The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Motion blur results when the scene is not static and image being recorded changes during the recording due to long exposure or motion. Because of motion blur projected image is smeared over the sensor according to the motion. Motion blur PSF is characterized by two parameters, namely blur direction and blur length. Faithful Restoration of the motion blurred image requires correct estimation of these...
In the field of pattern recognition, the study of the gene expression profiles for different tissue samples over different experimental conditions has became feasible with the arrival of micro-array based technology. In cancer research, classification of tissue samples is necessary for cancer diagnosis, which can be done with the help of micro-array technology. In this article we have presented a...
In cellular network location management is a fundamental and complex problem which deals how to track the subscriber on move. Some amount of cost is incurred for the subscriber during the movement in a particular service area. This cost basically involved location update cost and paging cost. The main objective of this work is to reduce this total cost which includes this location update cost and...
Breast sonograms are more effective towards differentiation of cysts from solid tumours; if they could be post-processed for minimization of speckle content without blurring of edges. The approach presented in this paper consists of a bilateral filtering in homogeneity domain so that the despeckling process do not compromises the texture and features of masses. The proposed despeckled approach decomposes...
International Telecommunication Union (ITU-T) has laid down broad principles for the convergence of packet and optical platforms through a series of Optical Transport Network (OTN) protocols. Convergence of multiple services in order to use a common transport layer has emerged as an attractive solution to bring down the capital expenditure and operational costs. In this paper an Integer Linear Programming...
This paper reports a pseudomorphic high electron mobility transistor (HEMT) wide band low noise amplifier (LNA) for WLAN, vehicle communication systems and point to point communication applications. The LNA had been designed by using a single ATF36163 transistor. A wide band bias network has been designed and verified over the desired frequency range. The fabricated prototype of the proposed LNA has...
Generation of semantically meaningful ontology of Indian languages based terms, concepts, and their relations specially when talking about Hindi language, becomes a tedious task to approach without any disambiguation, where in a single change of relation, specific individual sub-node of ontology changes. This paper presents an approach for semi-automatic conversion of agricultural Hindi terms, concepts...
Steganography is one of the important and elegant tools used to securely transfer secret message in an imperceptible manner. Visual Steganography is another added feature of it. It is the steganographic method involving multimedia files like image, video etc. to hide a secret message. However this method may result in the distortion of the colour frequencies of the cover image which is predictable...
Use of EEG signals in measuring cognitive load is a widely practiced area and falls under Brain-Computer-Interfacing (BCI) technology. However this technology uses medical grade EEG devices that are expensive as well as not user-friendly for regular use. Recent launch of low cost wireless EEG headsets from different companies opens up the possibility for commercialization of BCI and thus drew attention...
Low Density Parity Check (LDPC) codes have gained lot of importance in the channel coding arena, because these can provide excellent performance close to Shannon limit & can easily beat the best known turbo codes for large block lengths. This paper explains generic algorithms for hardware efficient implementation of Encoder & Decoder for LDPC codes adopted by Digital Video Broadcast-Satellite-Second...
Charge Coupled Devices (CCD) detectors are frequently used in imaging payloads developed for different satellite applications like space based astronomy and earth observations. CCD's are being used for onboard/satellite applications as it provides lower noise and higher dynamic range than CMOS detectors. CCDs are available in various architectures hence design of Timing Generator is planned based...
The amount of data which is produced is huge in current world and more importantly it is increasing exponentially. Traditional data storage and processing techniques are ineffective in handling such huge data [10]. Many real life applications require iterative computations in general and in particular used in most of machine learning and data mining algorithms over large datasets, such as web link...
Requirement of multiple services from the customers has compelled the wireless service providers (WSPs) to maintain multiple radio access networks (RANs) of different radio access technologies (RATs). Further, dynamic spectrum allocation (DSA) approach offers a great opportunity to the WSPs to utilize their available spectrum in more efficient manner. As the growth of demand for wireless services...
Security and privacy are the biggest obstacles in Database as a service (DBaaS) of Cloud Computing. In DbaaS, cloud service providers provide services for storing customers data. As the data are managed by an un-trusted server, the service is not fully trustworthy. The data at the third party data center can be made secure by encrypting the database. But querying the encrypted database is not easy...
Shellcodes are widely used to exploit applications. Shellcodes can breach security and privacy to an unimaginable extent. Poor Programming results in various bugs that give attacker a chance to exploit an application. Exploiting an application allows attacker to inject a malicious code and transfer control of program to the injected code. The malicious code injected during exploitation is usually...
Migration of Android Native Application to Hybrid Application is a good choice since Hybrid Application is cross-platform in nature and has many other attractive features to offer but migrating an application from native to hybrid requires a lot of preparation for analyzing the complete process and dealing with the serious glitches expected during this process because any inappropriate step can drastically...
This paper presents a texture based approach for distinguishing mass from normal breast tissue in a mammogram. Identification of high probability area as mass is done on the basis of statistical features obtained from Gray-Level-Co-occurrence Matrix (GLCM) of mammogram image. The input mammogram is first pre-processed to remove the labeling artifacts and enhanced using adaptive histogram equalization...
Existing data structures which facilitate storage and retrieval of geographical data are R-trees, R* trees, KD trees etc. Most widely used and accepted structure among these is the R-tree. A drawback with R-trees is that it represents regions as fictitious rectangles which do not correspond to actual geographical regions. Also R-trees do not represent the hierarchy very well. For example New York...
The state-of-the-art improvements in cellular communication and ubiquitous availability of internet have led to significant breakthroughs in intelligent transportation systems where connectivity, autonomous driving and infotainment play a pivotal role in the enhanced driving experience. The Vehicle ad hoc Networks (VANET) have emerged as a distinguished branch of wireless communication pertaining...
The main objective of this work is creation of a synthetic ECG signal in software MATLAB based on the analysis of Fourier series. The individual elements of ECG signal are approximated by mathematical model, which is thoroughly described, explained and then applied. The output is a synthetic model of an ECG. Our approach to modeling biological signals allows change input parameters (amplitude and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.