The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
CBIR is one of the most widely used approaches for detecting images from an extensive image database. Now a day, numerous approaches have been developed to enhance the CBIR performance. The CBIR have a tendency to retrieve images depending on their visual content. CBIR evades several issues which are linked to the current ways of retrieving images by keywords. Most existing CBIR systems are based...
Routing stands for the sending the required data to the destination in such a manner that it reaches efficiently with high throughput and accuracy. The data is transferring over the network each sensor use some energy in receiving data, sending data. The life of the network depend how much energy used up in each transmission. The problem occurs when the transmission path meets with some sort of failure...
Since the evolution of the patch antennas, there is rapid growth observed in the applications of the patch antenna. There are number of benefits such as small size, ease of fabrication and installment, and a firm performance, so there are huge number of designs has been developed and presented by the researchers time to time. Taking an example of the mobile phone antennas, the antenna must have a...
The massive growth of digital technology along with use of internet has increased the use of audio-visual data such as images and videos in many domains like digital museums, commercial use, crime prevention, medical images, remote sensing and so on. With increasing volume of digital data, search and retrieval of relevant images from large data sets in accurate and efficient way is a challenging problem...
In today's world abundant data travelled from node to node or from cluster head to node or vice versa in a Wireless Sensor Network (WSN). This data can be of any type but it must consists the identity of that particular node where this data actually exist. The identity of that particular node is also as much important as the data. Due to this, there can be some security issues because if the identity...
Wireless Sensor Networks (WSN) is collection of various tiny sensor nodes to make communication possible between nodes to base station. Wireless Sensor Networks works in numerous critical situations like battlefields, forest fire detection, territory monitoring and many more circumstances. WSN have numerous design concerns out of which security is the key factor because it affects the overall performance...
Wireless Sensor Network (WSN) is an emerging technology due to its wide range of applications in public and military area. These sensor networks consisting of thousands of diminutive sensor nodes with limited resources with a base station and low cost, low power sensor nodes that are used for the monitoring purpose. As these sensor nodes are small in size and large in number therefore these networks...
This paper presents Newton's Method approach for Security Constrained Optimal Power Flow (SCOPF) problem including TCSC. Optimal Power Flow (OPF) problem is implemented using Newton's method aggregating all equality and inequality constraints. It is validated for two cases-base case and contingency case. In base case the objective is minimization of fuel cost and in contingency case line overloads...
A power system consists of linear as well as nonlinear loads but with the advancement in power electronics, the amount of non-linear devices are increasing day by day. This increment leads us to take into account their adverse effects on the power system as it causes the power system signals to carry different frequency components, which generate harmonics in the system. These harmonic components...
Modern routing protocols demonstrate inefficient performance in challenging environments, such as space communications, military operations, and mobile sensor networks. Basically challenging environment defines networks where the connectivity between end nodes has intermittent property due to dynamic topology or resource constraints. This results in the lack of instantaneous end to end paths, large...
Error correcting codes are used for detection and correction of errors in digital communication system. Reed Solomon (RS) codes are part of channel coding and are based on appending of redundancy to the information message to withstand the effect of noise, interference and fading. With the development of smaller process technology, systems are becoming more sensitive to radiation. If not considered,...
Social websites are the main part of the 21st century. Also, most of the generation is dependent on the social websites for communication. Social media is the stages where everyone feels free to express their emotions. Content can be in form of image, text, video etc. In addition to this, these uploaded multimedia contents can also contain the abusive words or some abusive images that are not suitable...
MCC (Mobile cloud computing) is a solution for the utilization of a range of shared mobile resources through wireless network environment. GMCC is a new paradigm that integrates geographical details in MCC. In this environment resource cooperation helps to increase resource utilization which leads to improvement in revenue by expanding the benefits of resource and upgrade QoS by minimum cost to lease...
Genetic Algorithm is the class of algorithm which deals with optimization related problem. Most of the work done under GA is based on software, this paper concentrate on designing the genetic algorithm processor using VHDL. Hardware design as compared to software is time and energy efficient as they are dedicated for single work. Genetic algorithm processor comprises of designing of sub modules, like...
Electroencephalogram (EEG) covers the detailed information regarding the neurological activity of human brain which is further used to analyze abnormal activities of which one of the abnormal activity is epileptic seizure which occurs due to sudden excitement of large number of neuron cells simultaneously. In this paper, spikes based parameters are used for epilepsy detection, as spikes are the main...
A number of improvements in WLAN leads to the deployment of Wireless Sensor Networks. Generally, WS N is a collection of a number of sensor nodes. Because it is very easy to deploy these sensor nodes so WS N gets popularity very quickly. The main applications of WS N are rescue mission & monitoring the temperature of environment etc. But as WS N has open access so security is very important. A...
Cataracts are blinding retina of millions of people. Current test Cataract detection from retinal is expensive using fundus camera as the detection is the key reason for this is not portable, needs an expert to perform the operation. This paper presents a low-cost smartphone based on smart systems integration and micro lenses allows patients in remote areas to have regular eye checks and the innovative...
The negative pressure wound therapy is these days very popular among all big operation plastic surgery. As they provide quick recovery and also keep wound infection free. So these days that market is expending a lot and the requirement for negative wound therapy increase. So this topic as a engineer is new for observation as on study we find that there is lot of scope in developing of these machine...
This paper presents a novel design of Modified Sierpinski Gasket Fractal Antenna (MSGFA). Sierpinski Gasket is known by name of Sierpinski Triangle having triangular slots using mid-point geometry of triangle. Sierpinski Gasket Geometry is modified using circular shape. It is fabricated on a low cost FR-4 epoxy substrate with relative permittivity of 4.4 and having dimensions 17.89 × 21.45 × 1.6 mm3...
Wireless Sensor Network is a group of distributed sensor nodes that has many applications those can vary from simple such as sensing temperature, pressure, humidity from the environment to critical applications that includes traffic monitoring, target tracking, patient monitoring etc. These critical applications are real time applications those can be possible with the Mobile Wireless Sensor Network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.