As a result of this reported research, a simulation model to analyse the behaviour of carbon nanotube field effect transistors (CNTFETs) under non-ballistic conditions is explained and the effect of gate dielectric on...
详细信息
In this work, we present an approach for detecting the text present in videos/scene images based on morphological gradient information. The system detects the gradient information using morphological operations and th...
详细信息
In this work, we present an approach for detecting the text present in videos/scene images based on morphological gradient information. The system detects the gradient information using morphological operations and the obtained results are binarized. The resultant binarized image contains some non-text regions which are then morphologically opened so that the small components with less than 4-pixel connectivity are eliminated producing another binary image. Finally, we employ connected component analysis and morphological dilation operation to determine the text regions and hence to localize text blocks. The experimental results obtained on publicly available standard datasets illustrate that the proposed method accurately detect and localize texts of various sizes, fonts and colors in videos and scene images.
To increase the security of messages sent over internet steganography is used. Various steganography techniques have been proposed so far. Least Significant Bit steganography is one such technique in which least signi...
详细信息
To increase the security of messages sent over internet steganography is used. Various steganography techniques have been proposed so far. Least Significant Bit steganography is one such technique in which least significant bit of pixels of the image is replaced with data bits. This approach has the advantage that it is simplest one to understand, easy to implement and results in stego-images that contain embedded data as hidden. The disadvantage of Least Significant Bit is that it is vulnerable to steganalysis and is not secure at all. So as to make it more secure, the least significant bit algorithm is modified to work in different way. This proposed approach simply does not pick up least significant bits of pixel in a sequence but is combined with midpoint circle approach to choose which pixels are used to hide message. The goals of this paper are to present theoretic analysis of Least Significant Bit approach and to propose an advanced LSB embedding scheme that exhibits not only the advantages of LSB but also provides additional level of security. The scheme breaks the regular pattern of LSB, resulting in increased difficulty of steganalysis and thereby raising the security level.
The Mobile Ad Hoc Network is a self controlling infrastructure-less wireless network with no unify administration with numerous characteristics like dynamic topology, multi hop routing, distributed routing and many mo...
详细信息
The Mobile Ad Hoc Network is a self controlling infrastructure-less wireless network with no unify administration with numerous characteristics like dynamic topology, multi hop routing, distributed routing and many more. MANETS are vulnerable to both active and passive attacks in the network. Jelly Fish attack downgrade the network performance and affects the network parameters like end to end delay, packet delivery ratio, throughput and energy spent. The end to end congestion control mechanism of Transmission Control Protocol is exploited by the Jelly Fish Attack. The main aim of this paper is to propose a novel mechanism for counterfeiting and combating the effect of Jelly Fish attack in the network using genetic algorithm.
In this paper, we propose to explore the possibility of integrating the appearance based paradigm with frequency domain for off-line signature verification. The proposed approach has four major phases : Preprocessing,...
详细信息
ISBN:
(纸本)9781479930814
In this paper, we propose to explore the possibility of integrating the appearance based paradigm with frequency domain for off-line signature verification. The proposed approach has four major phases : Preprocessing, Feature extraction, Feature reduction and Classification. In the feature extraction phase, Discrete Cosine Transform (DCT) is employed on the signature image to obtain the upper-left corner block of size m × n as a representative feature vector. These features are subjected to Linear Discriminant Analysis (LDA), thus reducing the feature vector to represent the signature with optimal set of features. The merits of DCT that captures the significant information in a small pack of coefficients is fed into discriminant analysis for further compact representation. The proposed approach, DiscriminativeDCT - MLP combines the benefits of two domains, yet does not suffer from their individual limitations. The optimal representative features from all the samples in the dataset form the knowledge base. Further, the Multi-layer perceptrons (MLP), a well known classifier is used for classification and the performance is measured through FAR/FRR metrics. Experiments have been conducted on standard signature datasets namely: CEDAR and GPDS-160, and MUKOS, a regional language (Kannada) dataset. The comparative study is also provided with the well known approaches to exhibit the performance of the proposed approach.
Text clustering is the method of combining text or documents which are similar and dissimilar to one another. In several text tasks, this text mining is used such as extraction of information and concept/entity, summa...
