The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increase in need for strong security systems, the biometric systems are becoming more and more popular. These systems are based on human traits which, unlike passwords or pins, cannot be lost, stolen or forgotten. One such trait is ear. With the initial doubts on uniqueness of ear, ear biometrics could not attract much attention. But after it has been said that it is almost impossible to...
In this paper, we present a strong universal designated multi verifier signature scheme based on bilinear pairings, which does not resort to random oracles. The security of the proposed scheme relies on the hardness of solving q-Strong Diffie-Hellman problem. The proposed scheme is more efficient than the existing universal designated multi verifier signature schemes. The signing and the designation...
Camouflaging is an attempt to obscure the signature of a target and sublimate the target in its background frame in terms of co-occurrence matrix texture properties. The objective of this research work is to detect such camouflaged defect. Since the texture similarity between the background and the defect is the premise for accomplishing camouflage, an intensive texture analysis should be able to...
Automatic form processing is an important application of document analysis subject. Such a system requires to be trained and tested on a standard database of forms collected from real-life. However, to the best of our knowledge, the only such available databases are NIST Special Databases. These databases consist of images of synthesized form documents. On the other hand, recently we developed a form...
Results of association studies using individual single nucleotide polymorphisms (SNPs) or SNP-haplotypes have been inconsistent. Possible reasons could be attributed to poor experimental design, generalization of results from a single population or inappropriate choice of markers. Here we explore the possibility that the sequence context of a SNP may be responsible for its poor association with the...
Human face detection plays an important role in real life application such as Face recognition, Human computer interface, Video surveillance and Face image database management. Automatic Face detection in such scenario is a challenging task. Here we propose to use skin color cue to detect face in a video sequence by modeling the skin color by an one class classifier named SVDD (Support Vector Data...
This paper deals with a quadratic classifier based scheme for the recognition of off-line handwritten numerals of Kannada, an important Indian script. The features used in the classifier are obtained from the directional chain code information of the contour points of the characters. The bounding box of a character is segmented into blocks and the chain code histogram is computed in each of the blocks...
In this paper, we propose Sniff and Embark (Sniff) protocol, a novel frame sniffing and token passing based approach to provide QoS in WLANs. Our simulations show that S^E performs significantly better than EDCF over the performance metrics - delay, jitter and time- constrained frame drop ratio.
Structured design specification lacks formality to reason about design correctness. In this paper primitives for structured workflow design are specified mathematically and observations are made by analyzing these specifications.
As technology scales down to nanometer technology, coupling effects between neighboring wires have a significant impact on power consumption and signal integrity on on-chip interconnects. Especially, on-chip inductive effects need to be taken into account due to low-resistance metal interconnection and fast signal transition times in nowadays IC design. In this paper, we propose a low power bus encoding...
With the size and increasing complexity of telecom networks, there is a need to interconnect management systems at different levels. This requires information flow across many applications in a domain independent way. XML is a widely deployed standard which is being used for integration of network management system(NMS) with other applications. We examine the performance of different transport mechanisms,...
In this paper we propose a new exponentiation architecture in GF(2m). The core of the architecture is a parallel structure for multiplication and squaring, which is based on the state transitions of programmable cellular automata (CA). The proposed architecture requires hardware of the order m2 and the time complexity is m. The performance of the design outperformed existing architectures based on...
Software effort modeling is one of the fields in which machine learning techniques have proved effective. In this paper, attempt has been made to establish a relation between program development time with respect to its dependence on various program and personnel attributes. A neural network model has been developed to predict the development time of various software programs. The model is a three...
A spanning tree T of a graph G is called a tree t-spanner if the distance between any two vertices in T is at most t-times their distance in G. A graph that has a tree t- spanner is called a tree t-spanner admissible graph. Given a graph G and an integer t, the tree t-spanner problem asks whether G admits a tree t-spanner. It is known that the tree t-spanner problem is NP-complete for chordal bipartite...
Buffered clock-tree design, with cells at its leaves, are known to meet timing and skew requirements better. Clustering of flip-flops leads to reduced clock-tree wirelengths and power-efficient layouts. In this paper, the problem of clustering flip-flops in a given placement is formulated as Multi-way Equi-Partitioning of a given point set, such that (i) total area of the partition (ii) area of the...
We propose a novel static slicing algorithm for inter-procedural programs. We use the system dependence graph (SDG) as the intermediate representation. We have implemented our algorithm by using file structures to handle all the statements that compute the static slice.
Search for a Web-page using Crawler based Search Engine depends on its Ranking Mechanism. Search Engine sorts through millions of Web-pages and present the significant Web-pages through Ranking method. A new approach is proposed here adopting Cellular Automata.
The paper presents a policy-based approach to detect security violations by enforcing security policy at run-time for providing secure email service. As email service usage is increasing day by day, hackers or attackers are also playing a vital role to destruct email service and even to crash the email server. Due to this, it is a challenging task today to the system administrators to provide secure...
In this paper we have presented design and implementation of a prototype for intrusion detection using mobile agents (MAs) in mobile ad hoc networks (MANETs). In this prototype each node runs intrusion detection system locally and equally cooperates with other intrusion detection systems running on other nodes. The proposed prototype is implemented and validated on PMADE (Platform for MA Distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.