The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the past two decades, the scenario in the computing world has evolved from client-server to distributed systems and then to central virtualization called as cloud computing. Computing world is moving towards Cloud Computing and it remains as buzzword of the current era. Earlier, users had complete control over their processes and data stored in personal computer where as in cloud, cloud vendor...
This paper presents the experimental evaluation for recognition of consonant-vowel (CV) units under noise. Noise is one of the common degradation in real environments which strongly effects the performance of speech recognition system. In this work, initially effect of noise on recognition of CV units is studied by using two-stage CV recognition system proposed in our earlier studies. Later spectral...
This paper discuss the effect of noise on vowel onset point (VOP) detection performance. Noise is one of the major degradation in real-time environments. In this work, initially effect of noise on VOP detection is studied by using recently developed VOP detection method. In this method, VOPs are detected by combining the complementary evidence from excitation source, spectral peaks and modulation...
Spatial data clustering groups similar objects based on their distance, connectivity, or their relative density in space whereas in the real world, there exist many physical constraints e.g. highways, rivers, hills etc. that may affect the result of clustering. Therefore, these obstacles when taken into consideration render the cluster analysis a hopelessly slow exercise. In this paper, a clustering...
In this paper, we propose a framework for modeling goal driven requirements of web applications. Web engineers mostly focus on design aspects only overlooking the real goals and expectations of the user. Goal oriented Requirement Engineering is a popular approach for Information system development but has not been explored much for Web applications. However, in today’s times Web is dominating in every...
Smart phones nowadays, with colossally large number of users have become very prominent[1]. Furthermore, this increasing prominence goes arm in arm with the rising number of malwares[2], thus making it inevitable to take cognizance of the need for an efficient malware detection mechanism. However, sundry former associated works like [3] & [4] for malware detection, have not cited a novel strategy...
Transmission Control Protocol (TCP) is known to suffer from performance degradation in mobile wireless environments, as such environments are prone to packet losses due to high bit error rates and mobility induced disconnections, because TCP is well reliable protocol for wired networks. In wired network packet loss due to congestion. Proposed scheme is a true end-to-end approach, based on the idea...
Remote sensing image classification in recent years has been a proliferating area of global research for obtaining geo-spatial information from satellite data. In Biogeography Based Optimization (BBO), knowledge sharing between candidate problem solutions or habitats depends on the migration mechanisms of the ecosystem. In this paper an extension to Biogeography Based-Optimization is proposed for...
Single Electron Transistor is the most prominent nanoelectronic device that will dominate the operations of nanoscaled integrated circuits. Molecules, especially DNA is prophesized to be integral part of the futuristic ICs. In this paper the current voltage characteristics of DNA base Cytosine are obtained by non-equilibrium Green’s function combined with density functional theory. The pattern of...
In wireless sensor network (WSN) the accuracy of data is important to maintain the networks’ performance. Therefore detecting nodes which either provide faulty readings or do not provide any information is an essential issue in sensor network management. As a whole the solution is to detect nodes with data and function faults, this paper proposes a novel method to detect nodes with both types of faults...
This paper mainly deals with designing a biological controller for biped robot to generate biped locomotion inspired from human gait oscillation. The nonlinear dynamics of the biological controller is modeled by designing a Central Pattern Generator (CPG) which is the coupling of the Relaxation Oscillators. In this work the CPG consists of four Two-Way coupled Rayleigh Oscillators. The four major...
A secure routing mechanism is the basis of security in mobile ad hoc networks. Seeing that nodes have to share routing information in order to find the route to the destination, further an ad hoc network is an open setting where everyone can participate, trust is a key concept in secure routing mechanisms. In this paper, we propose a novel opinion based trust evaluation model to detect misbehaving...
This paper presents our experimental work on analysis of sentiments and mood from a large number of Weblogs (blog posts) on two interesting topics namely ‘Women’s Reservation in India’ and ‘Regionalism’. The experimental work involves transforming the collected blog data into vector space representation, doing Parts of Speech Tagging to extract opinionated words and then applying semantic orientation...
In this paper, we put forward a technique for optimization of the search results obtained in response to an end user’s query. With the enormous volume of data present on the web, it is relatively easy to find matched documents containing the given query terms. The difficult part is to select the best from the possible myriad of matching pages. Moreover, most Web search engines perform very well for...
Cloud computing is on-demand computing in which the computing resources are owned and managed by a service provider and the users access the resources via the Internet. But cloud computing potential doesn’t begin and end with the personal computer’s transformation into a thin client. The mobile platform is going to be heavily impacted by this technology as well. License management is a major issue...
Data mining algorithms are widely used today for the analysis of large corporate and scientific datasets stored in databases and data archives. Industry, science and commerce fields often need to analyze very large datasets maintained over geographically distributed sites by using the computational power of distributed and parallel systems. Grid computing emerged as an important new field of distributed...
This paper presents text independent emotion recognition from speech using mel frequency cepstral coefficients (MFCCs) along with their velocity and acceleration coefficients. In this work simulated Hindi emotion speech corpus, IITKGP-SEHSC is used for conducting the emotion recognition studies. The emotions considered are anger, disgust, fear, happy, neutral, sad, sarcastic, and surprise. Gaussian...
This paper proposes a new method of concatenation cost calculation for enhancing the optimality in unit selection. Instead of defining same set of concatenation costs for all types of speech unit transitions, costs are defined based on the type of unit transitions. Different types of unit transitions that can occur mainly in an utterance are voiced to voiced, voiced to unvoiced and unvoiced to unvoiced...
Devising a scheme for evaluating the service quality of an institutional electronic library is a difficult and challenging task. The challenge comes from the fact that the services provided by an institutional electronic library depend upon the contents requested by the users and the contents housed by the library. Different types of users might be interested in different types of contents. In this...
In this paper, we propose a cooperative caching scheme that exploits an energy efficient model in Wireless Sensor Network. Cooperative caching is done in the form of concentric circular cache layers around the sink. A Circular cache layer is a group of nodes falls under circumference of the circle formed from the sink as center with a certain radius. At a time only a single cache layer becomes active...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.