Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In countries such as India with low grid prices, energy firms are offering competitive PPA tariffs by setting up large solar farms. Given lower margins in operating these farms, there is great sensitivity to panels underperforming. To detect under-performance, existing condition monitoring methods compare generated power with an ideal yield calculated based on local weather conditions. Applying such...
Proposed algorithm is a face recognition algorithm from video using Generalized mean Deep Learning Neural Network. Generalized mean provides fast convergence of the feature set and Deep learning neural network is enhanced using wavelet transform as it improves the classification efficiency of the neural network. The performance of the proposed algorithm is evaluated on PaSC and Youtube dataset. The...
Simultaneous algebraic reconstruction Technique (SART) based iterative method play a significant role in the quality of images reconstructed by Computed Tomography (CT). The basic limitations associated with this method include slow convergence, poor visual quality and ill-posedness. To address these drawbacks, SART iterative method is modified in two steps. The first step removes the issue of slow...
This paper contains simulations of a six-pulse Induction Furnace with 500 Hz output frequency and 500V output voltage. Comparison of thyristor based inverter and IGBT based inverter shown in the paper, and simulation of IGBT based inverter is shown because it has higher efficiency, faster switching. Rectifier section is diode based for the simplicity constrain. The model of the induction furnace was...
Unimodal biometric systems have been serving the security demands of real world applications to a great level but these systems show vulnerabilities to certain aspects like noisy inputs, non-universality, intra-class variability and spoofing. To overcome these limitations multimodal biometric systems were developed which use more than one biometric trait for recognition. Iris and Fingerprint were...
This paper presents an efficient face recognition method invariant to slight variation in pose, illumination and background where pulse coupled neural network (PCNN) is used to compute time signature used for feature extraction and generalized self organizing map is being used for classification. The efficiency has been significant improvement by combining PCNN which better resemble human brain neurons...
In MANETs, nodes communicate to each other through multi hop routing, where routes often get disconnected due to random movement of nodes. Recent applications in real world scenario demand realistic networks which can support large number of nodes and hence, the recent researches in MANETs are focused on scalability of these networks, as none of the existing routing protocol addresses the scalability...
In Mobile Ad Hoc Network (MANET), some routing protocols are proposed to hide the identity of node from outside entities that can observe data traffic which can be disastrous in military operations. However, existing protocols which provide full anonymity of source node, destination node and routes are vulnerable to malicious activités. The anonymous protocols hide the identity of the malicious node...
Several recent advancement in field of technology has created a various range of systems or applications that requires reliable and efficient recognition schemes which can determine the identity of the users and only authorized and legitimate persons are allowed to use the service or applications. Signature Verification is the most widely used biometrics for authentication purpose. It is a method...
In Halftone Visual Secret Sharing (VSS) scheme, meaningless random shares are encoded into halftone shares taking meaningful visual information which reduces the suspicion of intruders. Most of the halftone visual secret sharing scheme described in literature generate the shares in the form of the halftone image which makes it difficult for intruded to identify the content of the shares, therefore...
Holistic approaches of face recognition are not robust to illumination, scale, occlusion and age variations. Various studies indicate that the performance of holistic approaches degrades as the face database size increases. In this paper, we propose a user specific landmark geometry based approach that assigns weights to different geometrical distances according to their role in face recognition process...
A new image authentication technique using random sequence based secret sharing scheme with a data repair capability is proposed. For each block of image, an authentication signal is generated together with the binarized block content, which is transformed into several shares using the secret sharing scheme. The parameters which have been involved in the algorithm, are carefully selected so that the...
There are many applications in which morphological operations play an important role. Morphology is a very useful mathematical tool or method to be used in image processing. It has many application like edge detection and extraction form images for specific purpose, feature extraction based on the boundary information etc. It has many advantages over other image processing tools like the complete...
Automatic image annotation is the process of assigning relevant keywords to the images. It is considered to be potential research area in current scenario. Annotation to an image can be defined as the information which could describe an image by considering three ways i.e. when these images were taken, what are the different objects available in these images and finally the images belongs to whom...
This paper explores the measuring similarity between the web objects which are one of the fundamental task in information retrieval domain. This paper proposes a framework for improved and efficient web object search based on search domain. The concept of proposed approach defines the similarity between two objects (object can be a link or text content) and retrieve the related links with their content...
There are many applications which use Face Recognition for identification or verification of a person. In this study, a face recognition system based on HMM has been proposed to handle the problem of partial occlusion. Face is represented by eight isolated regions: Hairs, Forehead, Eyebrows, Eyes, Nose, Upper Lips, Mouth and Chin. The non-occluded region in face image of testing and training image...
This paper presents a two stage process for image de-noising and edge enhancement by applying singular value decomposition technique on anisotropic diffused images. The two diffused versions of the input noisy image are generated in the first stage by anisotropic diffusion. The first diffused image is a well smoothed image and the second diffused image is sharp edge detected image. Singular value...
This paper proposes a multiple image sharing scheme for secure communication of multiple images. The proposed scheme is applied for digital information data to provide a secure transmission, in such a way that only receiver get appropriate information. The proposed scheme, secretly generates n number of shares for multiple images by applying the matrix multiplication and matrix addition method with...
An automatic segmentation of leukocytes can assist pharmaceutical companies to take decisions in the discovery of drug and encourages for development of automated leukocytes recognition system. Segmentation of leukocytes in tissue images is a complex process due to the presence of various noise effects, large variability in the images, and shape of the nuclei. Surprisingly, rare efforts have been...
In all biometrics, iris contains rich texture for person identification and has its distinctive advantages because of its large inter-class variability and low intra-class variability. This research provides a fast and robust iris identification system. In this proposed system for iris recognition Daisy descriptors have been used as features which has been modified considering the context of iris...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.