The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The nature as always been a source of music be it the thunders, the rustling of trees or the birds chirping. The creative output of composers, writers, and artists is often influenced by their surroundings. Of course, an important part of what we see and hear is not only the people with whom we interact but also our geophysical surroundings. Of all the geophysical phenomena to influence us, the weather...
Antenatal care refers to the health care for women in pregnancy period. Periodic and regular supervision to a pregnant woman throughout pregnancy period until labor which will help reducing maternal death rates and miscarriages as well as birth defects, low birth weight, newborn infections and other preventable health problems. e-health plays a vital role to improve and assist independent living of...
Customer Relationship Management (CRM) is of paramount importance in the current business scenario where new start-up companies enter the market and compete with established companies and give tough competition. The Customer Relationship Management tools are used to maintain the leadership position and bridge the gap between customer and business developer. In this paper, we describe a CRM app developed...
Mobile Cloud Computing (MCC) and Internet of Things (IOT) are two of the fastest growing computing technologies in today's world. The biggest issue in these emerging technologies is their security weakness, In order to overcome this problem we have developed a system which combines the traditional user id and password mechanism with multimodal biometrics which includes fingerprint authentication and...
The present scenario of drone technology is used in the field of surveillance. In our paper we are indulged with drones which can be controlled through cloud servers that can be accessed by smart devices. The concept of artificial intelligence are engineered in intricate situations. The drones are powered by hydrogen fuel cell thus increasing the duration of flight. It is driven by four powerful brushless...
The proposed system is the next stage in home medical system. With the presence of wireless technology, it helps patients in unprecedented ways with helping them get real time medical results which may play an important hand in emergency situations. Wireless Home Health Monitoring System is a home-based monitoring system which measures the oxygen saturation in the blood, respiratory rate, body temperature,...
In today's growing concern for home security, we have developed an advanced security system using integrated digital signature and DNA cryptography. The digital signature is formed using multi-feature biometric traits which includes both fingerprint as well as iris image. We further increase the security by using DNA cryptography which is embedded on a smart card. In order to prevent unauthorized...
This project proposes a two-step fuzzy-based filter for restoring color images corrupted with impulsive and gaussian noise. The goal of the first step is to identify the noisy pixels by calculating the similarity between the central pixel and its neighborhood in a selected window. The noisy pixels in a selected window are then replaced by its modified value by computing the median around the central...
As the window system are affected by the malicious code, the vulnerability on the system are more. The behavior based monitoring is used to avoid the polymorphic malicious code. Signature based detection system or fixing these vulnerabilities are not the efficient method. Thus the behavior based monitoring is used to avoid malicious code in window system. Some of them hook high level system APIs to...
This paper presents a modified randomized cryptographic algorithm for secure exchange of secret keys. The existing randomized cryptographic algorithm (RCA) uses a dibit as the reference bits for encrypting the data of different sizes. However for large data sizes, this procedure takes more operations for the generation of key. The novelty of our work is to use a variable reference bit size that reduces...
The present scenario of spectacular fusion of chip size reduction and increase in number of circuits on chips has given a tremendous growth in battery operated and power sensitive applications thus leading to the growth in the emerging field of Low Power Electronics. In our paper we are indulged in Static Power reduction at the Architectural level as in near future this area of power is going to rule...
Grid Computing refers to the combination of computer resources from multiple administrative domains to reach a common goal. Grids which are a form of distributed computing contains collection of resources that are available for an application to perform tasks. The resources in the grid are generally heterogeneous, geometrically dispersed and belong to different administrative domains. The important...
This paper presents an improved method for capacitor placement in radial distribution feeders to reduce the real power loss and to improve the voltage profile. The location of the nodes where the capacitors should be placed is decided by a set of rules given by the fuzzy expert system. The sizing of the capacitors is modeled by the objective function to obtain maximum savings using Differential Evolution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.