The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work introduces Symbiotic Organism Search (SOS) for solving stability related problems. SOS is a new and robust approach in met heuristic fields and never been used to solve discrete problems. A sophisticated method to deal with stability related problem that is applied using the basic Symbiotic Organism Search (SOS) framework. The performance of the algorithm was evaluated on a set of benchmark...
In this paper, a novel approach based on General Relativity Search Algorithm (GRSA) for Automatic Generation Control (AGC) of a two area interconnected thermal-thermal power system is described. In the investigated power system, governor dead-band is considered as a nonlinearity. At first, AGC of the power system is analyzed with Proportional Integral (PI) controller and further Proportional Integral...
Most steganography algorithms are weak against attacks like visual and statistical but among all steganography algorithms F5 algorithm is more robust and secure. It can be more efficient if we reduce the encryption and decryption time and improve the embedding capacity. In this paper we present a better F5 algorithm with less encryption and decryption time and higher embedding capacity with the help...
The main aim of this paper is to design a parameterized 32 bit floating point multiplier which is based on IEEE 754-2008 binary interchange format. The proposed work is capable of checking overflow and underflow using corresponding flags by flagger circuit. In this design rounding modes are also considered based on the two bit control signal provided as input such as round to nearest even, round to...
Encryption for the compressed video stream has attracted the attention of many researchers within past few years. Due to exponential growth of digital multimedia contents over the network, their secure transmission over the network is a serious concern. Security and performance are two main peculiarities of any digital multimedia encryption algorithm. This paper presents an indexed chaotic sequence...
Nelder-Mead algorithm (NMA) is the best-known algorithm for multidimensional optimization without involving derivative computations. Due to the simplicity in implementation and the fast convergent property of NMA, it is widely used in the fields of statistics, engineering, physics and medical sciences. In practice, when objective function is complicated, the optimization procedure requires a lot of...
This work presents a binarization technique of map document images. It exploits an amalgam of global and local threshold approaches best suited for binarization of document images with complex background and overlapping objects in the foreground like maps. The proposed approach uses Distance Transform (DT) and Adaptive threshold. Initially a rough estimate of the map background is done using Distance...
Dynamic voltage and frequency scaling (DVFS) offers great potential for optimizing the energy efficiency of Multiprocessor Systems-on-Chip (MPSoCs). The conventional approaches for processor voltage and frequency adjustment are not suitable for streaming multimedia applications due to the cyclic nature of dependencies in the executing tasks which can potentially violate the throughput constraints...
RSA is the asymmetric cryptography system. The security of RSA public key cryptosystem is based on the assumption that factoring of a large number (modulus). Integer Factorization is an important problem mainly due to its connection with RSA algorihm of Public key cryptography. We present a new special purpose algorithm (VFactor) for factoring. We compare this algorithm with Fermat's Factorization...
In asymmetric key cryptography, also called Public Key cryptography, two different keys (which forms a key pair) are used. One key is used for encryption & only the other corresponding key must be used for decryption. No other key can decrypt the message, not even the original (i.e. the first) key used for encryption. The beauty of this scheme is that every communicating party needs just a key...
The rapid increase in the complexity of real-life applications has led to the perpetual demand of refined architectural designs. Multiprocessor systems-on-chip (MPSoC) emerges as one of the possible solution for satiating such enormous computational needs. These MPSoCs are employed with Network-On-Chip (NoC) interconnect for power efficient and scalable inter-communication required between processors...
Minimum Spanning Trees (MST) problem is a classical problem in operation research and network design problem is an important application of it. Minimum Spanning Tree (MST) problem can be solved efficiently, but its Biobjective versions are NP hard. In this paper, we compare three tree encoding schemes using Biobjective evolutionary algorithm. Three different tree encoding methods in the evolutionary...
To find MST (Minimum Spanning Trees) in complete graph is a classical problem in operation research having network design as an important application. It is possible to solve MST problem efficiently, but its Biobjective versions are NP hard. In this paper, we present a comparison of two encoding schemes for representing tree in Biobjective optimization scenario. The three different instances of Biobjective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.