The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An investigation comparative of many descriptors of various images in content-based image retrieval system (CBIR) is described in the paper. This paper describes more number of various features in CBIR system and compare the four different Color and texture based existing low level Feature Extraction Techniques such as Tamura Texture Features, RGP Color Histogram, Gabor Features and Joint Picture...
Saliency detection is one of the prominent areas of research since it is used in many computer vision applications. In this paper a visual saliency model is proposed which is bottom-up approach that is used to detect salient regions of an image. The proposed system combines two properties to find the salient regions. First, the proposed system uses a special image descriptor called image signature...
The purpose of Text Mining is to process unstructured (textual) information, extracting meaningful numeric indices from the text, and, thus, make the information contained in the text accessible to the various data mining (statistical and machine learning) algorithms. Information can be extracted to derive summaries for the words contained in the documents or to compute summaries for the documents...
The paper proposes a new image watermarking technique for digital media that can embed a specified watermark image in the cover image without affecting the imperceptibility and increase the security of watermarks. Watermarking techniques based on DCT (Discrete Cosine Transform) and Wavelet Transform are studied, whereas by using wavelet packet transform the robustness of the technique can be achieved...
The future user needs in the field of Multimedia retrieval is the focus of many research and development activists. It is empirically observed that no single algorithm is efficient in extracting all different types of images like building images, flower images, car images and so on. Hence a thorough analysis of certain color, texture and shape extraction techniques are carried out to identify an efficient...
Cognitive Radio (CR) is an efficient means to improve the under employment of scarce spectrum resource [1]. The proposed A-BPRS (Altruistic Bit Perk Running Scheme) controller, which in turn detects and terminates the presence of Malicious users and it let the white space to be filled by the neighboring reconfigurable secondary users, thereby maximizing the throughput and minimizing the under employment...
Sentence Clustering is performed based on the key terms in sentences within a document or group of documents. A sentence may come under different topics in a single document with different word of similar meaning which will not be clustered correctly by using hierarchical clustering methods. Hierarchical clustering methods are robust. They are not very efficient as its time complexity is O (n2). To...
The proposed system for the cloud based automatic system involves the automatic updating of the data to the lighting system. It also reads the data from the base station in case of emergencies. Zigbee devices are used for wireless transmission of the data from the base station to the light system thus enabling an efficient street lamp control system. Infrared sensor and dimming control circuit is...
The world of Ethernet has experienced a number of changes in the last few decades. The introduction of new protocols and new ways of data transfer has caused major changes in the Ethernet world. With the current trend, there will be a time when data is moved from various datacenters at less cost. Efficient protocols would be proposed to see this change in data migration. Performance and delay issues...
In this paper, a new image watermarking technique has been adopted that can embed a specified watermark image in the cover image without affecting the imperceptibility and increase the security of watermarks. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using wavelet packets are better when compared to wavelet transform. An attempt...
An intrusion detection system monitors the activities of a given environment and determines whether these activities are malicious or legitimate (normal) based on system integrity, confidentiality and the availability of information resources. This work proposes a methodology to overcome all the weakness of single layer intrusion detection. In this work, a layered approach for intrusion detection...
Pattern matching is a technique that can be used to identify or detect any anomaly packet from a sequential action. Injection attack is a method that can inject any kind of malicious string or anomaly string on the original string. Most of the pattern based techniques are used static analysis and patterns are generated from the attacked statements. In this paper, we proposed a detection and prevention...
Planning / Expansion of transmission network are regularly done to meet the ever increasing load in a reliable and secure manner. The process involved in planning includes analysis of geographical, technical and economic feasibility of the corridor under consideration. This paper mainly concentrates on proposing a planning process considering geographical and technical analysis, with indications where...
Network on Chip (NoC) is rising as an efficient solution to solve the aggravating scalable interconnection architecture, designed in reality. The increasing quantity of cores that area unit integrated on a silicon die and, however the technology scaling has enabled designers to integrate many processors on a single chip realizing chip multi-processor (CMP). Problems arising from technology scaling...
The information is rich: but the knowledge is poor. To gain a better knowledge from available information, number of techniques and methods has been developed in the area of data mining so far. On the other hand privacy is one of the most important properties of information that any system should satisfy. The secrecy of the information must be maintained while sharing the information among different...
Efficient consumption of energy of sensor node in Wireless Sensor Networks (WSN's) is one of the noticeable challenges nowadays. We can prolong the lifetime of WSN by well-organized clustering of nodes. In this work we suggest PSO incorporated cuckoo search optimization algorithm for clustering in energy aware way and compared it with cuckoo search algorithm. Through efficient clustering of WSN we...
Service Integration has become a critical issue as organizations find a greater need to consistently interact with their partners and share their Business logics to carry out the necessities. To accurately and efficiently extract and integrate the required service logics from the rapidly expanding Business services, developers need to empathize the whole service and must decide on proper approach...
In this work a PSO based algorithm has been proposed to improve the sturdiness against RS steganalysis. RS Steganalysis is commonly used method which detects the steg-message from the stego-image. A new method based on particle swarm optimization is proposed in this paper to improve the robustness of the stego image against RS steganalysis. The pixel values of the LSB steg-image are modified by the...
Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that target machine or server unavailable to its clients. This threat by nature needs no control over the...
Power flow control, in an existing long transmission line, plays a vital role in Power System area. This paper employs the shunt connected compensation (STATCOM) based FACTS device for the control of voltage and the power flow in long distance transmission line. The proposed device is used in different locations such as sending end of the transmission line, middle and receiving end of the transmission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.