Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Retrieval of images using visual features is a hot research field in image processing used in various utilizations like in the business field, medical image, geographical images etc. In this research work, we propose and implement a fused approach for image retrieval technique using HSV Histogram color feature, LBP and SFTA texture feature of an image. Standardized Euclidean distance is operated as...
Now a days, a great attention has received for content-based image retrieval by the researchers. It is very popular and interesting topic of computer vision. The basic requirement of content based image retrieval is to extract the appropriate information from the large image repository corresponding to query image on the basis of contents with better system performance. But, in the development of...
Computer science is involved to the greater extent in agricultural and food science these days. Many Artificial Intelligence and soft computing techniques and technologies are used for classification and defect detection of various products and thus helps in Better quality product for the end users. In this paper we focus on the standing of Arecanut in global and Indian market and usage of computer...
Ultrasound imaging is an indisputable image modality for clinical purposes. Unfortunately, it comes with the inherent speckle noise which results in the degradation of the texture information in these images, thus making the diagnosis harder. This paper proposes a new approach for despeckling the ultrasound images combining the multiscale anisotropic diffusion model with the non-subsampled shearlet...
This paper aims in presenting a thorough comparison of performance and usefulness of de-noising techniques, belonging to scale-space domain. Multi-scale Transform (MST) based image de-noising techniques overcome the limitation of Fourier based methods, as it provides the local and detailed information of non stationary image at different scales, which is necessary for de-noising process. The MST based...
Diabetes is a disease that reduces the human body's ability to store and regulate sugar. This disease develops due to excessive intake of food with higher sugar, excessive work pressure or unbalanced routines lacking in proper diet. Diabetes once developed is then harder to overcome and thus effects the human body functioning leading to failure of many human body parts. One of the major problem associated...
In this paper we study single image haze removal techniques on outdoor images for visibility enhancement in foggy weather conditions. Haze removal techniques based on dark channel prior model have used different filters for estimating the transmission. We have studied effect of using different filters along with the fundamental mean and gaussian filters in the visibility enhancement in foggy conditions...
Research on activity based computing has, recently made progress and is growing attention in many real life applications like healthcare monitoring using wearable sensors and development of rehabilitation systems. However there is a lack of overview about the various sensing technologies used for activity recognition. In this paper, we present a comprehensive survey about the various sensing technologies...
This paper of cascaded[4] AES [1][2] suggest symmetrical block encryption using 200 bit sequential plain text and 400 bit key. Algorithm uses 400 bit key which is divided into 2 parts of 200–200 bits providing different keys for each rounds of cascading which will increase the security. Here AES-AES cascading is done which consist of 5 rounds instead of 10, thus it will omit the mix column twice from...
In recent times, user activities on web-based social networks has increased enormously irrespective of time and place that generates a variety of datasets which further offers tremendous scope for both mining and knowledge discovery. Due to a large number of Social Networking websites and interactions among people via these sites, rapid growth in social networks has taken place. Community detection...
A sensor is a device that senses, perceives, or distinguishes and responds to an input from a physical location and provides an output that is human decipherable. As obesity levels all over the world are reaching the sky, especially in the U.S., China, and India, the use of sensors can help in managing rising obesity levels. There are many traditional dietary assessment methods such as doubly labeled...
The size of the Genetic data base is increasing incessantly. Hence the difficultyhas increased not only in storing and managing such huge database but also in extracting information from such gigantic databases. This brings in the need of genetic data compression. Standard compression algorithms fail to compress genetic data. Hence, we require special algorithms for compressing genetic databases....
With the growing popularity of sensors and the advent of Internet of Things (IoT), there is exponential growth in data. Sensors are collecting data for various domains like traffic, predictive maintenance, equipment health, meteorology etc. Mostly, data collected by IoT devices or sensors is of heterogeneous format which is difficult to interpret and integrate. With the rise in applications of sensors...
It is believed that technology will take over the day to day life of human begin. No one can remain isolated from the adaptation of technology. Hence it is the need of the hour to introduce a technology which will do the day to day life tasks in human life with smart and intelligent way. Hence, this paper critically discuss the emergence and progress of Internet of Every Things (IoET) as the next...
The Internet of Things (IoT) is increasingly being recognized by researchers, companies and analysts all over the world as one of the most advanced technologies that has the capacity to revolutionize the behaviour of everything around us. It possesses the potential to not only affect the health, safety and productivity of billions of people but also has a major economic impact. Inspired by the idea...
The paper reports an Internet of Thing (IoT) based health monitoring and tracking system for soldiers. The proposed system can be mounted on the soldier's body to track their health status and current location using GPS. These information will be transmitted to the control room through IoT. The proposed system comprise of tiny wearable physiological equipment's, sensors, transmission modules. Hence,...
Air pollution is the largest environmental and public health challenge in the world today. Air pollution leads to adverse effects on Human health, climate and ecosystem. Air is getting polluted because of release of Toxic gases by industries, vehicular emissions and increased concentration of harmful gases and particulate matter in the atmosphere. Particulate matter is one of the most important parameter...
This paper defines the different categories of dynamic metric which are designed to measure component at run time based on the some parametric values. These parametric values help to define the execution flow of all components required to get the desired result. This paper focuses on dynamic metrics of component integration at run time. The dependency function measure the Component-Usage Metric and...
It is already known that there are many potential advantages of cloud computing and many enterprise data and applications are shifting to hybrid or public cloud. But there are some big organizations that may not shift to cloud computing due to their critical business applications. The share of the cloud computing in the market is far less than it is expected. The security concerns of the cloud computing...
Ransomware is a malware that stealthily gets installed in your device and holds your files or operating system functions for ransom. It restricts you from using your PC or mobile device, by encrypting your files. Paying ransom (through Bitcoins) however, does not guarantee that you'll get your files back. Prevention is still way better than allowing yourself to be infected and then trying to find...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.