The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A pair of L-shaped slot loaded rectangular patch antenna is analysed by using circuit theory concept which exhibits dual resonance behaviour. Two resonance frequencies are at 2.45 GHz and 5.125 GHz (experimental 2.44 GHz and 5.12 GHz, simulated 2.48 GHz and 5.2 GHz). The -10 dB bandwidth of lower and upper resonance frequency is 4.13 % (experimental 3.4 %, simulated 3.51 %) and 8.82 % (experimental...
In this paper, Human Visual System (HVS) characteristics are modeled using Lee and Lu's Fuzzy- BP network for the purpose of image watermarking. The Fuzzy-BP network is trained by 27 inference rules comprising of three input HVS features namely luminance sensitivity, edge sensitivity computed using threshold and contrast sensitivity computed using variance. The Fuzzy-BP network block wise produces...
Finite Newton Support Vector Regression (FNSVR) is a reliable and robust method for regression analysis which unlike other support vector regression methods, converges the computation in a few iterations. In this paper, we have used FNSVR method for embedding and extracting a binary image as a watermark in 8-bit gray scale cover images. Digital image watermarking being a time consuming task, requires...
We present a 6.4 μW electrocorticography (ECoG)/electroencephalography (EEG) processing integrated circuit (EPIC) with 0.4 μVrms noise floor intended for emerging brain-computer interface (BCI) applications. This chip conditions the signal and simultaneously extracts energy in four fully-programmable frequency bands. Functionality is demonstrated by tuning the four bands to important frequency bands...
Requirements hand-over is a common practice in software development off shoring. Cultural and geographical distance between the outsourcer and supplier, and the differences in development practices hinder the communication and lead to the misinterpretation of the original set of requirements. In this article we advocate requirements quality certification using LSPCM as a prerequisite for requirements...
Monitoring movement across national borders is a challenging problem due to several economic and technical issues. Due to the vast size, remoteness and other geographical confines of border regions, technical solutions are necessary to complement the limitations of manpower. In this paper we discuss our research in developing a system for detecting border intrusion activity by combining wireless sensor...
The design of 42 GHz, 200 kW Gyrotron has been carried out using in-house and commercially available software's. A triode type MIG has been designed using EGUN code and three in house developed codes MIGSYN, GINTMESH and MIGANS respectively. A weakly tapered interaction cavity has been designed to excite TE03 operation mode. A software GCAVSYN has been developed to synthesize the cavity geometry and...
Finding the surface of a volumetric 3D object is a fundamental problem in computer vision. Energy minimizing splines, such as active surfaces, have been used to carry out such tasks, evolving under the influence of internal and external energies until the model converges to a desired surface. The present deformable model based surface extraction techniques are computationally expensive and are generally...
Static Random Access Memories (SRAMs) are present nowadays in all CMOS products in large quantities. Besides, they are often very challenging both on process side (due to small dimensions) and on design side (due to performance request). As a consequence, managing their reliability is of prime importance, though it is quite complex due to their overall complexity. This paper demonstrates a full reliability-based...
Recent advances in integrated circuit technology scaling, analog circuitry, and wireless communication have created the possibility for complex low noise, low power wireless instrumentation to be deployed in previously impossible scenarios, particularly in the realm of wireless sensing for biology research and biomedical applications. The generation of portable, autonomous devices made possible by...
Robots play a major role in flexible manufacturing system (FMS) and the performance measure of a robot is one of the critical issues in the design of robotic work cells. Performance measure and selection of robot for an application is usually done based on experience, intuition and at most using the kinematic considerations like workspace, manipulability, etc. This problem has become more cumbersome...
The electronic properties of very thin gallium phosphide nanowires of different shapes were studied using density functional theory in local density approximation. We consider four different shapes of nanowires viz. linear wire, zigzag wire, square wire and hexagonal wire. The geometry optimization and the stability of all nanowires were investigated. We explore the minimum energy configuration for...
Earlier the model suggested was much generalized and simple. It was lacking in clarity about the functioning of its components, which made it difficult to be implemented. In this paper an improved model for the security policy framework is suggested, in which functioning of each component and there interconnectivity is explained clearly. The fitness functions for the system and which parameter can...
In the k means clustering algorithm right value of clusters (k) are initially unknown and effective selections of initial seed are also difficult. In this paper efficient k-means algorithm is proposed and implemented which overcome initial seed problem and unknown number of cluster problem. The algorithm is applied on real BIST server log data and Gaussian dataset to test its accuracy and efficiency...
Extracting classification rules from data is an important task of data mining and is gaining considerable attention in recent years. This paper comprises classification of different types of rule extraction algorithm and their comparative study by considering their advantages separately. These Ant Colony based algorithms called as Ant_Miner have been successfully implemented in various fields such...
In the present work, an effort has been made to propose and implement a new steganographic technique for images by modifying existing algorithms. This technique uses LSB steganography as the basis and randomly disperses the secret message over the entire image to ensure that the secret message cannot be obtained easily from the image. Detailed visual and statistical analysis of the algorithm reveals...
The semantic robots of the immediate future are robots that will be able to find and recognize objects in any environment. They need the capability of segmenting objects in their visual field. In this paper, we propose a novel approach to segmentation based on the operation of fixation by an active observer. Our approach is different from current approaches: while existing works attempt to segment...
Efficient, miniaturized wireless recording is critical for both existing and emerging health-monitoring applications. One important example of this is in the brain interface community, where new technologies allow improved observation and understanding of brain functions. This, in turn, drives the need for ever smaller, lower power, and higher performance circuitry for chronic recording. This paper...
Summary form only given. Time-resolved plasma potential measurements, in HIPIMS discharge with a titanium target and argon sputtering gas, have been carried out using emissive probe with time resolution of 20 ns. Measurements were performed parallel to discharge centre line, above the racetrack, normal to target, at a fixed frequency of 100 Hz, pulse width of 100 I????s, two operating pressures of...
A genetic algorithm based policy management system judges the validity of network events according to the rules defined in the rule base. These rules are either IP addresses or combination of IP address and some other parameters, such as port numbers etc. This paper discusses the design and benefits of rule base which is based on finite state machines. Since whenever a new network event comes, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.