The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Power management in embedded devices is of paramount importance. Heat generated by CPUs is one of the important factors contributing to the battery life of the handheld devices. In Linux kernel, the problem of heat generation by CPUs is tackled by the thermal subsystem. The thermal subsystem limits the heat generation due to CPUs by limiting the maximum frequency of a CPU. This is made possible by...
The unprecedented growth of data in web, social media and the attempt to make the cognitive process using computers make Sentiment Analysis a challenging and interesting research problem. Sentiment Analysis mainly deals with the process of analyzing the sentiments or feelings from someone's expression or piece of information, and also in discovering the cognitive behavior of humans. The usage of computers...
The fast growing use of social networking sites among the teens have made them vulnerable to get exposed to bullying. Cyberbullying is the use of computers and mobiles for bullying activities. Comments containing abusive words effect psychology of teens and demoralizes them. In this paper we have devised methods to detect cyberbullying using supervised learning techniques. We present two new hypotheses...
Communication channel is highly prone to noise and therefore error correcting codes are required to protect the transmitted data. Residue Number System (RNS) is defined as the representation of an integer in the residue field. Redundant Residue Number System (RRNS) is obtained by adding some redundant residues in the RNS. In RNS, the arithmetic operations are carry free, so errors do not propagate...
Process scheduling algorithm plays a crucial role in operating system performance and so does the data-structure used for its implementation. A scheduler is designed to ensure the distribution of resources among the tasks is fair along with maximization of CPU utilization. The Completely Fair Scheduler (CFS), the default scheduler of Linux (since kernel version 2.6.23), ensures equal opportunity among...
In this paper a CART-based pause duration prediction model has been developed for Malayalam language. Prosodic features like pause durations, syllable prolongations etc. play an important role in making the speech output from a Text To Speech (TTS) system more intelligible. An analysis on the various factors that affect pause duration for Malayalam language has not been conducted till date. Here,...
This paper focuses on the open source GNURadio Software and studies its use as a research tool coupled with USRP and RTL SDR. USRP, RTL SDR and GNU Radio software suite is introduced and briefly discussed. GNU Radio software suite can act as a simulation tool or a software subsystem to drive a SDR transceiver hardware. This is shown by implementing WBFM receiver using RTL SDR with GNU Radio. It concludes...
Wireless sensor network comprising tiny, low cost sensors can be either stationary or mobile, deployed over a widespread geographic region. Mobility of sensors offers research challenges, more specifically in the field of routing and energy consumption. This paper proposes a routing protocol, using Zigbee module ProFlex01 and CC2025 that exploits all cluster member sensor nodes to route through a...
The problem of Optical Character Recognition is as follows- here input is a scanned image or a printed or handwritten text and the output is a computer readable version of the input content. A lot of research work has been done on OCR worldwide for different languages. Though ‘Bengali’ is the second most popular script and language in Indian subcontinent and the fifth most popular language in the...
Along the prompt growth in World Wide Web, the availability and accessibility of regional language contents such as e-books, web pages, e-mails, and digital repositories has grown exponentially. As a result, the automatic document classification has become the hotspot for fetching information among the millions of web documents. The idea of classifying the text, forms the baseline for many NLP applications...
Combinatorial testing aims at identifying faults that are caused due to interactions of a small number of input parameters. It provides a technique to select a subset of exhaustive test cases covering all the t-way interactions without much loss of the fault detection capability. The test set generated is for a fixed value of t. In this paper, an approach is proposed to generate test set for a system...
Wireless Sensor Networks have revolutionized mobile Computing in the past decade or so. A myriad of systems have been designed and developed for various applications, most commonly, environmental monitoring, water quality monitoring, structural monitoring etc. One particular domain where there is a dearth of sensor networks implementation is agriculture. The advantages of sensor networks have not...
Cooperative communication has attracted foremost research concern due to its ability to expand system coverage and enhance spectrum efficiency. In this paper, a transmit cooperative beamforming scenario with multiple-input-multiple-output (MIMO) decode-and-forward (DF) relay channel with a direct source to destination link is considered, into which an orthogonal-frequency-division-multiplexing (OFDM)...
The network topology in Mobile Ad hoc Networks (MANETs) dynamically changes due to mobility of nodes and power constrained, hence routing is a challenging issue in these networks. QoS aware routing is needed to provide optimal routes as a function of parameters like bandwidth, delay, packet loss etc. Our approach is focused on QoS enabled route discovery procedure which involves estimation of node...
In this paper, we propose a discriminative method to identify raga of a polyphonic music clip using Normalized Note Histogram (NNH) features. The raga performed during the rendition is mainly based on the lead voice which corresponds to the main melody. In this work, the sequence of pitch values is extracted from the polyphonic music signal using salience based approach. From the sequence of pitch...
Secrecy, Integrity and Authenticity are the major trust areas whenever information is subjected to third party intervention who can gain data access from vulnerable links in the system, communication channel or individual user identity. While addressing these issues, Cryptography turns out to be the trusted brand in the computer science fraternity and Visual Cryptography, as one among this, is a methodology...
Detection of shot transitions is an important preprocessing step for content based video retrieval systems. Out of the various types of transitions present in videos, dissolve detection is the most challenging one. This is due to the inherent complexity induced by the component frames making up the dissolve transition. In this work, a two-phased approach is presented for detecting the dissolve sequences...
Text plays its vital role in visual content analysis and understanding. Videos contain text with diversity in its text patterns and complex backgrounds. In this paper, we propose an approach based on compass operator for detecting the edges. We obtain the edge maps by convolving the Kirsch Directional Masks along eight different directions for the preprocessed video frame. The resultant images are...
An approach to detect and remove cast shadows of moving objects was proposed in this paper. Gaussian mixture model with only one learning rate a was used for background subtraction and modeling. Initial classification of foreground pixels into object pixels and shadow pixels were performed using saturation property of HSV color space. In the hue difference or brightness ratio based shadow detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.