The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid increase in the demand for Internet of Things services, securing the information content delivered among various entities involved in the IoT architecture has become an important issue. Accordingly, the problem of Internet of Things security has become more and more challenging day-by-day. As IoT systems are very diverse in their requirements and implementations, here specifically focus...
This paper focuses on the designing of Integer order & fractional order PID controllers. Various tuning techniques are used for the designing of the PID controllers and the Fractional order PID controllers (FOPID). Ziggler Nicholas method, Cohencoon, Astrom-Hagglund (AMIGO), Chien-Hrones-Reswick methods are used to find proportional, derivative & integral parameters of PID & FOPID. Nelder...
There has been unprecedented growth of spatial data encountered in different application domains and their analysis has become more important and practically relevant. Clustering is one of the important tasks in spatial data mining and its issues have been extensively studied. In this paper, we propose a new hybrid approach for data clustering. Initially the proposed approach exploits spatial fuzzy...
Electric power systems constitute the fundamental infrastructure of modern society. Though continental in scale, they have virtually penetrated across places. Thus, access to electricity is a challenge during the blackout situation. Though failures are rare events, when they occur cause an catastrophic effect on the society on the whole. The services have to be restored as quickly as possible in order...
Breast Cancer is the most common incursive cancer which is found in females all through the world. of all the female cancers it comprises of 16% and it accounts for 22.9% of invasive cancer in women. of all the cancer deaths 18.2% are from breast cancer which includes males and females. As the modern science is improving many researches and techniques have been emerged to eradicate this dreadful disease...
Data mining has gained much importance in the field of research these days. It makes perfect blend for analyzing data of any fields and provide decision based output. Data generation and storage these days are done at high speed. Non stationary systems play holistic role in providing such data. Availability of such data creates scope of analysis for researchers. Such data which are continuous, unbounded,...
A The paper presented here mainly focus on the Current mode Schmitt trigger designed on the basis of ZC-Current Differencing Transconductance Amplifier (ZC-CDTA). The ZC-CDTA used in this proposed circuit is well suited for signal processing applications and biomedical applications. This circuit implementation has been carried out using voltage supply of about ±0.85V and bias current of about 20μA...
This paper describes the design of a low area, power efficient and high performance Fast Fourier Transform (FFT) processor using an energy efficient adder architecture and a mod-ified booth multiplier architecture in place of the ordinary CMOS logic adder circuit and multiplier circuit, respectively. Variable supply voltage (VSV) scaling was implemented in the processor which is an efficient way to...
Human beings have the ability to express their emotions and feelings through the speech but some unfortunate ones do not have the ability. They cannot speak and listen. This paper presents a man machine interface using video camera. The system will use a single, color camera mounted above a neutral colored desk surface next to the computer. The output of the camera will be displayed on the monitor...
In this Computer world, E-mail is one of the popular modes of communication due to its easy accessibility and low cost. Due to the advantages of time, speed and cost effectiveness, a lot of people use it for commercial advertisement purposes resulting in unnecessary e-mails at user inboxes called spam. Spam is the unnecessary and unwanted commercial e-mail. It is also known as junk e-mail. It is sending...
Resource sharing is a very efficient mechanism to reduce FPGA resources for realizing several application categories. In the context of realizing signal processing datapath in area efficient applications several researchers attempted to Resource sharing. The present work demonstrates realizing FSK receiver on small Xilinx FPGA. In this work FSK demodulator architecture is simulated using MATLAB tool...
It is common knowledge that conventional testing practices are tedious, costly and unproductive. This paper strives to explore the advantage of using combinatorial test design over conventional testing. An empirical study has been done with business applications to analyze the difference in effort for both methods and the results have been discussed. This study is conclusive as far as the reduced...
Region duplication or copy move forgery is a common type of tampering scheme carried out to create a fake image. The Held on blind image forensics depends upon the authenticity of the digital image. As in copy move forgery the duplicated region belongs to the same image, the detection of tampering is complex as it does not leave a visual clue. But the tampering gives rise to glitches at pixel level...
The requirement in addition to consequences in refining efficiency of energy in cloud applications have enlarged owing to speedy evolution and explosion of data center amenities everywhere in the globe. Virtual machines (VMs) embrace pillar of utmost and are frequently associated on the Physical Machine (PM) towards proficiently employ its assets. Various workload scheduling algorithms are proposed...
To meet the demand for low data rate, low power and cost-effective wireless communication IEEE 802.15.4 has grown its popularity. As it has low power it is potentially susceptible to interference by other wireless technologies with much higher power that also works in the same 2.4 GHz ISM band such as IEEE 802.11 standard, Bluetooth, and microwave. IEEE 802.11 standard operate random file transfer...
Denial of service attack is one of most interesting attack of network because of this network bandwidth utilization increase. To prevent this attack using various techniques. In our proposed work we give trust or repuatation base technique in which sender and receiver send data using encryption and decryption. Novality of our work we provide by our result.
In this paper, an efficient Dynamic voltage and frequency scaling (DVFS) for multi precision multiplier on reconfigurable FPGA is proposed. This paper is focusing on implementation of multiplier which works on runtime data with lower supply and clock frequency. Multipliers plays important role in arithmetic operations and it is power consuming part of circuit. This system is designed to address the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.