The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Deployment of effective surveillance and security measures is important in these days. The system must be able to provide access and track movement of different types of vehicles and people entering the secured premises, to avoid any mishap from happening.
In recent years evolutionary computation has its growth to extent. Amidst various evolutionary computation approaches, genetic algorithms and particle swarm optimisation are used in optimisation problems. The two approaches find a solution to a given objective function employing different procedures and computational techniques; as a result their performance can be evaluated and compared. The problem...
This paper proposes fuzzy system and neural network approaches to identify the incipient faults in the power transformer using dissolved gas analysis (DGA) method. Using the IEC/IEEE DGA criteria and the gas concentration values as references the fuzzy diagnosis system and neural network are built. The proposed systems are verified using practical data collected from Electricity Board. The fuzzy system...
This paper deals with the fingerprint classification and recognition system, which consists of extracting and matching of minutiae from the input image. The necessity for security in fields such as improving airport security, strengthening the national borders, in travel documents, in preventing ID theft has brought the need to develop an able and efficient method for correct classification of personnel...
In this paper we introduce and study the concept of (taui , tauj)-fuzzy generalized alpha-closed sets, (tau i, tauj)-fuzzy pair wise generalized xi-mappings, where xiisin {continuous, open closed and irresolute}
Large cities with fleet of vehicles require a system to determine location of movement of passenger vehicles at a given time. Vehicle tracking systems can be used in theft prevention, retrieval of lost vehicles, providing traffic-oriented services on lanes. The vehicle tracking systems VETRAC enables vehicle drivers or any third party to track the location of any moving vehicle. Most modern vehicle...
Internet protocol (IP) packet traceback system identifies the origin of the sequence of IP packets when the source addresses of these packets are spoofed. IP packet traceback is usually performed with the help of routers and gateways. Several approaches have been proposed to trace IP packets to their origin. The packet marking approach enables routers to probabilistically mark packets with partial...
The ever-increasing volume in the collection of image data in various fields of science, medicine, security and other fields has brought the necessity to extract knowledge. Face classification/recognition is one of the challenging problems of computer vision. The use of Data mining techniques has a legitimate and enabling ways to explore these large image collections using neuro-genetic approaches...
The problem of identifying the sources of a denial of service (DoS) and distributed denial of services (DDoS) attack is hardest in the Internet security area, because attackers often use incorrect or spoofed source addresses of IP packets. IP traceback system is to identify the origin of IP packets when the source address of these packets is spoofed. In the traceback system, routers are playing vital...
Discrimination of Image Qualities for some applications in Computer Vision is very much important. The process of evaluation of image quality is very difficult as it possesses noise which is fuzzy in nature. Threshold selection for object extraction, for a bimodal or multi modal histogram is still a difficult problem. It is proposed in this paper that based on the four fuzzy measures, namely, linear...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.