The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, combination of statistical model based approach and Non-negative matrix factorization (NMF) based approach with on-line update of speech and noise bases for speech enhancement is proposed. Template based approaches are more robust and performs better to non-stationary noises compared to the statistical model based approaches. However, the template based approach is dependent on a priori...
A simple and robust gesture recognition system is proposed for better human-computer interaction using Microsoft's Kinect sensor. The Kinect is employed to construct skeletons for a subject in the 3D space using twenty body joint coordinates. From this skeletal information, ten joints are required and six triangles have been constructed along with six respective centroids. The feature space corresponds...
The worldwide electrical energy consumption is progressively escalating and the installed conventional high power station cannot accomplish the demand. Now a days nonconventional energy sources are taking a vital role for the power generation. In this paper modeling of solar PV panel for high frequency application is introduced with the help of boost chopper and high frequency hybrid resonant inverter...
One of the most anonymity centric network, TOR has become a research interest for several applications. As anonymity is very hot topic these days, developing remote administration with untraceable administrator will create huge impact and opportunities for security analysis. The rise of embedded systems, creation of secure server communications and connecting them through TOR will be the dawn of new...
The Internet of Things (IoT) is one of the major technological trends which is utilized to monitor natural and human made resources to help in predicting and detecting exigence events like flood, fire, gas and water leak that can pose an intimidation to human life. This paper proposes a novel wireless prototype of a live weather monitoring station that uploads weather information received from the...
Security of the outsourced data has become the core problem of cloud computing. Many security models have been proposed, among which, CP-ABE has gained popularity in this research area. The Ciphertext-Policy Attribute Based Encryption (CP-ABE) is considered as a propitious tool for fine grained data access in the cloud storage system. The existing CP-ABE scheme with only one authority does not solve...
Matched Subspace Detector (MSD) is a robust detection scheme used for detection of the target primary user signal buried in high-dimensional noise where the target signal is assumed to be placed in low-rank subspace. In this paper we attempt to present the benefits of MSD detector by providing the performance comparison with some other existing blind signal detection techniques and further confirmed...
The authors presented two different optimization methods-one is quantum particle swarm optimization (QPSO) and another is backtracking search algorithm (BSA). Combined with inverse fast fourier transform (IFFT), the paper deals with the synthesis of array of linearly spaced and mutually coupled half wavelength very thin vertical and parallel dipoles with fixed value of voltage standing wave ratio...
This paper presents a unified approach for identification and control of continuous-time signals and systems from its discrete-time representation at high sampling rate. Delta operator is used in developing a unified frame work for identification and control of MISO systems. The philosophy of time moments (TM) is recasted as Delta Time Moment (DTM) and computed from real time input-output data. The...
Quantam-dot cellular automata is a promising nano electronic computational architecture which can be used to process binary information. It performs binary operation using single electrons in arrays of quantum dots. The basic building block in QCA design is a QCA cell which can be used to build basic gates, as well as combinational and sequential circuits. In this paper, design of a real time application...
Photonic bandpass filter is designed at 1.55 μm using double negative refractive index material with air interface for use in optical communication system. Paired nanorod is considered as the DNG material for simulation, and wave propagation thorough the structure is considered along the direction of refractive index variation. Effect of oblique incidence is studied on transmittivity and bandwidth...
Chip size is an important factor considered for implementation in any system for navigational aid. Dual purpose device such as gyro/accelerometer has increased the interest of researchers to reduce the size of the chip, while serving both the functions of gyroscope and accelerometer. This paper presents the design, dynamics and experimental characterization of the acceleration response of 2-DOF drive...
This paper presents some initial observations on the application of fractal shaped slots in a substrate integrated waveguide based leaky wave antenna. Significant to the design issues are obtaining a nearly 1 GHz impedance bandwidth with a second iteration fractal shaped slot ranging from 9.25 GHz to 10.25 GHz. Pattern stability is observed with near identical radiation pattern within the frequency...
The electrical machines with increased number of phases are being used in industry because of their reliableness, firmness, and safeness comparing with 3-phase induction machines and direct current machines. This paper compares the performance of a Five phase Induction Motor with different conduction modes such as 180°, 144°, 153°, and 171° in five phase voltage source Inverter. A comparison is made...
Autonomous mobile robots are capable of moving through an environment where human access is difficult or impossible. Due to the low cost and long life cycle of a passive RFID tag, the identification of an object by passive RFID tags is gaining its popularity. Path (e.g., road) following by mobile robots based on paint line detection has recently been implemented in many countries. This path following...
In this paper a perceptual subspace speech enhancement method using masking property of human auditory system with signal to spectral deviation ratio (SSDR) normalization is presented. The masking property of the human auditory system is used while deciding the gain parameters for the algorithm. Spectral Domain Constrained estimator was employed in determining the filter coefficients and colored noise...
In the domain of Quantum Information processing (QIP), quantum clustering approach plays a vital role for processing information. The quantum clustering technique is basically used for providing effective information navigation and browsing mechanism. There are many classical approach of clustering the documents like k-means clustering algorithm, hierarchical clustering algorithm, information bottleneck...
Various approaches have evolved for the improvement of the performance of microstrip antennas like modifying geometry of the patch, using multilayered substrate, cutting out slots of different shapes from the patch or the ground plane etc. Of late, metamaterial inspired designs are receiving greater attention. The present work focuses on a combination of traditional approach of slot based design and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.