The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: low power cascaded three stage amplifier; software bug complexity; energy based gossip routing algorithm; autonomic computing system; high-speed image cryptosystem; semantic Web services; multiple selection diversity antennas; cooperative trust management framework; speech recognition; digital watermarking; fault tolerant active pixel sensors; genetic algorithm;...
This paper lays out different issues and solutions in the design of an operating system with an in-memory kernel - from the minimum features required for a program to become the kernel, to how this kernel should be written into the boot sector of a disc so that it gets loaded into the memory. It highlights how this operating system can be made to support user specific authentication, keyboard and...
eCommerce is an area where an Autonomic Computing system could be very effectively deployed. eCommerce has created demand for high quality information technology services and businesses seek ways to improve the quality of service in a cost-effective way. Properly adjusting tuning parameters for best values is time-consuming and skills-intensive. This paper describes a simulation environment to implement...
Mobile IP version 6 (MIPv6) is an IP layer mobility protocol for the IPv6 Internet. Route Optimization (RO) in Mobile IPv6 provides a mobile node (MN) the opportunity to eliminate the inefficient triangle routing with its corresponding node (CN) and therefore, greatly improves the network performance. However, in doing so, MIPv6 introduces several security vulnerabilities, and among them a major concern...
In this paper, we propose a novel face recognition method based on local appearance feature extraction using dual-tree complex wavelet transform (DT-CWT). It provides a local multiscale description of images with good directional selectivity and invariance to shifts and in-plane rotations. In the dual-tree implementation, two parallel discrete wavelet transform (DWT) with different lowpass and highpass...
Service Oriented Computing (SOC) is gaining prominence as the technology of choice for integrating applications in diverse and heterogeneous distributed environments. Web Service technology is an important instance of Service Oriented Computing aiming at facilitating the integration of new applications, avoiding difficulties due to different platforms, languages etc. In this regard building complex...
Internet now a day, is one of the most popular mode of communications, and its popularity suffers from a vital issue of not supporting the security of the confidential data during transmission. In this work, a high-speed cryptosystem for image data has been developed for efficient and secured communication over Internet. The basic idea is that the given image is first compressed by VQ for traffic...
Retrieving image from large & varied collections using image content (such as color, shape, texture) as a key is challenging & important problem . This paper describes a two approaches to content based image retrieval (CBIR) that represent each image in database by a vector of feature values called ??Image Retrieval using DCT coefficients of pixel distribution & average value of row &...
The problem of voltage sags and Swells and its severe impact on sensitive loads is well known. To solve this problem, custom power devices are used. One of those devices is the Dynamic Voltage Restorer (DVR), which is one of the most efficient and effective modern custom power devices used in power distribution networks. This paper described DVR principles and voltage correction methods for balanced...
The objective of the work describes the observation and construction of a low cost temperature monitor with controller for laboratory uses. In a reaction monitoring lab, a temperature controller monitors and maintains the temperature in a closed loop. In this paper a low cost embedded temperature monitor with controller is built using AVR ATmega8 microcontroller. A thermistor, a thermocouple and an...
Databases have become an integral part of the web applications in the current world. Database based applications have brought a revolution in the domain of information technology. These applications interact with the databases using Structured Query Language (SQL) queries embedded in the code. There are automated ways to test the applications written in imperative and structured languages. However,...
Pixel defects are unavoidable in many solid-state image sensors, especially, CMOS image sensors. The pixel defects includes Hot pixels, Partially-stuck pixels, Fully-stuck pixels, Abnormal sensitivity defects, Random Telegraph Signal defects. Among them the most common and significant is hot pixel defect. Many approaches have been proposed to counter the effects of hot pixel defect. They include the...
This paper provides a method for solving the resonant frequency of circular and rectangular patch antennas when brought near another similar antenna with a spacing less than 0.2?? to the antenna designer, even without having a theoretical base in electromagnetics. When the spacing between the antennas is so small, mutual coupling effects that do not predominate when the antennas are far from each...
This paper focuses on implementation of cascaded configuration of initiator-target pair in NetBSD environment. The use of existing independent initiator and target for cascading has some drawbacks, which can be handled by combining pair of target and initiator as proposed in this paper. We also show the performance comparisons between proposed and the existing system.
This paper presents an investigation on a voltage regulator for parallel operated isolated synchronous generators supplying 3-phase 4-wire loads driven by constant speed prime mover like diesel engine, bio-mass, gasoline, hydro turbine unit etc. The proposed voltage regulator is realized using a STATCOM (static compensator) for providing the reactive power compensation, and load balancing. Three single-phase...
Elimination of the p-MOS transistor from the pass gate network significantly reduces the parasitic capacitances associated with each node in the circuit, thus, the operation speed is typically higher as compared to the CMOS counterpart. But then the improvement in the transient characteristics comes at the price of increased process complexity. In Complementary pass transistor logic (CPL) circuit,...
Late potentials in ECG take place in the terminal portion of the QRS complex and are characterized by tiny amplitudes and larger frequencies. The occurrence of late potentials may signify underlying distribution of electrical activity of the cells in the heart, and provides a substrate for production of arrhythmias. The problem of late potentials causes high levels of signal power to be seen at frequencies...
Multi Agent Systems find their use in various diverse domains where interaction, collaboration, cooperation, or negotiation with other agents and with the environment is required to solve a particular problem. In this paper we model call admission control as a multi agent system and attempt to evaluate the impact that the degree of distribution of agents and interaction models of multi agent architectures...
In Wireless communication, the rapid fluctuations in the amplitude and phase of received radio signal are called fading. It has a significant impact on the quality of the demodulated signal. Fading can cause increase in bit error rate and leads to poor performance of the communication system. Thus fading model has to be selected which suits for the environments like urban, suburban and rural areas...
In recent years high performance computing has evolved from large and expensive supercomputers to network based environments or workstation clusters and to grid computing. A grid is composed by geographically sparse resources that join to form a virtual computer. The resources (computers, networks, storage devices, etc.) of the grid are heterogeneous and reside in differentiated domains. An important...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.