The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Iris template classification in unconstrained environment is one of the open challenges in recognizing human through iris biometric modality. The iris template classifier must be robust to the outliers and noise introduced in the individual iris class distribution because of the occlusion, blur, specular reflection, etc. Also, it should perform fast enough, to make its use in real-world applications...
In this paper we propose SEVA (Salient Events for Video Analytics), a framework for accurate detection and localization of salient events from a given video shot. Our proposed method is based on statistical learning theory and models salient event detection as a one-class classification problem. Video frames are split into blocks for extracting both the spatial and temporal features. Given a video...
Sequence alignment is one of the most useful strategies in bioinformatics. Biological sequences accumulate mutation through the process of evolution which eventually transforms the residues in the sequences. Primarily sequence alignment is performed to find the level of similarity of an unknown sequence with a known one by identifying common pattern of residues. The pair of sequences may be of equal...
This work proposes to authenticate offline signatures using a Case-Based Reasoner (CBR). The case base serves as a repository of sets of genuine signatures for which a central point on the n-dimensional global feature space is preserved along with the Inter-Quartile Range (IQR). These signatures are paired off to perform Dynamic Time Warping (DTW) comparison on their respective contours. Metrics generated...
As the population is increasing worldwide, huge need arises to provide proper health-care services. With the advent of modern technologies the need-gap may be augmented. Sensor is one such technology which can be used to enable Internet of Things based health-care monitoring system. In this paper, implementation of such a system is described. In a real time health monitoring system, there are many...
Phonocardiogram (PCG) signals are often corrupted by different types of artifacts which make computer based heart sound signal analysis more challenging. It requires human intervention to select decent quality of signal subsequence that is free from artifacts. In this work, we have proposed a new technique of automatic artifact-free subsequence selection from PCG signal by the application of Discrete...
Spectrum Sensing is a key technology in cognitive radio systems. Since orthogonal frequency division multiplexing (OFDM) is one of the major wideband transmission techniques, spectrum sensing of OFDM based primary user signals is considered in this work. This paper proposes a two-stage scheme-Fuzzy Hypothesis Testing based Sample Covariance Matrix (FHTSCM) for primary user signal detection. Firstly,...
A Delay Tolerant Network (DTN) is prone to security threats, especially the Selfish and Black-hole attacks. In this work, we have taken up these two security issues in a DTN based on an architecture suitable for Post disaster scenario, where mobile nodes move around a fixed destination and communicate messages to it. A co-operative scheme is presented to reduce the harmful effects of these malicious...
A low cost instrumentation system was proposed in this paper to determine the stability of dental implants using Resonance Frequency Analysis (RFA) technique. In the present work, an improved system has been described which provides a microcontroller based tracking of the change in resonance frequency (RF) when the dental implant is dipped in a hardening dental plaster mixture. In order to do so,...
Suitable analysis of microarray dataset can unlock the mystery of the origin of many dreaded disease like cancer which can subsequently be investigated for its rectification, resulting into search for drug design. A critical challenge of the post-genomic era is to find out the cancer causing genes that induce changes in gene expression profiles in the microarray dataset. Various algorithms based on...
LDPC codes represent a class of codes for a wide variety of modern day coding applications including wireless communications and also some aspects of Cryptography. The general decoder for these codes, the Sum-Product algorithm can be viewed as a nonlinear dynamical system and has been shown to exhibit bifurcations and chaotic phenomena in the low and waterfall SNR zone in an AWGN channel. It has been...
A computational grid environment consists of several loosely coupled heterogeneous resources though a network. The resources may geographically reside in any part of the planet and its interaction with other components in the grid is independent of its location. The grid generally follows a Client-Broker-Resource System, in which the broker acts as an intermediary between the clients and the resources...
The most important issues in the Internet are congestion control. Queue management is an important part to provide better link utilization and fair service of buffer at the Internet router so as to control the congestion. To provide this we can implement different queuing techniques at the Internet router where TCP is used as transport protocol or we can use eXplicit control protocol (XCP). Our aim...
Information transmission in a neuronal axon is based on electrical processes, which may be compared with the flow of a potential in a dielectric medium inside a cable. Commonly, this wave transition is described by a telegrapher's equation & used extensively in structural analysis & modeling of a neuron. In this paper, a three pronged approach was adopted to investigate the relation...
It is critical to deploy human resources at the right time in software maintenance projects to deliver varying workloads under the committed Service Level Agreements (SLA). This is quite challenging considering the fact that human resources come with different skill-set, learning curve and productivity. Again, keeping resources longer than necessary makes the project expensive and uncompetitive. We...
Microarrays help in storing gene expression data from a cell. Each microarray describes features of each cell. The rows in microarray represent the samples and the columns represent the gene expression level of the cell. Microarray data is of high dimension due to which classification using conventional methods becomes tedious and inefficient. Therefore, reducing the dimension of long feature vector...
Text clustering is widely used for creating clusters of the digital documents. Selection of cluster centers plays an important role in creating clusters of the documents. In this paper, we use artificial bee colony algorithm (hereinafter referred to as ABC) to select an appropriate cluster centers for text documents. The ABC is a swarm intelligence based algorithm inspired by intelligent foraging...
In this paper an adaptive partial image encryption technique has been proposed based on Chaotic Map generation. Gray scale image is decomposed into its corresponding binary eight biplanes. Among the biplanes, the significant biplanes are determined for scrambling. All the biplanes are encrypted and scrambled by applying Pseudo Random Binary Number Generator using the recurrence relation of skew tent...
Software evolution prediction has been one of the objectives in the past studies on open source software. A perusal of the existing research in this area shows ARIMA modeling as the most frequently used prediction procedure. This paper analyses the ability of a method of prediction based on fuzzy time series to predict the next state of data. The data set is related to commit history of three open...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.