The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IP - VPN and VPN Service Provider (VSP) customersmaintain the quality for the routing and signaling entities. In thenetwork, VSP is getting viewing by VPN like opaque entity andlimiting meaningful interaction between the VPN and VSP. In thispaper, we will reduce the (Crankback + Miscall) Ratio for theVPN network and increase the VPN Successive Rato. As from theresults session, VPN (Crankback + Miscall)...
The OSI model is implemented for protection &security of crucial information to be accessed by hackers in thetransmission process. The OSI model applies a security system likeIPSec (Internet Protocol Security) incorporated in network layer &SSL (Socket Secured Layer) in transport layer. The PPTP (Point toPoint Tunneling Protocol) is implemented in data link layer todevelop a tunnel that is...
The previous work, suggests a portioned picturebroadcasting system where screens of small size are accumulated togenerate screen of bigger size through Ethernet network interfacethat helps in easy install & implementation of digitized displaydevices. The system makes use of Texas Instruments Da Vinciplatform, that is comprised of Da Vinci TMS320DM6646 dual coreCPU along an ARM9 core & C64+...
Human brains work has always been attractive and challenging to researchers for a decade of time. Brain computer interface (BCI) is now an imperative area for brain research. Various methods are used to record the brain signals and analyse that signals. One of the methods in which recording of electrical activity along the surface of scalp. In this paper, we study the problem of mind awake stage signal...
Artificial Bee Colony (ABC) is a popular swarm intelligence based approach used to solve nonlinear and complex optimization problems. It is a simple to implement and swarm based probabilistic algorithm. As the case of other swarm based algorithms, ABC is also computationally expensive due to its slow nature of search process. The solution search equation of ABC is significantly influenced by a random...
Today's scientific era has contributed immensely to the design and deployment of interfaces to aid physically handicapped people to combat their disabilities. The alternate interfaces assist individuals in leading a normal life and perform expected activities. Such types of interfaces are the part of Assistive Technology. There are different phases between design and deployment of assistive technology...
Artificial Bee Colony (ABC) is a popular swarm intelligence based approach used to solve nonlinear and complex optimization problems. It is a simple to implement and swarm based probabilistic algorithm. As the case of other swarm based algorithms, ABC is also computationally expensive due to its slow nature of search process. The solution search equation of ABC is significantly influenced by a random...
Incredible evolution of Internet, Digital devices and communication channels lead to an enormous increase in data leading to demand of Data security systems. Image stenography is the technique to hide data inside an image. This paper proposes a message dependent image stenography technique for concealing information into a cover image. Arnold transform is used with 24-bit key insertion before Haar...
Nowadays image retrieval plays an important role in an extraordinary number of multimedia applications which serve human society. Since a generic graph based retrieval scheme working in every situation can be quite difficult to implement due to the presence of complex scene. In this paper we investigate to deal with such problems and focuses on how to extract the object from an image using topological...
Due to the dynamic changes of business environments and the advancements of technologies, information technology (IT) projects are facing lots of challenges, and there is requirement of systematic approaches to deal with the risks to ensure the project's success. As, no IT Project can ever be risk free. Here we are proposing a framework of automated risk removal model which identifies, classifies...
To achieve the maximum productivity using minimum resource is the aim of any software industry. Software engineering provides an abstraction process to develop software product. It has introduced various methodologies, principles and concepts. Most of them are the software process models which are also known as software life cycle models. In the software industry different-different types of projects...
Minimization of energy consumption is an important parameter to be considered in mind when designing an algorithm for WSN. In this paper an advance algorithm for energy efficient clustering and multi-hop routing is proposed in WSN. The sensor network is constructed in the form of a circular area. The base station is at the centre of this circle. The sensor nodes will be deployed in concentric circular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.