The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The study of Human-Robot interaction faces one of the biggest challenges in measuring the trustworthiness of the robots. The enhancement and the augmentation of the human capabilities using the human robot integration are dependent on the reliability and dependability of the robots. These factors become more significant when the participation of the robot is the human robot integration is active and...
Adaptive control of the research object is the uncertainty of the system to a certain extent, so-called “uncertainty” here refers to describe the mathematical model of controlled object and its environment is not entirely sure, including some unknown factors and random factors. Adaptive control and regular feedback control and optimal control, is also a kind of control method based on mathematical...
Skin melanoma is one of the common and most important cancer among human beings. In recent years, a numerous procedures have been proposed to detect and analyze skin cancer. The initial screening of the skin cancer is carried out visually by a doctor. Later, the suspicious regions are recorded using a digital dermatoscope. In the proposed research work, extraction of the cancerous region from the...
Fast Fourier Transform (FFT) and Inverse Fast Fourier Transform (IFFT) is an integral part of Orthogonal Frequency division multiplexing (OFDM) systems. This forms the physical layer architecture of wireless systems and is designed to consume low power. This paper presents a low power and area efficient architecture for the FFT implementation. FFT involves more complex addition and multiplication...
The Discrete Fourier Transform (DFT) is an important technique in the field of Digital Signal Processing (DSP) and Telecommunications, especially for applications in Orthogonal Frequency Division Multiplexing (OFDM) systems. The Fast Fourier Transform (FFT) is an efficient algorithm to compute the DFT and its inverse. The FFT processor plays a key role in the field of communication systems such as...
This paper compares the performance analysis of a Medium Access Control (MAC) scheme named Distributed Coordination Function (DCF) with a much efficient scheme called Constant Time Contention (CONTI)by varying number of contending nodes, thus suggesting the better scheme with regard to parameters such as delay, throughput, collision rate and jitter. DCF[4], which is used as the MAC scheme for IEEE...
Data replication in data grid increases the availability of data and reduces the total execution time of the grid job. Replica replacement algorithm plays a vital role when storage space is limited. It is this algorithm that decides which replica should be replaced for the new one. The binomial prediction, Least Frequently Used (LFU) and Least Recently Used (LRU) replica replacement algorithms are...
Assessment of aging civil infrastructure should be done periodically to getting information about the structural condition. In context to it, classification, detection, and localization of cracks within these concrete structures is of paramount importance. The most commonly used procedure, i.e. visual inspection, is executed manually by human inspectors, and thus, its accuracy depends on personnel's...
Cloud computing is a sort of computing that is contingent on distribution computing resources preceding having innate servers or specific plans to knob applications. In the cloud computing Cloud storage avoids the need to buy storage and also allows user to access broad range of application and resources immediately, which are hosted by others. But difficulty is our data security is not grauntaneed...
The huge expansion of world wide web has involved a contemporary fashion of conveying the attitude or viewpoint of human being. It is a channel where anybody any visualize opinion and sentiments of different customers. It is also possible to see opinion classified into different categories and ratings given on different products. This information plays a supreme role in sentiment classification task...
Now a days people are enjoying the world of data because size and amount of the data has tremendously increased which acts like an invitation to Big data. But some of the classifier techniques like Support Vector Machine (SVM) is not able to handle the huge amount of data due to it's excessive memory requirement and unreasonable complexity in algorithm tough it is one of the most popularly used classifier...
Job or task scheduling with shared resource is challenging. With the increase in the size of the problem manual or sequential approach fails. Scheduling becomes a costly and tedious process. Not only schedules are ineffective, but also the task to prepare schedules becomes overhead. As the time increases, the associated cost also increases. The allocation of shared resources (M) to jobs (J) such that...
In the modern days, the technology is evolved in all the aspects of our life. The demands on functional and non-functional characteristics such as low power, high performance, small size, light weight, and low cost for the electronic gadgets invites the solution called embedded systems. Experimenter boards from embedded device manufacturers facilitate the users in rapid prototype development. These...
The Twitter micro blogging site is one of the most popular online social media in today's Web. During an important event, such as a disaster event, hundreds of thousands of tweets are posted rapidly on Twitter. The information is posted too fast for anyone to make sense, hence the information needs to be organized in order to utilize the information effectively. It has been observed that many of the...
Bayesian network is a probability, which is based on a probabilistic inference network of graphical and Bayesian formula is the basis of the probability of network. The paper analyzes general Semantic pixel naming and the implementation process and concept of Bayesian per pixel segmentation (BPPS). On this basis, author presents a novel deep learning framework for clustering and information mining...
Image inpainting, also known as disocclusion or image completion is a method of reconstruction of lost or damaged region of an image or video. The art of inpainting is as ancient as art itself. It is done by professional artists in museums. In this paper, an enhanced method is proposed for the object removal using exemplar-based image inpainting. In this method, the image is normalized column wise...
Cloud computing enable users to avail the various services as per their wish. However, the quality about the service and its trust detail is not transparent to the user. In this paper, we propose a fuzzy logic based trust evaluation system that accepts the user's feedback in terms of fuzzy linguistic terms. The appropriate weight for the given feedback is calculated with the fuzzy inference system...
Nowadays all people want something new in every field. If someone is listening to song then selection of song is quite tedious task. So our aim is to identify the best suitable song for user based on his/her MOOD. So we have developed two techniques for prediction of song, first one is based upon some previously played songs and second one takes location factor in to consideration. Every user has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.