The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Image Encryption has gain popularity because of need of secure transmission of images over open networks and increased attacks on data flowing over network. Different type of data have different features, that is why for images different techniques were evolved to protect confidential data from unauthorized access. Encryption techniques used for encrypting textual data does not work with images, so...
In this paper, we propose a methodology for embedding a color image data into a PDF file and vice versa. At the transmitter, the signature image is encoded by encryption algorithm. When host file is an image, the information is embedded in the host image in the red components. Furthermore, this scheme requires no knowledge of the original image for the recovery of the signature image. At the receiver,...
Data extraction and transform are based on the mapping relation between the new system database and old system database. In generally, transform also includes data cleaning, which is to clear the dirty data that is from original database, Before data cleaning, analysis of data quality is demanded. As long as the dirty data is found, it can be cleared. Data loading is to load the data which has been...
Maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves dividing the image into random shares to maintain the images secrecy. Unfortunately heavy computation cost and key management limit the employment of the first approach...
For the frequent disconnection, low bandwidth, high latency in wireless computing environment and other characteristics of mobile handheld devices such as resourceconstrained, we analyze the limitations of the current three mobile J2ME Web Service integration schemes. By means of extending agent theory and its expanded functions, a new three layers mobile web service integrate scheme based on it is...
This paper presents an approach for providing high availability to the requests of cloud's clients. To achieve this objective, fail over strategies for cloud computing using integrated check pointing algorithms are purposed in this paper. Purposed strategy integrate check pointing feature with load balancing algorithms and also make multilevel checkpoint to decrease check pointing overheads. For implementation...
A cloud OS is a simplified Operating System that runs in web browser, providing access to a variety of web based applications that allow the user to perform many simple tasks without booting a full-scale operating system. In this paper we will make a study on the function of cloud OS and a brif survey of cloud OS.
The key to analyzing the optical filter using z-transform is that each delay be an integer multiple of a unit delay length. A coupler is just the point where two paths (wave guide) are brought together so that their evanescent field overlap and a power transfer from one port to other exist. The lattice structures allow a systematic approach to filter synthesis. They are suitable forms for performing...
In this paper, the suitability of the existing MANET routing protocols for VANETs has been evaluated. Even though a VANET is a subset of MANET, it has unique characteristics and message delivery requirements. VANETs are characterized by a very dynamic topology with partial infrastructure support, patterned mobility, mobile nodes with sufficient resources, intermittent connectivity and varied channel...
Secure mobile payment is the most important link for a mobile phone to realize full payment. At the present stage, there are many researches about security of mobile information in the country. Those researches are mainly based on Windows Mobile, BREW or software of J2ME, and limited to specific areas. On the aspect of the hardware cryptograph, they focus on the security of computer information. There...
Parameter estimation is crucial for model identification in control engineering and in other disciplines. In present work a new method based on interval constraint satisfaction technique is proposed for obtaining parameter estimation of a system using linear orthogonal regression. In orthogonal regression, errors in both the measured variable and response variable are taken into account. The power...
Medical image fusion has been used to derive useful information from multimodality medical image data. The idea is to improve the image content by fusing images like computer tomography (CT) and magnetic resonance imaging (MRI) images, so as to provide more information to the doctor and clinical treatment planning system. This paper aims to demonstrate the application of wavelet transformation to...
Compressed Sensing (CS) is a novel approach of reconstructing a sparse signal much below the significant Nyquist rate of sampling. Due to the fact that ECG signals can be well approximated by the few linear combinations of wavelet basis, this work introduces a comparison of the reconstructed ECG signal based on different wavelet families, by evaluating the performance measures as MSE (Mean Square...
The organization and retrieval of information from hyper-linked documents is a challenging task for search engine expected to satisfy user queries with relevant content in first few top results displayed to the user. This arrangement implies in need of maintaining index of relevant context based pages. This paper provides a novel technique for indexing the web documents based on the context of keywords...
A recent trend in routing research is to avoid inefficiencies in network level routing by allowing hosts to either choose routes themselves (e.g., source routing) or use overlay routing networks. Such end-to-end route selection schemes are selfish by nature, in that they allow end users to greedily select routes to optimize their own performance without considering the system-wide criteria. Recent...
In any image processing system denoising of images is an important step. The images can be corrupted by different noises with different levels. There are three types of noises available: impulse, Gaussian and Speckle noises with mixture of them. Many algorithms are proposed to remove salt & pepper (impulse) noise as well as Gaussian noise. The Robust statistics based filter is also proposed to...
We present a new gait identification method based on dynamic time warping (DTW), as video surveillance system requires high accuracy and precision. It could reduce computational cost of gait recognition, significantly improve the recognition rate for gait and meet the demand of video surveillance. The characters of human appearance have been utilized to extract entire binary image of human silhouette...
In this paper a new approach for image enhancement considering pixel intensity variation for interpolation is presented. This technique determines edges by comparing the intensity variations between centre pixel and its neighboring pixels of window size 5 5. On the basis of designed thresholds, extrapolated blank pixels are filled. The sliding window 5 5 size gives better result over window size 3...
Medical domain has witness a tremendous change in technology with advancement in medical science instruments and other side usage of images has increased in this domain to detect various diseases. On one hand where experience doctors are putting their experience into detail pictorial representation of various parts of body to further diagnose the patient records and on other hand safety of those pictorial...
This paper proposes a asymmetric FinFET (Fin shaped Field Effect Transistor) for robust and low power SRAM (Static Random Access Memory). This FinFET device uses Asymmetric Drain (AD), Asymmetric Drain Spacer Extension (ADSE) and Asymmetric Lateral Diffusion (ALD) techniques. The proposed structure exploits asymmetrical behavior of current to improve read-write stability for SRAM without compromising...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.