The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sequences having the minimum peak aperiodic autocorrelation sidelobe level one (1) are called Barker Sequences. Such sequences have been used in numerous real-world applications such as channel estimation, radar and spread spectrum communication etc. Unfortunately, the longest known biphase and quadriphase Barker sequences are of lengths 13 and 15 respectively. In this paper Modified Simulated Annealing...
Optimum detection for a direct sequence code-division multiple-access (DS-CDMA) system using conventional MUD is known to have a high computational complexity. For K number of users for instance, the computational complexity grows exponentially with K. The impact of this complexity problem is more serious for the more complicated variants of CDMA such as space time block coded (STBC) multi-carrier...
Stealing cell phone has become the eye catching business for culprits. There should be a reliable method of protecting the instrument from burglars. Our paper proposes a new innovative, reliable, fool proof security measure for cell phones using voice recognition and fingerprint recognition. Our proposal demands neither external hardware nor extra cost. The above methods possess no hardship for the...
Face recognition has found its extensive application in security. An effective method in extracting features increases the efficiency and the recognition rate of the face recognition system and also makes its implementation easier. This paper proposes a two step methodology for improving the recognition rate of the face recognition system. Face images extracted from an acquisition system posses noise,...
Magnetic resonance (MR) imaging has been playing an important role in neuroscience research for studying brain images. The classifications of brain MRI data as normal and abnormal are important to prune the normal patient and to consider only those have the possibility of having abnormalities or tumor. Classification of MRI data along with skull in MR images results in reduction of efficiency to a...
The paper presents a simple approach for detecting frauds by comparing the finger prints a person live and after death. There are changes occur in the fingerprint after the death of a person. A comparative study is made on the samples (both live and dead samples), in order to find any possible changes in the characteristics of the live and dead fingerprint samples. A set of dead samples are analyzed...
This paper deals with design and implementation of a novel handwritten character detection system. Component extraction part is a major block in the system. It is used to obtain the various components in the image for analysis and obtain various positioning parameters. This paper also shows the purpose of using orientation dependent algorithms and their advantage over orientation independent algorithms.
In this paper a method is proposed for the extraction and verification of signatures present on images of bank documents, which include signature localization using variance, signature block extraction using entropy, normalization using desired mean and variance, and verification using a hidden Markov model (HMM) with fixed number of states. Horizontal projection, vertical projection, right envelope,...
The automatic recognition of human faces presents a significant challenge to the pattern recognition research community. Typically, human faces are very similar in structure with minor differences from person to person. Input represents a set of measurements called the pattern vector. Principal component analysis (PCA) approaches to face recognition are data dependent and computationally expensive...
This paper presents a neural network approach for predicting the secondary structure of proteins from amino acid sequences. We have assumed a simple neural network with one input & output layer. Single hidden layer is also considered. Our neural network can be trained to predict the secondary structure of proteins by studying proteins with already known secondary structure by modifying the weight...
Indic script recognition is a difficult task due to the large number of symbols that result from concatenation of vowel modifiers to basic consonants and the conjunction of consonants with modifiers etc. Recognition of Gujarati script is a less studied area and no attempt is made so far to constitute confusion sets of Gujarati glyphs. In this paper, we present confusion sets of glyphs in printed Gujarati...
The paper presents a two stage classification approach for handwritten Devanagari characters. The first stage is using structural properties like shirorekha, spine in character and second stage exploits some intersection features of characters which are fed to a feedforward neural network. Simple histogram based method does not work for finding shirorekha, vertical bar (spine) in handwritten Devnagari...
Assessment of the risk for development of age-related macular degeneration (ARMD) requires reliable detection and quantitative mapping of retinal abnormalities that are considered as precursors of the disease. Typical signs for the latter are the so-called drusen that appear as abnormal white-yellow deposits on the retina. Colour retinal images are used presently to visually identify the presence...
Currently, there are many ongoing researches that are targeted at making robots more human-like. In this paper, we are presenting a flexible algorithm that can allow a robot to write. This novel methodology includes two important phases namely, recognition of characters and writing of characters.Recognition is done via polynomial fitting. From a given text, each character is segmented, divided into...
This paper presents a technique for face recognition that uses Gabor wavelets with five scales and eight orientations to derive desirable facial features characterized by spatial locality, spatial frequency, and orientation selectivity to cope with the variations due to illumination and facial expression changes. The fractional power polynomial kernel principal component analysis (KPCA) method maps...
Orthogonal moments such as Zernike moments and Legendre moments have been proven to have superior feature representation capability and low information redundancy. The number of orthogonal moments to be used as features or numerical attributes to perform any application is minimal due to the orthogonal nature. However, the information possessed by each moment order needs to be analysed to identify...
Multimedia technology provides a valuable resource to enhance practical teaching and learning experience. The ability to combine practical applications with visualization using the virtual instrumentation and multimedia tool is the advantage of technology-based education. The paper reports the implementation of remote access experimentation for technical education. We present an interesting e-learning...
A mobile robot having to navigate purposefully from a start location to a target location, needs two basic requirements: sensing and reasoning. However, the pervasive presence of uncertainty in sensing makes the choice of a suitable tool of reasoning and decision making that can deal with incomplete information, vital to ensure a robust control system. In the existing system the mobile robot navigates...
Motif discovery is an important problem in bio-informatics that involves the search for approximate matches. Various algorithms have been proposed, including exhaustive searches as well as heuristic searches that involve searching only a subset of all the possible solutions. One such often employed method is the genetic algorithm. A genetic algorithm based approach is employed in MDGA, using a single...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.