The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended recipient. With the other steganography methods such as Image, Audio, Video, a number of text steganography algorithms have been introduced. This paper presents some new approaches for steganography in Indian Languages. Considering...
The J League (Japan Professional Football League), is the top professional association football league in Japan. Contested by 18 clubs, with teams playing 34 games each totalling 306 games in the season. It is one of the most successful and lucrative football league in the Asian club football. It is also the only league which has been given top class ranking by the Asian Football Confederation[11]...
There is an increasing trend in use of Knowledge Management System (KMS) by organizations specially those in the service sector. Knowledge Management (KM) has been recognized as one of the essential strategic tools that lead to continuous performance improvement of organizations. Organizations providing services to customers have to respond to several, numerous, overlapping, client problems promptly...
Case-Based Reasoning is a Knowledge Management mechanism that allows knowledge acquisition through learning and experience undergone in the process of problem solving applying similarity-based reasoning. Problem representation is by means of metadata representation of certain knowledge items stored in a repository termed Case-Base. This paper discusses on a Fire Emergency Handling System where fire...
The Basketball is uniquely American game and most popular in this country and now getting popularity in worldwide. National Basketball Association(NBA)is the major basket ball league conducting basketball matches event of every year in the month of february. In a basketball match, k tickets are available and more than k people give demand for a ticket to watch the match. To earn more profit in that...
Indian Railways have one of the biggest infrastructures in terms of number of Express trains run per day across cities . It is comparable to any railways in the world. For each Express train there is a "TATKAL" scheme that reserves few seats on emergency basis. In the existing scheme for each seat a ticket is issued after charging a fixed price. However, for different distance different...
3GPP Long Term Evolution (LTE) is a Next Generation (4G) Wireless Technology, providing an evolutionary path for 3G/UMTS deployments. The LTE network architecture is based on a flat all-IP architecture which requires a full mesh connectivity between the LTE evolved Base stations (eNBs). Carrier Ethernet has emerged as a strong candidate to meet the highly scalable and flexible requirements of the...
The purpose of this paper is to introduce an economic cooperative agent based optimization algorithm oriented on Ant Colony System (ACS), which is sensitive to load profile changes, for controlled and optimized switching of Static VAR Compensators (SVCs). Compared to other available heuristics ACS offers several advantages including distributed computation, positive feedback, and robustness. Optimization...
Steganography is the means of storing information inside another message in such a way that hides informations existence. A number of steganography algorithms have been introduced using text, image, audio, video files as the cover media. Among these, text documents have been widely used for a very long time. This paper presents a new approach for steganography in Hindi texts. Considering the structure...
Optimization of power and delay is very important issue in low-voltage and low-power applications. In this paper, we use the dual-threshold technique to reduce leakage power by assigning a high-threshold voltage to some transistors and low-threshold to some others. Here, the polarity of the MOSFETs is considered as the selection criteria for assigning threshold. In order to achieve the best leakage...
In this paper we propose an adaptive scheduling algorithm for IEEE 802.16j based wireless broadband networks. Computation of an optimal schedule for prioritized traffic in OFDMA based IEEE 802.16 wireless network is an NP-Hard problem. Hence, we propose a scheduling heuristic for an OFDMA based WiMAX relay network. The ORS (OFDMA Relay Scheduler) heuristic computes the zone boundaries (relay and access)...
This work reports the performances of straight and bent normal dispersion decreasing fiber amplifiers (NDDF) to generate self-similar parabolic pulses, including the spatial variation of nonlinear factor. The dispersion tapering along the fiber length of the proposed NDDF is obtained in presence of the external gain. For varying core radii along the fiber length, bend loss being no longer a constant...
For the dynamic nature of the grid, the applications need to adapt to the changing resource status and usage scenarios. This is required to ensure that the performances of the components do not suffer. Objective of this paper is to present an adaptive execution scheme for achieving guaranteed performance as has been agreed upon through service level agreements (SLAs). The scheme has been implemented...
The evolution of self-similar parabolic pulses is demonstrated by designing a parabolic index dispersion decreasing fiber amplifier with normal dispersion (ND-DDF amplifier), with inclusion of the variation of nonlinear factor (gamma) with distance. The pulse transmission is extensively studied for the proposed ND-DDF in presence of external gain as well as virtual gain induced by its dispersion profile...
The helical antenna can be used in through-the-earth mine communications systems. Properly designed the field reaching the receiver above the ground is sufficient for maintaining communication with the underground transmitter.
We present an 8 MB/s 3-bit per cell (D3) NAND flash memory that uses the same number of ECC bytes as 2-bit per cell (D2) NAND. Since no extra columns are added in D3 devices, the 16 Gb D3 chip in this paper achieves 0.112 Gb/mm2 compared to 0.079 Gb/mm2 on D2 chips, as previously reported (K. Takeuchi et al.,2006). This is a 41% improvement in Gb/mm2 and a 20% gain in overall die-size.
A new configuration was designed and tested based on ldquosandwichingrdquo target analyte molecules between two metal nanostructure substrates using surface enhanced Raman scattering (SERS), which exhibits significantly higher SERS enhancement compared to just one substrate.
Broadband antennas are very useful in many applications as they operate over a wide range of frequencies. The objective of this paper is to study the transient response of the spiral antenna over broad frequency ranges. As such, the phase response of the antenna as a function of frequency is of great interest. In the ensuing analysis, the antenna is excited by a monocycle pulse. The antenna has a...
In this paper the ground penetrating radar is modified such that the effect of the ground bounce and the antenna coupling is minimized. This is done through the use of two transmitter antennas instead of one. The will totally reduce the antenna coupling effects, but the ground bounce is to some extent dependant of the surface roughness of the ground. In this research the ground has been assumed to...
Uplink-downlink imbalance is a characteristic of all wireless networks which greatly impacts system performance, and must be accounted for in system design and simulation. However this property seems to have received sparse attention in literature. This paper describes imbalance, its potential sources, audits impact on traffic and overhead channel performance, soft handoff adaptive server selection,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.