The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. So adaptation of dynamic key is very important for secure key management, for encrypting messages for communication.
Outbreak of debt crisis in Europe has made the issue of corporate failure prediction, known as financial distress prediction (FDP) as well, a significant topic in the field of management science. The purpose of this paper is to propose five hybrid classifiers to tackle corporate failure prediction problem. Principle component analysis (PCA),information gain (IG) and relief (Re) methods as representatives...
Cloud computing a big pool of resources dynamically reconfigures its resources as per user requirement in real time. Cloud environment mostly works with virtualized environment, which is a key consideration for providing virtual machines as a service to the users. It is difficult to manage virtual machine, and to deploy on any data centers. In cloud environment users expects better services from the...
Clustering is an exploratory data analysis technique, which categorizes the dataset into some groups. These groups are formed in a way so that items which have similar features live in same group and those have dissimilar features remain in other. There are many clustering algorithm available. Different kinds of algorithms are best used for different kinds of data. K-means is most used clustering...
Vehicular Ad hoc Network (VANET) is an upcoming wireless technology that enables communication between vehicles travelling at high speeds. The ability of VANETs to prevent fatal accidents by relaying data over the network has attracted the attention of both researchers and automobile manufacturers. Data dissemination is one aspect of VANETs used to improve the safety and performance of the vehicles...
The growth of kidney disease has gradually increased over the coming years. Ultrasound imaging is an incontestable vital tool for diagnosis, it provides the internal structure of the body to detect eventually diseases or abnormal tissues non-invasively. This paper presents analysis of Ultrasonography (USG) images for detection of Chronic Kidney Disease(CKD) stages. The methodology of image processing...
This study provides us a method for the frequency detection in Medium and High frequency SSVEP. We investigated the SSVEP response for 8Hz (Low frequency), 14Hz (Medium frequency), and 28Hz (High frequency). Our results showed that the SSVEP responses are stronger in Low frequency region than that of Medium and High frequency regions indicating that Medium and High frequencies are difficult to detect...
Connectivity and robustness of ad-hoc cognitive radio network are the challenges faced by cognitive radio network due to moving nature of the channels, which are available for the communication to take place, among cognitive radio nodes. This challenge can be addressed by the concept of Clustering, which groups the neighboring nodes of a cognitive radio network. It helps the node to switch to other...
MANETs are wireless networks consisting of dynamic nodes that are self-configurable and infrastructure-less. The traditional layered architecture is designed for wired networks, and it runs into performance issues when deployed for Ad-hoc networks. Research focus has shifted towards cross layered architecture to break the traditional layered architecture. This paper proposes a joint optimization of...
Manycore architecture system includes more number of processing elements to improve the performance while sustaining power considerations. Accelerating heterogeneous manycore computing elements involves huge amount of memory copy, computation and thread management. Applications of manycore architectures range from desktop computer to ware-house-scale computer. In this paper, the state-of-the-art trends...
ECG is a method of measuring, displaying and recording the electrical activity of heart. In this paper, wavelet de-noising method has been examined to eliminate noise from the ECG signal. Using soft and hard thresholding process, the significant wavelet coefficients from each level are selected and denoised. ECG signal is reconstructed with inverse wavelet transform. Different thresholding algorithms...
Failure in rolling element bearings is most common failure type associated with electrical machines. Bearing faults results in failure of machine and eventually loss in productivity facility. Localised faults in bearing generate impulses in vibration signal due to impacts of rolling elements on races. Vibration signals for three conditions of ball bearing; 1) good, 2) having fault on outer race and...
Spammers are one of the key security related threat on the Internet nowadays. Attackers can recruit a large number of machines at economic intensive through spamming. Spam zombies are compromised machines in a network which are involved in the spamming activities. Spammers use spam zombies to perform cyber crimes. Spamming causes wastage of network bandwidth. So it is a significant challenge for system...
It is very essential that a structure must be run without defects because existence of a defect affects the service life of the structure in harmful way. So, it is important to understand the dynamic behaviour of the structure. Crack changes dynamic performance of the structure and observing this change, the crack depth size and position of crack can be predicted. Non-destructive testing (NDT) methods...
In this paper, we review extant computational models of time perception to elucidate the need for developing connectionist/neural networks models of time perception based on emergent systems approach. The widespread differences between production or symbolic processing systems that are based on cognitivist approach (e.g., ACT-R, and Soar) and connectionist systems that are based on emergent systems...
Information Extraction is an activity of examine text for information relevant to some interest. Information extraction needs depth analysis than simple key word searches. The information extraction system recognizes and extracts knowledge from a massive literature and extracted knowledge is accumulated in a knowledge base. Many conventional automatic information extraction approaches using Natural...
In this paper we present an approach for low-level body part segmentation based on RGB-D data. The RGB-D sensor is thereby placed at the ceiling and observes a shared workspace for human-robot collaboration in the industrial domain. The pixelwise information about certain body parts of the human worker is used by a cognitive system for the optimization of interaction and collaboration processes. In...
This paper proposes to use Genetic algorithm for optimizing the best Eigen vectors to improve the recognition accuracy of Modular image Principal Component Analysis (MIPCA) for face recognition. Modular Image PCA has been proved to be efficient in extracting features for recognizing face invariant to large expression. It is important to note that all the extracted features are not efficient and required...
Registration of aerial images is a necessary step as valuable information for studying; monitoring, forecasting and managing natural resources can be obtained from it. This paper presents an algorithm for registration of aerial images using orthogonal moment invariants. Initially reference aerial image and test aerial image are resized to same size and converted to gray scale and contrast enhancement...
Class quantification of aerial images plays a vital role in remote sensing. One of the class quantification method is discussed in this paper. Proposed method uses Maximum Likelihood Estimation based classifier for class quantification. Algorithm is trained by the sample classes derived from parent image. Feature space is estimated from each training sample. Different classes are labeled in test image...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.