The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Image pre-processing techniques are used to improve the quality of an image before processing into an application. This uses a small neighborhood of a pixel in an input image to get a new brightness value in the output image. These preprocessing techniques are also called as filtration and resolution enhancement. The medical image quality parameters are mainly noise and resolution. The main objective...
This paper possess the fuzzy segmented based performance analysis for the reconstruction of a non linear PET Liver image using fuzzy logic controlled Maximum Likelihood Expectation Maximization (MLEM). The various types of iteration method used are MAP, MLEM and OSEM. MLEM, an iteration approach, has more advantage for reconstructing the Positron Emission Tomography (PET) when comparing with the analytical...
Search engines can return ranked documents as a result for any query from which the user struggle to navigate and search the correct answer. This process wastes user's navigation time and due to this the need for automated question answering systems becomes more urgent. We need such a system which is capable of replying the exact and concise answer to the question posed in natural language. The best...
Cloud computing is a service where storage and computing resources can be accessed on subscription basis. Cloud computing is powered by the concept of virtualization technology. The virtual machines (VM) are hosted in servers so that user's requests are serviced in an optimal manner. The process of moving a running virtual machine or application between different physical machines without disconnecting...
Modelling a PLL based 40MHz integer-N frequency synthesizer to identify and eliminate the reference spurs. The macro-model has a gain margin of 6.64dB and a phase margin of 43.1°, ensuring the stability of the closed loop system with a settling time of 3.85μsec. A notch-type comb filter was modelled to eliminate the periodically occurring reference spurs observed at 20MHz and 60MHz.
A 4-channel Time-Interleaved analog to digital convertor with 12-bits of resolution and sampling rate of 4 giga samples per second for 60GHz applications is designed using MATLAB SIMULINK macro blocks. The interleaving channels of Time-Interleaving analog to digital convertor(ADC) architecture, has a 4 stage Pipelined ADC with a 3-bit flash ADC followed by a 3-bit digital to analog convertor(DAC)...
This paper proposes an injection locked four stage differential ring voltage controlled oscillator (VCO) in which in-phase and quadrature phase of the reference signal is injected after the first stage, for both frequency multiplication and division. The free running frequency of 4-stage differential VCO is 485MHz. Frequency Multiplication is carried out by injecting a reference frequency of 1.25GHz...
This work concentrates on the application of spectrally periodic filtering nature of microring resonators for optical clock/pulse rate multiplication. This is a less complex, low cost route for realization of high bandwidth optical communication systems. Microring resonator is modeled theoretically to extract appropriate dimensions and cross coupling ratios to realize spectral filtering with different...
Rainbow tables are basically huge tables filled with hash values and are used to find required password. Rainbow Table is used by the hackers to find the password by reversing the hashing function. Hashing the plaintext or password is a 1-way function which implies that hash can't be decrypted to find the required password[10]. To authenticate the user a system takes the hash value generated by the...
In this work, our focus is on study and analysis of various clock gating technique and design and analysis of clock gating based low power sequential circuit at RTL level. Virtex-6 is 40-nm FPGA, on which we implement our circuit to re-assure power reduction in sequential circuit. Clock gating is implemented on smaller circuit called D flip-flop and on larger circuit called 16-bit register. The percentage...
Evolutionary Algorithms (EA) are used in many optimization problems such as the Artificial Neural Networks (ANN). But the main challenging issue of using these algorithms is the time taken for computing the function value, implementation and verification of hardware architecture design. In this paper we propose to implement the architecture design of Back Propagation Neural (BPN) networks using Very...
The multiple access technique is suggested for 4G communication system. The various types of multiple access technique are available in the communication system. In this broadsheet compare the enactment of the three most familiar methods constructed on the bit error rate. The three familiar techniques are orthogonal frequency division multiplexing (OFDM), Multi-Carrier Code Division Multiple Access...
ICT has become an indispensable factor in the modern life of every individual. The elements of information and communication technology related sources are perceived as essential parameters in day today operation of banking both in private and public nature while deal with customers and stakeholders. The applications of ICT are augmenting in every sphere of our action includes both consumption and...
The Intensive Care Unit (ICU) is the arena in which many succeed and many others perish in the intense battle between life and death. The systematic documentation of all events here will be invaluable for research purposes. Traditionally these are written on case sheets and maintained in paper form in the Medical Records Department. The advent of Electronic Medical Records (EMR) has not only changed...
In this paper a method to detect two simultaneous bit errors and correct a single bit error during data transmission is devised. The proposed method is developed based on Hamming Code. The key point for the implementation of error-free data transmission is the encoding of the information to be transmitted in such a way that some extent of redundancy is included in the encoded data, and a method for...
Fault tolerance in cloud computing is a grand challenge problem now a days. The main fault tolerance issues in cloud computing are detection and recovery. To combat with these problems, many fault tolerance techniques have been designed to reduce the faults. In this paper, we have proposed a Virtualization and Fault Tolerance (VFT) technique to reduce the service time and to increase the system availability...
All Denial of Service Attacks (DoS) is malignant. Their occurrence in the network affects the entire network performance. Dropping attack either Packet Dropping or Datagram Dropping is DoS in nature. Both these attacks occur corresponding to Transport layer of Mobile Ad hoc Network (MANET) stack which affects the entire functionality of transport layer. In this paper we have discussed a novel kind...
Power dissipation is an important design criterion during the VLSI process flow. Reversible logic is one of the promising fields having a wide range of applications starting from low power VLSI design, fault tolerant circuits, quantum computing to fields such as bio informatics. An ALU may be regarded as the processor's numerical calculator and logical operation evaluator. In this paper a fault tolerant...
Steganography is a data hiding process in which information is secured, while transferring data from sender to receiver. In audio steganography, encoding process is carried out through inactive frames of low bit rate audio streams by performing iLBC (Internet Loy Bit rate Codec). This methodology can be used in applications such as VoIP(Voice Over Internet Protocol), streaming audio archival and messaging...
Infant abduction, swapping, missing, illegal adoptions and kidnapping are increasing issues in the hospitals, birthing centers, health centers and in other places where multiple births occur simultaneously. A biometric system using the footprint of the newborn is proposed to overcome such issues. An online system with specialized preprocessing steps is developed for the images with a normal and a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.