Artificial neural content techniques for audio indexing system
With the digital technology getting inexpensive and popular, there has been a tremendous increase in the volume and availability of audio through cable and Internet such as music on demand. Currently several web sites host audio and provide users with the facility to browse and watch online audio clips. Due to enhancement in technology in the recent years lots of music is available as handy media for various devices. Thus there is an urgent need of analyzing music for storage, indexing and retrieval. In this paper we aimed at classifying music on the basis of their audios. We have identified three audios for this purpose: happy, angry and sad. These cognitive styles have few things in common. Identifying and extracting these features is a challenging problem. On the basis of our observations and literature review we have identified the eight features namely energy, entropy, zero-crossing rate, spectral rolloff, spectral centroid, spectral flux, RMS of signal and MFCC. After extracting features we have used neural network based training for classification. We have used Artificial Neural Content Techniques and neural net tool for this purpose. We have populated a database of 150 songs consisting of 50 songs of each category. In this population 90 songs are used for training set and 60 for testing. The experimental results demonstrate the effectiveness of our classification system. We have obtained an overall accuracy of nearly 75%. The complete system is developed in ARTIFICIAL NEURAL NETWORK of the system.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Comparative study of cache optimization techniques
The power consumption of modern microprocessors is a primary design limitation across all processing domains, from embedded devices to high performance chips. Reducing feature sizes and increasing numbers of transistors residing on a single die only impairs this issue. Schemes are immediately required to handle this issue, yet still deliver high performance from the system. Architectures have several options for the organization cache. Typically, there are two approaches to improve the efficiency of the cache: either by increasing the number of “live” blocks residing in the cache —while keeping the capacity of the cache intact— or by dynamically adjusting the cache size to the actual requirements of the executing applications. In this paper we have compared some proposed methodologies from selective research papers for improvement of cache performance. The first one resizes cache and unused part is gradually decayed i.e. stop producing hits. In second approach cache is divided into hierarchy, which is searched in sections one by one to get a required hit. Finally, in third approach we re-configure our cache by using a configuration vector that is loaded with a new configuration before an application is started.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Mitigating Insider Data Theft Attacks in the Cloud
Cloud computing promises to significantly change the way we use computers and access and store our personal and busi-ness information. With these new computing and communica-tions paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
The use of SET protocol in telemedicine
Although electronic commerce has a lot of advantages it suffers from technological and non-technological limitations as well which have hindered its growth and acceptation. The imagination of insecurity and the lack of internationally accepted standards for quality, security and reliability are among the most important technological and non-technological obstacles facing electronic commerce. The insecure imagination of this technology has led to carrying out financial transactions by customers using traditional methods. Now, the question is raised that how the security of electronic financial transactions can be guaranteed for customers? Secure electronic transaction (SET) is one of the most important security protocols and guarantees the security of transactions of any kind. The present article explains the use of this protocol and the method of applying it in Telemedicine. Also, advantages and disadvantages of using SET will be discussed.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Backend analysis and implementation of LMS adaptive filter using VLSI technology
The role of electronic equipments in the industry has increased tremendously in recent past. With new technologies and techniques being considered in other domains, such as automotive, multimedia communications, mobile applications bring down the cost of the electronic gadgets. As the cost factor controls the reliability and volume issues, there is a need for design and development of low cost, reliable technology for industrial applications. The proposed techniques have been modeled using Verilog HDL and the models have been verified using test benches with a functional coverage of 95%. The results obtained have been compared with MATLAB results, which are considered to be a benchmark. The HDL (Hardware Description Language) code is synthesized using Synopsys Design Compiler targeting 130-nanometer TSMC (Taiwan Semiconductor Manufacturing Company) library and target technology. The synthesized netlist obtained for all the adaptive filtering techniques proposed in this research work is taken through physical design flow consisting of Floorplanning, Placement and Routing steps. The results obtained at each step are simulated for the functionality. The final GDSII (Graphical Design Standard II) file is generated for the proposed techniques.. The floor planning, placement and routing of the netlist ensures that the overall size for the entire chip does not exceed by 2.15 square millimeters. The results obtained for adaptive filtering techniques have proven that the complexities in the industrial applications can be met if the design is implemented on ASIC.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design of MEMS resonator for Reliability and Robustne comsol Multiphysics
