The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile Agents have become a promising technology in design, implementation and maintenance of Distributed Computing Systems, as they can travel form one node to another along with their internal state. Mobile agents are capable of performing tasks which need a lot of configuration. These days, mobile agents are widely used in number of applications because of their intelligence. Although they possess...
Cloud computing is really a new computing mode. Load balancing of resources across virtual machines is the fundamental problem of Cloud Computing. Effective job scheduling device must meet people 'requirements and increase the source usage, to be able to increase the entire efficiency of the cloud processing environment. In optimization issue. Genetic Algorithm and Ant Colony Optimization Algorithm...
This paper depicts the Design and behavioral Characterization of CMOS MEMS Accelerometer. MEMS (Micro-Electro-Mechanical systems) is the latest technology in which sensors at micro level are fabricated. In this paper CMOS MODEL is designed which imitate the working of MEMS Accelerometer. The Model thus designed in T-Spice, gives the behavioral Characterization of the Accelerometer. The advantage of...
Wireless sensor network is built by deploying sensor nodes in the environment. Sensors perform the monitoring task substituting human presence at the site. Sensor nodes are freely deployed in the real time environment. Sensor nodes work on in-built batteries because it's not possible to provide power in the real time scenarios. Sensor nodes are freely deployed in the network without any supervision...
Microgrids have emerged as a new solution to the increased energy demand and efficient integration of intermittent renewable energy resources. With technology intervention, it is possible to have demand side participation in energy market, thereby minimizing the cost of operation. In this paper, the energy scheduling has been carried out on a low distribution microgrid comprised of various distribution...
This paper presents a design of F shaped Microstrip Antenna Array (MAA) using corporate feed at a resonant frequency of 9.2 GHz. The proposed F shaped array is designed using FR4 material with permittivity sr = 4.4 and height=1.6mm as substrate. The array is simulated using High Frequency Structure Simulator (HFSS) software. The proposed antenna array has dual band at a frequency of 8.6 GHz and 9...
Grid Computing is a new infrastructure of 21st century that provides access to computational and data intensive resources to its users. The core purpose behind the evolution of Grid computing is to utilize the idle capacity of the resources without acquiring the resources physically. The grid users are resource providers and resource consumers. The resource providers are looking for optimum utilization...
Grid Computing is an evolution of parallel and distributed computing that enables sharing of resources among the users of virtual organizations across the world. The core purpose behind evolution of Grid is to utilize the idle resources. The resource providers who lend their resources for usage are always interested in optimum utilization of their resources. The resource consumers have keen interest...
OFDM (Orthogonal Frequency Division Multiplexing) has been raised a new modulation technique for next generation 4G networks e.g. LTE. But OFDM has a major drawback that is high value of PAPR at the transmitter end. Since OFDM is only used in the downlink of 4G networks therefore to reduce the problems of high PAPR (Peak to Average Power Ratio) in OFDM, some techniques e.g. SLM, PTS, Clipping, Coding,...
Image forensic techniques have a sensitive role in determining authenticity of digital images. Multiple tampering operations and varied image content has led to high false positive rate of these methods when applied to real world forgeries. A detection method based on fusion of multiple cues is desired to improve reliability and accuracy in image forensics. Hence, there is an insistent need of testing...
Gesture recognition turns up to be important field in the recent years. Communication through gestures has been used since early ages not only by physically challenged persons hut nowadays for many other applications. Interacting with physical world using expressive body movements is much easier and effective than just speaking As most predominantly hand is used to perform gestures. Hand Gesture Recognition...
The basis of this paper is grounded upon the theoretical assumption, which states that the integration of BitTorrent with Software-defined Networks (SDNs) will degrade the performance of BitTorrent, instead of improving it. This was further evaluated by emulating this experiment on a Ring topology to verify the results. The experimental results, however, showed an unexpected behavior wherein BitTorrent...
Sentiment Analysis(SA) is a combination of emotions, opinions and subjectivity of text. Today, social networking sites like Twitter are tremendously used in expressing the opinions about a particular entity in the form of tweets which are limited to 140 characters. Reviews and opinions play a very important role in understanding peoples satisfaction regarding a particular entity. Such opinions have...
The advancement of wireless communication leads researchers to conceive and develop the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). In Sybil attack, the WSN is destabilized by a malicious node which create an innumerable fraudulent identities in favor of disrupting networks protocols. In this paper, a novel technique has been proposed to detect and isolate Sybil attack...
Digital signal processing (DSP) systems require filters to fulfill their needs for particular frequency characteristics. This paper presents designing and optimization of digital finite impulse response (FIR) high pass filter. Optimization is a process to bring out the best result for an objective function. BBO is the algorithm which is based on the biogeography of organisms in a habitat. The algorithm...
Biogeography based optimization is a nature oriented concept. It extracts the idea of optimization from the way how species are distributed in various geographical areas. Various habitats are differentiated on the basis of habitat suitability index which determines strength of organisms in particular habitat. So habitat having highest habitat suitability index is known as best habitat. The same concept...
A Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which need a robust routing protocol. With the development of the MANET applications, more importance is given to Quality of Service (QoS) routing strategy. However mobility and congestion of the nodes lead to frequent link failures and packet losses affecting the QoS performance of the protocol. Taking these factors...
We investigated the effect of Ga flux and plasma power on the homoepitaxial growth of GaN epitaxial films by Molecular Beam Epitaxy (MBE) on MOCVD-grown GaN templates on c-sapphire substrates. The grown GaN films were characterized by several techniques to assess their structural and morphological properties. The surface morphology, dislocation densities and crystalline quality were found to be contingent...
Software development effort estimation is one of the most important activities in software project management. Various models have been proposed to construct a relationship between software size and effort, however there are many problems. This is because project data, available in the initial stages of project is often incomplete, inconsistent, uncertain and unclear. Accurate estimation of the software...
An Off-line Signature Verification System (OSVS) with a novel feature extraction procedure has been described. Fusion of concentric squares having geometric features, zone based slope as well as slope angle have been considered as input patterns. The strong feature set thus obtained makes the OSVS accurate. Verification was performed by using Support Vector Machine (SVM) technique with different kernels...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.