The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web has become an open platform where everybody can build and run their applications. Big companies can manage the expenditure themselves. Small company or a single user wants to create web services, better they can rent the computing infrastructure. All the big companies are investing heavily on this Cloud technology. Few notable, important and popular cloud based products are g-mail and yahoo mail...
In today's IT computing era, there is shift to aggregate computing resources into data centers (DC) shared by pool of users. With the increasing popularity of cloud computing, this pool of users are now more global than any-time in the past The resource demand of these users are inadvertently governed by strict “service level agreements”. In this paradigm, data centers' operational energy costs are...
Due to the advancement of VLSI (Very Large Scale Integrated Circuits) technologies, we can put more cores on a chip, resulting in the emergence of a multicore embedded system. This also brings great challenges to the traditional parallel processing as to how we can improve the performance of the system with increased number of cores. In this paper, we meet the new challenges using a novel approach...
Today's Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone's life. The problem is complicated by the fact that one cannot rely on the cooperation of individual servers and routers to aid in the collection of network traffic measurements vital for these tasks. Packet Forwarding Priority can have a significant impact on the performance...
Smart grid is designed to make the existing power grid system function spontaneously and independently without human intervention. Sensors are deployed to detect faults in the flow of power. In the proposed work, smart monitoring and controls are done by intelligent electronic devices. IED's (Intelligent electronic devices) monitors and records the value of power generated, and its corresponding voltage...
Real-time applications such as multimedia streaming and video conferencing have quite stringent Quality of Service (QoS) requirements from the network, because they are more sensitive to available bandwidth and loss rate than non real-time traffic. To provide scalable and simple Quality of Service (QoS) mechanism for multicast services, Probe-Based Multicast Admission Control (PBMAC) scheme was proposed...
In pervasive environment various devices with varying medium of access, mobility and connectivity have different types of services available among themselves. We are in need of a computing scheme which can utilize this limited amount of resources in the network in an efficient way. In this paper, we have considered various aspects of routing to find out the most efficient devices for service provisioning...
Handwriting recognition has been one of the active and challenging research areas in the field of image processing and pattern recognition. It has numerous applications which include, reading aid for blind, bank cheques and conversion of any hand written document into structural text form. In this paper an attempt is made to recognize handwritten characters for English alphabets without feature extraction...
Rough Set Theory (RST), proposed by Z Pawlak, is a new mathematical approach to vagueness and uncertainty. Tools based on RST are found to be useful in addressing data mining tasks such as classification, clustering and rule mining. In RST all computations are performed directly on the supplied data and works by making use of the granularity structure of the data. Association rules, which play an...
Mammography is a well established imaging technique for showing tissue abnormalities of breast and has been proven to reduce death rate due to breast cancer in screened populations of women. The proposed method classifies the breast tissues according to severeness of abnormality (benign or malign) using combined transform domain features. The discrete wavelet transform (DWT) features are merged with...
Digital watermarking is an effective and popular technique for discouraging illegal copying and distribution of copyrighted digital image information, which in turn provides an alternative solution for image authentication. This paper proposes an innovative watermarking scheme in which some pixels are randomly selected from original image, so that all of them have a valid 3 × 3 neighborhoods. A binary...
Melanoma can be cured if it is detected early, so early diagnosis is very important in dermatological practice today. Early and non-invasive diagnosis of melanomas can be done by accurate image segmentation of skin lesions. The medical images, while acquisition are generally bound to contain noise. This paper proposes a robust and efficient image segmentation algorithm using LOG edge detector to extract...
Facial Expression plays a vital role in the identification of Emotions and comprehension level of the students in the virtual classrooms. Expressions that signal emotions include muscle movements such as raising the eyebrows, wrinkling the brow (the forehead or eyebrow), rolling the eyes or curling the lip. Here, we propose an efficient method for identifying the expressions of the students to recognize...
Identification of protein coding regions (exons) in eukaryotic genomic sequences is an active area of research at present. Mapping of symbolic genomic sequences to numeric sequences is the first step required for processing them using digital signal processing (DSP) tools. For DFT-based methods paired numeric and frequency of nucleotide are reported as the best mapping schemes. In this work performance...
With the sophistication in automated computing systems Bio-Medical Image analysis is made simple. Today there is an increase in interest for setting up medical system that can screen a large number of people for sight threatening diseases, such Retinoblastoma (Rb) and Diabetic Retinopathy(DR). Spatial Domain Edge Detection approach needs Gray scale images for feature extraction and highly prone to...
With the increased use of digital images in numerous fields, especially sensitive ones like medicine and military where confidentiality is extremely important, their encryption has become mandatory. This paper depicts our proposed digital image encryption technique which employs two types of non-linear pixel transformation and the traditional Hill cipher which is a Matrix Transformation (MT). While...
Image Processing has a vital role in quality analysis of objects and presumably is one of the best ways of non destructive techniques. This paper aims at detecting flaws if any in the granite blocks by analysis of their digital images. Two common defects, Crack and Mica contamination is studied. The unique characteristics of the defects are studied. To detect the mica contamination k-means segmentation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.