This paper presents a fusion approach called Image and Signal Analysis of Multimedia Content (ISAMC) to provide a fully evolved model for emotion recognition using both external (face) and internal (EEG signals) chara...
详细信息
This paper presents a fusion approach called Image and Signal Analysis of Multimedia Content (ISAMC) to provide a fully evolved model for emotion recognition using both external (face) and internal (EEG signals) characteristics for the same emotional phenomenon. Both image analysis and EEG signal analysis is done using a video stimulus and based on wavelet approach for feature extraction. This novel methodology provides cross-validation of EEG and Image results with self-assessment of the participants and encourages multi-classification with the use of two different classifiers. The encouraging experimental results prove that the efficiency of this method is very high and due to its simplicity it can be a promising tool for emotion recognition.
In this paper, we propose a new image steganography scheme for colored images based on the cluster analysis. In this scheme, we analyze the secret data in order to make its clusters. The secret data can be textual, im...
详细信息
ISBN:
(纸本)9781849198462
In this paper, we propose a new image steganography scheme for colored images based on the cluster analysis. In this scheme, we analyze the secret data in order to make its clusters. The secret data can be textual, image/video or audio/speech. A cluster contains ASCII values of characters if the secret data is text, sample values for audio/speech and pixel values in case it is image/video. We then calculate the difference value between the secret data and the minimum value contained in the cluster. We do not hide actual secret data;the difference value is embedded equally into two channels of the image. The experimental results show that our proposed method has enhanced security as compared to the modified Kekre algorithm [7] and pixel intensity based high capacity data embedding method [9]. Furthermore, our scheme has good hiding capacity, high PSNR value, and very low MSE value.
With the advent of smartphones, mobile-devices have evolved as powerful mini-computers. However, they still suffer from two intrinsic shortcomings, namely limited battery-power and inferior processors compared to thei...
详细信息
Homogeneous algorithms assume that the entire sensor node equipped with equal amount of energy. In this paper, a network model has been proposed which incorporate heterogeneity in term of their energy. The term hetero...
详细信息
Symmetric encryption is widely used to enforce data security and provide other cryptographic primitives. Despite significant research that has led to the development of sophisticated symmetric encryption algorithms, v...
详细信息
A CMOS digitally programmable lossless grounded inductor is presented in this paper. It uses two digitally programmable second generation current conveyors (DPCCII) and three grounded passive elements including one ca...
详细信息
A CMOS digitally programmable lossless grounded inductor is presented in this paper. It uses two digitally programmable second generation current conveyors (DPCCII) and three grounded passive elements including one capacitor only. The inductance value is tuned by programmable gain factor of current conveyor. As an application, a current mode multifunction filter has been realized using proposed programmable inductor. The simulation results have been demonstrated and discussed using a SPICE simulation.
Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on...
详细信息
Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on. Task scheduling in an important aspect of distributed computing. As grid computing is a form of distributed computing with heterogeneous resources working in a shared environment with no central control. The main aim of Grid scheduling is to increase the system throughput and to satisfy the job requirements from the available resources. This work proposes a secure requirement (SRP) prioritized task-scheduling algorithm for grid computing. This algorithm is based on scheduling the jobs based on the resource requirement of the jobs which considers the memory requirement as the resource requirement of the jobs. It is named as the secure requirement prioritized (SRP) scheduling algorithm as the jobs memory requirement is passed to scheduler in encrypted form. It is compared with one of the widely used grid scheduling algorithm MinMin and has been tested in simulated grid environment. The experimental results showed a significant improvement in terms of makespan and system utilization.
This paper presents the relative merits of IR and microwave sensor technology and their combination with wireless camera for the development of a wall mounted wireless intrusion detection system and explain the phases...
详细信息
This paper presents the relative merits of IR and microwave sensor technology and their combination with wireless camera for the development of a wall mounted wireless intrusion detection system and explain the phases by which the intrusion information are collected and sent to the central control station using wireless mesh network for analysis and processing the collected data. These days every protected zone is facing numerous security threats like trespassing or damaging of important equipments and a lot more. Unwanted intrusion has turned out to be a growing problem which has paved the way for a newer technology which detects intrusion accurately. Almost all organizations have their own conventional arrangement of protecting their zones by constructing high wall, wire fencing, power fencing or employing guard for manual observation. In case of large areas, manually observing the perimeter is not a viable option. To solve this type of problem we have developed a wall-mounted wireless fencing system. In this project I took the responsibility of studying how the different units could be collaborated and how the data collected from them could be further processed with the help of software, which was developed by me. The Intrusion detection system constitutes an important field of application for IR and microwave based wireless sensor network. A state of the art wall-mounted wireless intrusion detection system will detect intrusion automatically, through multi-level detection mechanism (IR, microwave, active RFID & camera) and will generate multi-level alert (buzzer, images, segment illumination, SMS, E-Mail) to notify security officers, owners and also illuminate the particular segment where the intrusion has happened. This system will enable the authority to quickly handle the emergency through identification of the area of incident at once and to take action quickly. IR based perimeter protection is a proven technology. However IR-based intrusion detection system
Gender identification has its unique importance in sports and forensic sciences. However, the social issues are major constraints to identify the gender of a human being. A novel approach for gender classification usi...
详细信息
Message security in multi-hop infrastructure-less networks such as Mobile Ad Hoc Networks has proven to still be a challenging task. A number of trust-based secure routing protocols have recently been introduced which...
详细信息
暂无评论