The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a novel technique to address the instability and time variability challenges associated with brain activity recorded on different days. A critical challenge when working with brain signal activity is the variability in their characteristics when the signals are collected in different sessions separated by a day or more. Such variability is due to the acute and chronic responses...
Modern Information Retrieval Systems match the terms of a user query with available documents in their index and return a large number of Web pages generally in the form of a ranked list. It becomes almost impractical at the user end to examine every returned document, thus necessitating the need to look for some means of result optimization. In this paper, a novel result optimization technique based...
To overpass the speed gap between processor and main memory; cache memory is used. Cache memory is having hierarchical structure, including level 1 cache (L1), level 2 cache (L2) etc. Effective page replacement algorithm will result in effectual utilization of cache. L1 is having rich temporal locality while L2 is having poor temporal locality, thus same replacement algorithms for both the levels...
Events give important information about the behavior of a system in a summarized form. In the past, events have played an important role in breaking the functional requirements of the system in the ??event partitioning approach??. Our previous work has shown that events can be a starting point in object-oriented analysis of requirements. Every event triggers a use case in the system, hence should...
Excessive water production in oil fields is a challenging problem affecting oil production and entailing high handling and disposing costs as well as environmental issues. Accurate and timely diagnosis of the water production problem will significantly increase the success of the remedial actions taken. The traditional approaches in production data analysis by means of empirical techniques for proper...
Access to the internet and WWW is growing extensively, which results in heavy network traffic. To reduce the network traffic proxy server is used. Proxy server reduces the load of server. If the cache replacement algorithm of proxy server's cache is efficient then proxy server will be helpful to reduce the network traffic in more efficient manner. In this paper we are considering proxy server cache...
To defeat current commercial antivirus software, the virus developers are employing obfuscation techniques to create mutating viruses. The current antivirus software cannot handle the obfuscated viruses well since its detection methods that are based upon static signatures are not resilient to even slight variations in the code that forms the virus. In this paper, we propose a new type of virus signature,...
We previously presented a fault localization technique called value replacement that repeatedly alters the state of an executing program to locate a faulty statement [9]. The technique searches for program statements involving values that can be altered during runtime to cause the incorrect output of a failing run to become correct. We showed that highly effective fault localization results could...
The increasing complexity and dynamics in IT infrastructure and the emerging Cloud services present challenges to timely incident/problem diagnosis and resolution. In this paper we present a problem determination platform with multi-dimensional knowledge integration (e.g. configuration data, system vital data, log data, related tickets) and enablement for efficient incident and problem management...
In the development of 3G devices, all element of multimedia (text image audio and video) are used. To use this information, a channel of high bandwidth and more secured system is required. In this era, network security has become an issue of importance, on which lot of research is going on. We have proposed image encryption method using elliptic curve cryptography (ECC). RSA is too slow compared to...
Nowadays cellular systems operate with frequency reuse one, where adjacent cells use the same frequency band. Use equipments (UEs) located at cell edge are mostly affected by the resulting co-channel interference. In addition, cell edge UEs suffer from their weak carrier signal strength. This paper proposes a new method to increase the performance of cell edge UEs by means of information exchange...
Association analysis is one of the most popular analysis paradigms in data mining. In this paper, we present different types of association patterns and discuss some of their applications in bioinformatics. We present a case study showing the usefulness of association analysis-based techniques for pre-processing protein interaction networks. Finally, we discuss some of the challenges that need to...
We present a tool called BugFix that can assist developers in fixing program bugs. Our tool automatically analyzes the debugging situation at a statement and reports a prioritized list of relevant bug-fix suggestions that are likely to guide the developer to an appropriate fix at that statement. BugFix incorporates ideas from machine learning to automatically learn from new debugging situations and...
Processors speed is much faster than memory; to bridge this gap cache memory is used. This paper proposes a preeminent pair of replacement algorithms for Level 1 cache (L1) and Level 2 cache (L2) respectively for the matrix multiplication (MM) application. The access patterns of L1 and L2 are different, when CPU not gets the desired data in L1 then it goes to L2. Thus the replacement algorithm which...
In the modern world, digital images can be easily and rapidly transferred over networks. This may give rise to the possibilities of illegal copy or reproduction. Securing digital images while transferring through networks and later extracting it in the original form is a very challenging task. Several advance computation techniques have been developed which provide security to digital media while...
The advent of multicores presents a promising opportunity for speeding up sequential programs via profile-based speculative parallelization of these programs. In this paper we present a novel solution for efficiently supporting software speculation on multicore processors. We propose the Copy or Discard (CorD) execution model in which the state of speculative parallel threads is maintained separately...
Preprocessing is an important step for automatic check processing in Indian scenario where there is huge variation in writing style, especially the way in which Courtesy Amount is terminated and the fractional (Paisa) amount is written. Courtesy Amount Recognition (CAR) and Legal Amount Recognition (LAR) form the core of automated check processing system. For CAR identification, a number of approaches...
In recent years, double gate high electron mobility transistor (DGHEMT) have been introduced to provide better immunity to short channel effects which are inescapable with downscaling of the single gate devices due to fundamental limit on gate-to-channel thickness. Furthermore, in sub 100 nm regime, for lower device aspect ratio, channel thickness also becomes an important parameter affecting the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.