The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Video stabilization is one of the most important enhancement techniques used to remove undesired motion in a video. Combination of global camera motion estimation along with motion separation determines the undesired motion, which is to be compensated to produce a stable video sequence. In this paper a novel method for robust video stabilization is proposed which uses Speeded Up Robust Features(SURF)...
This paper describes the architecture of system level design for the analysis of fiber parameters for one simulation step considering the synchronous and timing issues. The challenge in realizing these systems is not only the hardware but also complex control design that marshals the data flow. In a well-thought-out system level design approach it is necessary in splitting the design into several...
This paper for the first time presents a novel voltage mode (VM) resistor less first order all pass filter employing multiple-output current controlled current conveyor transconductance amplifier (MO-CCCCTA). The proposed circuit employs only one active element and one truly (not virtually) grounded capacitor. The angular pole frequency of the filter can be electronically tuned with the help of bias...
Security has become an inseparable issue even in the field of space technology. Visual Cryptography is the study of mathematical techniques related aspects of Information Security which allows Visual information to be encrypted in such a way that their decryption can be performed by the human visual system, without any complex cryptographic algorithms. This technique represents the secret image by...
Chaotic maps have been widely used in data encryption. However, a number of chaos-based algorithms have been shown to be insecure. The application of BB equation for encryption is reported in a recent article. In this paper, new algorithms based on chaos and BB equation are reported for image encryption and decryption. The algorithms are illustrated through an example. For practical use, VLSI architectures...
Mobile gadgets and devices require seamless internet connectivity for the deployment using Mobile Internet Protocol (MIP). This paper gives an approach on how to construct a MIPv6 test bed environment. The preparation of Linux based personal computers as mobile IPv6 supporting routers, an IPv6 enabled mobile node, an IPv6 enabled corresponding node and installation of RADVD daemon on the Linux machines...
The paper presents an experimental study on a compact Isosceles Trapezoidal Dielectric Resonator Antenna (ITDRA) excited by microstrip line. It is observed that the DRA exhibits a 2:1 VSWR bandwidth of ~11.6 %, a gain of as high as 7.22 dBi and broad radiation patterns with good cross-polar levels that are consistent over the operating band. The antenna covers important application band of ISM: Bluetooth/...
This paper presents a comparison between various RLC-ladder filter simulation techniques using a recently proposed active building block, that is the multiple output current controlled current conveyer transconductance amplifier (MO-CCCCTA). The well known leap frog technique of RLC ladder filter simulation has been used to design the proposed circuits. The active block is used because of following...
Signal transforms are basic components of many signal processing applications. Simplification of transform kernels is advantageous in terms of computational requirements. Symmetries in kernels of existing transforms can be utilized to arrive at new transforms. This paper presents a new transform by using the symmetries of the Discrete Cosine Transform (DCT).
Achieving optimal transmission throughput in multi-hop wireless networks is a fundamental but hard problem. The situation is aggravated when nodes are mobile. Further, multi-rate systems make the analysis of throughput more complicated. In mobile scenario, a link may break or be created as nodes are moving within communication range. `Route and schedule discovery' which is to find the optimal route...
Modeling nonlinear systems using Volterra series is a century old method but practical realizations were hampered by inadequate hardware to handle the increased computational complexity stemming from its use. But interest is renewed recently, in designing and implementing filters which can model much of the polynomial nonlinearities inherent in practical systems. The key advantage in resorting to...
Representative frames are vital and attractive key components in providing Internet users a way to swiftly browse a video clip in different levels of detail, without the need to view entire video clip. Past study reveals that several schemes have been developed for representative frame extraction however all schemes are not decorating the key frames. This paper proposes a new concept called Representative...
In order to achieve the improved blocking performance of wavelength routed WDM networks, wavelength conversion can be implemented at nodes. The paper evaluates the performance of the network in terms of blocking probability with and without wavelength conversion. The analysis and comparison for wavelength conversion and without wavelength conversion has been undertaken for static and dynamic traffic...
Heart-beat detection has found many applications in military and bio-medical areas. Many of these applications focus on the use of impulse based ultra wide band (UWB) radars. This in-turn requires expensive hardware and consumes more power (for a given range) compared to stepped frequency continuous wave (SFCW) radars. However, the micro-Doppler characteristic of human body can be detected by SFCW...
Present day applications require various kinds of images and pictures as sources of information for interpretation and analysis. Whenever an image is converted from one form to another, such as digitizing, scanning, transmitting, storing, etc., some form of degradation occurs at the output. Hence, the output image has to undergo a process called image enhancement which consists of a collection of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.