The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ontologies were applied to impart knowledge in different fields and in this regard many Ontologies were built on domains like medicine Mathematics, physics etc. The Ontologies in the domain of computer Science & Engineering is very limited. The Ontologies related to a domain provide shared and common understanding and include mainly concepts in domain and relationship among the concepts. In this...
This paper presents a co-clustering based approach to discover overlapping community structure in networks that can be modeled by an undirected unweighted bipartite graph. The co-clustering algorithm uses Locality Sensitive Hashing (LSH) to cluster the nodes of the graph using Jaccard Index as the similarity measure. We employ recently proposed, weighted minwise sampling for randomized dimensionality...
The prediction of Indian summer monsoon (ISM) variability on extended range (3–4 pentads in advance, where pentad refers to 5-day average) is crucial due to its usefulness in agricultural and hydrological planning. Monsoon rainfall occurs in the form of active/break spells which causes large-scale flood/drought condition. Prediction before 3–4 pentad may not stop this condition but can help us to...
Mobile robot path planning is critical in the present day of automation. Several situations may occur for humans, like the environment may be dirty, hazardous, might cause death, or injury as in case of mining, detecting leakage in pipe, cleaning of pipe etc. where robots can be successfully employed. The idea of this paper is to develop a mobile robot that finds the shortest route from source to...
Computer vision systems majorly work on the basis of capturing three dimensional scenes. The scenes however have two dimensional images or videos that are sent for processing. The said images and the videos always have an object of interest. The scenes which are captured have a number of objects along with the object of interest. of all these objects, the ones which are not required are ignored or...
Colorectal cancer is a significant health problem in the world and is one of the major contributors in deaths by cancer. It is a malignant tumor that starts out as more likely to be non-cancerous but as the growth increases on the lining of colon wall it becomes carcinogenic. With regular screening colon cancer can be detected early, when treatment is more effective and CAD scheme with its recent...
This article proposes a novel approach to colorize a gray scale image with the help of a reference color image given by the user which presumably contains suitable color information for the grayscale image. Normalized Cross Correlation is used to search suitable color information from reference color image to construct chrominance values for pixels in the grayscale image. The proposed method is applied...
As the requirement for securing data has increased, novel approaches like reversible data hiding have been developed. Reversible data hiding is one among the many methods to securely store message into a cover media like image. Drawbacks of this method were overcome with the help of novel approaches like Separable reversible data hiding. Separable reversible data hiding is an improvised method in...
Steel plates are frequently used as structural element in various industries and structures such as bridges, buildings, Metal plates etc. Structural failure may result in a major societal collapse and economical meltdown. Thus to avoid such financial breakdown it is necessary to examine plate structure and its harmonics. In protection of structures it is extremely important to measure the vibration...
With the growing technology and amount of data, the use of cloud and centralized servers is increasing. When the data of the individuals is stored by the third party it leads to the insecurity of misuse of their information in the individuals. Data Mining is carried on this data stored over cloud to get useful information, analysis and decision making purposes. But along with the process of mining,...
Within last 10 years, much amount of research is dedicated to the field of neural sciences, image processing and computer vision regarding the significant issues related to face recognition techniques in machine learning algorithms. From many different theories and explanations for face recognition, which predominantly show that the survey and standardizing of these algorithms is itself a difficult...
Steganography is used to hide data in form of invisible communication. It is used to provide secret communication between two parties. In this research we divide work into two phases-(i) first phase-apply image steganography with 3-stationary wavelet transform over multiple color images. In second phase increase level of work by applying contrast enhancement with 3-level stationary wavelet transform...
In recent years due to globalization and increase in competition to capture market share, the customer is having many options of cars at much affordable prices. This has led to tremendous amount of cars on the road. The big cities in India are normally crowded and the city's existing infrastructure falls short to satisfy the growing needs. This problem is also combined with the inefficient use of...
Malaria is responsible for nearly 438,000 deaths worldwide in a year. A total of 214 million cases of malaria are encountered annually. The conventional method for testing malaria is through microscopy. A blood sample of the patient is spread over a glass slide, stained with Giemsa stain and examined under a microscope. It takes a few hours and a highly trained professional to visually examine the...
This paper presents a study on the varying degree of speaker identity information that is embedded across the MFCCs feature. A DTW based template matching model has been used on a set of 100 speakers' data, each from the CSLU speaker recognition database and the NITs text-dependent speaker verification database. The 39 dimensional MFCC feature vector, conventionally used in the automatic speaker recognition...
Rainfall plays a major role in the economic growth of every country. It is an essential component in the human life cycle. Its accurate and predetermined forecast can prevent many natural hazards and helpful to the tourists for travelling beautiful destinations of the world. Due to the current climatic variations, the accuracy of forecasting rainfall is very important. In this paper, we have used...
In Wireless Sensor Networks (WSN), sensor nodes are densely deployed in the network covered area, and have limited communication, computation capability and storage capacity. The proposed work is a multi-agent based fault tolerance scheme in wireless sensor networks by employing a set of static and mobile agents. We propose a scheme to implement fault tolerance to estimate the faulty behaviour and...
The increasing interest in the evaluation of biometric systems security is an important issue to be considered. The different threats called direct or spoofing attacks where in these attacks, the intruder uses some type of synthetically produced artifact (e.g., gummy finger, printed iris image or face mask), or tries to mimic the behavior of the genuine user, to fraudulent access of the biometric...
In signal processing systems, the fundamental computation is nothing but convolution which is found in many application areas. The main building blocks are the multipliers to calculate convolution. But multipliers are the main power consuming elements. In recent years power is an important constraint. Now days, linear convolution has been implemented using distinct types of multipliers to decrease...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.