The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Efficient transmission of multimedia has become a crucial task in next generation cellular wireless and internet protocol (IP) network. Transmission of video at various rates is now a common interest. In various video applications some source symbols are considered to be more important and must be received prior to rest. A packet loss from the important symbols is not encouraged. Recently application...
The subject of Robotics is undergoing paradigm shift, both in its applications and in design perspective. Also it is progressing towards inventing new mechanisms and structures. In one of the approaches, this is expected to be achieved by recreating actuators with artificial muscle by employing new materials. Bio mimicking and unconventional robots are significant because of the design aesthetics,...
In this paper, outage and the average Bit Error Rate (BER) performance of the Orthogonal Frequency Division Multiplexing (OFDM) based full duplex Cognitive Radio (CR) relay network is analyzed in the presence of Narrowband Interference (NBI). Assume the NBI signal to be quasi-static over one OFDM signal. The full duplex relay employs Amplify and Forward (AF) relaying strategy to improve the output...
This paper describes a novel approach for extraction of multiple objects from a given image of a natural scene. In the proposed approach, multiple objects are extracted by the application of saliency detection on the image. We use two distinct approaches for object extraction. One approach uses superpixels on the saliency map. Then the intensity of saliency map in each superpixel is used to compute...
Phase estimation plays an important role in various signal processing areas like Radar, Sonar, power systems, speech analysis, communications and many others. The phase of the analytic form of the non stationary signals can be used to find instantaneous frequency. This paper addresses the problem of simultaneous phase and instantaneous frequency estimation from polynomial phase signals embedded in...
An efficient image encryption algorithm with improved image security has been developed by using chaotic function, deoxyribonucleic acid (DNA) sequencing and genetic algorithm (GA). A chaotic sequence of desired length is generated by using the logistic map function whose initial value is calculated using the secret key. A number of DNA masks are generated and these masks along with the chaotic sequences...
A new fuzzy c-means clustering with non-extensive entropy regularization is proposed in this paper. The purpose of entropy regularization is to form approximate solutions of singular problems in the maximum entropy framework. The non-extensive entropy with Gaussian gain is generally used for identifying non-uniform probability densities as in regular texture patterns. It is thus well suited for regularizing...
The critical issues in a renewable energy based microgrid are ensuring continuous availability of power to the critical loads, and to provide supply to the maximum possible portion of the system under any abnormal conditions by topology management. An intelligent load shedding and fast reconfiguration of the system is therefore necessary in order to serve the critical loads and to maintain a proper...
A reversible data hiding (RDH) algorithm with improved security, which can reacquire the cover in separable manner from the marked stego-image is presented in this paper. In the content owner side cover image is encrypted by deploying user-defined security key derived-chaotic based transposition algorithm. Then the data hider conceals secret data into the encrypted image by perturbing its histogram,...
Green energy sources such as solar — PV, wind, fuel cell, battery, ultra capacitor etc. are highly recommended in hybrid electric vehicle applications. Power electronic converters play an essential role in the incorporation of these green energy sources in to the vehicle system. Design and analysis of a non-isolated dual input DC-DC converter for the integration of nonlinear V-I characteristic DC...
In this paper we present a study of Bit Error Rate (BER), for Digital Audio Broadcasting (DAB) system, employing Coded OFDM with different channel coding schemes. Analysis is carried out for convolutional coded and turbo coded data in an Additive White Gaussian Channel (AWGN) based on different constraint lengths and code generator polynomials used for coding. A comparative study on the computational...
As a result of increase in the installed capacity of wind power systems around the world, providing Low Voltage Ride-Through is one of the prime requirements of Grid Codes. Wind farms are now required to comply with stringent connection requirements which include remaining connected during grid faults, providing reactive power support, achieving system stability and voltage regulation. The paper analyzes...
Wireless sensor-actor networks (WSAN) consist of a vast number of sensors and few actors. Generally, these networks are deployed in an unprotected environment to sense the physical world, and perform reliable actions on it. Hence, these networks are always susceptible to various kinds of passive and active attacks by malicious nodes. The back hole and gray hole attacks are part of active attacks....
Phonetic Engine (PE) is the first stage of automatic speech recognition system that converts input speech to a sequence of phonetic symbols. A baseline phonetic engine is created using Malayalam speech database. A Graphical User Interface (GUI) is developed for the phonetic engine to perform real time recognition of phonemes. It is known that higher level of speech information such as intonation,...
Recently multilevel inverters (MLIs) got wide popularity as it gives much similarity in the output voltage waveform of that of ideal inverter. Many topologies are existed for MLIs. A new topology that gives better performance in reduction of switch count is also there in the field of MLIs. This new topology uses Sinusoidal Pulse Width Modulation (SPWM) as the control strategy. Even though it gives...
A novel ‘I’ shape with vertical slot defected ground structure (DGS) antenna using Multiple Input Multiple Output (MIMO) for wireless application is proposed for 5.8 GHz frequency band. MIMO antenna consists of two symmetrical antenna elements fed with inset feeding technique. Ground plane of both the antenna made defective by using ‘I’ shape supporting with vertical slots. DGS is introduced to improve...
In this paper, we present an optimal monitoring and evacuation methodologies for pilgrims in Arafat area of Makkah with the aid of Wireless Sensor and Actuator Networks (WSAN). In addition to its significant impact, the proposed application has many challenges that need to be tackled. We highlight these challenges and provide a Rings overlay that efficiently contributes to monitoring the area and...
A high degree of robustness is a prerequisite to operate speech and language processing systems in practical environments. Performance of these systems is highly influenced by varying and mixed background environments. In this paper, we put forward a robust method for automatic language identification in various background environments. Combined temporal and spectral processing method is used as a...
Medium bit rate hybrid speech coding schemes have gained much interest in the recent years and many of them have been standardized for various applications. This work characterizes a speech codec in a Compressive Sensing (CS) framework. We mainly demonstrate two aspects 1) Simultaneous compression and de-noising of speech by CS 2) Appropriate quantization of CS measurements to design medium bit-rate...
The real time biometric systems are used to authenticate persons for various applications. In this paper, we propose an efficient VLSI architecture for fingerprint recognition using O2D-DWT architecture and modified CORDIC-FFT. The O2D-DWT architecture is designed using only adders and shifters for high speed operation and is applied on fingerprint image to generate four sub-bands. The optimized Fast...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.