The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A video analyzer is a comprehensive bitstream analysis tool which accelerates development and debugging of video bitstreams while ensuring compliance with industry standards. There are many conventional analyzers present for different video standards like H.264, HEVC which are compliant only with the respective video sequence format. In this work, a generalized analyzer with integrated encoder is...
The present paper provides the conceptual framework on proposed filter called Extended Kalman filter which uses the concept of Kalman filter that provide more real information than the existing Kalman filter. The existing Kalman filter is not much secure to provide information of the theft vehicle. The proposed filter makes some improvement in the existing Kalman filter. To filters the position of...
In the fast growing scientific world, the social networks and entertainment have become an essential evil and contain a variety of face images. The face images have large visual variations like variety of pose, lighting, and variation in expression, aging, alignment and occlusion. All these factors act in performance degradation for face recognition and analysis. The face analysis is a sequence of...
Rapidly increasing user data base and escalating bandwidth demand has compelled Telecom Regulatory Authority of India (TRAI) to open up new spectrum bands for Long Term Evolution (LTE) access lying in TeleVision White Spaces (TVWS) for auction. But rural areas are not likely to respond to the such large bandwidths open to them. The paper proposes implementing Wireless Regional Area Network based on...
This paper presents the steady state analysis Quasi Switched Boost (QSB) DC-DC converter. QSB impedance network has only one inductor and one capacitor unlike Z-Source/Quasi-Z-Source which have two inductors and two capacitances in their impedance network but QSB impedance network has one more active switch, one more diode than Z-Source/Quasi-Z-Source impedance network. The DC voltage gain for ideal...
This paper presents the ac small signal modelling of Single Inductor Dual Output (SIDO) dc-dc converter. This SIDO dc-dc converter operates with one output in both buck and boost mode and other output in boost mode only. SIDO dc-dc converter has two switches, two diodes and a single Inductor to multiplex the both output circuits by suitable switching. Transfer functions have been deduced by means...
This paper presents the ac small signal modeling of Quasi-Switched Boost Inverter (QSBI). Quasi-Switched Boost Inverter (QSBI) has been recently derived from classical Quasi-Z-source converter. Both QSBI and Quasi-Z-source inverter (QZSI) are single-stage buck-boost inverter. But QSBI has some added advantages over QZSI such as reduced number of components for impedance network, lower current rating...
Network performance and quality estimations are much sought parameters in network applications. Performance evaluation and monitoring approaches are unreliable and suffer from high packet transmission cost. This work proposes a performance analysis algorithm (First-last Trail) for investigating network quality estimation. Considering the drawbacks of active measurements in WSN, the proposed method...
In restricted mobile network, to achieve the network optimization, the dynamic election of infrastructure control devices is done. These infrastructure controlled devices are the similar nodes with high capabilities. Clustering is about to identify these high strengths nodes that can optimize the heavy communication in network. In this paper, a fuzzy adaptive model is presented to perform cluster...
Redundancy of words and characters in English language helps cryptanalysts in guessing the cipher text. DNA sequences do not follow any linguistic properties. Hence, translating any language first to DNA sequences and then applying cryptography technique upon it can prevent the attacks based on frequency analysis‥ DNA cryptography is a branch of cryptography derived from DNA computing and based on...
The availability of a large number of processing nodes in a parallel and distributed computing environment enables sophisticated real time processing over high speed data streams, as required by many emerging applications. Sliding window stream joins are among the most important operators in a stream processing system. In this paper, we consider the issue of parallelizing a sliding window stream join...
Recently, Lee et. al. carried out the cryptanalysis of Juang et. al. two-factor authentication key exchange protocol in Public wireless LANs. It was shown that Juang et.al. protocol is vulnerable to the stolen verifier attack and doesn't satisfy the user anonymity. Apart from the, high computational overhead of the server. This paper, proposes an improved protocol towards authentication and key exchange...
Sensors being used for gas sensing in underground coal mine require frequent recalibration due to highly humid and toxic environment prevalent in UG coal mines. If we intend to deploy a WSN which can continuously monitor the UG mine environment then we require sensors which are able to withstand the environment of UG coal mine. Acoustics gas sensors are more rugged and would be able to work for prolonged...
Cloud Platform is a platform where cloud applications runs. It is an online platform, which works over internet. Cloud Platform has been constructed of three layers: “SaaS”, “PaaS”, and “IaaS”. Many companies in market i.e. Google, Microsoft, IBM etc used to provide cloud platform on per click basis and as well free of cost. In this research work, Google cloud platform is used for deploying our application...
Analysis of digital design and implementation of Nam Quoc Ngo's 32 bit integrator is being presented in this paper. The design objective is to realize a wider bandwidth integrator. Proposed design is optimized using conditional sum adder for addition, Radix 4 Booth with Wallace tree carry save adder algorithm for multiplication and a modified algorithm to calculate 2s complement of a binary number...
Smartphones are becoming increasingly popular among users. They are equipped with an enormous number of applications, and these applications drain the smartphones' batteries. Moreover, battery capacity is significantly restricted due to constraints on size and weight of the device. It is important for smartphone applications to be energy efficient. Thus, a methodology to conduct energy performance...
In this paper, a novel and more robustic mutual authentication and key exchange protocol based on Elliptic curve discrete logarithm problem has been proposed. This proposed protocol is a two party protocol in which first server authenticates itself to the client and after that client authenticate itself to the server over an untrusted and unsecured network before the session key generation. Before...
VP8 is an open source video compression format released by Google. This format is being accepted in many industry applications like HTML5, Web Real-Time Communication, and Video playback in different browsers etc. There is indeed an industry/market demand to support this format at full-HD resolution. This paper proposes the cost effective implementation of VP8 hardware (HW) encoder in terms of time...
Today, H.264/AVC coding standards is widely used for efficient coding of video signals. But to cope with resolutions higher than high definition (HD) more efficient coding is needed. A successor to the H.264/AVC codec is now developed by JCT-VC standard called High Efficiency Video Coding (HEVC). To improve the coding efficiency of intra frame, up to 35 intra prediction modes are defined in HEVC....
Smartphones are constrained in battery-energy and resources such as processing power, storage, and Internet bandwidth. The capabilities of the smartphones can be enhanced if they can access the hardware, software resources and data on a laptop in an energy efficient way. This enables the owner of a smartphone and a laptop to use his/her devices with flexibility. With this view, we propose Universal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.