The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Eliminating Shadows from the acquired images is an important preprocessing task for image analysis. In the work a novel shadow removal technique has been developed to eliminate shadows from the images acquired from the rice fields. Since the images are from the agricultural field, to remove shadow, vegetative indices, Normalized Difference Greenness Index (NDGI) and Redness Index (RI) of the image...
A PCB is a thin board made of fiberglass with electrical wires printed onto the board, connecting the central processor to other components on the board For inspecting the PCB, the image of the bare PCB is captured and visually inspected to find the defects. In this paper we propose a system where the reference image is obtained from a CAD file. The inspection image is the captured image of the PCB...
As the window system are affected by the malicious code, the vulnerability on the system are more. The behavior based monitoring is used to avoid the polymorphic malicious code. Signature based detection system or fixing these vulnerabilities are not the efficient method. Thus the behavior based monitoring is used to avoid malicious code in window system. Some of them hook high level system APIs to...
Whenever a research scholar starts working on some innovative ideas he/she searches for the domain specific technical research articles published as research papers in most of the international journals, conferences or workshops. The problems associated with these papers are similarity in contents and repeated relevant information. Reading these all relatedpapers completely one by one to get the latest...
Data acquisition systems, as the name implies, are products and processes used to collect information to document or analyze some phenomenon. We used Field Programmable Gate Array (FPGA) based data acquisition and data monitoring system. For the data acquisition and data monitoring we have used a Yagi-Uda 7-element simple dipole antenna and folded dipole with reflector, as a part of our experiment...
Measuring the semantic similarity between words is an important component in various tasks on the web such as relation extraction, community mining, document clustering, and automatic metadata extraction. Despite the usefulness of semantic similarity measures in these applications, accurately measuring semantic similarity between two words (or entities) remains a challenging task. This survey propose...
In general applications such as image processing signal processing and many similar applications find most of the work is done through multipliers to execute complex instructions. We generally use low order compressors for this multiplication operations. In this proposed paper, we are using higher order compressors to execute the multiplication operation. As these compressors have less delay, low...
Artificial Intelligence and web when amalgamated, it may produce miracle in terms of semantic web. E-learning works efficiently only when E-Content preparation is need based, searchable through semantic similarity between keywords. This paper describes a e-content/e-book preparation from existing available contents on a selected topic/topics, based on a semantic similarity between particular keywords...
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output...
This paper brings out the limitations of Semi-structured based web mining i.e. Web 2.0 Technologies to an end and applying the feasibility of Structured based mining — Semantic Web/ Web 3.0 to implement the proposed methodology as the Recruiter's Assistant/Training Library Tool. Semantic Web which represents data over web not only for display, but also for machine to understand -Meaningful Retrieval...
For the Adaptive Beamformer (ABF) of the RADAR to direct the main beam towards the desired target while placing nulls at the interfering jammer signals, the angle of arrival of all the incoming signals should be known beforehand[7]. Direction Of Arrival (DOA) estimation algorithms computes the angle of arrivals of incoming signals, which are given as an input to the ABF. In this research work two...
In order to reflect the importance of webpages in the web mining result, an algorithm based on regular expression constraints, is presented for mining weighted closed sequential patterns. At first, scans the sequence database once, finds all the weighted frequent items and make a sparse matrix to identify significant item set and satisfying minimum support and the minimum weighted support count. Secondly,...
This paper introduces a soft computing based signal processing approach that simplifies the analysis of clutter problem. This is done by using a fuzzy logic algorithm to mitigate low angle land clutter. The proposed clutter mitigation method will be helpful to address the problem of false alarm in vehicular safety application.
Clustering is an unsupervised learning technique in that there is no explicit demarcation of data as training and test data. Clustering aims to group related records by measuring similarities among the attribute. Major phase of clustering techniques is similarity measurement and it is based on different factors and parameters. The improved Nonnegative Matrix Factorization (NMF) based TCLUST (T-Clustering)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.