The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Planar spoofing is a well researched problem, wherein a high quality planar photograph can be replayed in front of a still camera as a substitute for another individual's face. Most modern day face recognition systems can be fooled by this process, as the perceptual information contained in a photo-of-a-photo, is virtually the same as that of a natural photograph of an individual. Current solutions...
The goal of this paper is to determine the object a person visually perceives by analyzing BOLD fMRI data. We use an fMRI dataset and analyze the effects of univariate and multivariate feature selection techniques. By performing dimensionality reduction with Principal Component Analysis (PCA), training with a Support Vector Classifier without a kernel and appropriate smoothing, we obtained a 93.16%...
Stored data needs to be protected against device failure and irrecoverable sector read errors, yet doing so at exabyte scale can be challenging because of the large number of failures that must be handled. We have developed and presented RESAR (Robust, Efficient, Scalable, Autonomous, Reliable) storage, an approach to storage system redundancy that only uses XOR-based parity and employs a graph to...
Architecture of database servers is one of the important parameters in the performance of web applications. In this paper, a model is proposed for guiding Postgre SQL database server sizing for concurrent users. Coloured Petri-nets are chosen to represent the model that brings out need to change the deployment architecture when the current architecture may not suffice. The focus of the proposed model...
Chip functionality testing can greatly benefit from a Built In Self-Test (BIST). The Self-Test Using MISR and Parallel Shift Register Sequence Generator (STUMPS) architecture uses a compression technique to generate a set of test patterns, to submit them to the circuit undergoing testing, and to compare the output with that of a “gold” (known to be good circuit) by loading and comparing the contents...
Twitter, a well-liked online social networking site, facilitates millions of users on a daily basis to dispatch and orate quick 140-character notes named tweets. Nowadays, Twitter is cogitated as the fastest and popular intermediate of communication and is used to follow latest events. Tweets pertaining to a specific event can be effortlessly found using keyword matching, but there are numerous tweets...
Automated classification algorithms have been applied to breast cancer diagnosis in order to improve the diagnostic accuracy and turnover time. However, classification accuracy, sensitivity and specificity could still be improved further. Moreover, reducing computational cost is another challenge as the number of images to be analyzed is typically large. In this paper, a novel Pixel N-gram approach...
The conventional private and public key cryptosystems suffer from issues of key exchange and key distribution respectively. A better alternative is to use identity of a user as the public key. Identity-based encryption is well accepted worldwide but its key revocation issue makes it insecure. Attribute Based Encryption, using attributes of a user instead of identity combats these issues. Though many...
The performance of the Trench Insulated Gate Bipolar Transistor is of special concern to the Smart Grid community. Here, a novel methodology for the quasi-static behavior of the device is introduced which is based on a firmly established law of classical thermodynamics, viz., the minimization of the Helmholtz Free Energy as a function of the internal fields, potential, and charge. The analysis begins...
Online transactions have gained popularity in the recent years with an impact of increasing fraud cases associated with it. Fraud increases as new technologies and weaknesses are found, resulting in tremendous losses each year. Since the transactions associated with e-commerce are large in number, the dataset associated with them is also large; therefore, it requires fast and efficient algorithms...
In this paper, we present the system of automatic MCQs (Multiple Choice Questions) generation for any given input text along with a set of distractors. The system is trained on a Wikipedia-based dataset consisting of URLs of Wikipedia articles. The important words (keywords) which consist of both bigrams and unigrams are extracted and stored in a dictionary along with many other components of the...
This paper proposes an image steganography for hiding secret images. The objective of the proposed work is to increase the embedding capacity while ensuring the security of the image. This has been addressed using two levels of processing. First is the application of Genetic Algorithm (GA) as ‘before embedding hiding technique’ which tries to identify suitable places in cover image where embedding...
In recent years, SRC has received many attentions for classification and identification tasks. This paper attempts to introduce a sparse representation based classification of EEG signal features and identification of associated activities or tasks. It uses wavelet and ICA processing of EEG signal for feature selection and dictionary training. Multiple dictionaries are trained and used for EEG signal...
Mobile Ad-hoc Networks (MANETs), a recent emerging technology in wireless networks and routing data poses a challenging issue because of it's random variations in the wireless environment. There are many routing criterias such as hop count, the quality of link, congestion, and interference that help in choosing the best route available in wireless networks. The various random changes in the wireless...
The spectrum sensing is a vital stage in cognitive radio networks. The performance of energy-based spectrum sensing scheme degrades under noise uncertainty, which can be improved by covariance-based sensing methods. In this paper, a double threshold-based spectrum sensing scheme using sample covariance matrix of received signal is presented, that improves the performance of conventional covariance-based...
The advancement in usage of information and communication technology has changed the operational activities of most organization in recent times. The grown in usage has contributed to the growth in the data that organizations have access to. In the past decade, the growth of these data has further given rise to research and development into computer storage devices and infrastructure. In addition...
Object classification in both images and videos is an important task within the field of computer vision. The process of classifying objects into predefined and semantically meaningful categories using its features is called object classification. Many researchers are working in this area to improve the accuracy of classification and to reduce the dimension of features extracted which are used for...
Biometrics represents the identity of individuals. Physical characteristics like voice, face, fingerprint, etc. are used to recognize individuals. Biometrics are used as a promising method for authentication, but use of these raw biometric data results in some privacy concerns. In this paper, we propose a system model for privacy preserving biometric authentication system for speech, face and fingerprint...
We considered a multi-user MIMO broadcast (BC) system with multiple antennas at both transmitter and receiver sides. A scheduling scheme using semi-orthogonal user selection (SUS) with zero-forcing beamforming (ZFBF) is implemented. The total feedback load required in ZFBF systems is reduced by implementing a two stage feedback scheme by restricting the number of users to participate in each stage...
In this paper we use a Deep Neural Network (DNN) trained on data collected from the visual media-sharing social platform Instagram account of a popular Indian lifestyle magazine to predict the popularity of future posts. This predicted popularity of the post can be used to decide advertising rates and measure performance metrics important for publishing strategy decisions. The DNN primarily uses growth...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.