The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a faster supervised algorithm (BPfast) for the neural network training is proposed that maximizes the derivative of sigmoid activation function during back-propagation (BP) training. BP adjusts the weights of neural network with minimizing an error function. Due to the presence of derivative information in the weight update rule, BP goes to `premature saturation' that slows down the...
Tongue movement ear pressure (TMEP) signals have been used to generate controlling commands in assistive human machine interfaces aimed at people with disabilities. The objective of this study is to classify the controlled movement related signals of an intended action from internally occurring physiological signals which can interfere with the inter-movement classification. TMEP signals were collected,...
A recent surge of interest is to recognize Bangla characters. Bangla characters represent complex, multidimensional and meaningful visual information and developing a computational model for Bangla character recognition is a challenging job. This research presents a hybrid neural network solution for Bangla character recognition which combines local image sampling and artificial neural network. The...
Gene Regulatory Network (GRN) is an abstract mapping of gene regulations in living cells that can help to predict the system behavior of living organisms. In this research, we use a model based inference method to reconstruct GRN from gene expression data. We use linear time variant model which is of particular interest among all other models because of its capability of discovering the non-linear...
This paper describes an evaluation of Inhibition/Enhancement (In/En) network for noise robust automatic speech recognition (ASR). In articulatory feature based speech recognition using neural network, the In/En network is needed to discriminate whether the articulatory features (AFs) dynamic patterns of trajectories are convex or concave. The network is used to achieve categorical AFs movement by...
The objective of this project is to build a character recognition system, which is able to recognize printed and handwritten character from A to Z. the typical optical character recognition systems, regardless the character's nature, are based mainly on three stages, preprocessing, features extraction, and discrimination. Each stage has its own problems and effects on the system efficiency which is...
This paper presents a simple and computationally efficient method for plant species recognition using leaf image. This method works only for the plants with broad flat leaves which are more or less two dimensional in nature. The method consists of five major parts. First, images of leaf are acquired with digital camera or scanners. Then the user selects the base point of the leaf and a few reference...
This paper presents a multi-drug chemotherapy scheduling method for cancer treatment using multi-objective optimisation technique. Cancer cells, very often, grows resistance to a drug if it is administered alone for a long time and drug resistance eventually causes failure to treatment in most cases. The adaptation of multi-drug treatment in cancer increases the drug performance by reducing the drug...
The paper proposes a new technology to ensure enhanced security of personal identification information or binary images through the use of encryption and multiplexing processes. Orthogonal codes are employed to encrypt the given input images so that multiple encoded images can then be mixed together to save storage space or transmission bandwidth. The multiplexed and encoded image is further encrypted...
Face recognition is considered as a high dimensionality problem. To handle high dimensionality, a numerous methods have been proposed in literature. In this paper, we propose a novel face recognition method that efficiently solves that problem using MPEG-7 edge histogram descriptor. To the authors' knowledge, this is the first attempt to use edge histogram descriptor in face recognition. Although...
Over the years significant research has been performed for automated, i.e. machine vision based fabric inspection systems in order to replace manual inspection, which is time consuming and not accurate enough. Automated fabric inspection systems mainly involve two challenging problems, one of which is defect classification. The amount of research done to date to solve the defect classification problem...
Divergence algorithm is a statistical segmentation approach which finds segmentation point via detection of abrupt changes without any previous information of the acoustic signal. The approach could get high match of segmentation but also gives a lot of false segmentation points. This work introduced a property based on the usage of Zero Crossing Rate (ZCR) in enhancing segmentation by divergence...
Cooperative communication has been considered as a promising method for benefiting the advantages from MIMO (multiple-input multiple-output) system for single antenna mobiles in the wireless network, and many important milestones in this area have been achieved, leading to a flurry of research activity. Especially, cooperative communication in wireless sensor networks (WSNs) has gained so much interest...
To support IP-mobility of networks in motion, IETF proposed Network Mobility (NEMO) protocol that uses various signaling messages to ensure connectivity of the mobile nodes with the Internet. However, there has been no comprehensive cost analysis of mobility protocol entities that considers all possible costs. In this paper, we have developed analytical models to estimate total costs of key mobility...
In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around...
Although more than a decade of research has been done but pure general-purpose MANET is still not available rather than few prototypes within laboratory due to both technical and socio-economic point of view. Lacking in appropriate guidelines for realistic user traces, mobility models, routing protocols and considering real-life challenges, it is difficult to reproduce any typical scenario in reality...
Mobile networks can be formed in bus, train, aircrafts, satellites with a wide variety of on-board IP-enable devices and Network Mobility (NEMO) protocols are required to support uninterrupted services to ongoing sessions. Node mobility has a direct impact on the performance evaluation of various NEMO protocols. However, most of the analysis on mobility protocols used random waypoint mobility model...
This paper proposes a cross-layer design (CLD) framework called channel-aware buffer unit multiple access (C-BUMA) for improving wireless local area network (WLAN) performance. In the framework, the radio propagation (i.e. PHY layer) is combined with the medium access control (MAC) protocol for packet transmissions. By sharing channel information with the MAC protocol, the approach reduced unnecessary...
The IEEE 802.11 MAC layer protocol is designed for single channel. The improvement of network throughput can be done through the enhancement of spatial reuse and the reduction of transmission collusions by the utilization of multiple channels is important. Channel allocation can exploit the multi-channel missing receiver problem besides there are other problems such as the primordial hidden terminal...
Integrating nodes in a MANET to the Internet require either a connection to the Internet or they can connect to the Internet through the Internet gateways or servers. For the second case a node in a MANET has to find out the gateway or server to connect to the fixed nodes in the Internet. End to end packet delay and throughput are strongly dependent on the time needed to discover the gateways. A source...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.