Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, frequency reconfigurable antenna array is presented. Reconfigurability is achieved by using a pin diode as a switch in DGS (Defected Ground Structure) antenna. An antenna array without DGS is acting as reference antenna. Further array is designed with DGS using pin diode. Both of the designs were simulated using CST and they have operating frequency of 2.62GHz, 2.94GHz and 2.52GHz....
Tagging face is the most prevalent topic in today's world. This paper personifies a text based approach called name tag which uses skin color segmentation for face detection. For extraction of skin region we have used RGB, HSV, Cb, Cr color models with different ranges of thresholding. Each skin region is converted into binary image. Then morphological operation and region properties are applied to...
Hashing plays an important role in image retrieval due to its fast search speed and low storage cost. In this paper, a new algorithm called Kernelized Iterative Hashing (KIH) is proposed for image retrieval, which takes account of kernel trick, and gets hash codes by iterative training. The kernel trick is used to map the image data from low-dimension into high-dimension cleverly. In this way that...
This paper studies the relationship between drag coefficient of particle clusters and the particle Reynolds number during settling process using Lattice Boltzmann Method. The interaction among each particle in the cluster was briefly discussed. This simulation calculated the drag coefficient of five-particle cluster with different Reynolds numbers. The drag coefficients for the particles at different...
Images include information about human body which is used for different purpose such as medical examination security and other plans Compression of images is used in some applications such as profiling information and transmission systems. Regard to importance of images information, lossless or loss compression is preferred. Lossless compressions are JPEG, JPEG-LS and JPEG2000 are few well-known methods...
In EEG Electroencephalogram signals Artifacts records are originated due to various factors as line interference, EOG (electro-Oculogram) and ECG (electrocardiogram). These noise sources upsurge the striving in analyzing the EEG and to procurement clinical information. Therefore, specific filters design is obligatory to diminution of such artifacts in EEG records. This research work anticipated an...
Massive Open Online Courses (MOOCs) have commanded considerable public attention due to their sudden rise and disruptive potential. As a very promising area, the biomedical world offers the integration between several domains, complementing medicine with engineering topics. This work has been focused primarily over a MOOC delivered in Spanish, covering the introductory ideas of biomedical engineering...
Recognizing faces in presence of illuminations, pose, facial expression variations in controlled as well as uncontrolled environments remains one of the most challenging aspect. In this paper, we propose a novel recognition methodology which deals with challenges of face recognition to obtain robust and efficient recognition. The framework is based on extracting discriminant statistical features from...
In recent years, people have paid more attention to the shadow detection of moving target in video surveillance system. The shadow will directly affect the accuracy of moving target recognition, and do adverse effects on the subsequent processing such as target segmentation, target extraction and target tracking. So shadow elimination is an important part of intelligent video surveillance system....
Handwritten Recognition and Archaeology are significant facts of antediluvian epoch and scripts which are not easy to learn. For example, Pali written in Sinhala, Khmer, Burmese, Devanagari, Lao and many more which are having prodigious influence in the Buddhism culture since they hoard the lessons. Discussions in this paper portray need of ancient scripts to be recognized. Recognition of Akkhara-Muni,...
This paper deals with a cubic B-Spline interpolation technique to shed the impulse noise and preserve the edges in MRI images. MRI images play a vital role in diagnosis and treatment in many specialties such as neuro-imaging, cardiovascular, musculoskeletal, liver & gastrointestinal MRI etc. To remove the impulse noise, a thresholding based two-step process is adopted. The proposed method operates...
Fatality due to road accidents are increasing with the increase in population and number of vehicles. Intelligent systems are developed to counter act the loss due to road accidents. The paper proposes one such method to counter the accidents by the implementation of pedestrian detection by the use of LBP histogram and HAAR-like features. LBP histogram are used for cross checking the HAAR-like features...
In this work, we designed a Visitor Counting Machine (VCM) in terms of power efficient circuit using family of three different IO Standards which are LVTTL, Mobile DDR, HSUL 12. These three different IO Standards are compared with each other on the basis of Clock power, Logic power, Signal power, IOs, Leakage power and Total power consumption to search the most power efficient one. In order to find...
In order to reduce the noise content of the fiber optic gyro (FOG) output signal, and to improve the zero drift index of the FOG, the paper uses the programmable logic device FPGA. The LMS algorithm is analyzed and studied, and it is realized by Verilog language programming. The thought of the paper is based on classical finite state machine. Compared with previous programming algorithms, it has a...
This paper elucidates the replicating of a human brain which is energy efficient. The power consumption factor has been highly focused in this research. Attempts have been made to study those conditions at which the consumption of power is minimum. An artificial human brain is advantageous over the real brain due to the fact that it has a higher accuracy, it can perform those rigorous calculation...
Evolutionary algorithms are efficient algorithms for solving the most complex optimization problems of the current era. Differential Evolution (DE) is a simple population based evolutionary algorithm under this category. As shown in literature, c omparative to exploration of the search space, DE is less capable of exploiting the existing solutions. Therefore, DE is very much expected to skip the true...
Segmentation technique is used for analysis and diagnosis of tumor in MRI Brain image. The paper presents Modified Fuzzy C Means with Optimized Ant Colony Algorithm for segmentation of brain tumors in 3D magnetic resonance images. In this paper, the image segmentation is obtained by using Modified Fuzzy C Means with Optimized Ant Colony Algorithm using Min - Max Ant System. The proposed methodology...
Now the method on looking for the queen bee is not only workload-intensive, time-consuming but also low-efficiency. In order to locate the queen bee in the hive in real time, a localization system was designed under visual studio.net platform by using magnetic localization technology. The system detected the measurement of the magnetic field produced by the permanent magnet, collect the pre-treatment...
Most steganography algorithms are weak against attacks like visual and statistical but among all steganography algorithms F5 algorithm is more robust and secure. It can be more efficient if we reduce the encryption and decryption time and improve the embedding capacity. In this paper we present a better F5 algorithm with less encryption and decryption time and higher embedding capacity with the help...
This paper proposes an adaptive network-based fuzzy inference system (ANFIS) based forecasting method for short-term wind power forecasting. An accurate forecasting method for power generation of the wind energy conversion system (WECS) is urgent needed under the relevant issues associated with the high penetration of wind power in the electricity system. To demonstrate the effectiveness of the proposed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.