The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The previous two decades have seen the successful deployment of Computational Science programs in universities across the globe. These programs are aimed at training scientists and engineers to tackle problems requiring interdisciplinary approaches to finding solutions to scientific and engineering problems and the development of new computing, as exemplified by the co-design approach to exascale...
Among all existing medical imaging modalities such as MRI, CT, PET and SPECT, ultrasound (US) imaging is one of the most widely used in various applications such as ligament injuries, tendon injuries, bone injuries, cardiac imaging, blood flow estimation and obstetrics. Although Three-Dimensional Ultrasound (3D-US) has many benefits such as non-invasive, low cost, portable, real-time and non-ionizing,...
Security over communication is totally essential especially for critical applications such as Military, Education and Financial applications. Unfortunately, many security mechanisms can be broken with new developments in classical computers. Quantum computers are capable of performing high speed simultaneous computations rather than sequentially as the case in classical computers do. In order to break...
Machine translation (MT) research in Indian languages is still in its infancy. Not much work has been done in proper transliteration of name entities in this domain. In this paper we address this issue. We have used English-Hindi language pair for our experiments and have used a hybrid approach. At first we have processed English words using a rule based approach which extracts individual phonemes...
Users of mobile devices face the problem of guarding their gadgets every time they are outdoors. Theft of laptops is the 3rd most frequent computer crime after virus and hacking. The really scary part is that according to FBI, 1 in 10 laptops purchased today will be stolen within the next 12 months. Sadly, only 3 percent will be returned. Occasionally, laptops and mobile devices are also lost due...
The algorithm pertains to creation of a middle level message transmission mechanism between the highly sophisticated encryption technique and the messages transmitted by phonetic alphabet codes. The algorithm suggests two levels in the language with each level varying in complexity and advantages.
Communication has been a major problem for children with cognitive disabilities and spastic children. They are unable to effectively communicate their needs to their parents and caretakers. Modern advancements in communication technology, with increased capabilities of mobile phones, provide scope to design assistive technologies for these children. In this paper, we describe the design of a smartphone...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.