The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Securing digital data has become tedious task as the technology is increasing. Existing encryption algorithms such as AES,DES and Blowfish ensure information security but consume lot of time as the security level increases. In this paper, Byte Rotation Encryption Algorithm (BREA) has implemented using parallel processing and multi-core utilization. BREA divides data into fixed size blocks. Each block...
The image processing applications involve huge amount of computational complexity as the operations are carried out on each pixel of the image. The General Purpose computations that are data independent can run on Graphics Processing Units (GPU) to enable speedup in running time due to high level of parallelism. Compute Unified Device Architecture (CUDA) and Open Computing Language (OpenCL) programming...
Software has gained popularity in daily activities ranging from small scale applications running on handheld devices to complex application and big data processing. The software is critical in nature as it has become the most vital part of a system resulting in risks related to software failures. The risk estimate associated with a system can be calculated using different techniques. The performance...
Class imbalance presents a problem when traditional Classification algorithms are applied .In the previous years there are most important substitution and change has been carried out on data classification. Classification of data becomes difficult because of its unbalanced nature. The problem of imbalance class has developed into significant data mining issue. The class imbalance situation arises...
A novel combined approach of SLM (Selective Mapping), PTS (Partial Transmit Sequence) and DSI (Dummy Signal Insertion) is proposed to diminish PAPR (Peak to Average Power Ratio) and OBI (Out of Band Interference) in OFDM (Orthogonal Frequency Division Modulation) systems. The efficiency of OFDM decreases while the cost of installing HPA (High Power Amplifier) increases when the PAPR factor is high...
The simulation of aerospace vehicles is a challenging job as it consists of various expensive, fragile and unique subsystems. Apart from this, these systems are electrically connected and dynamically operated with the state of the art simulation setup. The first release of the software embedded in them may not fulfil its complete requirements, which may lead to failure of subsystems. So simulation...
In recent years, Because of rapid advancement of semiconductor fabrication technology, electronic devices have been becoming smaller, cheaper, and requiring less power for its operation every year. One of the fields, which have benefited by the technological advancement, is the field of WSNs. Recently, a lot of researched related WSNs have been conducted and people have been realizing its unlimited...
Digital image copyright protection techniques have drawn substantial interest from the research community for the last two decades. In particular, Copyright Protection schemes based on Visual Cryptography (CPVC) are designed to protect sensitive images without degrading the quality of host images. In this paper, the security of one such CPVC scheme proposed by A. Nag et al. is analyzed. We demonstrate...
Biology is a life science which has high significance on the quality of life and information security is that aspect for social edification, which human beings will never compromise. Both are subjects of high relevance and inevitable for mankind. So, an amalgamation of these subjects definitely turns up as utility technology, either for security or data storage and is known as Bio computing. The secure...
Test Case Design and Specifications are mostly written by teams in descriptive manner. Although teams put in their best efforts to write test cases that cover impacted requirements and regression testing scenarios, creating set of all-inclusive test cases is not possible. Also, it becomes difficult for one person to understand & execute test cases authored by another person. This paper examines...
The present paper focuses on the compression system using Huffman compression algorithm for data compression. The rate of data decompression is more time consuming during the decoding of these compressed data. Various works have proposed for the enhancement of compressed data decoding. In this paper the realization and implementation of a High speed decoding Huffman coding system is proposed and the...
Interest in the digital images has increased a lot over the last few years, but the process of locating a desired image in such a large and diverse image collection becomes very difficult. Traditionally text in different languages is used for efficient retrieval of images; it has several drawbacks such as language constraint and subjectivity of human perception.
In this paper, A Conformal finite-difference time domain (CFDTD) method using a conformal overlapping grid concept is explained. A circular micro-strip patch antenna is used as object to explain the CFDTD concept. The code is developed using MATLAB and corresponding results are explained and corresponding results compared with results produced from ADS Momentum tool. In this grid overlapping case...
Information and Data security is of high concern for almost all organizations. Intrusion though can be dealt with use of firewalls, better and much improved ways of detecting intrusions are through advanced software, but some non technical issues may also lead to unauthorized access, if ignored. This paper attempts to discuss these issues. A survey was conducted and responses regarding cyber security...
Research on the applications of compressed sensing has been mainly directed towards sub-Nyquist acquisition of a sparse signal followed by reconstruction, using different recovery algorithms, to get the original signal. In this paper, we present a scheme of compressed acquisition of a set of sparse signals and subsequent reconstruction of the signals at an effective sampling rate which is a multiple...
This paper shows the implementation and comparison of Carry Select Adder (CSA) using BEC (Binary Excess one Converter) and First Zero Finding (FZF) logic implementation techniques with optimization of the Full Adder (FA) cell by minimize number of transistors. The results have been analyzed and compared for implementation of both the above logic styles for 28T, 10T and 8T FA cells where as keeping...
Content addressable memory is a special type of memory which can do search operation in a single clock cycle. CAM has disadvantages of high power dissipation during the matching operation. Binary content addressable memory (Bi-CAM) is a special type of memory which is used to search for logic 0, logic 1. These types of memories are used in computer networking devices in order to perform the look up...
The information in World Wide Web is dynamic and growing faster. Existing topic based search engines are not adequate to retrieve information required by the users. So there is a necessity to develop genre based search engines. Firstly, web genres have to be identified to develop genre based search engines. Presently, there exist a few genre corpuses which include web genres like articles, online...
Predicting the performance of the students and helping them to improve their knowledge in subjects is one of the jobs of the educational universities. It is a laborious work to track many students in the universities. So, the universities started using content management systems to track the record of the student's marks, grades and performance. Even then, the tutor have to evaluate manually to finalize...
In this paper, the performance of Automatic Speech Recognition (ASR) and Mean Opinion Score (MOS) are evaluated under different channel conditions over GSM Network using standard narrow band Full Rate speech and channel coding algorithms. CMU SPHINX toolkit and TIMIT speech database (8 kHz raw files) are used to evaluate the ASR accuracy. MOS values are estimated, using PESQ P.862, as recommended...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.