Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Electrical energy is now the biggest driving force on earth. The dependence and widespread use of electricity has its equivalent pros and cons. Thus modernization of the traditional grid system in order to overcome the major setbacks is the need of hour. Making use of advanced tools and development of various applications for evolution of conventional system is the major lead for smart grid. Demand...
Automated musical genre classification using machine learning techniques has gained popularity for research and development of powerful tools to organize music collections available on web. Mel cepstral co-efficients (MFCC's) have been successfully used in music genre classification but they do not reflect the correlation between the adjacent co-efficients of Mel filters of a frame neither the relation...
While tapping onto the mobile device capabilities for execution of resource intensive tasks, it has been proven by many studies that the local device resources are unable to completely perform the task execution. Therefore, it becomes imperative that the intra-device resources are put to productive use by offloading the jobs to a remote location for execution. However, in those settings where the...
This paper presents the design of a passive band pass filter with a single phase matrix converter (SPMC) topology used for induction heating. Proposed configuration reduces total harmonic distortion (THD) of the output voltage and therefore, enhances the fundamental output power. Here the sinusoidal pulse width signals are generated and synchronized to avoid commutation problems, occurred in matrix...
Object classification in both images and videos is an important task within the field of computer vision. The process of classifying objects into predefined and semantically meaningful categories using its features is called object classification. Many researchers are working in this area to improve the accuracy of classification and to reduce the dimension of features extracted which are used for...
Software Reverse Engineering scenario would involve software that has been worked upon for years and carries several modules of a business in its lines of code. Unfortunately the source code of the application has been lost, what remains is “native” or “binary” code. Traditional obfuscators work on binary code but they are tedious and do not provide us with a specific obfuscation depending upon the...
The advancement in usage of information and communication technology has changed the operational activities of most organization in recent times. The grown in usage has contributed to the growth in the data that organizations have access to. In the past decade, the growth of these data has further given rise to research and development into computer storage devices and infrastructure. In addition...
Autism is a learning disorder falling in the ADHD (Attention Deficit Hyperactivity Disorder) spectrum, varying from being slightly autistic to severe. The level of autism is judged by a special educator after close examination of the child's activities. This paper presents an algorithm that can automate this assessing procedure. While a game is being played the activity pattern of the player is captured...
Mobile Ad-hoc Networks (MANETs), a recent emerging technology in wireless networks and routing data poses a challenging issue because of it's random variations in the wireless environment. There are many routing criterias such as hop count, the quality of link, congestion, and interference that help in choosing the best route available in wireless networks. The various random changes in the wireless...
In recent years, SRC has received many attentions for classification and identification tasks. This paper attempts to introduce a sparse representation based classification of EEG signal features and identification of associated activities or tasks. It uses wavelet and ICA processing of EEG signal for feature selection and dictionary training. Multiple dictionaries are trained and used for EEG signal...
The performance of the Trench Insulated Gate Bipolar Transistor is of special concern to the Smart Grid community. Here, a novel methodology for the quasi-static behavior of the device is introduced which is based on a firmly established law of classical thermodynamics, viz., the minimization of the Helmholtz Free Energy as a function of the internal fields, potential, and charge. The analysis begins...
With the rapid emergence of cloud and its magnificent features such as high availability, reliability and security, a large number of clients are moving to the cloud platform. This migration of clients has led to increased burden on the resources such as CPU, network and memory. Hence, the problem of high power consumption, increased carbon footprints and need for higher cooling effects arose. However,...
Architecture of database servers is one of the important parameters in the performance of web applications. In this paper, a model is proposed for guiding Postgre SQL database server sizing for concurrent users. Coloured Petri-nets are chosen to represent the model that brings out need to change the deployment architecture when the current architecture may not suffice. The focus of the proposed model...
Stored data needs to be protected against device failure and irrecoverable sector read errors, yet doing so at exabyte scale can be challenging because of the large number of failures that must be handled. We have developed and presented RESAR (Robust, Efficient, Scalable, Autonomous, Reliable) storage, an approach to storage system redundancy that only uses XOR-based parity and employs a graph to...
Automatic generation of a time table with multi-level constraints is a challenging exercise. Typically, a timetable problem has many possible solutions in the initial search space, each with a distinct fitness level. In this paper we propose a multi-stage hybrid solution based on an evolutionary algorithm where the initial population is first generated that satisfies all the hard constraints. A user...
Wireless sensor networks are very suitable for remote sensing and monitoring tasks. Sensor nodes being battery operated devices and other limited resources present many challenges for protocols in WSNs. Researches are being continuously conducted with the purpose of combating these issues. Clustering in WSNs aim to distribute the energy load of the nodes by assigning some aggregator nodes or cluster...
A systematic synthesis procedure is given for realizing a class of oscillators. An oscillator basically consists of an amplifier and a passive network N in its feedback path. When gain A of the amplifier is negative real one additional buffer amplifier is required. It is shown that if OA-based amplifier is used for realizing A, the synthesized oscillators are such that their performance is not influenced...
Circularly polarized microstrip antenna realized by cutting unequal arm length U-slot is discussed. In 2.3 GHz frequency band, it gives VSWR and axial ratio bandwidth of 9 and 4%, respectively. In the reported work, a detailed explanation about the working of circular polarized antenna in terms patch resonant modes and the equations/design procedure to realize similar antennas at different frequency...
Biometrics represents the identity of individuals. Physical characteristics like voice, face, fingerprint, etc. are used to recognize individuals. Biometrics are used as a promising method for authentication, but use of these raw biometric data results in some privacy concerns. In this paper, we propose a system model for privacy preserving biometric authentication system for speech, face and fingerprint...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.