, of the original function. In this paper a novel technique, Discrete Fourier Transformation based Image Authentication has been proposed to authenticate an image and with its own application one can also transmit secret message or image over the network.
Debnath, Chhanda,Dobernig, Andrea,Saha, Pijus,Ortner, Astrid Korean Chemical Society 2011 대한화학회지 Vol.55 No.1
가끔 먼 지역 거주자들은 현대 의약품이나 의학 서비스에 있어서 불충분하거나 접근할 수 없다. 그들은 개똥쑥의 선택된 품종을 경작하고 차 제조의 적절한 방법에 따라 식물로부터 차나 달인즙을 만드는 것에 의해 말라리아에 대항한 치료의 관점에서 이익을 얻을 수 있다. 아르테미시닌에 대한 최대 추출 효율을 위해, 개똥쑥의 차제조의 다른 방법들은 발달된 DPP방법을 적용하여 연구되었고 이 논문에 서술되었다. 차는 시간을 다르게 하여 3가지 다른 방법으로 제조된다(굽기, 섞거나 섞지 않으면서 굽지 않기 그리고 마이크로 웨이브 오븐). 결과로부터, 아르테미시닌의 더 높은 농도(84.7%)는 15분 동안 섞으면서 굽지 않는 차 제조법에 의해 도달될 수 있다는 것을 발견했다(R.S.D. 2.34%). 아르테미시닌의 농도는 마이크로 웨이브 오븐에서 1.5분 이상 구울 때 감소한다. 최대한도의 추출(88.9%)은 증류수에서 5%에탄올과 함께 섞는 추출방법에서 가능했다(R.S.D. 2.28%). Sometimes inhabitants in remote areas have inadequate or no access to modern medicines or medical services. They can get benefit in term of the treatment against malaria by cultivating selected breeding of A. annua and making teas or decoctions from the plant materials following the proper way of tea preparation. In order to have the maximum extraction efficiency for artemisinin, different ways of tea preparations of A. annua were investigated by applying the developed DPP method and described in this article. Tea was prepared by three different ways (cooking, without cooking with/without shaking and microwave oven) with different times. From the results, it has been found that higher concentration of artemisinin (84.7%) can be attained by following the approach for tea preparation without cooking with shaking for 15 minutes (R.S.D. 2.34%). The concentration of artemisinin decreases with cooking more than 1.5 min in microwave oven. The utmost extraction (88.9% of artemisinin) is possible to extract by shaking with boiled 5% ethanol in distilled water (R.S.D. 2.28%).