The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's scenario, any design is vulnerable to third party attackers like Hardware Trojan depends on their accessibility to the design. Hardware Trojans are the pernicious circuitry which are added to an original design by an attacker. These Trojans may lead to erroneous output of a system or even can incapacitate the design. Hence there is a demand for detecting the Trojans. The proposed method...
The improvised Particle Swarm Optimization (PSO) Algorithm offers better search efficiency than conventional PSO algorithm. It provides an efficient technique to obtain the best optimized result in the search space. This algorithm ensures a faster rate of convergence to the desired solution whose precision can be preset by the user. The inertia parameter is varied linearly with iteration number, which...
Hadoop has become the most used framework for data intensive processes such as mapreduce. Business intelligence and technology forecasting has played a big part in enhancing the popularity of Hadoop framework. In this paper we have proposed an improvement for apache Hadoop yarn (also known as Hadoop 2.0) architecture. Container nodes, application master, resource manager and the pool of resources...
Main objective of dual video watermarking is to achieve better compression rates, robustness against attacks and high security which has been rarely reported. In this paper, visible and invisible watermark is embedded in the video encoder during compression, resulting in an optimized compression/watermarking algorithm and system. Due to its lower complexity, Discrete Cosine Transform (DCT) watermarking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.