The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new scheme for hyperspectral image classification through k-means clustering. The scheme includes three steps. Firstly, principal component analysis (PCA) is utilized for dimension reduction of the hyperspectral image. Secondly, the reduced features are clustered using k-means clustering algorithm and subsequently the clusters are trained separately by multi-class support vector...
Oata Grid provides transparent access to grid user. The grid data stored across distributed storage resources whilst fulfilling the Confidentiality, Integrity, Availability (C,I,A). The stored data is replicated in data grid to increase the availability. Replica Manager uses replica replacement algorithm to decide which replica to be replaced for the new replica when there is not enough space for...
Evolving technology has created an inevitable threat of expose of data that is shared online. Wireshark tool enables the ethical hacker to reveal the flaws in the system security at the user authentication level. This approach of identifying vulnerabilities is deemed fit as the strategy involved in this testing is rapid and provides good success in identifying vulnerabilities. The usage of Wireshark...
The use of mobile devices in our day to day life has increased drastically in the last ten years. Much of it can be contributed to the breakthrough in the field of communication. Since they contain most of our personal information, the constant worry of security and privacy has increased. In order to tackle this problem, non-obstructive and continuous user authentication has been proposed. This paper...
Effective Utilization of Resources and throughput computation is an important consideration in using cloud resources. Each resource is allocated by the tasks and each resource has virtual machines to handle the subtasks of use cases. The cost performance analysis is done using the markov model and the Server Allocation Matrix (SAM). Resource allocation in cloud computing System is a new dimension...
Seamless and ubiquitous connections are the ultimate aims of 4G era. But due to high mobility of users and different service class of applications, the connection failure rate is found to be high in mobile networks. This can be overcome by the handover (both horizontal and vertical), which plays a vital role in ensuring the QoS assured connections of user satisfaction. With the increased number of...
This paper is aimed to provide a brief description about the working and the processes involved with the system. And it is also focusing on the challenges during the deployment of ontology for university examination system. The development of semantic web also enhanced the creation and publishing of ontology and relationships in almost all domains. The ontology developed in this paper using protégé...
The main objective of clustering to form a group of similar/dissimilar data object into cluster. Cluster analysis aim to group a collection of patterns in to cluster based on similarity. Cluster is the unsupervised learning technique which is used to looping a set of unordered data object in to a smaller number of meaning full cluster. The relation between cluster either intra or inter. Clustering...
Oata replication in data grid increases the availability of data and reduces the total execution time of the grid job. Replica replacement algorithm plays a vital role when storage space is limited. This algorithm decides which replica to be replaced for the new one. The binomial prediction, Least Frequently Used (LFU), Least Recently Used (LRU) replica replacement algorithms are well known in the...
This paper presents a new Hybrid security algorithm for RSA cryptosystem named as Hybrid RSA (HRSA). Here computation of "public key" (P) as well as "private key" (Q) depends on the value of M, where M is the product of four prime numbers. So complexity involved in factorizing the variable M increases. Another interesting feature about this algorithm is that the computation of...
Image fusion is the process of merging all similar information from two or more images into a single image. The aim is to provide an image fusion method for fusing the images from the different modalities so that the fusion image will give more information without losing input information and also without any redundancy. This paper gives the efficient method for fusion purpose, by fusing LIDAR and...
This paper presents to detect the faces in an image and locates the facial features in an image. The detection of the facial parts such as eyes, nose, mouth and face is an important task in this process. This system is used to recognize and detect the parts of the human facial factors in an image. The study involves the algorithm of Viola-Jones Cascade Object Detector which gives various combination...
Various power quality issues can be mitigated by the introduction of power quality conditioner which shows a spectacular performance for grid tied DG system. This paper studied on various power quality issue, unbalance voltage and current distribution with several fault. Adding different adjusting commands which defines the system like existing reference current harmonic current relation with other...
The success of any cryptographic algorithm lies in the unpredictability& irreproducibility of random number generation. For implementing the cryptographic algorithms it should be integrated within a single chip. Hence a random number generator which produces unpredictable random numbers as well as occupying less area is the essential one. In this work, random numbers are generated based on sampling...
Metadata creation along with growth of social bookmarking emerged an approach named tagging. Often people look for location along with its route and detailed information about its surrounding. Mobile users may opt for current event that is taking place in the current location along with historical background of their surroundings and events that happen over time. They are provided with information...
Customer churn prediction has gathered greater interest in business especially in telecommunications industries. Many authors have presented different versions of the churn prediction models greatly based on the data mining concepts employing the machine learning and meta-heuristic algorithms. This aim of this paper is to study some of the most important churn prediction techniques developed over...
Mobile phone is a hand-held communication device, the popularity of which has increased unbelievably over the past few years. This is not only because of the ability to make calls but also due to the Short Messaging Service (SMS) provided. Although, the number of people using mobiles is a myriad, there are still people who depend on landline phones for communication. The only way of communication...
For Making a Business Successful a sustainable overall development strategy is needed, so that end point the customer should satisfy by seeing the profit margin of the business. Big data and Predictive analytics field enable the organizations to use big data that is both stored and real-time to move from a historical view to a forward-looking perspective of the customer and which indeed became the...
The three dimension cylindrical structure is interesting, challenging and offers excellent space utilization. With utilization of three-dimensional space, the unit cell size of the FSS can be further reduced. A novel design of three dimensional Cylindrical Shaped Frequency Selective Surface (CSFSS) based on a single circular ring structure has been proposed. Firstly, a circular ring has been chosen...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.