The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ad-hoc network is an infrastructure less wireless network. Since ad-hoc networks are self-organizing, rapidly deployable wireless networks, they are highly suitable for various applications. Every nodes of ad-hoc network are connected dynamically in an arbitrary manner. There is no default router available in this network because all nodes of this network behave as routers and take part in discovery...
XML actually developed as a benchmark for caching, dispense and interchanging data over multiple platforms. The XML data is on the grow over the time in fast rate. Enterprises want formulating queries on XML datasets habitually. As giant XML data is retrievable, it is not easy job to pull out vital data from XML dataset. It is computationally expensive to answer queries without any sustain. Towards...
The algorithm proposed in this paper enhances the K Strange points clustering algorithm by selecting the first of unchanging K strange points as the minimum of the dataset and then finds the next strange point as the point which is farthest from the minimum and continues this process till it finds the K points which are farthest and almost equally spaced from each other. It then assigns the remaining...
A new configuration of underwater robotic vehicle, named AQUAD, is presented here. It is a configuration with four thrusters in a plane which is inspired from an aerial quadrotor system. The system is designed considering the hydrodynamic challenges, and mathematically modelled using Newton-Euler approach. A PID controller is used to control the attitude of the system and implemented with the model...
This paper presents synthesis of unequally spaced linear array antenna with minimum sidelobe suppression, desired beamwidth and null control using wind driven optimization (WDO) algorithm. The WDO technique is nature-inspired, population based iterative heuristic global optimization algorithm for multidimensional and multimodal problems. The array synthesis objective function is formulated and then...
In this paper we introduce a novel face representation method called Cross Local Binary Patterns(XLBP) to improve the robustness of face recognition for partially occluded and non-uniformly illuminated face images. In our method we use Radon transform to capture the coarse level shape information and XLBP to capture the texture information. Individual histograms computed on each sub-block of the face...
Sentiment Analysis is a technique to identify people's opinion, attitude, sentiment, and emotion towards any specific target such as individuals, events, topics, product, organizations, services etc. Sarcasm is a special kind of sentiment that comprise of words which mean the opposite of what you really want to say (especially in order to insult or wit someone, to show irritation, or to be funny)...
In this paper we deal with a special class of quadratic supply rates, dissipativity with respect to which can be directly read off from a system's Nyquist plot. These supply rates are called Nyquist-plot-compatible (NPC) supply rates [8]. The characterizing property of these supply rates is that to each of them a specific region in the complex plane can be associated: dissipativity w.r.t. these supply...
Cloud resources like Amazon EC2 and Google Compute Engine have become an integral part of our life with their pay-per-use pricing models. On the other hand, attempts have also been made to create virtual clouds on the fly using available devices in the locality like smartphones and tablets. Such devices being equipped with powerful processors, this is a novel method of utilizing their normally unused...
The growing oil demands and the economic concerns have inspired the governments, car manufactures and the environmentalist to promote the manufacturing of Electrical Vehicles (EV). With developments in the power grid and advancements in the vehicle technology the EVs can contribute to the grid by selling or buying power from the grid. For the effective and efficient use of the V2G there is a major...
The Vehicle-to-Grid (V2G) concept has become a reality with developments in the power grid and vehicle technology. The electrical vehicle (EV) can be connected to the grid to contribute power and help in maintaining the grid stability for shorter duration of time. The communication between the grid control center (GCC) and Aggregator is very crucial as GCC sends the power requirement details to the...
Cloud technology is becoming more and more popular in recent time. With the popularity of the Cloud Computing, Cloud security becomes a vital issue in the Cloud computing domain. Particularly, the new evolving threat to the enterprise cloud makes the firewall systems of enterprise cloud to slow down the operation. On the other hand, one of the central challenges to deploy, Cloud applications into...
One of the key indicators of leveraging Cloud Computing is the penetration of e-business among Cloud Service Providers(CSP). The cloud computing applications are being developed across various domains to enable easy and efficient access to the data and services remotely. There is a potential for CSPs in applying e-business technologies, especially in the migration process between virtual machines...
In this paper the Laser Gesture Detection Technique is proposed. In today's modern world it is a need of time to complete each and every work quick and fast. Proposed system is used to perform day to day activity faster and with fewer labors to make human life luxuries and physically disabled human to perform their task easily. This technique is based on laser image capturing performed by operator...
The stability of Metal-Oxide-Nitride-Oxide-Silicon (MONOS) memory structures remain a major concern for Non-Volatile Memory (NVM) devices. In this paper, working on 30-nm technology we have analyzed a MONOS like structure involving the use of multilayer high- k dielectrics as the blocking layer. The work demonstrates the superiority of the structure with multilayered high-k blocking stack over the...
In many organizations large amount of data are collected. These data are sometimes used by the organizations for data mining tasks. However, the data collected may contain private or sensitive information which should be protected. Privacy protection is an important issue if we release data for the mining or sharing purpose. Privacy preserving data mining techniques allow publishing data for the mining...
Biometric system is one of the most popular tool for user identification where security is primary concern such as Banks, airports and companies etc. Few of biometrics tool such as fingureprints, face and Iris are frequently using for user identification, nevertheless its flaw like mimic the original data makes it weak. Hence, there is another biometric has been emerged based on EEG where mimicry...
Redundancy within a natural image has been widely exploited for enhancing the sparsity in representation to achieve better restoration. The BM3D is the current state-of-the-art denoising method. It combines the transform-domain and the non-local means spatial-domain algorithms and is named as “collaborative filtering”. The discrete wavelet transform is shown to be the best performing transform in...
Presently, Sn-Ag-Cu (SAC) solders are most commonly used as the interconnect materials in the semiconductor package. However, their thermal fatigue and drop impact resistant properties depends on the Ag content and therefore, most semiconductor package assemblers are forced to implement multiple SAC alloys depending on intended performance. Sn-xAg-Cu solders with high Ag content (x>3 mass%) give...
Many algorithms have been proposed for harmonic estimation to improve the power quality performance, but till today it is still a challenge for accurate estimation. In this paper an adaptive filtering algorithm called Fast Transverse Recursive Least Square (FT-RLS) is applied for the first time for estimating harmonic parameters. The algorithm has been considered to estimate the amplitudes, phases...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.