The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Random number generators have become an essential part of our modern life, in ways that average consumers seldom appreciate. Much of modern communication and digital storage relies on cryptography to ensure privacy, security, and authentication. Random number generation is a critical process that underlies all of these methods. The rapidly increasing demand for bandwidth, storage, and computation,...
The results of the mathematical modelling for the voltage-controlled oscillator based on a transistor structure with negative resistance are presented in this article. The generated oscillations with and without noise were described with the Van der Pol's model. The research was carried out for relaxation and oscillator modes of the generator.
The inability of the present search engines to map the retrieved result set using semantics of the query keywords has been discussed. The present study suggests a framework to improve the mapping of Concept and Context of the query keywords and thereby remove noise from the query. This ensures more relevant and satisfactory retrieval of the results. The framework has been designed for the scenario:...
Impulsive noise is one of the key factor that prevents millimeter waves frequencies wireless sensors system to be fully reliable in the railway environment. Measurements of impulsive noise taken in real railway environment are required to understand the behavior of the wireless sensors under these undesired fields. In this paper, impulsive events are extracted and characterized from the measured data...
In this paper, we propose Joint SRAM (JSRAM) cell, a novel circuit-level hardening solution for having a flexible trade-off between cache capacity and reliability. Our solution aims at addressing both permanent and transient faults in SRAM cells. JSRAM technique enhances read-stability by increasing critical Read Static Noise Margin (RSNM) to decrease faults when circuit operates at lower VDD voltages,...
The rapid development in the field of computer graphics (CG) makes it quite easy to create photo-realistic images and videos. This brings forward an emergent requirement for techniques that can distinguish CG from real contents. In this paper, we propose a method that leverages human pulse signal to distinguish between CG and real videos that include human faces. We use a robust tracking method to...
Motion Onset Visually Evoked Potentials (mVEPs) are elicited by visual stimuli that offer a more elegant, less fatiguing visual presentation than other stimuli used in visual evoked potentials (VEPs) studies. mVEP for use in brain computer interface (BCI) video gaming offer users a pleasant presentation environment to play video games. Modern, commercially available video games are a popular form...
The power grid evolves towards a new mix of generation and consumption that introduces new dynamic and stochastic behaviors. These emerging grid behaviors would invalidate the steady-state assumption in today's state estimation - an essential function for real-time power grid operation. This paper examines this steady-state assumption and identifies the need for estimating dynamic states. Supporting...
Background suppression in video sequences has recently received great attention. While there exist many algorithms for background suppression, an important and challenging issue arising from these studies concerns that for which attributes of the data should be used for background modelling. It is interesting and difficult because there is no knowledge about the data to guide the search. Also, in...
Edge detection is used to extract the important features (e.g.-line, curves and corners) which can be used for very handy purposes (e.g.-face recognition, computer vision algorithms). But extraction of Edges from images is an onerous job without effecting the structural properties of image what so ever. Edges in an image signify the abrupt changes in intensity values. So it becomes even more strenuous...
In fluorescence microscopy, where the benchmark datasets for validating the various image analysis methods are difficult to obtain, a great demand is either for manually annotated real image data or for realistic computer generated ones. In the last two decades, the latter case has become more and more accessible due to an increasing computer capabilities. However, the development of elaborate models,...
This paper proposes an underwater positioning system (UPS) for remotely operated underwater vehicle (ROV). The system uses two underwater speakers as anchor nodes and a hydrophone as a receiver node. Time-of-arrival (ToA) is locally measured by sensors to identify distances from the hydrophone to the two anchor nodes. Then, using 2-D trilateration algorithm and depth from a pressure sensor, the position...
Documents can be a valuable source of information but often they suffer degradation problems, especially in the case of historical documents, such as strains, background of big variations and uneven illumination, ink seepage, etc. Binarization techniques should be applied to remove the noise and improve the quality of the documents. Collections of historical and old document images care commonly provided...
While all computation generates electromagnetic (EM) side-channel signals, some of the strongest and farthest-propagating signals are created when an existing strong periodic signal (e.g. a clock signal) becomes stronger or weaker (amplitude-modulated) depending on processor or memory activity. However, modern systems create emanations at thousands of different frequencies, so it is a difficult, error-prone,...
It proposed a positioning algorithm, which is based on secondary positioning of the shoe print image. After the pre-process was imposed on the image, the image is rotated by the algorithm of the vertex angle deflection according to the image feature. Then, the algorithm of equidistant vertical line as the second position is imposed on the image. Finally, the shoe image is in a perpendicular position...
In this work we present an interactive video conferencing system specifically designed for enhancing the experience of video teleconferencing for a pilot user. We have used an Embodied Telepresence System (ETS) which was previously designed to enhance the experience of video teleconferencing for the collaborators. In this work we have deployed an ETS in a novel scenario to improve the experience of...
The onset of computer based speech synthesis has brought mankind a favorable way of communication by enabling automatic speech-conciliated communication. Assistive Technology for desktop operations must meet high expectation of usability. Though various assistive technology tools are available, still visually impaired are not independent to access computer systems completely as compared to sighted...
Considering the problem that structure information can be easily lost when the edge and texture regions of image are denoised by the Non-Local Means (NL-Means) denoising algorithm, and a NL-Means image denoising algorithm based on edge detection is proposed in this paper. Firstly the edge detection in the noise image is got by using the improved Sobel operator, and then the detecting result is used...
CAPTCHAs exploit the gap in the ability between a human and a machine to understand the semantics of specific multimedia content, with vast applications in computer security. In this paper we compare two techniques in automated CAPTCHA solving for text-based CAPTCHA schemes, i.e., Classification based on the Vector Space Model (VSM) versus a popular Optical Character Recognition (OCR) engine. For...
This paper describes various measures that have been taken to ensure Electromagnetic Compliance of Man Machine Interface Computer used in Fire Control Radar System as per MIL-STD-461E. It covers evaluation and reduction of radiated emission from the unit under test. Even with basic design techniques in place non-conformance to the standard were observed. The potential sources of Electromagnetic Interference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.