The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The language class presented here is introduced by Subramanian et al. and includes the class inferred by Makinen's algorithm. We present a modification of the work of Subramanian et al. in order to remove some limitations in the original algorithm.
This paper presents a comprehensive load balancing approach using priority based migration (PBM) mechanism for a trusted small scale distributed computing environment. A process migration server (PMS) that acts as a cluster management server reduces latency time in migrated process execution; leading to no starvation condition for any process thus achieving uniform distribution of load among all the...
Clustering is used commonly in ad hoc networks for hierarchical routing. Size-bounded clustering has been proposed to restrict the maximum size of a cluster so that the routing load, and hence the energy drain, on the clusterhead is bounded. However, all the existing size-bounded clustering algorithms take the size bound as the number of nodes in the cluster. This approach may still result in high...
In this brief, the existing integrators/differentiators have been discussed along with the methods to arrive at the same. The methods include linear interpolation and linear optimization. Classical Integrators derived from the integral approximation formula have been referred to. Genetic algorithm has been applied for further optimization and subsequent design of wideband integrators/differentiators...
In the present work, an effort has been made to propose and implement a new steganographic technique for images by modifying existing algorithms. This technique uses LSB steganography as the basis and randomly disperses the secret message over the entire image to ensure that the secret message cannot be obtained easily from the image. Detailed visual and statistical analysis of the algorithm reveals...
Innovation & creativity are the valuable intangible assets which play a vital role in the transformation of business & society. The emergence of globalization & increasing competition created a threat for the organizations to survive in market and innovation & differentiation became necessity to sustain economic development and competitiveness. Recessions and times of uncertainty present...
Dynamically allocated and manipulated data structures cannot be translated into hardware unless there is an upper bound on the amount of memory the program uses during all executions. This bound can depend on the generic parameters to the program, i.e., program inputs that are instantiated at synthesis time. We propose a constraint based method for the discovery of memory usage bounds, which leads...
In this brief, the existing integrators/differentiators have been discussed along with the methods to arrive at the same. Using those methods, few new Integrators/Differentiators have been designed. The methods include Linear Interpolation and Linear optimization. Secondly, Simulated Annealing Algorithm has been applied for further optimization and subsequent design of wideband integrators/ differentiators...
Working with low frequency universal charge recovery logic (CRL) based NAND gate, the leakage current results in gradual charge up of the output node resulting in an incorrect output. A better implementation of the same circuit which increases the output resistance for the leakage current is used to mitigate this drawback in this paper. Also an analysis of the effect of rise time of clock edge on...
In the era of multi-core, computer vision has emerged as an exciting application area which promises to continue to drive the demand for both more powerful and more energy efficient processors. Although there is still a long way to go, vision has matured significantly over the last few decades, and the list of applications that are useful to end users continues to grow. The parallelism inherent in...
The widespread deployment of Resource Description Framework has resulted in the emergence of a new data storage paradigm, the RDF Graph Model, which, in turn, requires a rich suite of modeling and visualization tools to aid with data management. This paper presents R2D (RDF-to-Database), an effort whose goal is to enable reusability of relational tools on RDF data. R2D aims to transform RDF data,...
Panoramic stitching of static and dynamic scenes is a very important and challenging research area. For static scenes, number of approaches has been proposed so far. The result produced by these approaches provides great similarity between resultant panorama and input images with almost zero seam visibility. However for dynamic scenes, we have found that existing approaches are unable to overcome...
Video matting is defined as the process of changing the background of the video by extracting the foreground image from each frame of a video. In this paper, we propose a video matting technique which uses Ncut segmentation technique to segment the frames. Further, Sobel edge detection technique is used on the segmented frames for detecting edges. Afterwards, Edge thickening process fills up all the...
Natural Image Matting today, is widely used in various disciplines including media, animation industry, computer simulations for research etc. The process of estimating the foreground and background colors with proper alpha mattes has been widely studied and satisfactory results have also been obtained. This paper deals with one such method where a rough estimate of alpha matte in RGB (Red, Green,...
Autism spectrum disorder is an inherently complex phenomenon requiring large studies of many different types to further understanding of its causes. The National Database for Autism Research (NDAR) is being constructed to aid in this effort by providing a means for researchers to share and integrate data. An autism ontology drafted by a group at Stanford is being incorporated for use by NDAR to allow...
In this paper we present a five neighbor stochastic error diffusion technique. The technique assumes a Gaussian process for weights adjustment. Five neighboring pixels are considered for uniform error distribution. The direct and indirect paths from a particular pixel to all of its five neighboring pixels are considered to calculate the weights of the error filter. The distribution of quantization...
With the advent of location aware sensor applications, precise location discovery has become an important technology in wireless sensor networks. Inter Peer communication in the sensor network has been modeled as the graph with constraints defined in terms of proximity. Recurrent grid based voting approach (RGBV) has been introduced to estimate the location of unknown nodes in the network. Voting...
Sophisticated and evolving CAPTCHA breaking algorithms as mentioned in [(K. Chellapilla et al., 2004), (G. Mori et al., 2003), (J. Yan et al., 2008)] have successfully broken currently employed CAPTCHAs. This has resulted in a continuous requirement for more robust CAPTCHAs. In light of this, STC generation scheme was introduced in (A. Gupta et al., 2009) to stay secure for a long time. In this paper,...
Decimal data processing applications have grown exponentially in recent years thereby increasing the need to have hardware support for decimal arithmetic. In this paper, an improved architecture for efficient Binary Coded Decimal (BCD) addition/subtraction is presented that performs binary addition/subtraction without any extra hardware. The architecture works for both signed and unsigned numbers...
Single crystalline tin oxide (SnO2) nanowires have been synthesized by carbothermal reduction of SnO2 nanopowder followed by thermal evaporation of the reduced precursor and growth via the vapor-liquid-solid (VLS) growth mechanism. The nanowires are deposited on single crystalline TiO2 substrates of orientations of (100) and (110) that are coated with a thin film and colloids of gold (Au) catalyst...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.