The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel segmentation algorithm is proposed in this paper for the segmentation of digital images with either bright or dark or both type of features corrupted at very high impulse noise ratios. The specialized pre-processing set-up completely restores the impulse corrupted image and generates all the information required for perfect segmentation. The algorithm works on the marker extractions of the...
The techniques for watermarking of digital images are available to prevent unauthorized distribution of multimedia data image. In this paper, a watermarking scheme is proposed in which the image is decomposed in to wavelet coefficients and a visual recognizable logo and content based watermark information is embedded in the wavelet coefficients. The wavelet coefficients corresponding to the points...
Reprogrammable devices such as field programmable gate arrays (FPGA's) are highly attractive options for hardware implementations of encryption algorithms. This paper proposes compact, memory less, high-speed hardware architectures for the Rijndael AES encryptor/decryptor, with combined data path, resource sharing and logic optimization for novel networking applications. Architectural optimization...
Imaging in medicine has become so common that it is necessary that we have an image compression standard for the medical images. The JPEG 2000 standard is the latest from the JPEG group. The JPEG 2000 is more computationally intensive than the JPEG. In this work we propose a faster implementation of the integer wavelet transform used in the JPEG 2000 standard. We have implemented the integer wavelet...
In the grid-computing environment, resources are autonomous, distributed with varying pricing policies. The grid comprises of the contributors and the users who each play a role for certain compensational benefits. The proposed model is a tender contract type that envisages a real market operating on the supply and demand perspectives of a defined commodity. It allows a decentralized selection of...
In this paper, criterion optimization based image thresholding techniques to perform segmentation using global and local fuzzy statistics are presented. The global and local fuzzy statistics considered for an image are the fuzzy histogram and fuzzy co-occurrence matrix of the image, respectively. A novel way of adapting the membership function, which is required to calculate the fuzzy statistics,...
Performance improvement of a micromachined patch antenna operating at 30 GHz with a capacitively coupled feed arrangement is presented here. Such antennas are useful for monolithic integration with active components. Specifically, micromachining can be employed to achieve a low dielectric constant region under the patch which causes (i) the suppression of surface waves and hence the increase in radiation...
The "Webcam mouse" system has been developed to provide computer access for people with severe disabilities. The system tracks the computer user's movements with a Webcam and translates them into the movements of the mouse pointer on the screen. Body features such as the tip of the user's nose or finger can be tracked. The visual tracking algorithm is based on cropping an online template...
The tolerance against self-phase modulation (SPM) of three differential phase-shift keying (DPSK) modulation schemes viz. conventional DPSK (CDPSK), symmetrical DPSK (SDPSK) and pi/4-DPSK in a 40-Gb/s multi-span dispersion compensated single-mode fiber (SMF) link is studied through detailed numerical simulation. The study takes into account the influence of pulse duty-ratio, tight optical filtering,...
In this work, we propose a constrained autoregressive (CAR) model based Burg method for parametric spectral estimation. CAR Burg method is based on constraining the Mth reflection coefficient of an M-order AR model. The value of this constrained reflection coefficient can be used for controlling the frequency bias and improving the spectral resolution between two close peaks in the spectrum. The method...
Radar tracking of a ballistic target in re-entry phase has been considered in this paper. The motion of the target is evaluated with the assumptions that the drag and gravity are the only forces acting on the ballistic target after it enters into the endo-atmospheric phase. With unknown ballistic coefficient, the problem is actually a case for combined state and parameter estimation. After around...
To accommodate huge traffic load cellular communication systems often use sectorized antennas at the base station in urban area where the co-channel interference is reduced. But as the number of call handover increases the handover algorithm need to be modified so as to respond faster and efficiently. It should also take into consideration the mobile velocity to avoid undue call termination and unnecessary...
The paper describes the architecture and design of the pipelined execution unit of a 32-bit RISC processor. Organization of the blocks in different stages of pipeline is done in such a way that pipeline can be clocked at high frequency. Control and forward of `data flow' among the stages are taken care by dedicated hardware logic. Different blocks of the execution unit and dependency among themselves...
Face reconstruction from available images of a human face is a vital step to achieve various objectives, such as study of human anatomy, intrusion detection, face recognition, content based retrieval, and law enforcement. This paper introduces a novel approach for removal of beard from bearded images using the concept of structural similarity and co-ordinate transformations. The proposed method utilizes...
In this paper, we address the problem of delivery of multimedia services on bandwidth deficient wireless networks for E-learning. We propose a modified continuous rate-scalable wavelet based video compression technique for E-learning lecture videos. The algorithm eradicates spatial and temporal redundancies and exploits the virtues of content based classification for compression. Some of the distinguished...
Pitch shifting finds applications in voice morphing and other speech related applications. We have used complex wavelet transform to obtain and manipulate pitch of the signal. The novelty of our model is extraction of wavelet 'pitch-scale' values, which correspond to average pitch value of signal's voiced frame. The phase matrix corresponding to this scale is altered keeping modulus unchanged. The...
A mobile ad-hoc network is the cooperative engagement of a collection of mobile nodes without the intervention of any centralized access point. It is a temporarily formed infrastructure-less network using mobile nodes like laptops, personal digital assistants and cellular phones. The nodes in the network not only become source or destination but sometimes help other nodes to communicate with each...
MIMO systems have gained immense attention in the recent times for supporting high data rates and reliability. Different MIMO channel models have been proposed in the literature. Geometrically based single bounce one ring channel model is a widely used technique for modeling the channel. Evaluation of the performance of the channel has been widely studied under a uniform linear and circular array...
We propose low density parity check (LDPC) coded optical wireless communication systems with multiple subcarrier modulation (BPSK and QPSK). Upper bounds on the bit-error rate (BER) for maximum likelihood (ML) decoding of LDPC coded systems have been obtained on atmospheric optical channels where the effects of the scintillation exist. We also show that LDPC coded atmospheric optical systems have...
Information retrieval (IR) is the process of retrieving information that is relevant to the users' needs. Data fusion in IR usually combines the various retrieval schemes (strategies) to enhance the performance of the IR systems. Though, the fusion operation successfully combines the merits of all participating member strategies, some of them may affect it's performance. Hence, it is essential to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.