The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Soft landing means to land a spacecraft on a surface by gradually reducing its velocity to within 0–5m/s. In order to land the spacecraft accurately at the desired landing spot the descent velocity of the spacecraft have to be determined. This paper introduces a vision based velocity estimation of a lander during soft-landing on an alien planet or a satellite. The method estimates the velocity by...
Communication is the basic need of every growing area. The most popular communication medium is Internet. But communication over internet is facing some security problems. So there are many techniques are available to secure the communication. One of the major techniques available is steganography. Steganography is the process of hiding secret data from unauthorized access. Image steganography is...
Direct sequence spread spectrum (DSSS) is an optimal mode of coding for data communication. Spread spectrum coding were used in various communication modes, which gives an advantage of channel interference minimization, with maximum spectrum utilization. With the simplicity in coding efficiency, this coding approach was most effectively used in various application of data exchange. However, with the...
A Novel VLSI Architecture has been developed for Color Mosaic Images. The architecture was designed for implementation on an FPGA. The proposed work presents the integration of Color Image Mosaicing and Encoder Architecture in order to mosaic image/video sequences in real time. Novel algorithms for the image mosaicing have been designed using ASM charts. The image mosaicing architecture is coded using...
The aim of this paper is to bring new contribution and new technology for locomotive especially for WAP-7. Recent advance technology was proposed on locomotive by ABB, ALSTOM, HITACHI, etc. but still there is a disturbance in converters by converting AC/DC/AC. This proposed topology called multilevel inverter using PIC reduces the total harmonic distortion and also while triggering the gates in inverter...
Now a days people are dependent on the internet so security of data becomes a major issue including integrity. Data security is a very important aspect in this digital world. Cryptography came into the picture to provide data security. In cryptography, cryptosystem means a suite of cryptographic algorithms expected to execute a specific security most commonly for achieving confidentiality. Basically...
EEG contains immense information about the brain activity which cannot be understood completely by visual inspection. Powerful signal processing algorithms in EEG analysis can greatly assist the physicians and neurologists to extract such hidden information. It has been found that EEG being a time-varying and non-stationary signal, can be analyzed by non-linear methods. In this paper we tried to evaluate...
Cloud computing has many attractive countenance, because of those countenance; it has become much easier to store large amount of data on it. Hence, preserving the data on cloud helps user to access the data from any place whenever it is needed. Thus due to the vast data, a very big concern emerges i.e. security and privacy. Encryption helps user to prevent their data from illegal access and thus...
We propose a system to identify Bharatanatyam hand gestures or Mudras. This involves a preprocessing stage which does a skin based segmentation to obtain the hand boundary. The feature extraction stage involves obtaining the chaincode of the entire contour of the hand followed by normalization. It also includes extracting the Euclidean distance from the centroid to the outermost boundary of the hand...
With an increase in demand of high data rate near field communication, Visible Light Communication (VLC) has been recognized as advanced and most promising innovation to acknowledge short-run, high speed as well as large capacity wireless communication. In this paper, a prototype of real time embedded system has been proposed, using modest financially accessible light emitting diodes (LED), which...
In today's world, an enterprise user uses quite a number of applications or IT resources which have their own set of credentials. These credentials differ from system to system or applications to applications and needs to be remembered by the particular user. Also, user has to enter the different credentials too again and again whenever re-login to any application is needed. This consumes time and...
Sentiment analysis is all about opinion mining. Analyze emotions, characteristics and opinions of users about any products, topics, or problem. For the public opinion, internet is becoming a spreading and very wide platform where online forums, social sites, blogs and other sites contains opinion and review of people in form of comments and posted messages. Now a days the knowledge obtained from these...
Electro-encephalogram (EEG) is the electrical activity of brain cell groups in the cerebral cortex or the scalp surface. It plays an important role in studying the patient mental condition and Human Machine interfacing. Normal EEG signals can avail in the band of DC to 60 Hz frequencies with a few hundreds of micro volts of strength. Ocular artifacts and muscular noise with similar statistical properties...
The patient information such as x-rays, CTs and MRIs needs to protect from unauthorized access as per the HIPPA act. To provide better security for medical image novel encryption algorithm is proposed. In first phase, row wise, column wise and diagonal wise rotation is performed based on binary key provided. In second phase, four chaotic logistic maps are used to generate pseudorandom numbers which...
This paper presents the novel multimedia human-computer interaction system based on Kinect and depth image understanding. For human-machine interface of the user intent is one of the research directions. Industrialized society goal is the satisfaction of the material quantity and quality, which is the measure of people's living standards. It is the purpose of the man-machine interface design and let...
In these days, Employee turnover has become a major challenge in many software industries. Most often, people suffer from stress due to heavy work pressures imposed on them and competitive spirit of the work completed in their day to day lives. A survey was conducted by software professionals who work for various companies and stress on them was investigated. For this study, the PEGASOS optimization...
Although IoT has been around us for a while, it's a new leading edge in technology which has the ability to connect, communicate and remotely controlling devices via the internet. There is a transition happened from closed networks to the public Internet. Here comes the need of making people understand the need of security monitoring techniques in public network. IoT has been improved the quality...
Frauds related to the ATM (Automatic Teller Machine) are increasing day by day which is a serious issue. ATM security is used to provide protection against these frauds. Though security is provided for ATM machine, cases of robberies are increasing. Previous technologies provide security within machines for secure transaction, but machine is not neatly protected. The ATM machines are not safe since...
Digital Signal Processors are special type of microprocessors with its architecture optimized for signal processing applications. Hardware acceleration has been proved as an extremely promising implementation strategy for the digital signal processing (DSP) and multimedia application domain. An accelerator module can be attached to processor core for enhancing performance. It enhances the performance...
This paper presents efficient object tracking in video sequences using multiple features by embedding mean shift into particle filters. When clutter background and occlusions are present. Particle filtering is used because it is very robust and performs well for non-linear and non-Gaussian dynamic state estimation problems. The image features, such as shape, texture, color, contours, and random motion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.