The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nvidia's GPGPU based Compute Unified Device Architecture (CUDA) is a software platform for massively parallel high-performance computing on GPU. It provide several key abstractions- a hierarchy of thread block, shared memory, and barrier synchronization. This model has proven quite successful at programming multithreaded many core GPUs and scale transparently to hundreds of cores: many industry and...
In this paper, we present a region growing technique for color image segmentation. Conventional image segmentation techniques using region growing requires initial seeds selection, which increases computational cost & execution time. To overcome this problem, a single seeded region growing technique for image segmentation is proposed, which starts from the center pixel of the image as the initial...
The one dimensional unipolar orthogonal codes are employed as signature sequences in spread spectrum modulation schemes like incoherent optical CDMA system. The cardinality or upper bound of code set, containing one dimensional unipolar orthogonal codes of code length 'n' and code weight 'w' and correlation constraint λ, is given by Johnson bounds. Conventionally these codes are represented by weighted...
Clustering approach is widely used in biomedical applications particularly for brain tumor detection in abnormal magnetic resonance (MRI) images. Fuzzy clustering using fuzzy C-means (FCM) algorithm proved to be superior over the other clustering approaches in terms of segmentation efficiency. But the major drawback of the FCM algorithm is the huge computational time required for convergence. The...
In this paper, an algorithm is proposed to design maximum possible sets of one dimensional orthogonal codes of given code length 'n', code weight 'w', auto-correlation constraint a λ_a and cross-correlation constraint c λ_c. Each set consists of number of unipolar orthogonal codes up to maximum limit given by Johnson bounds. Here, each of the designed sets of unipolar orthogonal codes is independent...
This paper addresses the problem of recovering a super-resolved image from a single low resolution input. This is a hybrid approach of single image super resolution. The technique is based on combining an Iterative back projection (IBP) method with the edge preserving Infinite symmetrical exponential filter (ISEF). Though IBP can minimize the reconstruction error significantly in iterative manner...
in this paper, a new method to compensate three stage amplifier is proposed, second non-dominant pole cancellation of multi-path nested Miller compensation (MNMC) are paid. Using the feed forward signal and changing the location of the second zero, second non-dominant pole is removed and behavior of system is approached to the first order system. To verify the method, one practical example is presented...
Multiple transmit and receive antennas can be used to form multiple-input multiple-output (MIMO) channels to increase the capacity (by a factor of the minimum number of transmit and receive antennas) and data rate. In this paper, the combination of MIMO technology and orthogonal frequency division multiplexing (OFDM) systems is considered for wideband transmission to mitigate inter symbol interference...
The Interleave-Division Multiple-Access (IDMA) scheme is known for property of orthogonality amongst its user-specific interleavers. The interleavers are, therefore, referred has the heart of IDMA Transceivers. In the literature, researchers have proposed Tree Based Interleaver (TBI) which not only reduces the bandwidth requirement in comparison to that required in case of Random Interleavers (RI)...
In this paper, we design and implement a novel complete set of Walsh and inverse Walsh transforms for signal processing. The system consists of Walsh Transforms (WT), Digital Signal Processing (DSP) block, inverse Walsh transform (IWT) and a dividing block. The Walsh and inverse Walsh transforms are designed to produce correct results for any input data combinations. A DSP block is designed to perform...
With the development of network multimedia technology, more and more real-time multimedia applications need to transmit information using multicast. The basis of multicast data transmission is to construct a multicast tree. The main problem concerning the construction of a shared multicast tree is the selection of the root of the shared tree or the core point. In this paper, we propose an algorithm...
In this paper, an efficient design is proposed to utilize full capacity of the orthogonal variable spreading factor (OVSF) code tree. The design favors time bound calls and scattered capacity when not used by time bound calls is utilized for data calls. The call establishment delay for delay sensitive time bound calls is significantly reduced due to less number of code searches, as only a part of...
This paper presents the recent technical research on the problems of privacy and security for radio frequency identification (RFID). RFID technology is already used widely and is increasingly becoming a part of daily life. However, issues regarding security and privacy with respect to RFID technology have not been resolved satisfactorily. There are huge number of challenges, which must be overcome...
In this paper, the large scale Unit Commitment (UC) problem has been solved using Dynamic Programming (DP) and the test results for conventional DP, Sequential DP and Truncation DP are compared with other stochastic techniques. The commitment is such that the total cost is minimal. The total cost includes both the production cost and the costs associated with start-up and shutdown of units. DP is...
Network and web security measures are now having utmost attention and so the use of firewall, which is vigilant to scrutinize incoming-outgoing packets between private network and Internet. The decision is usually relied upon the source/destination address or port number. Even high end technologies and higher layer protocols like DNS, SMTP, POP3 etc. are also vulnerable and susceptible to be exploited...
In this paper we proposed a data caching scheme which is made capable of intelligent prefetching for mobile ad hoc networks (MANETs). With prefetching as a integrated part of data caching, will try to sense the future needs of mobile nodes (MNs). Once it is established regarding the requirement of a particular data item, data is fetched and kept in the cache before it is required. This will reduce...
PAPR reduction algorithms exist in the literature, are often effective for specific scenarios. The proposed adaptive mode PAPR reduction algorithm chooses the mode best suited for different transmission conditions in order to achieve a substantial reduction in PAPR for most scenarios which is essential in Cognitive radio. It was proposed in our previous paper that linear combination can be combined...
Organic Thin Film Transistors (OTFTs) are promising devices for future development of variety of low-cost and large-area electronics applications such as flexible displays. This paper analyzes the performance of OTFT made of several organic semi conducting and insulating materials and further discusses their applications. Analysis of previous research work demonstrates that the mobility in OTFT decreases...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.