The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses about the application of denoising process for mobile phones. Mobile phones are often used in noisy environments such as noisy street, cafe, or in a moving car/train. The attribute of speech can be degraded by the background noise. The spectral subtraction method is considered to be the popular method of noise reduction in speech signal. The performance of the original speech...
The ever-increasing popularity of the use of larger-volume image database in various applications, it is an imperative to build an efficient retrieval system to browse through the entire database. Our approach relies on image feature that exploit texture features using second order statistical values such as gray-level co-occurrence matrix (GLCM), this feature extraction process is as follows: the...
Due to growing era of internet and the ease of using it, the copyright protection and authentication of contents has become very important issue. For the same purpose digital watermarking has been used over a long time. This article gives a brief idea about the analysis of different watermarking techniques used for web pages. Both the HTML and XML techniques have been discussed along with their merits...
This paper describe about a new methodology to implement Artificial Intelligence, Cloud and Internet of Things in Robots. Now a days, Artificial Intelligence take a main part in the world into robotics. Almost all industries use robots for various works. They were using co-operative robots to make different kind of works. But there was some problem to make robot for multi tasks. So there is a need...
Designing the feedback compensator for the SEPIC (single ended primary inductance converter) converter is quite difficult due to the extreme amount of phase shift in the power stage and occurrence of double resonance. Hence the current mode control, which increases the complexity of the system, is the most commonly adapted for stabilizing the converter. However, the careful observation of the frequency...
Road accidents claim exceedingly high number of lives every year. The victim's life depends upon the mercy of others. The delay of emergency vehicle reaching the accident spot and the traffic in between accident spot and hospital has increased the chances of death of the victim. Tracing the accident spot is the major issue faced by emergency unit. To overcome the drawback we propose a system which...
In many places, the Municipal garbage bins are overflowing and they are not cleaned at proper time. As a result of which the consequences are severe. It includes overflow of garbage which results in land pollution, spread of diseases, also it creates unhygienic conditions for people, and ugliness to that place. There needs to be system that gives prior information of the filling of the bin that alerts...
Quadriplegics is paralysis caused by illness or injury to a human that results in the partial or total loss of all their limbs and torso. Quadriplegics is highly dependent on an assistant for wheelchair movement. It is not always the case where the helper is with the patient all the time, therefore independence is encouraged among the wheelchair users. The eye movement can be considered as a significant...
In this paper we evaluate different supervised methods, we study the impact of different algorithms on deceptive messages. In deception detection, Bayesian Filters are widely and successfully applied for the sake of detecting and eliminating spam but, fail to function well in scenarios where false positives are penalized heavily. In our method we use different classifiers with different data sets...
This paper presents a brief description of a uniformly doped junctionless surrounding gate MOSFET. The proposed device is a thin nanowire has equal doping concentration throughout source, channel and drain region. This device provides very low leakage current, high on current and high on-off current ratio. The absence of the ultra shallow junctions in the conventional MOSFETs makes this device easy...
One of the important sectors of the Indian economy is Industry. The Small Scale Industries (SSI) plays a vital role of the Indian Economy in terms of generation of employment, and base of entrepreneurial which helps to create and share the production. The study held in SSI in press shop, hands-on approach to workplace where material handling table work effectively, by considering the space constraint,...
Nowadays, preservation of digital data is moving toward cloud computing, which is a lot of infrastructure provides data warehousing for systems and individuals. Thus, From the demand of cloud users for the use of Forensic Investigation; digital forensics tool using cloud computing is a new field of study related to the increasing use of information processing systems, networks and digital memory devices...
A new blind speech extraction method consisting of a minimum mean-square error short-time spectral amplitude (MMSE STSA) estimator and noise estimation based on independent component analysis (ICA) is proposed in this paper. First, a computer simulation is performed using the artificial noise whose stationarity could be controlled parametrically and the obtained results indicate that the proposed...
Binaural beats are perceived when two slightly different frequencies of sound are presented to each of the ear. The difference between the two frequencies would be the frequency of the binaural beats. Binaural beats of different frequency ranges were found to influence the brain waves producing cortical entertainment and was reported to affect the subject behavior and cognitive functions. The continuous...
Metamaterials are artificially engineered structures which derive its property due to its cellular architecture and chemical composition. Their structure may be periodic or a periodic in nature leading to either negative permittivity or negative permeability or both, in a given range of frequency. In this paper an Electric-field-coupled (ELC) resonator is studied, its resonant frequency is theoretically...
DNA material is present in all living things and it contains all relative information. DNA material is very long in nature and contains more than 10,000 base pairs. These base pairs contains mainly four element i.e. adenine (A), guanine (G), cytosine(C), thymine (T). To study DNA directly is very difficult task. DNA fragmentation is the separation or breaking of DNA strands into pieces. DNA fragmentation...
Administration of Anaesthesia is important for both surgery and intensive care. The intravenous anaesthetics are widely used to provide rapid onset, stable maintenance, and rapid recovery compared with inhaled anaesthetics. The aim of the project is to investigate a reliable and safe methodology for delivering total intravenous anaesthesia using closed loop control technology and bispectral analysis...
The finger print matching process, the minutiae detection plays a major role to identify the maximum matching point of the finger print of the input image to train the dataset. The image segmentation is based on the thresholding algorithm. By using the thresholding algorithm, the region of interest area is segmented and then the minutiae of the maximum matching point are detected on the region. The...
Security is a critical concern in wireless network. Physical layer security exploits the physical characteristics of wireless channel for secure transmission. The physical layer security approach is a competitive alternative to achieve information-theoretic secrecy. In the area of physical layer security which guarantees confidentiality by using Automatic Repeat Request technique, ARQ is described...
Thyroid is a hormone secreting gland which influences all metabolic activities in our body. The production of hormone is regulated by the feedback loop between the hypothalamus, pituitary -gland and thyroid gland. The most common thyroid problems involve over production of thyroid hormones is said to be hyperthyroidism. Insufficient hormone production leads to hypothyroidism. Thyroid gland area varies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.