The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quality of any application is the end result of how each phase of the Software development life cycle was handled. Multiple teams and techniques are used to achieve a good quality application. Software testing is one critical phase which all are aware. But justice will be done only if all the phases do participate well in their respective ways. Here in this paper we are trying to understand the contribution...
Anomaly detection in a network is important for diagnosing attacks or failures that affect the performance and security of a network. Lately, many anomaly detection techniques have been proposed for detecting attacks whose nature is strange. A process for extracting useful features is implemented in the anomaly detection framework. Standard matrices are applied for measuring the operation of the anomaly...
Feature selection has two important roles in the neuroimaging based classification. It possesses increased classification accuracy by eliminating the irrelevant features and identifying the best features for the discrimination of classes. Many approaches implemented for the feature selection in the context of neuroimaging. The development of feature selection methods is an active area of research...
The matter of great concern is that there exists wider gap between the proportion of the technologies generated by the public agricultural research system and technologies adopted by the farmers in India. One of the vital reasons for such wide gap is due to the lack of an appropriate extension/technology transfer model in agriculture that could establish better linkage between scientists and farmers...
Digital asset management system (DAMS) handles digital assets. For ownership declaration or copyright management, DAMS need to watermark the digital assets. For more efficiency and protection, it is necessary to watermark the digital assets in the compressed-encrypted domain. In compression process, encoding information using fewer bits than original representation and encryption is carried out by...
The recovery of a damaged or altered video file plays a vital role in searching for evidences to resolve a criminal case in digital forensics. Here, a frame-based recovery method for a corrupted video file has been proposed using the specifications of a codec that is used to encode the video data. The existing approaches try to recover a video file with the help of the file structure rather than frame...
Internet plays a main role in our life as our whole life revolves around the internet it become too hard for us to imagine our life without internet. As the use of internet increase the security for all types of data also increases. Early days these securities was provided with the authentication process via password, but now a days use of traditional authentication process is more risky for accessing...
Digitalized video has become an established storage and exchange medium due to the fast development in recording technology. E-lecturing has become added professional popular. The number of lecture video data on the web is growing quickly. Therefore, an additional skillful method for video retrieval within huge lecture video archives is immediately desired. This paper comes close to regular video...
Today data hiding is latest research area in which secret data is hidden in any cover image like audio, video, file and image. Hiding of data is mainly done in medical and military needs. In this paper, it covers many data hiding and compression schemes, but we mainly focus on side match vector quantitation and image inpainting in this paper. The goal of using side match vector quantitation is to...
Big data is a collection of datasets which are so large and complex. Data sets are growing day by day and sharing, transfer, capture, storage, etc. are the main challenges in Big Data. Data mining discovers patterns from a large data set. Data mining with Big data is a complex task. HACE theorem is proposed which finds Complex and Evolving relationships among data. It finds the characteristics of...
The harmonic disturbance that is caused by the double line frequency ripple power in the single phase AC/DC or DC/AC system. This issue can be eased through the installation of bulky electrolytic capacitors in the dc-link. Unfortunately, such passive filtering approach may inevitably lead to low power density and limited system lifetime. Symmetrical full-bridge circuit uses dc-link capacitors to absorb...
This paper describes a novel approach to identify a baby physiological state and its needs. In this work normal infant cry signal of ages 1day to six months old is used. In particular there are fixed cry attributes for a healthy infant cry, which can be classified into five groups such as: Neh, Eh, Owh, Eairh and Heh. The infant cry signal is segmented by using Pitch frequency and the features like...
Data de-duplication has an important role in reducing storage consumption to make it affordable to manage in today's explosive data growth. Numerous DD methodologies like chunking and, delta encoding are available to optimize the use of storage. These technologies approach DD at file and/or sub-file level but this approach has never been optimal for NoSQL DBs. This method proposes data De-Duplication...
Although information extraction, data mining and unification may appear all together in many applications, their implemented interfaces in the majority of the existing systems would be preferred by most of the researchers to be described as serialized integration rather than as tightly coupled integration. The main aim of this paper is to present an agent system that performs unification of data mining...
Spectrum availability of the WiFi network is increased with the help of Cognitive radio (CR). The availability of spectrum is targeted by jamming attack. The jamming attack is addressed with the help of reactive frequency hopping technique. One of the important factors that support the frequency hopping technique is the channel selection strategy. The existing selection strategies are either based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.