The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Emotion recognition of the speaker can impact in the commercial sector to know the valuable feedback. Though many systems have appeared to perform similar task, they do not provide feasible solutions for various parameters, especially have lesser accuracy. Thus an integrated Fuzzy Inference System (FIS) with naïve Bayes classification that provided crisp outputs with greater accuracy. Fuzzy set...
Multi-Speaker activity (MSA) detection helps in detecting the presence of whether the speech signals has a single speaker or multiple speaker speeches in the speech signal. It is easy to calculate the ZCRs (zero crossing rate) of the speech signal and makes a comparison with a suitable threshold (Th). Multi-speaker is declared as and when the zero crossing value exceeds the threshold. The impact of...
Today it is very necessary to protecting Sensitive information from external world. To protecting sensitive information now a day's barcode technique is used. In the real world many industries are using the technique to protect sensitive information form external parties. This paper contains the algorithm which helps to protect the sensitive information. This proposed algorithm is useful to hiding...
Biometrics are used for security purpose. It is used to recognize a person based on their unique characteristics. Among several biometrics, Fingerprint is the most widely used and acceptable biometrics. Biometric system has several advantages over traditional methods. But it can be affected by several attacks. The type 1 attack is performed at the sensor level. Differentiating a genuine biometric...
This paper proposed a new system for image based authentication, where the image is treaded as identification of authenticated user. This system employs approach to store a unique id or password into image and helps to restrict unauthorized user access system. This proposed algorithm is help to eliminate the weakness of password authentication and bypass the risk generated from password authentication...
Developing countries like India needs a significant improvement in infrastructure such as Roads or Highways. Construction of these highways is a costly affair, which can't be invested by the government alone. Normally Public private partnerships are made to construct such a huge projects. The money spent on these projects can be regained by collecting toll from the passengers who use the roads. The...
This paper presents the results of investigations in speech emotion recognition (SER) in English and Hindi based on micro perturbations in pitch, called jitter, as well as very small variations in intensity, called shimmer. Jitter and shimmer are proposed as minimal, reliable and effective features for speech emotion recognition since it is difficult to bring about such minute variations in intensity...
An intelligent tachycardia diagnosis system assists the clinicians in discriminating normal and various tachycardia classes of heartbeats generally in the life-threatening conditions. This paper proposes, a methodology to classify multiclass tachycardia class using Electrocardiogram (ECG) signal. In this work, tachycardia classes are marked using nonlinear transform domain method Empirical Mode Decomposition...
Web Applications used in various organizations performs different types of operations. The functions of these applications are validated through the testing methods. It becomes necessary for the improvement of the functionality and performing of the web applications. The web database application is tested for the database that is being integrated with the application to validate the quality of the...
Image mining is more than just an extension of data mining to image domain. In recent years, the concept of utilizing association rules for classification has emerged. This approach proved often is more efficient and accurate than traditional techniques. This paper presents the concept of association rule mining and applied to the problem of mammogram image classifications. Association rules are obtained...
Biochips are vitally needed in the Biotechnology, since biological analytes (eg. DNA, Proteins, Hormones, etc.) are detected and identified through Biochips. The throughput and speed of the Biochip is necessary to achieve higher which leads to perform many tests at the same time efficiently. A proposed architecture to achieve high performance with low power is Multicore Processing Structure where...
The growing direct or spoofing fraudulent attacks of thieves has motivated us to focus our prime concern on the security over money transaction. The accuracy of biometrics in identification is increasing its usage extensively. The method proposed in this paper focuses on how the money transaction in an ATM machine will be secured by providing personal identification by analyzing biometrics like fingerprints...
The phase of complex transforms like Fourier, Complex wavelet and curvelet of an image is more immune to noise than its magnitude. This article analyses its immunity to additive white Gaussian noise (AWGN) both mathematically and quantitatively. We have derived noise sensitivity (i.e. the rate of change of noisy image phase or magnitude with respect to AWGN magnitude) and used Structural Similarity...
Paddy being the staple food of India is majorly affected by deficiency of primary nutrient elements like nitrogen, phosphorus and potassium. Leaves can be deficient with multiple nutrient elements at a same time. This can alter natural color of paddy leaves. Such leaves are considered as defective. The proposed work is to automate multiple nutrient element deficiency identification of paddy leaves...
The offline signature verification is an automatic verification system that works on the scanned image of a signature. Signature verification uses the gray level measure with varying foreground features. The signature verification is performed by identifying feature vector using local patterns. Before extracting the features preprocessing of scanned images are performed by taking isolated signature...
One of the challenges faced in video retrieval is accurately detecting and extracting the objects in motion. The properties of the moving objects from the query clip are obtained, represented quantitatively, and compared to the corresponding features of the moving objects in the videos stored in the database. If a large number of features match, it generally indicates that the objects are similar...
The current work presents a multilingual speech-to-text conversion system. Conversion is based on information in speech signal. Speech is the natural and most important form of communication for human being. Speech-To-Text (STT) system takes a human speech utterance as an input and requires a string of words as output. The objective of this system is to extract, characterize and recognize the information...
In this paper virtual Wavelength Meter (WM) for Quantum Cascade Laser (QCL) using LabView is presented. Virtual WM has two features, firstly it can provide the emission wavelength of QCL according to change in temperature and current and secondly it provides the necessary parameters values for tuning a QCL at a required wavelength. Virtual WM can make system compact, cost effective, flexible and more...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.