The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work an introduction to intelligent electric vehicle is presented. Design and development of intelligent vehicle for intelligent behavior quick output, cost is very cheap and it avoided the hurdle in his way so it is called safe intelligent electric vehicle. An introduction of intelligent vehicle that how it changes his performances according to the environment that can adapt the change as...
In this paper, the application of pattern search algorithm (PS) in conjunction with the well known algorithm “particle swarm optimization” (PSO) has been explored in the area of automatic generation control for multi area interconnected thermal power system. The resultant hybrid algorithm named as “hPSO-PS” has been applied to optimize the parameters of proportional integral controllers in the two...
The revolution in utility computing paradigm is brought by Cloud computing which replaces the traditional software installation. The cloud computing service models are basically classified into three parts i.e. software as a service (Saas), Platform as a service (Paas) and Infrastructure as a service (Iaas). There are four deployment models followed by Cloud computing i.e. Public Cloud, Private Cloud,...
This paper presents the design of RISC architecture based multicore processor using the Xilinx® development platform for designing and Spartan-6 FPGA for the implementation of the architecture. The light weight multithreaded kernel module is implemented on the top of the architecture to demonstrate the parallel programming potentials on the same. A task assigned to the processor is managed by the...
This paper presents a new pitch based gender detection algorithm by analyzing the non stationary behavior of speech signal. To find pitch a peak detection algorithm is developed which find the dominant frequencies of vowel part of speech signal and then select the fundamental frequency from them. The evaluation is done on the 200 voice samples by using POC as the accuracy parameter. Gender identification...
This paper deals with the radio propagation models predominantly used for the 4th Generation (4G) of cellular networks generally known as Long Term Evolution (LTE). It is necessary to study the radio wave propagation models at the development level of any wireless communication network or system. A comparative analysis is made among various radio propagation prediction models to assess the appropriate...
The paper presents a unique combination of texture feature extraction techniques which can be used in image texture analysis. Setting the prime objective of classifying different texture images, the Local Binary Pattern (LBP) and a modified form of Gray Level Run Length Matrix (GLRLM) are implemented initially. The next phase involves use of combination of the former two methods to extract improved...
Real handwriting authentication systems need a robust writer identification over a long time period. The paper analyzes signature sessions of the ATV-Signature Long Term Database (ATV-SLT DB). The database contains 6 sessions generated by 27 users over 15 month. The quality change of the verification results over a period of 15 month is examined. 64static and dynamic biometric features from the ATV-SLT...
This paper proposes a biometric system to identify people using common biomedical sensors. A dataset is built by groups of signals acquired from 25 people, and is used in the system. The present proposal applies a combination of principal components analysis and support vector machines to identify people by a group of biometric signals: electrocardiogram, airflow, temperature, pulse oximetry, electromyogram...
A Visual Speech Recognition system is completely dependent on correct extraction of lip contours. The extracted lip contour can be useful in tracking the lip movements in Visual Speech Recognition. The accuracy of the system can be improved by correct extraction of the lip contours. In this paper, a computer vision approach is proposed to automatically extract lip contour from the face image. The...
In this paper, the proposed implementation of a soft-biometric system for automatic age detection from facial images is described. In order to do this, the method followed was that of a classical biometric system. The first step is preprocessing, to enhance the feature extraction. The next step is the parameterization, where techniques like wavelet transformed, discrete cosine transformed or local...
In this work, an application of constrained genetic algorithm (CGA) based optimization approach has been explored for design of low pass and high pass finite impulse response (FIR) digital filters. To accomplish the task of optimal filter design, a novel constraint function has been proposed and integrated with the fitness function in CGA environment. CGA minimizes the fitness function under supervision...
Sentiment Analysis is the process of figuring out the emotions from a piece of writing that whether it is positive, negative or neutral and is used to tell the speaker's attitude. The trend, today, is to consider the opinions of a variety of individuals around the globe before purchasing an item using micro-blogging data. Customers tend to go over a lot of reviews about a particular item before buying...
The exponential growth in digital data over the internet has increased the requirement of a robust and high quality watermarking techniques. In general, the image watermarking techniques embed the binary or grayscale watermark into the cover image or into many multimedia images. In this method, variable visibility factor is used for the insertion of watermark into the low frequency component of the...
An optimization approach to design an efficient 2nd order infinite impulse response (IIR) digital integrator (DI) is proposed using Cuckoo search algorithm (CSA). The unique feature of the proposed approach has been the formulation of the condition for obtaining ideal DC frequency response which has been attained by forcing the sum of the z-term coefficients in the denominator equal to zero during...
Lung cancer is the foremost cause of death in many regions of the world. Early detection betters the chances of survival. PA chest radiography is the most commonly used diagnosis tool for detecting lung tumor, because it is cost effective and requires less radiation dose. Radiologists fail to detect nodule from PA chest radio graphs, at early stage because of complex anatomical structure present in...
Biometrics is gaining a lot of popularity as a tool to authenticate an individual using the unique biometric attributes. The exchange of biometric data over unsecured network channels makes it vulnerable to breach of security by illegal access. To overcome this challenge this paper proposes an efficient and secured chaos based encryption scheme having exceptionally desirable complex behavior which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.