详细信息
Text clustering is the method of combining text or documents which are similar and dissimilar to one another. In several text tasks, this text mining is used such as extraction of information and concept/entity, summarization of documents, modeling of relation with entity, categorization/classification and clustering. This text mining categorizes only digital documents or text and it is a method of data mining. It is the method of combining text document into category and applied in various applications such as retrieval of information, web or corporate information systems. Clustering is also called unsupervised learning because like other document classification, no labeled documents are providing in clustering hence, clustering is also known as unsupervised learning. A new method called Hierarchical Agglomerative Clustering (HAC) which manages clusters as tree like structure that make possible for browsing. In this HAC method, the nodes in the tree can be viewed as parent-child relationship i.e. topic-subtopic relationship in a hierarchy. HAC method starts with each example in its own cluster and iteratively combines them to form larger and larger clusters. The main focus of this work is to present a performance analysis of various techniques available for document clustering.
DeConverter is core software in a Universal Networking Language(UNL) system.A UNL system has EnConverter and DeConverter as its two major *** is used to convert a natural language sentence into an equivalent UNL expre...
详细信息
DeConverter is core software in a Universal Networking Language(UNL) system.A UNL system has EnConverter and DeConverter as its two major *** is used to convert a natural language sentence into an equivalent UNL expression,and DeConverter is used to generate a natural language sentence from an input UNL *** paper presents design and development of a Punjabi *** describes five phases of the proposed Punjabi DeConverter,i.e.,UNL parser,lexeme selection,morphology generation,function word insertion,and syntactic *** paper also illustrates all these phases of the Punjabi DeConverter with a special focus on syntactic linearization issues of the Punjabi *** linearization is the process of defining arrangements of words in generated *** algorithms and pseudocodes for implementation of syntactic linearization of a simple UNL graph,a UNL graph with scope nodes and a node having un-traversed parents or multiple parents in a UNL graph have been discussed in this *** cases of syntactic linearization with respect to Punjabi language for UNL relations like 'and','or','fmt','cnt',and 'seq' have also been presented in this *** paper also provides implementation results of the proposed Punjabi *** DeConverter has been tested on 1000 UNL expressions by considering a Spanish UNL language server and agricultural domain threads developed by Indian Institute of Technology(IIT),Bombay,India,as *** proposed system generates 89.0% grammatically correct sentences,92.0% faithful sentences to the original sentences,and has a fluency score of 3.61 and an adequacy score of 3.70 on a 4-point *** system is also able to achieve a bilingual evaluation understudy(BLEU) score of 0.72.
The trends and necessity of running business organizations from multi-locations and multi-nations caused huge demand for distributed databases. The performance of any distributed database is highly depends on th e fra...
详细信息
The trends and necessity of running business organizations from multi-locations and multi-nations caused huge demand for distributed databases. The performance of any distributed database is highly depends on th e fragmentation of global relations and allocation of those fragments at different sites of the network. The data or fragment allocation ma y be performed either by static or dynamic ways. By efficiently allocating fragments in a dynamic way, performance of the distributed business organizations can be enhanced. This paper proposed an extended approach to dynamic fragment allocation in Non-Replicated distributed database systems which additionally include distance factor besides already existing factors like access threshold, access time constraints, and volume of data transmission. This ext ended fragment allocation approach will enhance fragment allocation in broader sense and also improves the overall performance of the system.
As providers of higher education begin to harness the power of big data analytics, one very fitting application for these new techniques is that of predicting student attrition. The ability to pinpoint students who mi...
详细信息
In cellular networks, blocking occurs when a Base Station has no free channel to allocate to a mobile user. There are two kinds of blocking. New call blocking refers to blocking of newly originated calls and the hando...
详细信息
In cellular networks, blocking occurs when a Base Station has no free channel to allocate to a mobile user. There are two kinds of blocking. New call blocking refers to blocking of newly originated calls and the handoff dropping refers to blocking of ongoing calls due to the mobility of the users. From the user's point of view, the service of a handoff request is more important, as the forced termination of an ongoing call is more annoying than the blocking of new calls. In this paper, an adaptive guard channel based call admission control scheme is proposed which also deals with the problem of non-uniform traffic demand in different cells of the cellular network. A common set of channels are determined dynamically which can be used simultaneously in all the cells. Cell tiers with different radii are used to cope with the interference introduced by using same set of channels simultaneously in all cells. The adaptive guard channels alleviate the considerable amount of increase in the new call blocking probability due to guard channels while it can still protect handoff calls. The performance of the proposed scheme is presented in terms of call blocking probability, call dropping probability and channel utilization. Simulation results show that the proposed scheme can reduce the call blocking as well as call dropping significantly in highly congested cell.
暂无评论