The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of semantic web technologies assures a new incentive for researches over software engineering. Although the basic concepts of semantic web have a widespread tradition over engineering sector, it moreover becomes difficult for software engineers to look into the diversity of ontology-provided approaches. A realistic scenario Zoo Management is taken based on which an ontology is generated...
The wheeled mobile robot navigation is represent by teleoperation system. That is communications are shared by master robot, as based current communication the wheeled mobile action like wheeled slippage and position which is observed by slave robot. Finite time control of wheeled mobile robot with Soft Computing system under unknown environment of obstacle avoidance and parametric uncertainties is...
Computers have made their way into all realms of human actions. The emergence of high-speed networks and the popularization of mobile devices resulted in the increase of the number of accesses to online content on the Internet. Powerful servers have become inevitable as they support huge data processing. Flash crowd occurs due to popular content which attracts large crowd that demands immediate and...
Blockchain is a distributed, transparent, immutable ledger. Consensus protocol forms the core of blockchain. They decide how a blockchain works. With the advent of new possibilities in blockchain technology, researchers are keen to find a well-optimized Byzantine fault tolerant consensus protocol. Creating a global consensus protocol or tailoring a cross-platform plug and play software application...
Current and voltage behaves like a fault during power swing condition. Distance relay which sense to operate due to change in impedance may be falsely operated in power swing. Therefore a power swing block is necessarily used in distance relay for security purpose to avoid mal-operation during power swing. During power swing all types of fault such as symmetrical, unsymmetrical and high resistance...
Distribution system optimization problem involves several uncertain random variables on account of stochastic nature of load demand and power generation from renewable energy sources. These issues obligates the use of probabilistic power flow while solving any distribution system optimization problem. Hong's point estimate method (PEM) is a well-known tool used in transmission systems having meshed...
In last several years, significant amount of attention has been devoted to task scheduling process in heterogeneous distributed computing system (HDCS). The task scheduling is an important problem, where different tasks are scheduled to target processor in such a way that the overall tasks computation is completed within a shortest possible time. In this paper, we have presented a multi-level queue...
Steganography is the classical technique of securing the confidential data. The data is hidden in an object called cover medium. The encoder (sender) and the decoder (receiver) only have the knowledge of secret data hidden in the cover object. An image is a cover object that hides the secret data. DNA is another cover object which has a huge data storage capacity and it hides a very large secret data...
Wireless body area network (WBANs) is a kind of wireless sensor network which can be the various sensors are attached on wearable clothing and human body and implanted under the skin. To ensure data security, the data is stored in cipher text format at the data sink by applying cipher text policy attribute based encryption in the sensors that are used. The major challenge of the wireless body area...
The innovative creation, IDS (Interactive Display on any Surface) is converting any surface as a touch screen is playing its major role in various consumers and business environments. An IDS is a new interactive methodology which is surrounded by different modes of natural interaction. With its projection based technology it makes the business applications to improve towards the next level and making...
Software Defined Networking (SDN) is a new approach in network architecture which decouples the control plane from data plane. The SDN controller has the global view of the underlying network, enabling enormous research works in the area of traffic engineering (TE). Existing congestion control solutions for SDN TE are either reactive or proactive in nature. In reactive schemes when congestion event...
Internet has become widespread, and is used for all transactions to support client and server services. E-commerce is also one of the services to sell the goods using the Internet. E-Transaction has becomes more important, security for E-transaction is a important work because of the insecure communication channel. In this paper, we have proposed a new algorithm for a secure e-transaction using chaos.
In the domain of telecommunication architectures, the mobile cloud technology is presently emerging as widely required tool for expanding its usage and versatility. However, there are some underlying challenges with implementing the offloading method which hinders its practical applications. The framework of POMAC (Properly Offloading Mobile Applications to Clouds) has been previously utilized for...
In biometric system, gait based recognition has more challenges as a result of changing appearance by several factors. To overcome these challenges, in our previous work, effective gait recognition using multi-objective enhanced adaptive fusion technique by BAT algorithm (EGRMEAFBAT) was proposed in which the most efficient features, most informative less efficient features and shape features from...
A Radio over Fiber (RoF) link comprising of a 1550 nm directly modulated laser source, single mode fiber and a PIN photodiode, is simulated for pico cell applications. The photodiode is connected to a compact 900 MHz GSM band microstrip patch antenna. The fiber optic link is modeled in Optisystem software and the antenna parameters are linked from Advanced Design System (ADS) software. The wireless...
Recently there has been a tremendous increase in the interest of the security of people and due to the ubiquitous presence of surveillance cameras and other similar systems, Automated surveillance systems have garnered widespread interest from the scientific community. Concomitantly, several advancements in the domain of biometrics have contributed to its pervasiveness in unrestricted environments...
Wireless Gigabit Alliance (WiGig Alliance), a microwave WiFi is becoming a popular trend in today's communication for its multi gigabit data transmission rates at a short range. As it provides faster communication at unlicensed 60 GHz spectrum, it is widely used for transmission of audio/video from computing device to other processing/large display devices. Designing a 60 GHz millimeter wave antenna...
In this paper, we suggested AdBoost algorithm for further improvising the performance of system. In the enhanced adaboost, the eigen vectors are computed for facial region & applied classification. In the process of classification, we opt for process of learning, training & testing. As observed from the result sessions in the previous paper [13] the outcomes from the reboost detection are...
Buying and maintaining supercomputers are exceedingly costly affairs. In a country like India, not many organisations can afford to have one, due to which many compute-intensive works and research remain undone. On the other hand, the revolution of smartphones has brought unforeseen computing power to our fingertips. Today's smartphones can deliver equivalent or even better performance than supercomputers...
Cloud services are employed for different purposes such as storage, delivery and processing of data. The workloads encountered are mainly heterogeneous resource demands. Heterogeneous distributed systems are often considered as a combination of public and private cloud systems, mobile based clusters and networks. Many schedulers and scheduling algorithm lacks reliability requirements for tasks and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.