The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a different approach for parallelizing the Doolittle Algorithm with the help of Intel Threading Building Blocks (TBB) allowing the users to utilize the power of multiple cores present in the modern CPUs. Parallel Doolittle Algorithm (PDA) has been divided into 3 parts: Decomposing the data, Parallely processing the data, finally Composing the data. Using the PDA we can solve the...
The local feature descriptor called SIFT, is one of the most widely used descriptors. The keypoints found with RSIFT and describe them in a standard way, which makes them invariant to the size changes, rotation, position, scale, and so on. These are quite powerful features and are used in a variety of tasks. This local feature SIFT descriptor gives potential key points, which are extracted from the...
Mobile ad-hoc networks are more vulnerable to security attacks due to their unique characteristics such as dynamic topology, no fixed infrastructure, resource limitations and multi-hop scenario. In MANETs one the dangerous attack is packet dropping attack. This packet dropping attack is two types: 1. Black hole and 2. Gray hole. In both the attacks, an attacker sends the false reply to source node...
MANET consists of the number of mobile nodes that form a wireless communication. MANETs are self configuring network where the nodes can move freely and randomly. It can dynamically join the network and leave the network at any time. It is widely used in industrial and commercial applications like vehicular communication, agricultural needs and disaster management, etc. There are studies based on...
Virtualization is rapidly gaining acceptance as a fundamental building block in enterprise data centers and is the core component of cloud computing platforms. It is most known for improving efficiency and ease of management. While this technology is meant to enhance the security of computer systems, some recent attacks show that virtual machine technology has much vulnerability and becomes exposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.