The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Last decade has seen an increasing demand for vehicle aided data delivery. This data delivery has proven to be beneficial for vehicular communication. The vehicular network provisions safety, warning and infotainment applications. Infotainment applications have attracted drivers and passengers as it provides location based entertainment services, a value add to the traveling experience. These infotainment...
Wireless sensor networks has become envisage for various purpose in all the fields of technology. Random deployments are a fundamental crisis to realize coverage and/or connectivity in sensor networks. Path-Trace-Back protocol is proposed proficiently to preserve the data at specific geographic area coverage in a network with node mobility in nature. This scheme can turn out to be more difficult for...
Diabetic retinopathy is the impairment of the retinal blood vessels due to complications of diabetes, which can subsequently lead to loss of vision. The only solution for this problem is through the use of a retinal screening system that would diagnose the retinal damage at an early stage. This paper proposes the use of morphological operations and segmentation techniques for the detection of blood...
The information available in the World Wide Web is stored using many real web databases (e.g. vehicle database). Accessing the information from these real web databases has become increasingly important for the users to find the desired information. Web users search for the desired information by querying these web databases, when the number of query results generated is large, it is very difficult...
Email proves to be a convenient and powerful communication tool but it has given rise to unwanted mails. Spam mails leads to wastage of server storage space, consumption of network bandwidth and heavy financial losses to the organization, thus a serious research issue. Filtering mails is one of the popular approaches used to block spam mails. In this work, we propose RePID-OK (Repetitive Preprocessing...
This paper proposes a Traffic-Differentiated Two-Hop Routing protocol for Quality of Service (QoS) in Wireless Sensor Networks (WSNs). It targets WSN applications having different types of data traffic with several priorities. The protocol achieves to increase packet reception ratio (PRR) and reduce end-to-end delay while considering multi-queue priority policy, two-hop neighborhood information, link...
Cognitive wireless networks are the solution for the existing networks Infrastructure and security problems for all applications. Cognitive techniques adopted in this paper, monitor the transactions among the nodes in the network and detects the malicious nodes and takes preventive measures. To achieve high detection rate, single-sensing with cognition is adopted and training of network is done using...
Several Routing Protocols have been proposed and developed in the last few years for Wireless Sensor Networks (WSNs). Since there has been increasing interest in the development of Wireless Sensor Networks to specific applications, it is necessary to discuss routing techniques suitable to the application and segregate the Quality of Service (QOS) parameters specific to the application domain along...
This paper presents the study on the cost analysis for the Video-on-Demand (VoD) system exploiting the advantages of the Peer-to-Peer (P2P) architecture. Our objective is to tackle the problems in analyzing cost and to come up with efficient cost analysis model (CCAM) thereby enhancing the revenue to the system. We adopt a partially decentralized P2P architecture with a cluster based approach to find...
Data mining in medicine is an emerging field of high importance for providing prognosis and a deeper understanding of the classification of disease. The proposed system concentrates on the two different cognitive tests for the diagnosis of different stages of dementia. Dementia is considered as the fourth most common disorder among the elderly. Early detection of dementia and correct staging of the...
The fact that the signature is widely used as a means of personal verification emphasizes the need for a signature verification system. In this paper, Standard Scores Correlation based Off-line Signature Verification (SSCOSV) System is presented. The comparison is made on the basis of Pixel density and geometric feature points. Before extracting the features, preprocessing of a scanned signature image...
Human fingerprints are reliable characteristics for personnel identification as it is unique and persistence. A fingerprint pattern consists of ridges, valleys and minutiae. In this paper the Minutiae Extraction in Fingerprint using Gabor Filter Enhancement (MEGFE) algorithm is proposed for minutiae feature extraction and post processing. A global feature extraction and fingerprints enhancement are...
As security is a major concern in present times, reliable authentication systems are in great demand. A biometric trait like the vascular pattern on the back of the hand of a person is unique and secure. A biometric system working on this principle often fails to authenticate a person either because of the varying hand posture or due to an injury altering the vein pattern. In this paper we propose...
The face recognition system attains good accuracy in personal identification when they are provided with a large set of training sets. In this paper, we proposed Advanced Biometric Identification on Face, Gender and Age Recognition (ABIFGAR)algorithm for face recognition that yields good results when only small training set is available and it works even with a raining set as small as one image per...
Wireless sensor networks(WSN) usually consists of a large number of tiny sensors with limited computation capacity, memory space and power resource. WSN's are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource constrained nodes and lack of tamper-resistant packages. To achieve security in wireless sensor networks, it is important to encrypt...
Wireless sensor networks (WSN) consists of tiny autonomous devices called sensors capable of sensing, processing and transmitting information. Energy consumption, routing and maximizing lifetime are the important challenges in the sensor network. In this paper, we propose multiple tree construction (MTC) algorithm to address the problem of finding path from each node to its nearest base stations to...
Advanced data mining technologies along with the large quantities of remotely sensed imagery, provide a data mining opportunity with high potential for useful results. Extracting interesting patterns and rules from data sets composed of images and associated ground data are typically used in order to detect the distribution of vegetation, soil classes, built-up areas, roads and water bodies such as...
The way in which Wireless Sensor Networks (WSN) are designed requires that energy be taken as the most crucial element if WSNs are to be used in the most effective way to serve the purpose for which they have been deployed in the target region. Routing protocols are the main aids that can assist in reducing the energy consumption required by the transmission of data throughout the sensor networks...
A Wireless Ad hoc Network consists of mobile nodes with energy constrained batteries. In this paper, we have proposed an Optimized Lifetime Multicast Tree (OLMT) algorithm that constructs a minimum energy multicast tree resulting in minimum total transmission power consumption,thereby increasing the lifetime of the network. We observe that, simulations carried on NS2 provides significant improvement...
It is de facto that merging two different streams of vehicles into one single stream poses some degree of inconvenience. As human lives are at stake, a lot of care has to be taken in this area of traffic management. In this paper a proactive merging strategy is proposed, keeping the intersection of ramp and a highway as the main focus. In our algorithm, it is assumed that the vehicles are sensor-enabled,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.