The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Wireless Sensor Networks (WSN), sensor nodes are densely deployed in the network covered area, and have limited communication, computation capability and storage capacity. The proposed work is a multi-agent based fault tolerance scheme in wireless sensor networks by employing a set of static and mobile agents. We propose a scheme to implement fault tolerance to estimate the faulty behaviour and...
The increasing interest in the evaluation of biometric systems security is an important issue to be considered. The different threats called direct or spoofing attacks where in these attacks, the intruder uses some type of synthetically produced artifact (e.g., gummy finger, printed iris image or face mask), or tries to mimic the behavior of the genuine user, to fraudulent access of the biometric...
In signal processing systems, the fundamental computation is nothing but convolution which is found in many application areas. The main building blocks are the multipliers to calculate convolution. But multipliers are the main power consuming elements. In recent years power is an important constraint. Now days, linear convolution has been implemented using distinct types of multipliers to decrease...
SAR ADC architecture is mainly based on the CMOS technology and Op-amp free. In this paper, designed a SAR ADC with 10 Bit 50MS/s using CM biased Switching Method in 180nm CMOS technology. The ADC is analyzed using Nodal Analysis method and calculated different dynamic parameters like ENOB, SNDR, INL, DNL, FOM etc. These are simulated using HSPICE, Spice Explorer, CSCOPE and MATLAB software's. Simulation...
In this research, we presented another implanting calculation for Image Steganography, which is based on 3-stationary wavelet transform (SWT). Firstly, we take four pictures: one is cover image and another is secret image. In the process of embedding, we divide RGB image into three planes: Red, Green and Blue. In this work, embed multiple color secret images into a single cover image for providing...
K-nearest neighbor is widely used data mining algorithm in many areas such as text, medicine. In this research, methods to speed up the K-nearest neighbor algorithm when executed sequentially have been proposed. All of these methods scan through the data set element by element. The first one uses a max heap implementation to speed up finding nearest neighbors of a data point. The second one uses a...
Cloud computing is ruling the present IT Industry. The Cloud Service Requesters (CSR) are no longer interested to tie to a single Cloud Service Provider (CSP) because they are expecting the service at less cost, high performance, high availability and ease of use. This requirement motivates the Cloud Service Requesters to migrate from single to Multicloud Environment. Massive availability of different...
This work focuses on monitoring the distance covered on feet by a person and the calories burnt due to walking, running or jogging. An algorithm is designed which relates the movement of arms of a person to his feet during walking. The motion of arms is detected by an accelerometer, which reads the dynamic change in the positions and variations. This work uses a 3-axis MEMS digital accelerometer ADXL345...
In recent years, the research done for developing automated inconsistency checker has proved a boon for many developers and testers. Inconsistency in the code leads to many issues. There is availability of some inconsistency tools that have been developed to check various kinds of inconsistencies. In this paper, a comparative review on the existing methods/tools available is presented for the inconsistencies...
With the growing demand of electronics industry, the device density on VLSI chips is also growing causing more and more signal interference (on-chip noise) among the interconnects. Especially in communication systems, when such a noise causes errors, they become irreversible and thus need to be addressed. In this paper we have designed a cyclic code generator using noise immune designs of gates and...
Noise removal plays an important pre-processing stage for motion estimation and video enhancement. This paper describes a novel algorithm for color video sequence enhancement using Least Path Impulse Detector extended to spatio-temporal filtering. This algorithm works well with both Gaussian and impulse noise and quality analysis factor such as PSNR and SSIM proves the efficiency of proposed method...
In this paper, we conduct analysis on the current condition of virtual reality and the computer graphics and the applications on the digital media interaction. We proposed the systematic review of the digital media interaction modes with the theoretical analysis of the virtual reality and computer graphics. Multimedia gateway is a separate control of the entire media interaction center core components,...
A critically injured person when reaches the hospital has to go through many official formalities. The proposed system aims at preventing the further delay of form filling using automatic face recognition with blood system. Database of all the patients are collected on the basis of their previous medical history records. The patient is passed through the black box which completely scans and detects...
Sentiment Analysis (SA), an application of Natural Language processing (NLP), has evolved a lot over the past decade. It is also known as opinion mining, mood extraction and emotion analysis. Social Media provides a good platform for people to share their thoughts, feelings and views. Social Media like Twitter is flooded everyday with tweets from users. These tweets can be effectively used for extracting...
Crankshafts play a pivotal role in the automobile industry as it is the primary part of the internal combustion engines. There is a strong necessity for its stable and dependable operation in the market as failure of the crankshaft results in huge losses. Harmonic analysis helps us to determine the behavior of the crankshaft when subjected to different time varying loads. This will be useful to obtain...
Dravidian languages are highly agglutinative and morphologically rich in their features. Language processing for these languages requires more annotating data compared to European or Indo-European languages. In this paper we present the comparison between Statistical Machine Translation (SMT) model with linguistic and non-linguistic data models for English to Kannada languages. The experiments shows...
From the last decades, routing protocol is a critical issue in multi-hop network. There are mainly three categorization of routing protocol: unicast, multicast and broadcast. Here, we are focusing on multicast routing protocol in mobile ad hoc network. Multicast routing is a communication paradigm between a sender and multiple receiving nodes. Multimedia is the main application of multicast routing...
Resource sharing is a very efficient mechanism to reduce FPGA resources for realizing several application categories. In the context of realizing signal processing datapath in area efficient applications several researchers attempted to Resource sharing. The present work demonstrates realizing FSK receiver on small Xilinx FPGA. In this work FSK demodulator architecture is simulated using MATLAB tool...
This paper proposes a system that classifies textual images (images that encounter text within) using low-level image features. Image classification and content based image retrieval is a growing field in the area of image classification. In this paper, the approach is based on various low-level image features including GLCM features like mean, skewness, energy, contrast, homogeneity. Using these...
Emergency exit signs are used for safety purpose in buildings, malls, shops, etc and various other places. They provide escape routes or ways using which people can escape during emergency situations. Escaping during such situations using the emergency exit signs and emergency doors are easier for sighted people, but visually impaired should rely upon someone else. Hence, in this paper we propose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.