The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research aims to automate the process of gathering online, end user reviews for any given product or service and analyzing those reviews in terms of the sentiments expressed about specific features. This involves the filtering of irrelevant and unhelpful reviews, quantification of the sentiments of thousands of (useful) reviews. And finally, providing the end user (business/manufacturer) summarized...
To improve the quality of software system, there is a need to eliminate or reduce the rework. Software reuse is one of the solution proposed for it. Software reuse involves reuse of existing software modules, also called reusable software components, while creating new software systems. In the context of software reuse, it is important to evaluate the performance of reusable software components as...
Software Testing is a very important phase in the cycle of software development. It is the only phase which ensures the reliability on the software. Generally 40–50% of the software development cost is spent on this phase. Though many automatic testing tools are present, but still most research is required in this field to reduce cost and time allotted for this phase. Test Oracle is a process which...
In this paper, a three stage improved speech signal recognition model is presented. The presented approach improved the recognition process by reducing the process time and to provide robust speech recognition. In first layer of presented model, the feature extraction from speech is done using Statistical Analysis based DWT approach. The extracted feature based recognition reduced the signal size...
Mammoth data is being created in stock market round the globe. In the era of global village, stack holders and participators in stock market is developing its own repositories. Due to this phenomenon, same data is being deposited at different places and repeated again and again. Repetition of data requires resources and it leads to the wastage of cost, energy, power, space etc. In market is relatively...
Empirical study of control dependency and data dependency means that after applying various observations and techniques for large software as well as small programs we analyze that data dependency is more suitable for large software systems and control dependency is more suitable for small programs. For small programs with a few lines of code, static slicing gives the well output and provide optimum...
Commercially popularized with the year 2002 with the launch of Amazon web services cloud computing has changed the way IT services and resources are delivered to the customers. With its varied platforms like SaaS, PaaS and IaaS it has made available resources which was once never available on demand and scalable manner. With the advantages of high scalability and flexibility, excellent reliability...
In this paper, a discrete time fractional order differentiator has been modeled for estimating the fractional order derivatives of contaminated signal based on Legendre's polynomials. The given signal is approximated with Legendre polynomials of different degrees. The Riemann-Liouville (R-L) fractional order derivative definition is used. For finding the fractional order derivatives of signal, first...
With an abridged introductory note on the discrete wavelet transform (DWT) and random shift cipher (RSC), this paper attempts to study a technique for color image encoding and decoding scheme using two stage random shift cipher (TSRSC) associated with DWT. In this approach, keys and the arrangement of RSC parameters are compulsory. The formula for total number of keys in encoding process of color...
A comprehensive survey of scene classification based on pLSA formulation literature is presented. Due to the growth in robotics there is an increase in the concern towards visual technology adaption and the interest in the concern has been growing over past years. Vision creates the premises for brain-processing. Our brain receives and keeps unconscious processing over the stupendous amount of visual...
Existence of similar shaped handwritten characters in any script affects its automated recognition. Effective recognition of similar shaped characters increases overall performance of automated handwritten character recognition. It is intensive research area because of its application in wide ambit of real human beings problems like postal address interpretation and signature verification in bank...
The distributed software working in changing environments operates successfully under a dedicated human supervision. Thus anchoring cost and time during its operation. This paper mainly focuses on simulating a Cyber Physical System (CPS). Main goal of our work is to provide, models as a view of the run-time behavior of an actual CPS. We provide here a workflow to simulate a CPS. A case study on Water...
Most of the real world scenes have a very high dynamic range (HDR). The mobile phone cameras and the digital cameras available in market are limited in their capability in both the range and spatial resolutions. Same argument can be posed about the limited dynamic range of display devices which further differ in spatial resolution and aspect ratio. In this paper, we address the problem of displaying...
Hadoop and Map reduce today are facing huge amounts of data and are moving towards ubiquitous for big data storage and processing. Benchmarking tools available are not capable of analyzing performance of the Hadoop cluster system and are made to either run in a single node system. HiBench is an essential part of Hadoop. It is a comprehensive benchmark suit that consists of a complete deposit of Hadoop...
Surveillance is important in most of the sensitive areas for crime detection. Tracking, learning and detection of any real time object in the video stream is an essential part of surveillance. Researchers have designed the object tracking systems for better efficiency but these systems sometime fails due to loss of information caused by complex shapes, rapid motion, illumination changes, scaling and...
In this work we have implemented and discussed the performance evaluation of Least Significant Bit (LSB) and Least Significant Digit (LSD) on various formats of multimedia data. We have shown the performance variation on different formats for which these two techniques have been applied to hide the messages. Implementation of both the algorithms has been done to explore the security and distortion...
In this paper, we present the work related to syntactic annotation of Marathi text using Ruled-based approach which is very essential in Sense Disambiguation of a natural language text. We have implemented a system for generating and applying natural language patterns to overcome the sense ambiguity problem. We manipulate the grammatical structure of sentence to give the correct output for Marathi...
Electronic mail (email) has become an essential element for Internet users. Many studies indicate that day by day numbers of internet users are increasing. As population increasing on the Internet, volume of email traffic is also growing. This entire volume of email consist 80% of unwanted emails. These unwanted emails are known as spam email and referred as unsolicited bulk email (UBE). These emails...
This paper discusses the implementation of multiple pedestrian tracking in a pedestrian detection framework. Pedestrian detection and tracking is used in modern day ADAS (Advanced Driver Assistance Systems) for detecting the possibility of collision with a pedestrian by capturing video stream. The ADAS are responsible for generating warning to driver or automatically controlling the vehicle. The multiple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.