The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. The main risk factors associated with a software defect which is not detected during the early phase of its development are cost and effort. Thus the main intention of any organization is to identify and rectify the defects...
Any application that would depend on indoor positioning may need an exact location. Our work on indoor localization in 3D using spherical co-ordinates would have an edge to all the future needs. A combination of Pico, Femto, Wi-Fi, otherwise termed as hybrid localization techniques are used in conjunction with leveling and sectoring. Leveling and sectoring are implemented using base station and Wi-Fi...
Data center networks widely uses TCP for communication between the servers as it provides reliability and congestion control. However, TCP does not work well for certain type of communication patterns. One such a pattern is barrier synchronized many to one communication. During this type of data transmissions, multiple servers simultaneously transmits data to a single client and also the client cannot...
Fingerprint is most important and widely used biometrics trait for identification. However, the fingerprint identification is still a challenging task in forensic science for criminal investigation and identification due to less area of region of interest (i.e.ridges and valleys) in the obtained fingerprints. Entire fingerprint is obtained only when it is given intentionally. But, in the case of criminal...
Edge Detection is one of the basic characteristics of the image. It is an important basis for the field of image analysis such as image segmentation, target area identification, extraction and other regional forms. The edge detection operators such as canny, sobel, prewitt operators detects the wide range of edges in image. These operators apply the convolution operation at each pixel to have gradient...
A non-Sinusoidal oscillator based on integrating the diode-switched currents and Regenerative Comparator is presented. The Implementation is derived from a known circuit with operational amplifiers where these are replaced by current conveyors. The circuit contains grounded resistances and capacitance and is suitable for high frequency square and triangular signal generation and frequency can be accurately...
The aim is to formulate a paradigm which is capable of reflecting the most innovative practices in delivering Tele-Medicare to patients, specifically focusing on rural and remote parts of a region. Tele health Therapy is not a practice area but a service delivery model that surpasses practice areas and improves access to occupational medical therapy services. The work presents an e-Medicare service...
In this project, we are presenting a new concept for preserving fingerprint confidential. Identification of fingerprint is an active area of search. In most portions we are manipulating recognition of fingerprint for enhancing the isolation and safety. The matching methods can be of two types-enrolment of fingerprint and authentication of fingerprint. The union of fingerprint for protecting isolation...
LTE is acronym for “Long Term Evolution” used as a new technology that suggests intensifications to prevailing mobile technologies. LTE is 4G (4th Generation) technology that focuses to afford excelling features of service as compare to other technology. LTE is extensively called the competent and adversary technology to WiMAX because of its wireless nature and mobile services. LTE is one of the most...
India is the largest producer of fruit and second largest producer of vegetables in the world. Due to the diverse agro climatic conditions and better availability of package of practices, the production is gradually rising. Although, there is a vast scope for increasing the production the lack of proper cold storage and cold chain facilities are becoming the major bottlenecks in tapping the potential...
In today's era mobile applications have reached great heights. Processing power, available user memory and storage have seemingly increased. Considering all this, a concern about energy consumption is raised as all these require a significant amount of power consumption. Also keeping the battery backup of a smartphone in mind, the need to conserve and minimize Energy consumption comes to play. This...
Very Long Base Line Interferometry (VLBI) is a technique that allows determination of angular position of spacecraft by measuring the geometric time delay between received radio signals at two geographically separated base stations. Delta Differential One Way Ranging (Delta-DOR) is an application of VLBI where delay measurements of a spacecraft radio signals are compared with delay measurements of...
The objective of Digital Watermarking is to provide security in terms of information hiding and copyright protection. The researchers are continuously working to create robust digital image watermarking methods. In this paper proposed a novel technique for RGB digital watermarking based on 2-Discrete Cosine Transform (DCT) with discrete wavelet transform (DWT) algorithm. For this use of two images-...
In this paper we intend to use vehicular ad hoc network to together and assemble real-time speed and position information on single vehicles to optimize signal control at traffic by road. First specify systematically the vehicular traffic signal control difficulty as a job scheduling difficulty on processors with job equivalent to platoons of vehicles. Then jobs are planned using an online algorithm...
The advent of new technologies nowadays are making our lives relatively easier. Wireless charging using inductive coupling could be one of the new technologies that can be the cause of a revolution. In this project it has been showcased that the charging of low power devices wirelessly via inductive coupling has become possible. This wireless charging minimizes the complexity that arises through the...
The remain undetected threat, backdoor is a computer based cryptosystem or an algorithm or the form of an installed program, it is a method of bypassing normal authentication, securing unauthorized remote access to a computer, hackers benefit obtaining access to plaintext and users' sensitive information. The research on Backdoor is keep vigorous as the day passes and more new threats have been detected...
An automobile based on virtual path algorithm has been presented in this paper. The paper is useful in designing a vehicle which moves from one point to another with minimum human intervention. To achieve this, virtual path concept is used. To design a virtual path, a set of co-ordinates required to reach destination from origin is calculated. Based on these co-ordinates the automobile takes its own...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.