The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Retrieving short monophonic queries in music recordings is a challenging research problem in Music Information Retrieval (MIR). In jazz music, given a solo transcription, one retrieval task is to find the corresponding (potentially polyphonic) recording in a music collection. Many conventional systems approach such retrieval tasks by first extracting the predominant F0-trajectory from the recording,...
Biometric is a pattern recognition system that automatically identifies people according to their physiologic and behavioral properties. Among the physiologic properties, hand has a special place so that all features of hand like palm lines, inner knuckles, external knuckles and geometry could be used. More recently, the usage of blood vessels pattern in the palm, in addition to the high acceptability,...
The sparse representation based classification (SRC) performs not very well for small sample data. A discriminative common vector dictionary based SRC is introduced in this paper to address this issue. The contribution of this paper is that the dictionary of the proposed method is constructed by the discriminative common vector per class. The common vector represents the invariant property of each...
Electrocardiogram (ECG) conveys numerous clinical information on cardiac ailments. For proper diagnosis of cardiac disorders, high-quality ECG signals are always desired. However, in reality, pathological ECG signals are corrupted with several noises. In this work, empirical mode decomposition (EMD) along with adaptive switching mean filtering (ASMF) based ECG denoising technique has been proposed...
Many datasets contain variables that take binary values. Often one would like to subset the data set according to the value of such a binary variables and compare and contrast the statistical parameters for such subsets. We have written an R code to analyze such datasets and create plots to give comparison of mean of variables for such binary partitions. We show the result of this analysis for the...
Steganography is the art of covered writing or hidden writing. The main concern of steganography (image hiding) methods is to embed a secret image into a cover image in such a way that the cover should remain as similar as possible to its original version. In addition the cover image should remain robust with respect to usual attacks. In this research, we present a method that tries to cover all above...
The Internet of Things (IoT) will connect billions of devices deployed around the world in a near future by embedding mobile network and processing power capabilities into a wide range of physical computing devices used in everyday life of many people. Recent studies concerning IoT have addressed not only the interoperability of devices, but also the context awareness feature which makes easy to discover,...
With the continuous emergence of all kinds of complex systems and the increasing complexity of complex systems, standards architecture becomes more and more important for its guidance and support in the life cycle of complex systems. First, this paper makes a comparative study on several architectures and architecture frameworks, and the comparative study shows that Standards Viewpoint is a better...
The Network Intrusion Detection Systems (NIDS) are either signature based or anomaly based. In this paper presented NIDS system belongs to anomaly based Neural Network Intrusion Detection System (NNIDS). The proposed NNIDS is able to successfully recognize learned malicious activities in a network environment. It was tested for the SYN flood attack, UDP flood attack, nMap scanning attack, and also...
This paper presents results of our study intended on analysis of visual quality of different types of images subject to denoising. More than 100 experiments with observers have been carried out to assess visual quality of denoised images. Two filters — standard DCT in sliding blocks and known BM3D filter — are considered. The latter filter often provides better visual quality but not sufficiently...
At present, the sharing of open data in any city is importance. The shared data, e.g., flood monitoring data, earthquake data, or traffic data, can be used to improve the way of human life. MQTT, the lightweight messaging protocol based on the publish-subscribe concept, is the most popular protocols used to share these data. There are two elements of MQTT messaging for sharing of any data; topic and...
The ECG signal, has attracted more attention due to its importance in diagnosing conditions. Now days T-wave alternans (TWA) has been used to forecast Sudden Cardiac death (SCD). TWA is the beat-to-beat alterations changing in the T-wave amplitude. A new method is used in this paper to detect these alternans waves more exactly and quickly with heart rate calculation by RR-interval in ECG. This algorithm...
In India, now-a-days 95% of Indians are expected to use the bank transactions even for day-to-day requirements. Recognizing the genuine signature and finding out the fraud signature is the challenging task. Here, we have used an approach of Artificial Neural Network (ANN) to recognize the signature. In this method a signature is collected from the bank cheque by cropping the area of interest. Further...
Trademark retrieval systems have been a well researched field however majority of these researches have been done on device trademarks and do not consider the presence of text embedded within trademark images as in case of composite marks. In this work a unified retrieval system has been proposed and implemented for composite trademarks. The technique is invariant to font size, font style and orientations,...
In this paper a novel technique of fragment visible mosaic image is proposed. It is a unique and novel kind of computer art called Mosaic tile image steganography technique, which transforms a color secret image into a so called secret fragment visible mosaic image of the same size. Initially choose randomly any color cover image from the existing database, which looks similar to secret color image...
Parallelization of BLAST at the software level usually segments either the query or the database but not both. In this paper, we investigate a hybrid segmentation approach that combines database segmentation with query segmentation. By organizing the nodes into groups, splitting the queries among groups, and replicating the entire database at each group, we take advantage of both database segmentation...
Memcached is an in-memory key-value caching system, which is used to resolve the principal contradiction of the disk-based database between the CPU and input/output, has been widely used as an effective way to solve the distance and improve the capacity of the source server. We optimize the performance of Memcached memory access through two ways: improve the density of memory storage and ameliorate...
In this paper, we introduce algorithms for pruning and aging user ratings in collaborative filtering systems, based on their oldness, under the rationale that aged user ratings may not accurately reflect the current state of users regarding their preferences. The aging algorithm reduces the importance of aged ratings, while the pruning algorithm removes them from the database. The algorithms are evaluated...
In recent years, many financial sectors are evolving with huge numbers of web applications, which plays a crucial role in organizations to make important decisions. Considering this, the data has to be secured in order to prevent it from any attacks which lead to a huge loss. One of the topmost attacks in the database is SQL injection attack, is injecting some malicious query into the database causing...
Long intergenic non-coding RNAs (lincRNAs) are associated with a wide variety of human diseases. Piles of data about the lincRNAs are becoming available, thanks to the High Throughput Sequencing (HTS) platforms, which open opportunity for cutting-edge machine learning and data mining approaches to analyze the disease association better. However, there are only a few in silico association inference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.