The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Extreme learning machine is state of art supervised machine learning technique for classification and regression. A single ELM classifier can however generate faulty or skewed results due to random initialization of weights between input and hidden layer. To overcome this instability problem ensemble methods can be employed. Ensemble methods may have problem of redundancy i.e. ensemble may contain...
Studying cyber-physical system (CPS) for a given network protocol and processor schedules is a challenging task. This investigation illustrates the role of TrueTime a MATLAB package for simulating CPS encapsulating information on processor schedules, and network protocols. Properties of CPS such as temporal behaviors, performance and stability can be studied using the TrueTime tool. Furthermore, these...
Under normal operating conditions, the generation capacity is more than the total load demand and losses. The objective is to find the real power scheduling of each generator for an interconnected power system under testing condition to minimize the operating cost of the power plant. Hence the generators power are allowed to vary within the given limits to meet the particular load with minimum fuel...
This paper manifests an innovative approach to transfer sensitive data in an interrupted communication channel using the dyad protection techniques of Cryptography and Steganography. Applying Rotor Caesar cipher on the message followed by 2 bit LSB Steganography helps to conceal the information from the intruder. This Steganography strategy is achieved by using Python Image library along with OpenCV...
The iris pattern of human eye is considered to be unique and distinct that it plays an important role as reliable biometric system for authentication purposes. Iris recognition has become a challenging issue under varying lighting or contrast conditions and due to occlusions such as eyelashes. Therefore, in this paper we have proposed a novel technique for eliminating the eyelashes, namely Entropy...
A worldwide network of Internet Of Things (IOT) is going to be the future network, which connects objects of different application fields, functionality and technology. These objects are uniquely addressable and use standard communication protocol and communicate in a heterogeneous networking environment. Anytime, anyplace connecting anything idea brought out significant advancements in the healthcare...
Image Registration is a complex process which has gained lots of importance and is at the forefront of digital image processing due to its unique and fundamental nature because of vast variations in applications. The complexity and variations in applications are because of the methodology adopted for data acquisition, analysis and processing requirements. In order to carry out image registration process,...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
This research paper presents a secondary study aimed at outline the role of artificial intelligence in the management of financial crisis in a business or organization. The research explored empirical evidence and mathematical modelling to provide reliable data that was used to achieve the objectives of the study. The cases of financial crisis in the UK, US, and Boston Chicken Inc. were used in the...
Support Vector Machines (SVM's) are supervised learning algorithms which can be used for analyzing patterns and classifying data. This supervised algorithm is applicable for binary class as well as multiclass classification. The core idea is to build a hyperplane which can easily separate the training examples. For binary class, SVM constructs a hyper-plane which can easily separate d-dimensional...
In Data Mining classification plays prominent role in predicting outcomes. One of the best supervised classification techniques in Data Mining is Naive Bayes Classification. Naive Bayes Classification is good at predicting outcomes and often outperforms other classification techniques. One of the reasons behind the strong performance of Naive Bayes Classification is due to the assumption of conditional...
This paper presents the construction of Binary Support Vector Machines and its significance for efficient Speech Emotion Recognition (SER). German Emotional Speech Corpus EmoDB has been used in this study. Seven Binary Support Vector Machines (SVMs) corresponding to each of the seven emotions in the EmoDB, namely Anger-Not Anger, Boredom-Not Boredom, Disgust-Not Disgust, Fear-Not Fear, Happy-Not Happy,...
This article discusses about how the variables affect the safety practice level of employees in a manufacturing organization. Brief gap analysis study is made between existing standard in calculating safety practice level index of the organization, and the proposed model of safety index. Left out variable in existing standard is added in proposed model of calculation of safety practice index. A new...
Main focus of our study here is how to reach optimum compression in the wireless Multimedia Sensor Network (WMSN) so as to improve power allocation between compression and transmission for maximizing the battery life of sensors. We know that there exists a large redundancy in sensor's data. So data need to be compressed before being transmitted to the sink/receiver/customer for reducing the heavy...
This paper discusses the design and analysis of a 16-bit 10MHz pipeline Analog to Digital Converter (ADC). A system and circuit level design of each component of the ADC was created in Cadence. Features of ADC were simulated in Matlab to test and examine its basic functionality. Transient analysis of the design was conducted to verify the performance of the ADC. Methods to correct non-linarites were...
In this paper, we developed a Binary Particle Swarm Optimization (BPSO) based fuzzy association rule miner to generate fuzzy association rules from a transactional database by formulating a combinatorial global optimization problem, without pre-defining minimum support and confidence unlike other conventional association miners. Goodness of fuzzy association rules is measured by a fitness function...
This paper presents Reversible Color Transmission of Compressed Fragment -Visible Mosaic Image of the same size for hiding the secret image. By applying the digital watermarking on mosaic image using DWT and PCA transformation increase the security, authentication, copyright protection and all types of internet applications. Most commonly used methods of watermarking are discrete cosine transform...
Fault detection in ball bearing has attracted attention of various researchers. Several Statistical features have been proposed and used by various researchers for fault detection in ball bearing. This work analyzes the importance of various available statistical features by different methods which includes graphical analysis, feature ranking using information gain and gain ratio. The results show...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.