The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The market demand for a low-cost transportation system that operates efficiently in a circulatory environment is significant. In this paper, we propose a solution, EcoPRT, a two person, electric, autonomous, low cost, adaptable system that solves the circulatory problem, being ideal for areas that are too far to walk but too short to drive. The key advantages of the proposed system are: narrow footprint,...
Recently, the explosive growth of mobile and internet has changed the world of mobile computing. Accessing, editing, downloading the digital content like videos, images has become much easier which eventually has led to the need of security and authenticity of host data. These days video is a most popular digital media shared via mobile hence an attempt is made to provide security for video transmission...
Proportional derivative plus feed forward (PD+FF) feedback control laws exist to locally asymptotically track a smooth reference trajectory having bounded velocity for a fully actuated simple mechanical system (SMS) on a Riemannian manifold. Almost-global asymptotically stable (AGAS) tracking for an SMS on a compact Lie group is also addressed in the literature by observing that the closed loop error...
In this paper, the problem of determining a fault pattern to be catastrophic for unidirectional linear array with k- link redundancy is studied. First, we establish a necessary and sufficient condition for a fault pattern to be catastrophic. Based on this necessary and sufficient condition, we derive an efficient testing algorithm whose complexity is O(mk), where k is the number of bypass links, and...
Rapid growth and advancement in technology has given high potentialities for mobile devices. The term mobile computing has turned much easier with the support of Internet and smart phones. The explosive growth in data transmission like image and video has given pressing need for security especially to protect copyright. Video data is a popular electronic medium shared in internet, because of its perfect...
The proliferation of smartphones is retarded by energy inefficient applications and energy bugs. These energy bugs severely impact the user experience and cause significant user frustrations. To detect energy bugs, we need to characterize the power consumption behaviour of software. To achieve that, we develop an operational definition of energy bugs that can be easily translated to a procedure to...
Graduate attributes assigned by the National Board of Accreditation, India help in attainment of program educational objectives. Here we consider that the twelve graduate attributes map directly to the twelve program objectives. The graduate attributes are salient and important for every graduating engineer. Each program outcome is achieved through course outcome. The curriculum comprising of various...
Warning data dissemination using vehicular networks is envisioned in Intelligent Transportation System applications. Due to extended connectivity of roadway vehicles and consequent extension of region of data propagation, data may be accessed in some geographical areas where it is neither relevant nor effectively beneficial. Moreover, propagating data to irrelevant regions increases communication...
We describe a novel Distributed Key Establishment (DKE) protocol in Disruption (Delay) Tolerant Location Based Social Wireless Sensor and Actor Networks (DTLBS-WSAN). In DKE, we propose that sensor nodes use neighboring signatures to establish their keys. Pre-distributed keys are used by actor nodes to strengthen communication security. We show that nodes can get guaranteed security when actors are...
Body Area Networks (BANs) are only recently beginning to revolutionize e-healthcare by making monitoring of various patients accessible and convenient for physicians and patients. Past research in BANs has focused on biosensor design, signal processing, power efficiency, and wireless protocols. However, numerous challenges plague its development and implementation to this day. One of these is the...
Two-photon absorption properties of a (terpyridyl)osmium-(porphinato)zinc (OsPZnOs) are studied in bulk and waveguides. Integration of OsPZnOs (δ>1300GM) in waveguides showed enhanced nonlinear performance and potential for photonic applications.
Networks in which nodes are intermittently connected, and have limited storage space and power, are termed Delay Tolerant Networks (DTN). To overcome these conditions, DTN routing protocols require nodes to store data packets for long periods of time until they contact with each other. In addition, they spread multiple copies of the same packet in the network to increase the probability of one of...
In this paper, we propose a new intersection-based geographical routing protocol, called delay tolerant routing protocol (DTRP) that adapts to the changes in the local topology within city environments. DTRP is based on an effective selection of road intersections through which a packet must pass to reach the gateway to the Internet. The selection, in such delay tolerant VANETs, is made in a way that...
Networks in which nodes are sparsely distributed and, therefore, are disconnected for long periods of time, are termed Delay Tolerant networks (DTN). The intermittent connection, together, with the limited resources of mobile nodes, mainly power and memory, created a challenging environment for data networking in DTN. Routing protocols developed for DTN tend to discover and select the minimum end-to-end...
We consider the system-level self-diagnosis of multiprocessor and multicomputer systems under the generalized comparison model (GCM). In this diagnosis model, a set of tasks is assigned to pairs of nodes and their outcomes are compared by neighboring nodes. The collections of all comparison outcomes, agreements and disagreements among the nodes, are used to identify the set of faulty nodes. We consider...
The goal of image segmentation is to partition an image into regions that are internally homogeneous and heterogeneous with respect to other neighbouring regions. We build on the pyramid image segmentation work proposed by [BHR] and [SSN] by introducing a mixture of colour and texture cues in order to more accurately group regions. Statistical comparison of each colour channel separately along with...
We propose a localized address autoconfiguration (LaConf) scheme for wireless ad hoc networks. Address allocation information is maintained on the network border nodes, called addressing agents (AAs), which are locally identified by geographic routing protocol GFG. When a node joins the network, it acquires an address from a neighboring AA (if any exists) by local communication or from the head AA...
In sparse mobile networks, nodes are connected at discrete periods of time. This disconnection may last for long periods in suburban and rural areas. In addition, mobile nodes are energy and buffer sensitive, such as in mobile sensor networks. The limited power and storage resources, combined with the intermittent connection have created a challenging environment for inter-node networking. This type...
The goal of image segmentation is to partition an image into regions that are internally homogeneous and heterogeneous with respect to other neighbouring regions. We build on the pyramid image segmentation work by making a more efficient method by which children chose parents within the pyramid structure. Instead of considering only four immediate parents each child node considers the neighbours of...
With recent advances in the development of wireless communication networks, vehicular networks have been receiving considerable research interest. One of the major applications of vehicular networks is Intelligent Transportation Systems (ITS). To exchange and distribute messages, geocast routing protocols have been proposed for ITS applications. Almost all of these protocols evaluate network-centric...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.