The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A modified forward-only counterpropagation neural network (MFO-CPN) for color image compression is proposed. It uses several higher-order distance measures for calculating winning node. It also incorporates nonlinear adjustment of learning rates in both the layers. Results with these distance functions are compared. Proposed modifications leads to improvement in the image quality and faster convergence...
In this paper, we present an efficient fault-tolerant token-based algorithm for achieving mutual exclusion (ME) in distributed systems. Nishio et al's fault-tolerant mutual exclusion algorithm requires feedbacks from every other site to recover from token loss. This results in considerable amount of waiting time and false token loss detection. Though Manivannan et al's algorithm solves the problems...
Bramari is one part of the Pranayama, as traditionally conceived, involves much more than merely breathing for relaxation. Bramari is a term with a wide range of meanings. "The regulation of the incoming and outgoing flow of breath with retention". Bramari also denotes cosmic power, or the power of the entire universe which manifests itself as conscious living being in us through the phenomenon...
Radio Frequency Identification (RFID) is slated to become a standard for tagging various products. As more and more products become RFID enabled, fast tag identification mechanisms will become important. Various tag identifica tion (or anti-collision) algorithms have been proposed for RFID systems. This work focuses on methods to improve tag read efficiency in RFID Systems. In this paper, we propose...
The advent of various real-time multimedia applications in high-speed networks prompt the necessity of quality of service (QoS) based multicast routing and the constrained Steiner tree as the mathematical structure behind it which is a well- known NP-complete problem. Two important QoS constraints are the bandwidth constraint and the end-to-end delay constraint. In this paper, an algorithm is proposed...
Simulation is a widely used technique in networking research and a practice that has suffered loss of credibility in recent years due to doubts about its reliability. In this paper, we conduct a simple Ethernet experiment on a test-bed, and try to reproduce the results using three popular network simulators: ns-2, QualNet and OPNET Modeler. We find that after careful simulation we are able to approximate...
The ease of deployment and the infrastructure less nature of mobile ad hoc networks (MANETs) make them highly desirable for the present day multi media communications. Traditional routing protocols may not suffice for real time communications which require QoS support from the network. Though there has been considerable research in this area, most of the routing protocols take into account a single...
A novel hidden Markov model (HMM) for recognition of handwritten Oriya numerals is proposed. The novelty lies in the fact that the HMM states are not determined a priori, but are determined automatically based on a database of handwritten numeral images. A handwritten numeral is assumed to be a string of several shape primitives. These are in fact the states of the proposed HMM and are found using...
Notice of Violation of IEEE Publication Principles??Estimating neutral divergence amongst Mammals for Comparative Genomics with Mammalian Scope??by Anup Bhatkar and J.L. Ranain the Proceedings of the 9th International Conference on Information Technology (ICIT'06)After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been...
Promoter recognition is based upon two complementary methods, a motif based method and a global signal based method. The literature is abound with motif search methods. But as the motifs of a promoter are consensus patterns of very short length and the chance of finding putative promoters is high, global feature methods gain importance. In this paper a simple global feature extraction method is proposed...
This article presents an efficient two-stage clustering method for clustering microarray gene expression time series data. The algorithm is based on the identification of genes having significant membership to multiple classes. A recently proposed variable string length genetic scheme and an iterated version of well known fuzzy C-means algorithm are utilized as the underlying clustering techniques...
CA are useful tools in modeling and simulation. However, the more complex a CA is, the longer it takes to run in typical environments. A dedicated CA machine solves this problem by allowing all cells to be computed in parallel. In this paper we present simple yet useful hardware that can perform the required computations in constant time complexity, O(l).
The technique considers a message as binary string on which a cascaded recursive carry addition and key rotation (CRCAKR) is applied. This technique uses binary addition method. It is a kind of block cipher and symmetric in nature hence, decoding is done following the same procedure. A comparison of the proposed technique with existing RSA and Triple DES has also been done in terms of frequency distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.