The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Subspace clustering is one of the active research problem associated with high-dimensional data. Here some of the standard techniques are reviewed to investigate existing methodologies. Although, there have been various forms of research techniques evolved recently, they do not completely mitigate the problems pertaining to noise sustainability and optimization of clustering accuracy. Hence, a novel...
Presumably Internet happens to be the first choice for on-demand entertainment, and HD-video contributes to major share of Internet bandwidth consumed. Adding to this there is considerable number of audience who intend to watch particular content more than once. Given the best effort delivery mechanism of Internet along with clogged data centers, there is a huge load on cloud in terms of data bandwidth,...
Modeling efficient knowledge bases for improving the semantic property of the World Wide Web is mandatory for promoting innovations and developments in World Wide Web. There is a need for efficient and organized modeling of the knowledge bases. In this paper, a strategy Onto Collab is proposed for construction of knowledge bases using ontology modeling. Ontologies are visualized as the basic building...
The current day networks use Proactive networks for adaption to the dynamic scenarios. The use of cognition technique based on the Observe, Orient, Decide and Act loop (OODA) is proposed to construct proactive networks. The network performance degradation in knowledge acquisition and malicious node presence is a problem that exists. The use of continuous time dynamic neural network is considered to...
The prime objective of any technological innovation is to improve the life of people. Technological innovation in the field of medical devices directly touches the lives of millions of people; not just patients but doctors and other technicians as well. Serving these care givers is serving humanity. Growth of Mobil Devices and Cloud Computing has changed the way we live and work. We try to bring the...
Biometric based identifications are widely adopted for personnel identification. The unimodal recognition systems currently suffer from noisy data, spoofing attacks, biometric sensor data quality and many more. Robust personnel recognition considering multimodal biometric traits can be achieved. This paper introduces the Multimodal Personnel Authentication using Finger vein and Face Images (MPAFFI)...
Distributed system has quite a lot of servers to attain increased availability of service and for fault tolerance. Balancing the load among these servers is an important task to achieve better performance. There are various hardware and software based load balancing solutions available. However there is always an overhead on Servers and the Load Balancer while communicating with each other and sharing...
The ability to feel the world through the tools we hold is Haptic Touch. The sensory element that will transform information into experience by remotely interacting with things is challenging. This paper deals with design and implementation of fore finger direction based robot for physically challenged people. The design of the system includes microcontroller, MEMS sensor and RF technology. The robot...
The exponential explosion of various contents on the Web, made Recommendation Systems increasingly indispensable. Innumerable different kinds of recommendations are made on the Web every day, including movies, music, images, books recommendations, query suggestions, tags recommendations, etc. The proposed system uses the historical browsers' data for search keywords and provides users with most relevant...
Cognitive wireless networks are the solution for the existing networks Infrastructure and security problems for all applications. Cognitive techniques adopted in this paper, monitor the transactions among the nodes in the network and detects the malicious nodes and takes preventive measures. To achieve high detection rate, single-sensing with cognition is adopted and training of network is done using...
Biometrics in high technology refers to the automatic recognition of individuals physiological and behavioral traits which determines their identity. Iris recognition is one of the most reliable and widely used biometric techniques for personal identification and security. The major objective of the work presented here is to accurately recognize the users with iris patterns and with faster computation...
Cognitive networks is the solution for the problems existing on the current networks. Users maintain integrity of the networks and user node activity monitoring is required for provision of security. Cognitive Networks discussed in this paper not only monitor user node activity but also take preventive measures if user node transactions are malicious. The intelligence in cognitive engine is realized...
A Wireless Ad hoc Network consists of mobile nodes with energy constrained batteries. In this paper, we have proposed an Optimized Lifetime Multicast Tree (OLMT) algorithm that constructs a minimum energy multicast tree resulting in minimum total transmission power consumption,thereby increasing the lifetime of the network. We observe that, simulations carried on NS2 provides significant improvement...
Ad hoc networks are collection of mobile nodes which communicate using wireless media without any fixed infrastructure. Each mobile host acts both as a network router and an end point as packets are forwarded over multiple hops. Node mobility being the distinguishing feature of the mobile ad hoc network, makes routing an important challenge. Hence, Quality of Service (QoS) is not easily achieved in...
Broadcasting in ad hoc networks, widely utilized as a building block for many network layer protocols is prone to broadcast storm problem. This problem necessitates to carefully designate some nodes in the one-hop neighborhood of the sender as forwarding nodes and reduce broadcast redundancy. In this paper, we propose an algorithm called Dual Covered broadcast with Negative acknowledgements (DCN)...
Broadcasting in Ad hoc networks is prone to broadcast storm problem and ACK implosion problem. These problems create the necessity to carefully designate some nodes in the 1-hop neighborhood of sender as forwarding nodes and reduce broadcast redundancy. In this paper, we have proposed an algorithm called enhanced double covered broadcast with negative acknowledgements (EDCBN) which focuses on achieving...
Wireless mobile ad hoc stations have limited battery capacity, hence, ad hoc routing protocols ought to be energy conservative. Route discovery is a common operation in routing to resolve many issues. In a mobile ad hoc network (MANET) in particular, due to host mobility, such operations are expected to be executed more frequently. A straightforward broadcasting by flooding is usually very costly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.