The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, surveillance systems play a key role in highly secured areas. The most common surveillance system, CCTV, produces a continuous image and has various problems such as high cost, need for continuous human intervention, and an inherent difficulty in locating and identifying the intruder due to the presence of obstacles. This paper proposes a scheme to classify a person's movement as intrusive...
With the advances in the growth of wireless technologies, the usage of cell phones (i.e.) mobile users and the location based services have been increasing. However the location privacy of an individual user has become the challenging problem in the location based service providers. Here we propose an Anonymity server which is enclosed within an authentication server and a security key generator....
Today Internet is routinely and widely used for variety of applications like exchange of information, searching and accessing information sources located all over the world and for providing various forms of computing and communications and different types of web based services. Internet technologies are also successfully put into use for offering solutions such as eCommerce, e-Payment, e-Governance,...
In this paper, a memetic meta-heuristic called the shuffled frog-leaping algorithm (SFLA) is presented for solving the combinatorial optimisation problem associated with lay-up sequence optimisation of laminate composite structures. The SFLA is a meta-heuristic optimization method that mimics the memetic evolution of a group of frogs when seeking for the location that has the maximum amount of available...
This paper presents a mechanism of integrating the concept of reliability with trust management policy in the distributed scheduling algorithms. This algorithm focuses on the distributed computing systems involving collaborative computing. Trust management is achieved with the concept of bidirectional reputation points that are assigned to resource providers and resource consumers. Moreover, concept...
Accurate fingerprint recognition system is the problem encountered in the field of biometric identification. Use of back propagation network for recognition problems resulted in inconsistent and unpredictable performance. The proposed approach using soft computing tools like Fuzzy, Neural and Genetic overcomes low recognition rate, low accuracy and increased time of recovery. The stages of this approach...
In this paper, a QoS enhancement scheme is proposed using an Interacting Multiple Model (IMM) for wireless VoIP (WVoIP) networks. The quality of speech varies in WVoIP due to variations in channel parameters. Kalman filter can be used to enhance speech quality by predicting the channel variations. IMM consists of two models namely static and dynamic, representing the wireless VoIP mobility states...
In recent times, tremendous amount of work has been done to explore alternative methods to store and query Resource Description Framework (RDF) data because scalability and fast query performance are necessary requirements for real world semantic applications built on top of RDF stores. Recent works like Hexastore, Matrix Bit Loaded and Vertical partitioning approach deals with storing, querying and...
In this paper a new control strategy for induction motor drives fed by CSI (Current Source Inverter) is proposed. A multivariable state feedback as well as FF (feed forward) control is applied for fast regulation and stability of the drive system. The design of the state feedback controller is based on the application of the pole assignment technique of industrial regulation theory to a dq axis state...
This paper proposes a system obtained through decision level fusion of two well known biometric sensors to identify a person namely, Fingerprint sensor and Voice sensor. More than one sensor is needed for critical or highly secured areas. This paper proposes a multiple sensor data fusion methodology using Fuzzy Logic (FL) approach. The finger prints recognition system uses orientation of the input...
In this paper, an efficient means to provide personal identification using finger print has been proposed. Field orientation method available in literature overcomes the drawbacks in the minutiae method. In order to get a better accuracy in identification even in noisy condition, a new method - Cross Correlation of Field Orientation (CCFO) is proposed in this paper. The proposed scheme uses field...
Wireless Sensor Network (WSN) is an emerging technology for person detection and tracking. This paper proposes a scheme for detecting and tracking a person using WSN. In an organization where employees possess unique Radio Frequency Identification (RFID) tags, a WSN node detects the presence of a person using a PIR sensor and the identity of the person is obtained from the RFID tag. The accuracy of...
The Sensor Network Localization problem deals with estimating the geographical location of all nodes in Wireless Sensor Network focusing on those node sensors to be equipped with Global Positioning System (GPS), but it is often too expensive to include GPS receiver in all sensor nodes. In the contributed localization method, sensor networks with non-GPS nodes derive their location from limited number...
Virtualization begins the platform for creating desired resources as demanded by the users. Using virtualization technology, customization of desired grid environment becomes possible and thus helps in providing a scalable solution to grid community. Recent trends of adapting this feature in grid computing have set another challenge of monitoring grid resources for efficient management. In this paper,...
In this paper, a partial duplication based scheduling algorithm is designed that focuses on reducing the schedule length and processor count of the schedule by reducing the idle time slots. The proposed algorithm clusters the tasks so that it reduces the total job completion time i.e reducing the schedule length of the tasks. Then the compaction process is used to yield reduced number of processors...
Multicast is an important communication method used in many emerging multimedia networking applications. Providing efficient security method to support the distribution of multimedia multicast is a challenging issue, since the group membership in such applications requires dynamic key generation and updation which takes more computation time. Moreover, the key must be sent securely to the group members...
To reach the rural masses, banks are going all out in providing a user-friendly banking experience. To boost micro financing initiatives, banks are deploying biometric solutions with ATMs. Establishing the identity of a rural depositor through biometrics makes it possible for illiterate or barely literate folks to become part of the banking user community. Fingerprint recognition has been recognized...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.