The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The conventional private and public key cryptosystems suffer from issues of key exchange and key distribution respectively. A better alternative is to use identity of a user as the public key. Identity-based encryption is well accepted worldwide but its key revocation issue makes it insecure. Attribute Based Encryption, using attributes of a user instead of identity combats these issues. Though many...
Automated classification algorithms have been applied to breast cancer diagnosis in order to improve the diagnostic accuracy and turnover time. However, classification accuracy, sensitivity and specificity could still be improved further. Moreover, reducing computational cost is another challenge as the number of images to be analyzed is typically large. In this paper, a novel Pixel N-gram approach...
The goal of this paper is to determine the object a person visually perceives by analyzing BOLD fMRI data. We use an fMRI dataset and analyze the effects of univariate and multivariate feature selection techniques. By performing dimensionality reduction with Principal Component Analysis (PCA), training with a Support Vector Classifier without a kernel and appropriate smoothing, we obtained a 93.16%...
Planar spoofing is a well researched problem, wherein a high quality planar photograph can be replayed in front of a still camera as a substitute for another individual's face. Most modern day face recognition systems can be fooled by this process, as the perceptual information contained in a photo-of-a-photo, is virtually the same as that of a natural photograph of an individual. Current solutions...
Large number of Sensor nodes which are distributed over a geographical area and connected via Wireless medium is called Wireless Sensor Network. Low energy consumption is a major design constraint for battery operated embedded systems such as wireless sensor networks. In order to reduce energy consumption path selection plays a major role. The proposed system Parameter Based Reliable Routing (PBRR)...
Several methods have been explained for blind source separation (BSS) in the literature. Those methods fail when considered for separation of speech signals. This paper mainly focuses on blind speech signal separation from the observations using canonical correlation. The performance of the proposed method is evaluated in terms of signal to interference ratio (SIR) and time domain waveforms of separated...
Vehicles of today are increasingly being networked via various available networking technologies. IEEE 802.11p advocates Vehicle-to-Vehicle and Vehicle-to-Infrastructure communication via Wireless Access in Vehicular Environments (WAVE) between vehicles in the frequency range of 5.9 GHz. Also, IEEE 802.11j proposes the usage of 4.9 GHz frequency range for Wi-Fi. This paper proposes a dual band antenna...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Today Big data is one of the most widely spoken about technology that is being explored throughout the world by technology enthusiasts and academic researchers. The reason for this is the enormous data generated every second of each day. Every webpage visited, every text message sent, every post on social networking websites, check-in information, mouse clicks etc. is logged. This data needs to be...
In many organizations huge amount of data is generated. Organizations use this data for their own benefit. Data mining extracts useful knowledge from huge data. Association rule mining is a powerful technique to find hidden patterns in large database. The limitation of mining association rules is that some sensitive patterns are revealed from sensitive rules. It is necessary to hide sensitive rules...
Vehicle routing problem (VRP) involves minimizing total route length while visiting each customer location exactly once. In capacitated vehicle routing problem the nodal demand of the vehicle need to be satisfied. For large scale problem use of clustering approach can improve the solution. In this paper an effective modified partition clustering approach has been proposed. The main purpose of proposed...
Online transactions have gained popularity in the recent years with an impact of increasing fraud cases associated with it. Fraud increases as new technologies and weaknesses are found, resulting in tremendous losses each year. Since the transactions associated with e-commerce are large in number, the dataset associated with them is also large; therefore, it requires fast and efficient algorithms...
This paper presents a study on how the performance of Phonetic engine(PE) varies with different set of spectral features selected for it. An exclusive study is carried out with a PE developed in the Manipuri language. Here, we built the PE using phonetic transcriptions and modeling of each phonetic unit by Hidden Markov Model (HMM). The symbols of International Phonetic Alphabet (IPA) (revised in...
Twitter, a well-liked online social networking site, facilitates millions of users on a daily basis to dispatch and orate quick 140-character notes named tweets. Nowadays, Twitter is cogitated as the fastest and popular intermediate of communication and is used to follow latest events. Tweets pertaining to a specific event can be effortlessly found using keyword matching, but there are numerous tweets...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.