The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Till date, the community evaluation in the field of scientific collaboration network, have been taken place on an individuals' impact. Very less findings have been done on the community detection and community evaluation considering the acquaintances of co-authors. This paper comprises of network in which the database of author's publications is used. The authors are the nodes and they are connected...
Due to advancement within the telecommunication, wireless communication, wireless sensors, and different technologies a replacement field of analysis has been evolved and this space of analysis is termed as Wireless Body space Networks. In WBAN miniaturized device nodes are planted within the blood stream or on the flesh. These device nodes are battery dependent, once the battery dies, node additionally...
This paper deals with the problem of classification of vehicles based on their acoustic signatures. Each type of vehicle transmits a particular type of engine sound, which can be used as a basis of classification. The samples are first collected using a reliable recording device. The signals so obtained are de-noised using wavelet analysis. The frames to be analyzed are selected using a unique energy...
Object tracking is of prime essence and forms the initial step for many applications in computer vision. It is applied in gaming, computer user interaction and many more. In this article, a stereo-camera is used to detect object which makes it a low cost solution for object tracking. It solves the following problems of object tracking — knowing what an object is, which object to track and which not...
The most important goal in image segmentation is extraction and description structural configurations with based on few input features or knowledge of an expert. Traditional techniques for medical image segmentation involve more time complexity thereby developing an obstacle in real time application schemes. This paper presents various ways of medical image segmentation. Image segmentation can be...
In contemporary IT and Internet society, Cloud computing brings a paradigm shift not only for successfully evolving large distributed software applications but also for delivering a number of innovative services and applications. Cloud computing is an umbrella enveloping several models of service, like SaaS, IaaS, PaaS, TaaS. In particular, software testing in/on/over cloud is the focus of this paper...
IOT devices are playing a leading role in most of the wireless networks these days, mostly in network analysis, information gathering and data transmission. But very limited work is done in the field of controlling devices via IOT protocols. In this paper, we are proposing a smart button that would be capable of handling multiple functions of smartphone. These functions includes sending GPS coordinates...
Mutation testing is an approach where mutations are introduced in the program. Each change causes a slight deviation from the original program and is called a mutant. Tests are performed which reject a mutant if its behavior differs from the original. Along with designing new software test suites, it also contributes in evaluating existing software tests. This paper introduces analyses and evaluates...
Teaching Learning Based Optimization Algorithm (TLBOA) is an efficient approach of dealing with linear, nonlinear and multidimensional optimization problems. It depicts the classroom behaviour of teachers and students (learners). The algorithm is divided in two phases, namely Teacher phase and Learner phase. The position update process of learner phase is based on the difference vector of two randomly...
MOOCs are Massive Open Online Courses, which are offered on web and have become a focal point for students preferring e-learning. Regardless of enormous enrollment of students in MOOCs, the amount of dropout students in these courses are too high. For the success of MOOCs, their dropout rates must decrease. As the proportion of continuing and dropout students in MOOCs varies considerably, the class...
Over the last two decades, numerous studies have been explored the relationship between the personality of individual team members and team outcome. Although every software team possess its own climate in order to exchange the knowledge transfer among the team members, it has been considered as the factor have the impact on team performance. Therefore, in this study we conducted an exploratory study...
Public Distribution System is a government-sponsored chain of shops entrusted with the work of distributing basic food and non-food commodities to the needy sections of the society at very cheap prices. It is also an important constituent of the strategy for poverty eradication and is intended to serve as a safety net for the poor people whose number is more than 33 Crores and are nutritionally at...
This paper describes the Automation systems and the design of the effective remote control system which makes life easier, comfortable, flexible and luxurious too. Wireless control is a foremost concern for everyone and this system provides low cost and flexible home automation & intelligent light control system [4]. Automation is not only widely used in industries, but also progressively entering...
Wireless sensor network is a set of independent transducers with communication infrastructure for recording and monitoring at different locations. The monitoring parameters are energy, temperature, humidity, pressure, direction and speed of the node in the WSN. The main challenges of WSN are efficiency, scalability, heterogeneity, reliability, robustness, privacy and security. Many researchers are...
During the past years various fraud detection techniques were proposed and used to reduce fraudulent activities. Selection an optimal fraud detection model becomes keen area of interest for researchers in the field of anomaly detection. Methods and tools for fraud detection model selection which were used in the literature used a limited no of model selection criteria for finding the detection of...
Identity management through biometrics provides huge advantage over traditional systems. This paper provides an extensive review of various biometrics technologies. A wide variety of biometric modalities like finger print, palm print, iris, facial features etc. are discussed in detail. Later these modalities are compared using various parameters. We have also discussed various multimodal biometric...
In today's world, the communication and interaction among the people is through the social networks. Graphically these networks can be represented as the collection of nodes and edges. People belong to different communities depending upon their relations. The community detection in networks is the clustering of networks into communities in such a way that the connections between nodes within the same...
At present telemedicine is widely used in developing countries for its variety of health services. In this paper, we have developed a low cost portable telemedicine tool kit for remote diagnosis of patients. Remote patient monitoring is one of the vital component of any telemedicine services. We have successfully able to collect patient data from any remote locations by using our developed tool kit...
This paper provides the study of various lossless data compression techniques and compares their performance and efficiency using time and space complexity. Data compression is itself a huge field in a computer science and it is used in reducing the size of data by removing the redundant characters or encoding the bits in data. We have used only lossless data compression techniques for compressing...
With more and more people coming online, social media is becoming a medium for opinion sharing. On 18 September 2016, security forces were attacked by a group of four terrorists. In this paper, we study sentiments and survival of tweets post-terror attack by extracting tweets from Twitter. Factors like last retweet, number of retweets, number of favorites are used to study information flow of data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.