The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Glaucoma is one of the most common causes of blindness in the world. The vision lost due to glaucoma cannot be regained. Early detection of glaucoma is thus very important. The Optic Disk(OD), Optic Cup(OC) and Neuroretinal Rim(NRR) are among the important features of a retinal image that can be used in the detection of glaucoma. In this paper, a computer-assisted method for the detection of glaucoma...
Web accessibility refers to the process of making the web resources accessible to all types of users including persons with disabilities, without any barriers. It also benefit others including elderly persons and people in specific circumstances which leads to situation based disability. Hence the idea of universal design is gaining attention in the digital ecosystem. This paper provides insights...
Chaotic sequences may be advantageous for secure communication. In this paper, a spreading sequence based direct sequence/spread spectrum (DSSS) communication system is proposed. The proposed scheme uses chaotic logistic map as the spreading sequences. The performance of the system is analyzed and demonstrated in a single path as well as multipath situation by means of computer simulation with additive...
The density of networks has been growing with the exponential rise in wireless devices demanding greater capacity and better coverage. Highly dense networks require automation of its configuration and optimization in order to make it simpler, faster and adaptive to the network environment. Further, autonomous adaptation makes the network more reliable and efficient. In this paper, a Self Organizing...
Differential cryptanalysis observes the effect of differences of input pairs of a cipher on the differences of its resultant output pairs. The difference of two cipher text is expressed as function of their corresponding plain text difference. In this paper we have focused on differential attack on a basic Substitution-Permutation network. Substitution-Permutation Network is the easiest way to achieve...
The increasing demands by even expanding networks of wireless and mobile devices have put huge strains on the allotted spectrum where challenges are related to providing better quality of service (QoS) and higher channel capacity. Though in this regard, multi input multi output (MIMO) systems are regarded as one of the viable options, their subsequent modification called cooperative MIMO have evolved...
To ensure effective dynamic spectrum access in cognitive radio proper signal classification in fading channels and low signal to noise ratio environment is essential. Due to lack of information about the modulation scheme used it cannot distinguish between signal present is that of the primary or any other secondary user communication. In this paper a multiclass modulation classification hierarchical...
In medical domain, proper set of information fusion is the vital requirement for quantitative interpretation. In this paper, we present a novel feature fusion technique based on two-fold feature projection (FP) for EMG classification. Canonical Correlation Analysis (CCA) transformation is performed on original feature space and wavelet transformation of original feature. Based on subspace learning...
In the authentication and key agreement protocol adopted in LTE, pseudonyms are employed for identity presentation, so that the real identity of the subscriber remains confidential. However, there are occasions where pseudonyms may fail to serve its purpose. In such a situation, there is a backup provision that allows the network to request the subscriber for its real identity. But, here lies the...
A smart grid is an electricity transmission and distribution network that embeds digital and other advanced ICT technologies to sense, monitor, communicate and manage the energy flows, real time electricity asset management, and take online decision from all generation sources to meet the varying electricity demands of end-users. Smart Grids oversees the real time capabilities of the generating, transmitting,...
Remeshing is an important technique used for the improvement of the quality of 3D models. The original features of a particular mesh may distort or change while using certain remeshing techniques. This may impact further processing on the mesh as remeshing is considered as a pre-processing phase for most of the mesh processing operation. So to preserve the geometrical features or the actual unique...
Speech is the most basic means of human communication and contains information regarding message, speaker's identity, dialects, mood and so on. Emotion is an integral part of speech that plays a vital role in the improvement of speech recognition system. The task of dialect recognition also helps in improving the automatic speech recognition (ASR) system for more natural communication between human...
A selective adaptive median filter is proposed for the restoration of gray scale images that are highly corrupted by salt and pepper noise. In this filter at first the noisy pixel is identified and then it is replaced by a suitable value. Here the size of the window automatically increases until it gets its suitable median value to replace the noisy pixel. This proposed algorithm shows better results...
Converting the voice signals (uttered in Maithili language) to text has lots of applications including speaker identification, voice mode interaction, bio-metric identification etc. Most of the research papers reported in literature, till date, concentrated mainly in English. Some works are also available for the languages Hindi, Bengali and Tamil. But working with regional languages like Maithili,...
This study attempts to transform the formant frequencies of the vowels/diphthongs of one variety of the Assamese language to another variety, using a statistical approach based on Gaussian Mixture Models(GMMs). Formants are the resonant frequencies of the vocal tract and are responsible for the differences in quality among different periodic sounds. They can therefore be used to represent regional...
C4.5 decision tree construction algorithm is widely used in medical field. But this algorithm C4.5 does not perform efficiently for mass calculations. Hence, in this paper an effort has been made to combine K-means and apriori algorithm results as the inputs of C4.5 algorithm to get better result. This technique has been applied in synthesized “Prostate Cancer Datasets” and try to achieve a robust...
The need to investigate the atomic constituents of biological network has led to increasing popularity of topological studies. A biological network is a graphical representation of the interactome with nodes and edges. Therefore, graph theoretic measures can be applied to such networks. We have performed an empirical study comparing a number of centrality measures, viz., betweenness centrality, eigenvector...
Mobile applications are increasingly becoming integral part of our daily activity list. These applications are enhancing the comfort in consuming the services rendered in the digital ecosystem. Nonetheless the accessibility of these applications to persons with disabilities has inherent barriers. This paper analyses the accessibility of e-governance based mobile applications for persons with disabilities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.