The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel integrated approach to Cognitive Radio environment with Radar signals of type linear frequency modulation (LFM) as Primary User (PU) is suggested in this paper. The approach consists of spectrum sensing of Radar signals through Wigner-Hough transformation process integrated with the learning and adaptation using Multi-Objective Genetic Algorithm (MOGA) for dynamic spectrum allocation. The...
Multi sensor target tracking is well known to have advantages over single sensor target tracking in many applications. Observational data from sensors, may be fused at different levels, ranging from the raw data level to feature level, or at decision level. This paper presents an experimental comparison of an averaging model of Kalman filter fusion and variance based fusion in estimating the position...
Recent surveys show that the number of road accidents has increased predominantly. One of the major causes to which increased accidents are attributed to is physical ailment of drivers. Continuous monitoring of driver's health condition is essential in order to reduce car accidents that occur due to health abnormality. A non-intrusive method is demanded so as to prevent hindering of driving activity...
The storage requirement for digital video is growing day-by-day due to increase in video quality. In order to reduce the file size while maintaining the required quality, a novel compression algorithm is needed. In this paper, an Adaptive Rood Pattern Search (ARPS) is used as the Motion Estimation (ME) and Motion Compensation (MC) technique and ARPS is integrated with the proposed Rate Distortion...
Mammography is an X-ray imaging technique for diagnosing breast tumour. Segmentation of tumour in the mammogram images are difficult task because they are poor in contrast and the lesions are surrounded by tissue with similar characteristics. In this paper, an automatic detection algorithm is proposed to segment the suspicious masses or lesions. Mammogram images are analyzed by wavelet and the algorithm...
Tongue and Ear plays a major role for speaking and hearing by normal person. But it is impossible to speak and hear by deaf and dumb people. But they normally speak using their sign action with others. It is easily understood by their community, but they fell difficult when they communicate with normal people because normal person can't able to understand their sign symbol. To tackle this situation...
The Max-Log-MAP is a Soft Input Soft Output (SISO) algorithm, which determines the probability of most likely path through the trellis and hence it gives sub optimal performance compared to Log-MAP algorithm. A simple but effective technique to improve the performance of Max-Log-MAP (MLMAP) algorithm is to scale the extrinsic information exchanged between two decoders using appropriate Scaling Factor...
Steganography is the art of hiding data in a medium without making it apparent that the medium contains a message. Various techniques for Steganography have been proposed in different mediums by researchers. The most commonly used form of Steganography is the LSB (Least Significant Bit) Steganography in which the Least Significant Bit of a byte is changed. Here, we propose a variable higher bit approach...
Today organizations in all industries particularly financial services, retail and communications are increasingly dependent upon IT and a highly available network to meet their business objectives. The necessity for change increases with the market demand and technology. Though there are many existing change management approaches to satisfy the normal changes, they fail to support the evaluation of...
Web services describe the standardized way of integrating the web based applications using XML, SOAP, WSDL and UDDI. A service oriented application is developed by composing suitable services available in the registry. Monitoring of the services is enabled using Apache Jmeter, in which the load and the invocation time for each service is specified which in turn helps to simulate the response time...
IEEE 802.11ac, also known as gigabit Wi-Fi is the latest and emerging wireless local area network (WLAN) standard. The Very High Throughput (VHT) of the order of Gbps can be achieved primarily with two important modifications when compared with the previous 802.11n standard. The first one is the increased number of spatial streams (8 as compared to 4 in 11n standard) and the second one is the support...
Recent times, a new communication archetype called Network Coding (NC) has emerged in which the mediator nodes allowed to carry out encoding and decoding operations on the information they receive. Network capacity of any communication network can be enhanced through this network coding strategy. Mobile Ad-hoc Networks (MANET) often consist of large number of mobile nodes that are strictly power constrained...
The liver is necessary for survival and is also prone to many diseases. CT examinations can be used to plan and properly administer radiation treatments for tumors and to guide biopsies and other minimally invasive procedure. Manual segmentation and classification of CT image is a tedious task and time consuming process which is impractical for large amount of data. Fully automatic and unsupervised...
A Mobile Ad-hoc Network (MANET) is a self-organized system comprised of mobile wireless nodes. It does not have centralized administration. So MANETs in open environment, easily attacked by malicious nodes because any node can join at any time in the network. AODV is a most traditional routing protocol used for MANET, which selects the shortest path for routing and it affects the data communication...
One of the challenges of CSUL (Computer Supported Ubiquitous Learning) research is capturing what learners have learned with the contextual data, and reminding the learners of it in the right place and the right time. This paper proposes a ubiquitous learning log system called SCROLL (System for Capturing and Reminding Of Learning Log). Ubiquitous Learning Log (ULL) is defined as a digital record...
A distributed environment is one in which intrusions are prevalent and drastically affect the performance of the networks. Therefore a need for Intrusion Detection Networks arises. Collaborators could be used here to enhance the detection of attacks. But still this concept suffers from lack of trustworthiness in the distributed environment. We introduce Mobile Agents (MA) to handle this problem effectively...
In Grid computing environment, as the resources are more heterogeneous, geographically distributed, complex and owned by different organizations, they are more prone to failures. Application scheduling in such a environment is very crucial. Generally, during application/job scheduling only performance factor of resources are considered. But if a node with high computational power also have high failure...
Cloud computing is a key computing platform for sharing resources that includes IaaS, Saas, PaaS and business process. This provides many benefits for the users to create and store health care data on the cloud thereby utilizing fewer resources in the client system. The proposed system mainly focuses on health care data security. To reduce the increase in cost of hospitalization, researchers are building...
Feature Selection extracts the more informative and distinctive features from any dataset to improve the classification accuracy. Evolutionary and swarm intelligent algorithms play a vital role in optimizing the process of FS. Artificial Bee Colony algorithm is a popular swarm intelligent, metaheuristic search algorithm and it has been widely used in solving numerical optimization problems. In our...
Handwritten numeral character recognition has been an intensive research in the field of artificial intelligence since many decades. This paper proposes a radial basis function neural network model for recognizing handwritten numerals. The geometric shape of handwritten numerals is described by computing a feature vector based on the skeleton of the images. The normalized central moment features are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.