The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the technology become advanced, every field initiate to utilize the advantage of it. Dental field is also one of them. dental x-ray images are very cheap and popular way for dentist diagnosis. now a days so many dental software are available but, having higher coast of purchase. So in this paper we develop a method with coast effective way of finding severity of impacted third molar based on MATLAB...
Nowadays, School buses carry millions of children to the school or from the school. The safety of school children became the most important issue nowadays, as there are many previous incidents, where the child was forgotten in the bus or the child was missing in the bus. Also in some of the cases the bus was hijacked by an unknown person in which, driver and students were killed. To avoid such situations,...
The key functioning of human body depends on liver health. Liver performs numerous metabolic functions that also enable smooth working of other organs. Any form of illness in liver leads to liver diseases. These diseases are of many types out of which the most commonly occurring are hepatitis A, B, C, D and E, primary biliary cirrhosis (PBC), liver fibrosis, liver tumor, alcoholic liver disease, liver...
Communications in general and telephonic conversations often take place in noisy and non-stationary environments. Noise power spectrum is the main issue in designing robust noise reduction methods for speech enhancement. Extended-DATE (E-DATE) which extends the dimensional amplitude trimmed estimator (DATE) is used in noise power spectrum estimation. The noise instantaneous power spectrum can be considered...
. Advancement in the latest technology has made researchers to generate data at a faster pace and collect the data in an efficient manner. Prior to the invention of computers, data collection, storage and processing was a tedious task. Hence, researchers were able to perform the analysis on data samples. But with the rapid development of computer and communication technologies, big data analytics...
Internet of Things (IoT) is network transfer data without human to human and human to machine communication. This project based on IoT (Internet of Things) for Home Automation. Home Automation is a collection of sensor Controller by microcontroller. Using Microcontroller, we can send data into the cloud server then we can share information on Cloud server and mobile app. we use cloud server as Ubidots...
Semantic web facilitates interchange of data of common data formats that enables people to share content beyond applications. Resource Description Framework(RDF) is a key technology that is used as a metadata data model, a method for the depiction of conceptual information. Reification is a prominent concept for making an assertion about an assertion. The objective of the paper is to analyze the chosen...
Biometric Systems gained attention in all over the world because of its reliability and user friendly approach. In contrast to these advantages, these biometric systems are highly fence less to fraudulent attacks via fake self manufactured, synthetic or reconstructed samples which is particular problem of biometrics. To ensure the security of biometric system, needs to develop a novel method which...
Cloud computing is a new mechanical and industrial art for hosting the applications and it is flexible, cost-effective, and user-demand platform. It provides the way to share distributed resources and services to all the business or consumer IT sector from desktop and portable PCs over the internet. The advantage of cloud storage is easy access, reduced hardware, low maintenance and installation cost,...
Inverted Index is an important data structure in computer science. It is used to create a mapping between a word and the set of documents in which that word appears. Thus, it is used to store documents per word. Currently, the output of inverted indexing is stored haphazardly in a look up table. Hence traversing through the look up table for fetching indexes requires linear search. The time complexity...
In data mining association rule mining play vital role in finding associations between items in a dataset by mining essential patterns in a large database. Standard association rules consider only items present in dataset transactions. These types of rules are called as positive association rules. The other kind of rules called Negative association rules also consider the same items, but in addition...
Automatic identification of bird species based on the chirping sounds of birds was experimented using feature extraction method and classification based on support vector machines (SVMs). The proposed technique followed the extraction of cepstral features on mel scale of each audio recording from the collected standard database. Extracted mel frequency cepstral coefficients (MFCCs) formed a feature...
Image modification becomes very easy because of image editing software and rapid development of Smartphone. Image is a way of communication, on social site people post their picture and other people either forward it or perform some operation like zoomed in/out, rotation and repost their image which is not identical image, it is near-exact duplicate image which resulted in large amount of images so...
Pitch detection algorithm is important feature in the speech processing algorithms. It can be used for speaker recognition, speech instruction of the hearing impaired ones, vocoder systems, discriminate normal and pathological voice etc. Hence robust and accurate determination of pitch is necessary. The paper involves determining pitch of the speech signal by the pitch detection algorithm — 1) Autocorrelation...
This paper presents finger vein recognition using different types of local directional patterns to gain best result in terms of classification accuracy, Equal Error Rate and to remove the limitation of the Local binary pattern which is its sensitivity to noise. In this paper we analyzed different techniques of LDP to make finger vein recognition reliable. LDP is used to compute the edge response in...
The work aims at estimating the elbow kinematics under fatigue and non-fatigue conditions at the same time classifying the surface EMG signal into fatigue or non-fatigue conditions using the Multiple Time Domain (MTD) features extracted from the sEMG signal. For the purpose, sEMG data is acquired from the bicep muscle of 30 individuals together with elbow kinematics data. The most suitable time domain...
Now a day security is a major issue in public places such as railway stations, airports, shopping malls and in crowded areas. Unattended object detection is one of essential tasks in video surveillance system. This paper proposes an algorithm for detecting unattended and unknown object using background subtraction and morphological filtering. The main goal of the algorithm is to automatically detect...
In this Computer world, E-mail is one of the popular modes of communication due to its easy accessibility and low cost. Due to the advantages of time, speed and cost effectiveness, a lot of people use it for commercial advertisement purposes resulting in unnecessary e-mails at user inboxes called spam. Spam is the unnecessary and unwanted commercial e-mail. It is also known as junk e-mail. It is sending...
The requirement in addition to consequences in refining efficiency of energy in cloud applications have enlarged owing to speedy evolution and explosion of data center amenities everywhere in the globe. Virtual machines (VMs) embrace pillar of utmost and are frequently associated on the Physical Machine (PM) towards proficiently employ its assets. Various workload scheduling algorithms are proposed...
Denial of service attack is one of most interesting attack of network because of this network bandwidth utilization increase. To prevent this attack using various techniques. In our proposed work we give trust or repuatation base technique in which sender and receiver send data using encryption and decryption. Novality of our work we provide by our result.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.