The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data mining is very effective technique for extracting useful information from large amount of structured dataset. Number of algorithms are available that can mine the useful and relevant information. Use of particular data mining algorithm has great impact on the results obtained. An innovative classification algorithm based on History Bits is developed for extracting useful and relevant information...
Cloud based services have become an integral part of our life. These services are based on infrastructure known as a data Center. As the demand for cloud based services increases the load on the data centers also increases and if this load is not properly managed the overall performance of the cloud degrades. This paper proposes a dynamic approach for load balancing a cloud that exploits the presence...
Diabetic Retinopathy that is DR which is a eye disease that affect retina and further later at severe stage it lead to vision loss. Early detection of DR is helpful to improve the screening of patient to prevent further damage. Retinal micro-aneurysms, haemorrhages, exudates and cotton wool spots are kind of major abnormality to find the Non- Proliferative Diabetic Retinopathy (NPDR) and Proliferative...
The most economical operation of modern power systems is to provide the power generation optimally from different units with possible lowest cost by trying to meet all the system Constraints. This work necessitates an answer to security constrained unit commitment (SCUC) problem with an objective function incorporating equality and inequality constraints of the system. The objective of the problem...
The computation of gaze direction is important in modern interactive systems. The displays in real-time monitoring systems depend on spatial and temporal characteristics of eye movement. Research studies indicate the requirement for efficient and novel techniques in human computer interaction. A strong need for gaze tracking methods that eliminate initial setup and attune procedure is required. The...
The online learning gains more popularity in recent days; its key success is delivering content over internet and can be accessed by students from anywhere and anytime. In general, attraction is the quality of arousing interest. Similarly, motivation is the other hand to support for learning. Since, the online learning has less control over students compared to the conventional teaching method. Therefore...
Hand gestures serve as primary tools for man-machine interaction. Hand Gesture Recognition System provides a natural, innovative and modern way on non verbal communication. A wide area of applications in Human Computer Interaction and Sign Language Recognition are available over last decade. This paper is a part of the project that aims at designing a real time system that would recognize sign language...
As we know in urban areas now a day the voting system is getting most complicated only because of the person's identity. They only have the voting card as a proof of identification. So there are lots of chances of fake voting. To avoid this we are developing this project which will store the identity of the voters using android mobile through facial recognition systems. This system will capture faces...
This paper studied the bit error rate (BER) analysis of various Ultra-wide band (UWB) pulses over different channel models using pulse position modulation (PPM) technique. Gaussian and its derivatives, modified Hermite pulse (MHP) and composite Hermite pulse (CHP) are used to transmit data bits in UWB communications. For BER simulation analysis of UWB pulses, earlier proposed additive white Gaussian...
This paper identifies an innovative design for signature verification which is able to extract features from an individual's signatures and uses those feature sets to discriminate genuine signatures from forgeries. An innovative JAVA-PYTHON platform is used for the development. Detailed feature study, algorithm development and feature set verification is carried out during this experiment.
This paper introduces and motivates the use of artificial neural networks (ANN) for recognition of speaker independent phoneme in voice signal. It shows the utilization of neural network's parallel characteristics as well as self-learning characteristics in phoneme recognition using the Kohonen learning rule. It demonstrates the utility of machine learning algorithms in signal processing by trying...
We present an ensemble method to classify Parkinson patients and healthy people. C&R Tree, Bayes Net and C5.0 are used to generate ensemble method. Using supervised learning technique, the proposed method generates rules to distinguish Parkinson patients from healthy people. The proposed method uses single classifier to generate rules which are used as input for the next used classifier and in...
There are many challenges in building mobile web applications today. One of the critical challenges that the developers face is on the “performance” of the mobile web application. With the ever boosting hardware on the mobile phones and tablets, the demand for the best performance on the mobile is something that the developers cannot ignore. Studies after studies have indicated that the probability...
In this paper a scheme for segmentation of unconstrained handwritten Devanagari and Bangla words into characters and its sub-parts is proposed. Firstly, the region above headline is identified by counting the number of white to black transitions in each row, which followed by its separation. Then the characters are segmented using fuzzy logic. For each column, the inputs to the fuzzy system are the...
This paper presents analysis of text based data retrieval system and opinion mining on social networking website. This data is collected from various sources like local machine, email accounts, social networking accounts of respective user. Multiple users can use this system by providing log in credentials. This paper explains significance of Inverse Document Frequency and Term Frequency in Lucene...
In the recent times with the increasing affect of malfunctioning of software developed using conventional approach on the world of embedded computer based systems, the use of model based approach is often advocated as a means of increasing confidence in such systems. Designing and validating real time systems using models helps to improve system safety, and reliability.
For reliable and error free transmission of data in communication systems we require a system employing forward error correction schemes. This paper analyze the performance comparison of Convolution code, Reed-Solomon code as well as concatenation of Convolution code and Reed-Solomon code over optical communication links with interleaving in terms of their probability of Bit error rate and signal...
The Human eyes are the most complicated organ, having ideal and interconnected subsystems namely pupil, iris, lens, retina, cornea and optic nerve. Cataract is one of the major health problems that occur mainly in the old age. Protein layer will develop gradually in the eyes and the lens become cloudy over a long time period. This reduces vision and leads to blindness. There are various Automatic...
In general, security evaluation of communication networks has always been of prime interest and in particular the ever increasing use of mobile phones in the last decade has led to keen interest in studying the possibility of hacking cellular networks. Security comes at an overhead in terms of either CPU cycles (computational overhead), bandwidth (communication overhead) and/or memory. While it is...
Medical imaging has grown tremendously over years. The CT and MRI are well thought-out to be most extensively used imaging modalities. MRI is less dangerous, but one cannot underrate the unsafe side effects of CT. Current study reveals the actuality of escalating risk of cancer as side effect for patients who go through recurring CT scanning. Consequently the devise of low dose imaging protocol is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.