The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Control flow graph represents the flow of a program by a directed graph. They are used in Software engineering, Compilers and Static program analysis. Control flow graph represents various paths a typical program may undergo for different inputs. Control flow graphs play a prominent role in the selection of test cases. In this paper, we present a simple method which uses control flow graph to find...
Smart City is becoming a commonly-used term to describe the concept of utilizing information and communication technologies (ICT) to enhance urban services and improve the quality of life for citizens. All communications should be fast and properly protected against unauthorized eavesdropping, interception, and modification. Therefore high speed and strong cryptography is required. Advanced Encryption...
India is an agricultural country and its economy is largely based upon crop productivity and rainfall. For analyzing the crop productivity, rainfall prediction is require and necessary to all farmers. Rainfall Prediction is the application of science and technology to predict the state of the atmosphere. It is important to exactly determine the rainfall for effective use of water resources, crop productivity...
Software effort estimations are based on prediction properties of system with attention to develop methodologies. Many organizations follow the risk management but the risk identification techniques will differ. In this paper, we focus on two effort estimation techniques such as use case point and function point are used to estimate the effort in the software development. The decision table is used...
In several traditional algorithms for optimization, the complexity of algorithm increases with expansion of system infrastructure. Resource constraint, cost and energy availability of wireless sensor network (WSN) demand a better node localization algorithm that doesn't require extra hardware as well as has better accuracy with good convergence. Sensor node localization is the ability of an individual...
This paper provides a new design methodology to improve the efficiency of a parallel dual core cryptoprocessor for computing pairings over Barreto Naehrig (BN) curves. The proposed design is specifically optimized for Field Programmable Gate Array Platforms(FPGA). We explore the inbuilt features of an FPGA device to improve the efficiency of a cryptoprocessor for computing 128-bit secure pairings.
This paper describes a novel approach to the connected component labeling problem, derived from two fast labeling algorithms, Wu et al. and Park et al. We propose a method that improves over existing divide and conquer methods. We propose two new methods - First, hierarchical (coarse to fine) label propagation from various sub images. Second, the recursive boundary labeling method is only one neighbor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.