The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Gestures are used in day to day life like nodding and waving without us being aware of them. It has become an important part in the communication among the humans. In the recent years new methods of Human Computer Interaction (HCI) are being developed. Some of them are based on interaction with machines through hand, head, facial expressions, voice, touch and many are still the current topic of research...
Tamil is one of the ancient languages in the world, spoken by 74 million people spread around the world. Tamil is the official language in states like Tamilnadu and countries like Malaysia, Srilanka etc., and the majority of people speak Tamil language. Recognition of Tamil speech would be beneficial to a lot of Tamil people and it is inevitable to carry out research in this field. In this paper we...
In this paper, we examine the significance of expansion of the user query by two techniques namely Efficient Clustering-By-Direction and Theme Clustering. These two techniques produce the clusters of keywords extracted from the set of retrieved documents for the user query. The former clustering is based on statistical approach whereas the latter clustering is based on semantic approach. Empirical...
The shortcomings in conventional controllers have diverted the attention of the researchers to concentrate on the use of artificial intelligent controllers such as fuzzy logic controllers. The fuzzy controllers are intuitive and give better response compared to conventional controllers. The performance of these controllers can be improved by increasing the rules present in the rule base. With increased...
OrthogonalFrequency Division Multiplexing (OFDM)is becoming the chosen modulation technique for wireless communications. Multicarrier modulation shows a significant sensitivity to the phase noise present in the oscillator used for frequency down-conversion at the portable receiver. For this reason, it is important to evaluate the impact of the phase noise on the system performance. In this paper,...
For an improved system modularity and flexibility through code reuse, efficient memory usage, and. reduced disk space dynamic loading of software components is widely used mechanism in operating system. However, Programming mistakes may create malicious components being loaded with regular dynamic loadings. In particular, dynamic loadings can be made as malicious components by placing an arbitrary...
Importance of print media in daily life is remarkable. Though the popularity of electronic media has increased considerably, print media still retains relevance in various areas. Mobile devices are nowadays used as common means of consuming electronic media. Recent surveys on mobile application usage patterns reveal that many users utilize mobile phones for reading articles, analyzing reports and...
Parallel computing operates on the principle that large problems can often be divided into smaller ones, which are then solved concurrently to save time (wall clock time) by taking advantage of non-local resources and overcoming memory constraints. Merge sort is not only a fast and stable sort algorithm, but it is also an easy to understand and popular representative of the rich class of divide-and-conquer...
One of the most important parameters to be studied in Wireless Sensor Networks (WSNs) is its life time. There are two typical data mining processes that support to reduce the energy consumption of WSNs is clustering and data summarization. Several energy aware, communication aware, coverage aware, data dissemination and data aggregation/sensor fusion protocols and algorithms have been specifically...
Cloud computing is the current technology used for sharing and accessing resources via Internet. It provides a scalable and cost effective environment. Large number of servers in the datacenters leads to huge consumption of power in the cloud computing scenario. Optimization of power consumption is a key challenge for effectively operating a datacenter. Power consumption can be regulated by using...
With the increasing demand of wireless services, users expect better Quality of Service and performance. Quality of Service provides the level of assurance for the data delivery over the network. In this paper, to provide the best Quality of Service a seamless proactive vertical handoff scheme is used. The Vertical Handoff management scheme controls the Handoff process. Handoff procedures used in...
This paper is mainly focused on computer simulation techniques used to simulate a standalone communication system which is used to transmit voice data on a specifically designed radio channel. Evaluation has been done on how much signal energy the system can transmit outside the radio spectrum range. Experimental results have been plotted for a voice over a simulated channel, which is capable of transmitting...
Researchers have proposed several mechanisms to secure data from unauthorized use but there is very less work in the field of detecting and managing an authorized or trustworthy agent that has caused a data leak to some third party advertently or unknowingly. In this paper, we implement methods aimed at improving the odds of detecting such leakages when a distributer's sensitive data has been leaked...
This paper aims to improve the effectiveness of retrieving images on the basis of color content by Color averaging technique. In this paper, a new technique of feature extraction based on relative mean is proposed. Here, the relative mean based technique initially normalizes the mean value into a binary form to reduce the computational complexity and to increase the speed of retrieval. Later, the...
The advantages of simultaneous read and write operations for dual-port SRAM memory cells are well known. In this paper two configurations of dual-port 8-Transistor Differential (8T-D) and 7-Transistor Single End SRAM cells are presented. The benefits of power-delay product and power dissipation are verified. The goals of low power and high performance control of the full CMOS SRAM can be achieved...
Eliminating the conflict misses in the caches has been a foremost field of research in cache memories. Although several cache addressing/indexing techniques have been demonstrated, most of them discuss about eliminating conflict misses for various memory access strides in a solo cache system. In this paper we present the analysis of the scenarios where conflicts arise at different levels of caches...
A dual band meander line wearable antenna is designed at the operating frequencies of 406 MHz and 850 MHz. Textile fabric materials were used as the antenna substrate and copper is used as radiating element. Four different types of antenna substrates were put into study. SAR (specific absorption rate) is calculated for the designed antenna using the human body model from MRI and RT scan images. The...
In this paper, we propose Hybrid DCT-VQ a lossy image compression technique based on Vector Quantization (VQ). In the proposed technique, we use the concept of energy compaction property of DCT to reduce the computational cost of codebook and to speed up the VQ process. This method is tested on set of standard test images for different sub-block sizes. The experimental simulation results infer some...
The image fusion algorithm based on wavelet transform works successfully for linear objects but its basic limitation arises for fusion of curved shapes. It is observed that most of medical images contain curved shape objects. In this paper Innovative Image fusion algorithm based on Fast Discrete Curvelet transform with different Fusion Rules such as Minimum Selection, PCA based rule, Averaging rule,...
The advent of the internet age has led to the increase of prominent network security issues. Information encryption has long been a method used for information security. With the rapid development of parallel computing capacities of computer hardware, this method alone could not be trusted to ensure security by increasing the key sizes, thus bringing in the information hiding techniques into the scenario...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.