Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprint is most popular biometric, and minutiae matching is used for the fingerprint matching. The matching algorithm may use the local or global or the scale invariant information. However, the technique providing fewer false matching with high accuracy consumes...
Information sharing over the public domain is one of critical challenge. In this paper, a two stage model is discussed to perform adaptive information encoding and dynamic steganography approach. At first level of proposed model, the adaptive encoding approach is dictionary based approach that performs the cyclic shift to encode the textual or image information. At second level of proposed model,...
With exponential growth of high data rate applications, significant energy is consumed in cellular networks to guarantee better quality of service (QoS). Therefore, energy efficient wireless communication is being paid increasing attention under the background of limited energy resource and environmental-friendly transmission behaviors. Recently, distributed antenna system (DAS) has shown great potential...
Wireless relaying has attracted dramatic attention in the last few years due to its advantage in multi-hop communication systems. Cooperation among nodes in a network enhances the overall system performance. Power allocation schemes have been discussed with respect to optimization of signal to noise ratio (SNR) without considering the interference. The contribution of our present approach is to allocate...
In this paper, we have analysed a ring-based wavelength-division-multiplexing passive optical network (WDM-PON), which provides fiber-fault protection by using dual ring architecture as well as Rayleigh backscattering (RB) noise mitigation. For protection and restoration against fiber fault, the dual fiber ring is used. Here, we discuss and analyse the characteristics of the downstream signals using...
Dependence on web applications is increasing very rapidly in recent time for social communications, health problem, financial transaction and many other purposes. Unfortunately, the presence of security weaknesses in web applications allows malicious user's to exploit various security vulnerabilities and become the reason of their failure. Currently, SQL Injection (SQLI) attacks exploit most dangerous...
Atomic Commit Protocols (ACP) are used to maintain atomicity in distributed systems. There are protocols available to minimize the overhead between the coordinator and participants, some are to minimize blocking while some to release the locks acquire by different participants. Optimized Two phase Commit (O-2PC) Protocol has been proposed to optimize the performance of 2PC based of deferred and immediately...
Dependence on web applications is increasing very rapidly in recent time for social communications, health problem, financial transaction and many other purposes. Unfortunately, presence of security weaknesses in web applications allows malicious user's to exploit various security vulnerabilities and become the reason of their failure. Currently, SQL Injection (SQLI) and Cross-Site Scripting (XSS)...
In this paper we try to optimize the Gate leakage current of ultra-thin SOI Double-Gate n-channel MOSFET by varying device parameters such as Si film thickness, Gate length, channel doping, Gate oxide thickness and buried oxide thickness. The ultimate size scaling limits of MOSFET is explored owing to scaling down of critical feature dimension size below 10nm. In this paper, we use a non-equilibrium...
The DNA microarray classification is one of the most popular technique among researchers and practitioners. In microarray data analysis, huge useful information may be lost due to irrelevant and insignificant features of the dataset. To overcome this drawback of the data set, only those features are selected which have high relevance with the classes and high significance in the feature set. In this...
Machine-to-Machine (M2M) communication has emerged as a key technology with huge market potential for cellular service providers deploying LTE networks. Addition of enormous number of M2M devices into the cellular networks poses a heavy competition to existing Human-to-Human (H2H) devices for getting radio resources, thereby affecting the performance of the H2H communications. But, one can not treat...
Co (III) doped titanium dioxide (Ti1− xCoxO2) thin films with different Co volume ratios (x = 0.0, 0.05, 0.1, 0.15, 0.2) were successfully deposited using Sol-Gel route. X-ray Diffraction patterns revealed that the films were deposited with amorphous, anatase and rutile phases. These phases strongly influenced by annealing temperatures and doping profiles. By annealing at 500°C, the structure has...
This paper presents a unique feed-forward Space Vector Modulation control scheme for achieving power balancing in a recently proposed multilevel inverter topology. Moreover, this strategy can be extended to any type of multilevel inverter topology and to any number of output levels of multilevel inverter (MLI). A comparison is made between the power delivered by sources with and without applying proposed...
This paper presents implementation of an universal modulation scheme on an proposed modular multilevel inverter for achieving charge balancing of the capacitors. Modulation is done by using sinusoidal pulse width modulation. Simulations are provided to prove the conclusion of the scheme.
With the growth of trends in computing and requirement for developing a reliable computing environment the need for performing tasks in distributed manner has gained much importance. Atomic commit protocols (ACP) are used to preserve the ACID property in distributed systems. Two-Phase Commit (2PC) is most widely used but the blocking of sites is undesirable as these sites may be holding locks on the...
With the advancement in mobility management in next generation, people will have an effortless, widespread, continuous access to information, activity and communication etc. when, where and how the client want it. To craft such an environment, one calls for integrating various networks that are budding from various emerging engineering practices. The Next Generation Future Network (NGFN) seems to...
Due to the ubiquitous coverage and seamless connectivity, cellular systems are very promising to support Machine-to-Machine (M2M) communications. But, all of the cellular networks are designed and optimized for Human-to-Human (H2H) or Human-to-Machine (H2M) communications and therefore facing several challenges due to incorporation of M2M communications. One of such challenges is efficient resource...
Machine to machine communication (M2M) or machine type communication (MTC) facilitates communication of two network enabled devices, without any human intervention, to take some intelligent decision based on the interaction of devices. Because of ubiquitous coverage and global connectivity, cellular networks are playing a major role in the deployment of M2M communications. Due to some unique characteristics...
We present an experimental study on measurement of nonlinear refractive index (n2) and nonlinear absorption coefficient (β) of organic liquids when the thermo-optic effects manifest into large nonlinear phase-shifts (Δϕ0) in an open-aperture Z-scan configuration.
Mobile Ad hoc Network (MANET) is a network comprises of mobile nodes connected without any centralized administration. Each node in the network has the ability to share a large number of objects with other nodes. The nodes are connected with other nodes to forward a message to other nodes until the search for node that desire meets. This paper represents a new replication method to recover the performance...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.