Learn More
A Deoxyribonucleic Acid (DNA) microarray is a collection of microscopic DNA spots attached to a solid surface, such as glass, plastic or silicon chip forming an array. The analysis of DNA microarray images allows the identification of gene expressions to draw biological conclusions for applications ranging from genetic profiling to diagnosis of cancer. The(More)
Emotion recognition helps to recognize the internal expressions of the individuals from the speech database. In this paper, Dynamic time warping (DTW) technique is utilized to recognize speaker independent Emotion recognition based on 39 MFCC features. A large audio of around 960 samples of isolated words of five different emotions are collected and(More)
This article address a novel emotion recognition system based on the Truncated Gaussian mixture model .The proposed system has been experimented over an gender independent emotion recognition database In the recent past, many models have been listed in the literature based on the emotion recognition, but these papers are more focused towards the speech,(More)
Modular multiplication is an important operation in several public key cryptosystems. This paper brings a novel idea based on the idea in the exponentiation computation. In this paper a new algorithm for modular multiplication for public key cryptosystem is presented. This proposed method is based on the following two ideas.(i) The remainder in regard to n(More)
In this paper, image fusion of filtered noisy image using genetic algorithm for removing impulse noise is presented. Image fusion is the process of combining two or more images into a single image while retaining the important features of each image. It is an important technique used in military, remote sensing and medical applications. Two different(More)
A Deoxyribonucleic Acid (DNA) microarray is a collection of microscopic DNA spots attached to a solid surface, such as glass, plastic or silicon chip forming an array. The analysis of DNA microarray images allows the identification of gene expressions to draw biological conclusions for applications ranging from genetic profiling to diagnosis of cancer. The(More)
Prominence of data streams has dragged the interest of many researchers in the recent past. Mining associative rules generated on data streams for prediction has raised greater research interest in recent years. Associative classification mining has shown better performance over many former classification techniques in Data Mining and Data Stream Mining(More)
We have carried out a series of laboratory experiments on AE monitoring to investigate the fracture behaviour of some dry and water-saturated rock samples of southeast Gujarat and Maharashtra which have been experiencing prolific seismicity in recent years in India. The results obtained from the study of Pavgadh rhyolites and Godhra granites tested to(More)
The aim of an efficient deniable authentication protocol is to enable a receiver to identify the source of a given message but not to prove the identity of the sender. Lu and Cao [7,10] confirmed that the previous protocols had a common weakness in which any third party can impersonate the intended receiver to verify the signature of the given message, and(More)