The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Bulk alloys of Co-substituted Fe2TiSi, forming the series Fe2Ti1−xCoxSi (x = 0, 0.25, 0.75 and 1), have been investigated by first-principle density functional calculations.
The cloud phenomenon is a vital service in internet computing. The three service models SaaS, PaaS & IaaS provides all the facilities & functionalities over the internet. Cloud service providers provide services on pay-per-use basis. The main aim of cloud service providers is to use resources efficiently and gain maximum profit using efficient scheduling algorithms which remains an issue in...
This is an attempt to gain better performance in executing the processes in distributed environments, which allows execution environments to move processes from processor to processor dynamically at any point in the life of the process. In this paper, a migration algorithm is proposed to migrate the processes dynamically to lightly loaded host using the CPU load as migration criteria. During the migration,...
In this paper a novel methodology for indexing domain specific audio archives using linguistic information present in the speech signal is discussed. The audio indexing system is phone based and can work under limited training data conditions. A training data set that captures the linguistic information within Hindi language at the syllable level is first developed. A reduced phone set is then derived...
Network simulator version 2 globally known as NS2 is an open source event-driven simulator tool gained very much popularity in communication network field due to its flexibility nature. Till the day there are number of projects tried to tell us how to use this tool effectively. An issue about performance evaluation process needs to be considered. A trace file which comes as an output of one-time simulation...
Wireless sensor nodes positions perform a crucial role in various sensor network applications. Localization of sensor node in WSN includes security problems such as node re-authentication and movement tracing. Various techniques have been proposed in recent times to solve the location problems of usual sensors but poor to support hostile and dynamic environments as their blueprints are only for the...
Sensor nodes' locations perform a vital role in many sensor network applications. Localization of sensor node in Wireless Sensor Networks adds security issues such as node re-authentication and tracing the movement. A number of techniques have been proposed recently to solve the locations issues of regular sensors but inadequate to support hostile and dynamic environments since their designs are only...
The objective of this work is to apply repetitive control strategy in an existing laboratory based Liquid Level System for tracking of periodic trajectories applied in the set point or rejecting periodic disturbances with known period. This paper deals with different conventional control techniques and repetitive control strategy for the Liquid Level System (LLS). The main objective of this paper...
We report a novel chemical and biological sensing metrology by combining both frequency-domain terahertz and microfluidic techniques through the quasi-optical approach. Using this sensing platform, a variety of chemicals have been examined over the frequency range of 0.57–0.63 THz. In addition, real-time monitoring and THz mapping of two-stream mixtures and diffusions in a microfluidic device are...
A novel Secure Multi-party Computation protocol for statistical computations has been proposed and implemented in this work. The described protocol is an enhanced version of our previous proposal of virtual party protocol. Here the system is implemented using a Token Ring Network. Secure Multi-party Computation is classically defined as a system in which computation which involves data from a number...
In this paper, we have proposed a novel architecture for SMC (Secure Multi-party Computations). This is an advanced version of our earlier Virtual Party Protocol. The system is based on tri-TTP (Trusted Third Party) architecture. The classical SMC problem is a computation which involves data from multiple parties. The key is to keep the data hidden from other parties. The protocol also find its applications...
This paper portrays recent trends in Radio Frequency Identification (RFID) systems and its commercial relevance. RFID is one of the most researched and rapidly emerging technologies. With the recent technological advancements at International level, it is finding its application in various areas and has a bright future scope. We have proposed a software framework for RFID integrated mobile phones...
The essence of high performance computing (HPC) in the field of computation nanotechnology and problems encountered by HPC arrangement in applying HPC to Nano-enabled calculations have been presented in the paper. A proposal to optimize computations in an HPC setup has been formulated to make nanotechnology computations more effective and realistic on a CUDA based framework. Results and findings in...
The essence of high performance computing (HPC) in the field of computation nanotechnology and problems encountered by HPC arrangement in applying HPC to nano-enabled calculations have been presented in the paper. A proposal to optimize computations in an HPC setup has been formulated to make nanotechnology computations more effective and realistic on a CUDA based framework. Results and findings in...
We have analyzed the effect of innovations in Nanotechnology on Wireless Sensor Networks (WSN) and have modeled Carbon Nanotube (CNT) based system. We have shown the integration of CNT in WSN and formulated a Nano routing system. A proposition is put forward by us on the changes needed in the existing sensor node structure to improve its efficiency and to facilitate and enhance the assimilation of...
RFID (Radio Frequency Identification) has been used in Supply Chain management but with the advent of Nanotechnology enabled RFID energy consumption is being constantly decreased. The major issues between implementation of such devices are their reliability and security. In this work we have implemented a novel and effective VPP (Virtual Party Protocol) for RFID systems. Use of VPP and insertion of...
Radio Frequency Identification (RFID) is generic term for technologies employing radio waves for detecting objects. We describe our approach with recent methodologies in RFID systems sighting its commercial ventures as it is the most researched and rapidly emerging technologies. RFID has wide application in payment systems, access control and asset tracking as the companies are using the technology's...
The expansion of internet escalated banking to a new level and has raised tremendous opportunities of joint transactions in which multiple banks cooperatively conduct some computation. Such computations use confidential data of the involved banks to compute the result. As the concerned data is private for the owning organization, its security is prime concern. Privacy preservation concern rises as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.