The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Optimization algorithms based on evolutionary techniques have been applied for the optimal design of the linear phase digital FIR filter for better control of the parameters of it. The coefficients of the actual filter are optimized by these algorithms to approximate the frequency response of the desired filter. In this paper, an improved Teaching-Learning-Based Optimization (ITLBO) algorithm is applied...
Man made machine has made the world dynamic as the universe of digitalization has arrived making an accounts unimaginable. Anything taught to be is unthinkable and can be turned to conceivable inside our own particular safe place keeping the data secure. This has been conceivable with the assistance of web crawler. The paper clarifies Google's new calculation HUMMINGBIRD which thought to overwhelm...
The objective of despeckling an ultrasound image is to smoothen the homogeneous areas while preserving the edges and structural information so that the diagnostic features present in the image are highlighted. In the present work, different despeckling methods i.e., methods based on local statistics, median filtering, geometric filtering and anisotropic diffusion have been applied on a comprehensive...
The manually traced continuous wave Doppler (CWD) echocardiographic images are used in estimating the severity of valvular abnormalities. Manual tracing is a time consuming activity embedded with inter- and intra-personal variations. To address this issue an automatic delineation technique based on texture filters is proposed in this work. The outer boundaries of the CWD images reflecting aortic regurgitation...
The rising gap between the data and the user that leads to the challenges for the volume, variety, velocity, veracity needs some innovative tools to be managed. Every year the data scientists are commanding on various practices with the data sets that are created exponentially across the world. It has become a crucial issue. Hence a smart learning for big source database is required. Here some value...
In our approach to find a suitable means for accessing and traversing a graph with edges that have the some alternating weight assigned to them. We studied combinational properties of graphs, thus allowing us to come to a newer and easier method to fully traverse a dynamic graph that stimulates the real-time environment with the weight upon its edges changing continuously. Our approach yields a fully...
Wireless sensor networks (WSNs) consist of small nodes with sensing, computation and communications capabilities. Due to the limited processing power, and finite power available to each sensor node, regular ad hoc routing techniques cannot be directly applied to sensor networks domain. Thus, energy-efficient routing algorithms suitable to the inherent characteristics of WSNs are required. The hierarchical...
In this paper we are investigates MHD mixed convection flow in a two parallel-plates vertical channel with reference to laminar, thermal and hydrodynamical developing flow of Newtonian fluid. The boundaries are considered to be isothermal with equal temperatures. The governing equations are solved by finite volume method. Also, their dependence upon certain material parameters have been studied. Velocity,...
This paper provide a variety of services through multiple service classes where each service class will provide a different performance in terms of response time. These service classes will be designed to provide appropriate levels of service to user applications. Different classes of services and the packets between different classes are classified as per the application request and study and analysis...
Digital revolution led to shift from the industrial age to ICT age. Cloud computing is one of the important innovation of the digital revolution. It is a new paradigm for hosting and delivering services using standard protocols of the Internet. It also provides the capability to utilize scalable, distributed computing environments within the confines of Internet with minimal management effort while...
In nanometer design pattern, leakage power has a basic need of total power. Consumption of power have been increased as a priority in the aspect of design for every Integrated Circuits(IC). To an added note is a fundamental arithmetic operation is used frequently in many large scale as well as very large scale integration application oriented DSP and microprocessor designs. The Full adder circuit...
Wireless Sensor Networks (WSNs) are gaining lot (lots) of attention by the researchers from worldwide due to application capacities expanded day by day. WSNs are formed by tiny wireless sensor nodes, which are a type of tiny computing devices with resource, constrained in nature. These computing devices are operated by batteries or some kind of ambient energy sources. The objective of this research...
To improve the performance and speed of Digital signal processing operations such as FFT (Fast Fourier Transform), DCT (Discrete Cosine Transform) and FIR (Finite Impulse Response). We can implement the arithmetic operations in a fused manner. By direct recoding of the sum of two numbers in Modified Booth, the Add-Multiply operator have been fused together to reduce the power consumption, hardware...
Embedded systems programming often involve choosing the worst case static memory allocation for most applications over a dynamic allocation approach. Such a design decision is rightly justified in terms of reliability, security and real time performance requirements from such low end systems. However with the introduction of public key cryptography and dynamic reconfiguration in IP enabled sensing...
Every complex and powerful system we see around us are real time embedded systems. They are real time because they are intended to respond within the time limits. In safety critical embedded systems like medical, railways, nuclear, space and aerospace we need qualified hard Real Time Operating System (RTOS) as failure to deliver timely results in catastrophe. Some of the qualified RTOS for critical...
In this highly digitalized world, maintaining the security of confidential data poses to be a serious challenge. One of the security policies, that can be implemented here is encrypting the data before sending it through any communicational channel. This may attract the attention of several hackers since it is portrayed as encrypted. In this context, we have steganography as an emerging area, which...
In the present paper different weighting techniques for design of linear, equally spaced smart antenna systems (SAS) are examined. The main focus of the paper is to perform comparative analysis of weighting techniques which are used in harmonic analysis to reduce undesirable effects related to spectral leakage. The weighting technique is incorporated in a SAS that adapt the beam pattern to match the...
Fog is one of the major sources of accident. It is the natural phenomenon which reduces the contrast and fades the colors of objects in the scene with respect to their distance from the driver. It results in poor visibility and thus brings great difficulty in driving, object identification, object tracking and monitoring in outdoor images. As a remedy to these problems we have proposed an algorithm...
Data mining is branch of computer science that delivers valuable information hidden in large volumes of data. The success of data mining depends on the quality of data and the algorithms used to extract information. A large number of tools and techniques have been developed for the purpose. Soft Computing methods have also emerged as a powerful tool for data mining as soft computing is tolerant to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.