The variability of design parameters caused by material properties is a major challenge in designing microelectro-mechanical systems (MEMS). The function of MEMSs is significantly influenced by this variability. We consider a thin-film resonator to show how the influence of scattering design parameters affect the behavior of the resonator. Here we used different material properties such as material density, poisson’s ratio, young’s modulus to analyse the performance of resonator
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Effect of concrete cover on crack width of RC beams
This paper describes an experimental investigation to clarify flexural cracking behavior of reinforced concrete beams. The effects of thickness of concrete cover of tension reinforcement on the crack width were carefully investigated. It was found that flexural crack width proportionally increases with increase in thickness of concrete cover. To control these crack widths and to enhance durability, different codes prescribes limiting crack width based on environment in which the structure exists. The latest revision of the Indian code stresses the importance of durability and has introduced formulae to calculate the crack widths. A simple formula involving the clear cover and calculated stress in reinforcement at service load has been included in latest revision of ACI code. A total six under reinforced beams with varying concrete cover (25 mm and 30mm) were fabricated and tested. Data presented include the deflection characteristics and cracking behavior. The experiment results compare reasonably well with the current codes of practice. It was observed that a beam with less concrete cove (25mm) reduces the flexural crack width.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Enhancing Image Security and Data Hiding using NVSS
Visual Secret sharing (VSS) suffer from secret transmission risk as the shares in VSS appear as meaningful image or noise like image. In order to overcome such problem a new Natural image based Visual Secret Sharing (NVSS) scheme was presented. Using NVSS scheme one can distribute a secret image using n-1 natural images and one noise image. It does not modify the contents of natural images. The encryption phase extracts features of every natural image. The secret image is converted to a share by performing computations on secret image and feature extracted from natural images. On the other hand the secret image is retrieved by performing computations on the share and the feature extracted from natural images. This scheme can be used to decrease the risk of transmission and also resolve the management problems. In our proposed system steganography is included to NVSS scheme to securely transfer data by hiding it behind the secret image. To increase the security further this secret data is encrypted before performing steganography. Hence the secret data is in encrypted format. This secret image is then converted into share which is finally embedded in cover image. This proposed scheme is able to share black and white, grey level or color images secretly. Also this scheme is easy to implement.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Implementing cancellation of 50 Hz interference in ECG
As the world’s population grows, the need for health care increases. This necessity has caused the invasion of engineering methods in medical field. A remote sensor is connected to an amplifier via a length of cable in order to measure the required parameter in the medical field. The amplifier output contains not only the sensor signal, but also a 50- or 60-Hz component due to stray pickup from power mains. Pickup of this type is often associated with sensitive high-impedance sensors like microphones and electrodes. Such hum may prove to be merely bothersome in a high-fidelity sound reproduction system, but it can be overwhelming when attempting to measure very small voltages, such as is found when trying to obtain a patient’s electrocardiogram (ECG). This paper briefs the implementation of Adaptive noise cancellation algorithms such as LMS algorithm and RLS algorithm using MATLAB 6 (R12) suitable for real time implementation, which can be used during measurements, will be developed.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Performance of self compacted concrete under shear and torsion with fly ash and steel fibers
The purpose of this research is to investigate the use of varied steel fibres with different aspect ratio in structural concrete to enhance the mechanical properties of self compacted concrete(SCC). The objective of the study is to determine and do the comparative study of the properties of concrete containing no fibres and concrete with fibres, as well as the comparison on the effects of different type and aspect ratio of fibres to the self compacted concrete. This investigation was carried out using several tests, which included workability tests of SCC, shear test, torsion test, moment etc
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]