The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IEEE 802.15.4 that is standard for Wireless Sensor Network (WSN) has been becoming prominent due to its wide variety of real time applications such as medical care, vehicle traffic control, embedded, etc. But for proper working of these sensor networks, certain performance parameters should be taken into consideration. We are analyzing three parameters namely-throughput, loss rate and average delay...
The last decade has witnessed a prompt progression in the field of rough set notion. It has been fruitfully applied to numerous diverse fields such as data mining and network intrusion discovery with little or no alterations. A rapid advance of interest in rough set theory and its applications can be recently seen in the number of international workshops, conferences and seminars that are either directly...
Content Based Audio Retrieval (CBAR) has been a growing field of research for the past decade. To be capable of classifying and accessing the audio files, relevant to user's concern, is fundamental for structuring multimedia web search engines. This paper proposes a technique to build a system to retrieve audio files by acoustic similarity using Sort-Merge technique. The frequency features of the...
The change in technology and the form of data being used has led to massive changes in database technologies. Most applications today, represent data that are intensely associative i.e. structured graphs, texts, hypertexts, wikis, RDF and social networking. The traditional relational database model (RDBMS) has been proved to be ineffective while handling such associated data with problems regarding...
Braun multiplier is one of the parallel array multipliers, which is used for unsigned numbers multiplication. This paper aims at an optimization of power and delay of Braun multiplier by using bypassing technique and modification of adders. The dynamic power of a multiplier can be reduced by using bypassing techniques and delay can be reduced by replacing ripple carry adder in the last stage of full...
The Perona Malik filter forms the base for various classical diffusion filters. It takes its origin from the heat equation. The images undergo an iterative diffusion process and the noise is removed gradually after each iteration. The basic concept behind various prominent image processing methods like image smoothing, enhancement, denoising etc is mostly based upon PM equation. But the main drawback...
The Fast Fourier Transform (FFT) and its inverse (IFFT) are very important algorithms in digital signal processing and communication systems. Radix-2 FFT algorithm is the simplest and most common form of the Cooley-Tukey algorithm. Radix-22 FFT algorithm is an attractive algorithm having same multiplicative complexity as radix-4 algorithm, but retains the simple butterfly structure of radix-2 algorithm...
In digital VLSI, power dissipation has become a prime constraint. Many design architecture and techniques have been developed to reduce power dissipation. In this paper implementation of combinational circuits such as logic gates, adders and multipliers in Gate diffusion input (GDI) technique and its comparison with other logic styles is presented. This technique allows reduce power consumption, transistor...
One of the major concerns of Orthogonal Frequency Division Multiplexing (OFDM) systems are its high Peak to Average Power Ratio (PAPR) values. These high PAPR values result in serious degradation in performance when a non-linear power amplifier is employed. The Conventional Partial Transmit Sequence (C-PTS) technique is one of the highly efficient methods for PAPR reduction in OFDM systems. Unfortunately,...
Fuzzy Logic Controllers (FLC) provides excellent control to non-linear systems owing to its ability to represent linguistic and heuristic knowledge in mathematical formulation. However, this delineation comes at an expense of large no. of computations. This paper discusses Fired Rules Hyper Cube (FRHC) based rule reduction technique and implements it on Analog Devices ADSP-BF537 processor. Performance...
Flexible AC Transmission Systems (FACTS) technology is the most advanced tool for power flow control in electric network. Unified Power Flow Controller (UPFC) is the most versatile FACTS device for optimization and control of power flow in transmission system. It is a voltage source converter based FACTS controller for series and shunt compensation of the line which controls the real and reactive...
To rise above the limitation of the Traditional load forecasting method using data warehousing system, a new load forecasting system basing on Radial Basis Gaussian kernel Function (RBF) neural network is proposed in this project. Genetic algorithm adopting the actual coding, crossover and mutation probability was applied to optimize the parameters of the neural network, and a faster growing rate...
Virtualization is rapidly gaining acceptance as a fundamental building block in enterprise data centers and is the core component of cloud computing platforms. It is most known for improving efficiency and ease of management. While this technology is meant to enhance the security of computer systems, some recent attacks show that virtual machine technology has much vulnerability and becomes exposed...
A mixed method is proposed for the order reduction of an interval system using pole clustering technique and simple mathematical manipulation process. kharitonov polynomial is employed in the interval system before the model order reduction technique is come into the approximation process. The pole clustering technique is used to obtain the reduced order denominator polynomial and the corresponding...
The group communication has been implemented by Multicast Authentication Batch Signature (MABS). This eliminates the network overheads such as packet loss, latency computation and communication overhead. The Batch signature is the effective cryptographic primitive which authenticates any number of packets simultaneously. This paper gives the solution by introducing Enhanced Multicast Authentication...
Language Identification (LI) is the process of determining the natural language in which the given content is written. It is an important preprocessing step in many tasks of Natural Language Processing (NLP). In a multilingual society like India, automatic language identification has a wider scope, since it would be a vital step in bridging the digital divide between the Indian masses and others....
The main objective of developing an image-watermarking technique is to satisfy both imperceptibility and robustness requirements. To attain this objective, a hybrid image-watermarking scheme based on Discrete wavelet transform (DWT) and Singular value decomposition (SVD) is proposed in this paper. In order to improve the robustness and imperceptibleness of the watermarked image, a new embedding and...
In this modern era, cloud computing has evolved as a new technology for enterprise and personal computing. Many cloud services are available for customers in the market today. Each service has different terminologies, security, cost and goals. Evaluations of these cloud services are becoming more and more significant. Among the different types of cloud services available, SaaS is rapidly becoming...
Multi biometric systems consolidate evidence from multiple sources of biometric information in order to reliably determine the identity of an individual. These systems can alleviate the limitations of unibiometric systems because the different biometric sources usually compensate for the inherent limitations of the other sources. But the major challenge to such systems is the template security and...
3D visual modelling of indoor space will not only provide the detailed knowledge about the environment but also rich contextual information of the existing objects. In this paper, we propose a parallel implementation of 3D modelling of indoor environment using Microsoft Kinect depth camera. 3D maps are generated by Simultaneous Localization And Mapping [SLAM] technique. These 3-D maps will be more...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.