The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
India's future science vision emphasizes planetary explorations for better understanding of the universe, finding new domains of material resources, energy, environmental systems and habitat. Mars has a special significance of having many similarities with Earth. Methane Sensor for Mars (MSM) is one of the significant payloads of India's first mars mission. The prime objective of the proposed Methane...
Reversible logic plays an important role in the synthesis of circuits having application in quantum computing, low power CMOS design and nanotechnology-based system. In this paper, we have proposed the online testability of reversible sequential circuits, which is first ever proposed in literature. On the way to propose the online testability of reversible sequential circuits, we have proposed an...
Multi valued logic synthesis is a very promising and affluent research area at present because of allowing designers to build much more efficient computers than the existing classical ones. Ternary logic synthesis research has got impetus in the recent years. Many existing literature are mainly perceptive to the realization of efficient ternary reversible processors. This research is based on the...
In this paper, we propose an algorithm that produces the complete test set (CTS) of a reversible circuit for Single stuck-at fault (SSF) and multiple-stuck-at fault (MSF) models. Our algorithm works only for an important subclass of reversible circuits - the circuits consisting of k-CNOT gates (k ges 2) though, any n-wire circuit having 0-CNOT or 1-CNOT gates can be converted to a (n + 2) wire circuit...
In this paper, we consider the problem of testing reversible circuits for a particular fault model: Stuck-at Fault Model. We propose a design-for-test construction technique for k-CNOT circuit having k ges 1 and only 2 test vector (i.e. minimal) suffice as their complete test set. We have also shown the way to exploit our method for the case of 0-CNOT circuits. Finally we provide some experimental...
A truly pervasive computing environment can only be created if ubiquitous computation power can collaborate seamlessly to create superior user experience. With the adoption of mobile computing platforms on the rise, we have explored how the IEEE 802.11 wireless access standards can be used to enable a device to be more aware of the capabilities of the infrastructure in its surroundings. Specifically,...
In this paper, we present the vision for an open, urban-scale wireless networking testbed, called CitySense, with the goal of supporting the development and evaluation of novel wireless systems that span an entire city. CitySense is currently under development and will consist of about 100 Linux-based embedded PCs outfitted with dual 802.11a/b/g radios and various sensors, mounted on buildings and...
The nonlinear interaction of quantum Langmuir waves (QLWs) and quantum ion-acoustic waves (QIAWs) described by the one-dimensional quantum Zakharov equations (QZEs) is reinvestigated. A Galerkin type approximation is used to reduce the QZS to a simplified system (SS) of nonlinear ordinary differential equations which governs the temporal behaviors of the slowly varying envelope of the high-frequency...
Reversible logic has become one of the most promising research areas in the past few decades and has found its applications in several technologies; such as low power CMOS, nanocomputing and optical computing. This paper presents improved and efficient reversible logic implementations for Binary Coded Decimal (BCD) adder as well as Carry Skip BCD adder. It has been shown that the modified designs...
Enterprises are aggressively eyeing ubiquitous mobile solutions to increase the efficiency of their taskforce, but this exercise is hindered by several functional and technical challenges. For instance mobile devices are widely different in terms of their underlying platform capabilities, available screen real estate, input mechanisms and so on. In this work we introduce mConnect, a Context aware...
Image morphing has been the subject of much attention in recent years. It has proven to be a powerful tool for visual effects in film and television, depicting the fluid transformation of one digital image into another. This paper presents a new approach of image morphing based on pixel transformation that depicts the transformation of pixels with their neighborhoods. The method is organized with...
Motif finding is one of the most important and challenging tasks in computational biology. In this paper, a new algorithm for finding motif is presented. The strategy used in this paper speeds up the operations of finding the motif. Performance comparisons among the existing algorithms and proposed algorithm are also presented which shows that the proposed algorithm performs better in terms of accuracy...
Automated banknote recognition system can be a very good utility in banking systems and other field of commerce. It can also aid visually impaired people. Although in Bangladesh, bill money recognition machines are not common but it is used in other countries. In this paper, for the first time, we have proposed a Neural Network based recognition scheme for Bangladeshi banknotes. The scheme can efficiently...
Wireless adhoc networks consist of nodes interconnected by wireless multi-hop communication paths. Such networks exhibit simulated mobility, where the topological changes are caused by nodes coming up or going down. These networks also exhibit complex overlapping of flow paths. This in turn leads to severe contention in between flows as well as between the sub-flows of the same flow. In this paper,...
Wireless sensor networks (WSNs) are best suited for perceiving a phenomenon, which in turn forms the basis for controlling an actuator in a corrective plane. However, before the corrective action can be invoked, it is necessary to validate that the data was not injected with a malicious intent. To this end we propose CADA (cellular automata based data authentication mechanism), a lightweight protocol...
Mutual authentication between a service provider and its users is essential to prevent unauthorized adversaries from misutilizing system resources. The traditional method of password table lookups is not scalable and is susceptible to overloading. Therefore this paper proposes a cellular automata based remote-mutual authentication (CARMA) Scheme to reduce the complexity of encryption and hash-based...
Web browser plays an important role in e-world. Web browser is a mean of surfing the Web site. We go through Web site for different purposes, for different information. We have to mention the URL of desired location on browser and wait for response. Sometimes we visit some common sites often, some we visit least. But current browsers provide less intelligent facilities regarding this matter. This...
Broadcasting is a fundamental operation in any network, more so in a wireless environment where the media is inherently broadcast in nature. The absence of guaranteed static reference nodes in a dense and dynamic wireless computing environment makes it almost impossible to control the propagation of a broadcast packet. In this work we survey the various techniques adopted to minimize the temporal...
The absence of guaranteed static reference nodes in a dynamic MANET environment makes it almost impossible to control the propagation of a broadcast packet in a controlled fashion. Therefore, to offset the well documented inefficiencies of a simple flooding mechanism, we propose optimal reliability broadcast mechanism (ORBM). ORBM is a received signal strength based scheme to control temporal congestion...
User authentication is most essential to prevent the unauthorized adversaries from obtaining the system resources. This paper proposes a cellular automata based remote-user authentication (CARA) scheme to reduce the complexity of encryption and hash-based cryptosystems. CARA uses cache-based nonce to avoid synchronization problems and thwart replay attacks. This scheme is robust against other attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.