The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Twitter users tweet their views in the form of short text messages. Twitter topic classification is classifying the tweets in to a set of predefined classes. In this work, a new tweet classification Method that makes use of tweet features like URL's in the tweet, retweeted tweets and influential users tweet is proposed. Experiments were carried out with extensive tweet data set. The performance of...
This paper presents an intelligent expert based system ANFISGA for the dosage planning for Type2 diabetes male patients. Even the Type2 diabetes accounts 90% of total diabetes patients the accurate dosage planning for the disease is complicated due to the variations of human body. In this paper two Artificial Intelligence techniques ANFIS and GA were combined. This human genetic algorithm accept the...
A threshold based Schnorr-Euchner (TSE) sphere decoder (SD) is presented in this paper to reduce the high computational burden incur in multiple input multiple output (MIMO) decoding. The proposed method makes use of the probabilistic threshold for SE enumeration to remove the nodes which are most unlikely to be an ML solution. The threshold is chosen using the pruning probability based on noise statistics...
Feature set selection is the process of identifying a subset of features which produces the result same as the entire set. The feature set selection helps in clustering the datasets. In this paper, a Highly Correlated Feature set Selection (HCFS) algorithmis proposed for clustering the data. This algorithm helps in selecting features based on its relevancy and redundancy factors. All the selected...
In computer vision, tracking human pose has received a growing attention in recent years. The existing methods used multi-view videos and camera calibrations to enhance the shape of the object in 3D view. In this paper, tracking and partial reconstruction of the shape of the object from a single view video is identified. The goal of the proposed integrated method is to detect the movement of a person...
Machine learning is a subfield of artificial intelligence that deals with the exploration and construction of systems that can learn from data. Machine learning trains the computers to manage the critical situations via examining, self-training, inference by observation and previous experience. This paper provides an overview of the development of an efficient classifier that represents the semantics...
Although a number of efficient and high-level design algorithms have been put forward for the realization of FIR filter using the least number of arithmetic operations, but they do not take into account the low-level implementation issues which can exactly make a difference to the area and delay in designing of FIR filter. In this paper, at first, we have presented the delay efficient addition and...
With the advancement in the technology, this era of Internet has witnessed a bloom in the Social Networking sites popularity. Social Networking sites facilitate the users with features like sharing personal information, making friends, developing new relationships, giving rise to new privacy concerns, etc., allowing only reliable people in one's network. Here comes in the concept of ‘Trust’. How can...
Recommendation system provides information about the arrival and importance of a newly released movie to their registered user. The pursuit of the users is analyzed from their past history. In this paper, a recommendation system is proposed to recommend rating of the movie to the users. The learning phase of the system takes in the user particulars about the user till-date and his rating towards those...
In the field of cloud computing, energy efficiency plays a major role. This is because the usage of cloud is increasing and so is the cost of energy; and also there is a necessity to reduce the carbon emission which occurs due to the usage of information and communication technologies (ICT). Hence there is a need for energy-efficient technologies that should reduce the overall energy consumption that...
Cloud computing has changed the nature of IT and business. However the adoption issues for the cloud is mainly due to the lack of transparency and control. Also, there are too many cloud service providers in the marketplace offering similar functionalities. In order to support the consumers in identifying trustful cloud providers, Trustworthy mechanisms for selecting cloud service providers is proposed...
Visual tracking is a fundamental key to the recognition and analysis of human behavior. This paper presents an approach to track several humans from video sequences acquired in real time. It addresses the key concerns of real time performance and continuity of tracking in overlapping and non-overlapping fields of view. It represents the human body by a parametric ellipsoid in a 3D world. The elliptical...
As there is an increasing need to share the medical information for public health research, enormous amount of Personal Health Records (PHR's) are periodically collected and shared between two or many sources for research purpose. Sharing medical information about an individual without revealing sensitive information is the biggest challenge. Privacy and security are the two biggest obstacles for...
Sensor cloud is an emerging technology which integrates wireless sensor network with cloud environment. The major issues to be addressed in the sensor cloud are storage and transmission. The existing compression algorithm inappropriate for small size files. The sensor data taken from different sensor are compressed based on their similarity but it is not appropriate when large numbers of sensors in...
Collaborative learning is an online classroom can take the form of conversation between the whole classes or within smaller groups. Moodle (Modular Object-Oriented Dynamic Learning Environment) is a free and open source e-learning software platform, also known as a Learning Management System, or Virtual Learning Environment (VLE). As a web-based tool, Moodle offers the possible way to deliver courses...
Biometrics has wide applications in the fields of security and privacy. Since unimodal biometrics are subjected to various problems regarding recognition and security, multimodal biometrics have been used extensively nowadays for personal authentication. In this paper we have proposed an efficient personal identification system using two biometric identifiers, palm print and Inner knuckle print. In...
Road network detection is the process of detecting and extracting the road network from very high resolution satellite and aerial images. It is essential for many applications like map generation and updating. To do this road network detection, resolution of satellite and aerial images plays an important role. If experts try to label the road pixels manually, it will take more time and will lead to...
The process of automating the question generation consists of many tasks. Selecting the target content (what to ask), question type (who, why, how) and actual question generation are the major issue of Automatic Question Generation. Certain definitions retrieved is available in Wikipedia either directly or is the outcome of executing set of sub queries for each key phrase categories The problem in...
In day today emerging trends utility services, cloud and green computations are playing the major task. The Utilities based paradigm provides many services for general public and other business activities. In the middle end cloud plays the vital role in shifting towards computational paradigm and pays way for users to utilize the resources anywhere at any time. In the current trend green replaces...
This paper proposes a chaos-based image encryption scheme with a permutation-diffusion structure. In this method the encryption is performed in bitwise manner. Mixing process is introduced to modify the pixel intensity values before encryption process. In the permutation stage the plain image pixels are shuffled and in the diffusion stage the generated random bits are exclusive or with the confused...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.