The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The field of digital communication is gifted with OFDM, a very powerful technology that opened doors to several applications requiring higher bandwidth and data rates. It survives severe channel conditions like narrow band interference and frequency selective fading. However, the increasing rate of data piracy accentuates the need for a secure wireless transmission. In this paper, we propose a technique...
One of the core issues for robust cryptographic systems is to deal with the rate of diffusion and distribution of keys. We try to strengthen this aspect by increasing the length of block ciphers. We present a new encryption and decryption algorithm for block cipher that supports 27 bit block size. All components in our system are chosen to be based on cellular automata so as to achieve higher parallelism...
Interactive Learning Environment has proven to be an effective solution for overpowering the limits of traditional one-to-many teaching. However, these environments require accurate representation of knowledge about learner to provide suitable guidance. Based on the behavior and performance, the traces of learners are captured and categorized to provide appropriate guidance in the learning environment...
This paper presents a very low power and area efficient ASIC implementation of Advanced Encryption Standard Algorithm (AES). The implementation results of S-Box, MixColumn Transformation and overall AES encryption/ decryption are given in this paper. The AES has been implemented in 90nm standard CMOS library using Synopsys Design Compiler with a core voltage of 1.2V. The power dissipation of S-Box...
There are a number of algorithms which provide methods to encrypt parts of video frames to make them unrecognizable or degraded. The proposed scheme treats the video as a sequence of ordered frames and provides an algorithm to break this order of frames by first distributing frames into n frame-sequences and then by internally scrambling these frame-sequences using proper keys. Any of these frame...
Nowadays, use of web has increased. User search a web corresponds to a query. Search engine provide indexed result for the users. Clickstream analysis is a new approach for web page importance calculation. User uses some clicks on the results according to the search result. These clicks are stored on server log file. Server log file store the order sequence of user clicks after that these clicks can...
In System on Chip, buses and point to point links are used as a communication infrastructure between one IP to another, but these cannot provide efficient interconnect from performance point of view. So NoC architecture was proposed to provide communication in multiprocessor SoC and overcome the limitations. This paper has implemented a 5-port 32-bit and 64-bit router architecture using wormhole routing...
To find the veins in intravenous emergency injections, non-invasive feasible methods seem to be necessary. In another area in biometric identification, hand vein patterns can be used as other external identifiers are more probable to be damaged or forged. To achieve these goals, NIR back hand vein images are captured. In the proposed method, the NIR hand vein images are pre-processed and segmented...
In this paper we proposed a steganography with maximum data, hiding capacity. In order to increase data hiding, 2D Anaglyphic stereography images are used for this process. The 2D Anaglyphic stereo input images of different colours and coloured filters in front of each eye allows only the appropriate image to pass. Some international standards body has decided that the right eye filter should he blue...
Present, fast growing century, includes people for fast and efficient travelling of their path from source to destination by covering at least one of the facilities in their path. As everyone in today's scenario wants to cover their distance from source by attending some facilities in their path and then reach to destination within a required time. This paper focus on algorithm with time dependent...
Vedic Mathematics is the ancient methodology of Indian mathematics which has a unique computational technique for calculations based on 16 Sutras (Formulae). Novel Binary divider architecture for high speed VLSI application using such ancient methodology is presented in this paper. Propagation delay and dynamic power consumption of a divider circuitry were minimized significantly by removing unnecessary...
Image Segmentation is necessary factor in the medical image processing. According to the current scenario of health care society, detection of brain tumor is a must. Automated brain disorder diagnosis with MR images is one of the challenging medical image analysis methodologies. Segmentation is used to separate the abnormal tumor portion in brain. These tumors are inhomogeneous, unsharp, and faint...
A Gray Code is an encoding of integers as sequences of bits with the property that the representations of adjacent integers differ in exactly one binary position. Gray Codes have many practical applications that go beyond research interests. There are different types of gray codes: Binary reflected, Maximum Gap, Balanced, Antipodal and Non Composite to name a few. On the other hand Reversible logic...
The field of character recognition has attracted more concentration of researchers for recognizing text from ancient documents. But because of some of the problems like error in recognition in text lines, overlapped characters, joined text line, ages, damage in text lines it is becoming more challenging for them to recognize the text. However, Most of devnagari handwritten ancient documents are not...
Orthogonal Variable Spreading Factor (OVSF) based networks require careful assignment of code to a new call. In this paper an assignment design is proposed which reduces number of code searches with less code blocking probability. The proposed design partitioned code tree into two parts and for a new call the algorithm needs to check one portion of the code tree for most of the calls. If no vacant...
In this study, 3-D structures of Harpin protein (Pectobacterium carotovorum), Single-stranded DNA binding protein (Pseudomonas aeruginosa), and R2.L1aJI (Campylobacter conisus 13826) has been modelled. For modelling, template selection is done by BLASTp search. For target template alignment, ClustalW server is used and then comparative modelling was done by Modeller9.10. Validation of models was done...
In this study, potential inhibitors against Harpin protein (Pectobacterium carotovorum), and Single-stranded DNA binding protein (Pseudomonas aeruginosa) is to be found. Modelled 3-D structure of target protein and their newly designed leads (inhibitors) are used for molecular docking studies using Hex 5.1. For machine learning approach, three data sets of leads are to be formed i.e. training, dependent...
Anti Torpedo Defense System (ATDS) is a very vast system with infinite geometrics and corresponding Tactical Solutions. Also, a few geometries do exist, where the Tactical Solution can never be arrived optimally. The Purpose of the system is to analyze the generated Tactical Solution which enhance the ships survivability against enemy Torpedo using the Optimal decoy deployment logic and maximizing...
Mobile Telecommunication applications have seen, in the last years, a remarkable increase in the number of installations and consequently there has been a relevant growth of energy consumptions. This is due to an ever-growing interest about new and reliable services in mobility calls with an increase of the BTS operational hours and traffic management, in order to guarantee the quality of the service...
Computational grids have the potential for solving large scale scientific problems using heterogeneous and geographically distributed resources. Before this potential is realized, there are several technical overheads that must be overcome. This paper introduces PRAG — a resource allocation technique that is pre-emptive in nature. The critical problem for grid users is efficient allocation of resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.