Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, four different single ended delay cells based ring oscillators have been presented. Output frequencies of ring oscillators have been controlled by varying the supply voltage 1.4V to 3.0V. The active load concept has been used in proposed circuits. First design shows frequency variation in the range [4.50–1.40] GHz with phase noise −87.79dBc/Hz @1MHz in saturated load. Second design...
In this work, a high throughput architecture for 1-D Discrete Wavelet Transform is proposed. The work proposes DWT computation through convolution of a ‘M’ point input sequence with a ‘L’ tap wavelet coefficients. Computation of DWT of an N point sequence is carried out by summing the results of blocks of ‘M’ points. For illustration, an 8 tap filter and block size of 4 is considered. Through poly-phase...
IVANETs (Internet Based Vehicular Adhoc Networks) are the adhoc networks formed by moving vehicles without any permanent infrastructure and are characterized by frequent disconnections, frequent topological changes, as vehicles move at very high speed and can take unpredictable turns on their route. So their cached data items become stale, need to be updated from the server and it results in high...
This paper suggests a new Advance Encryption Standard (AES) encryption technique. New Algorithm uses 400 bit block encryption scheme and a key dependent rotated S-Box which varies according to the 200 bit key provided by the user. Fixed S-box allows hackers to study S-box and find weaker points, whereas using key-dependent S-Box, it is harder for attacker to do any offline analysis of an attack on...
Wireless sensor network (WSN) is a wireless network of tiny, low-power nodes deployed in a region to keep track of environmental surroundings and collect data to be processed at a remote base station. Deployment remains one of the greatest challenges in WSN that impacts coverage and connectivity amongst other things. Coverage is one of the important issues in sensor networks, which echoes how well...
Anomaly detection involves way towards finding the example in the information that violates ordinary conduct. The choice of anomaly detection algorithm can to a great extent affect the undertaking of anomaly identification. The decision of abnormality revelation calculation can influence complexity and correctness of the process. The choice of anomaly recognition calculations may increase the occurrence...
In the era of online social networks and microblogging services, we encounter trending topics in each of such platform. Understanding such trends is not a trivial task. It requires a technical analysis of such scenario in order to infer a particular conclusion. Such analysis helps us in characterizing user or community behavior in any online social platform. In this paper, we study twitter, which...
Currently in India college ranking is the issue that is discussed a lot. In this paper, a common forum where students can get information about various engineering colleges and their ranking. There are many websites that give information about various engineering colleges but when it comes to students, for them it is important to know certain insights to parameters like faculty, campus life, hostel...
Big Data is a new emerging field as well as a big challenge. A vast amount of data is generated and stored daily and only 20% of data is structured. It is difficult to analyze and work on unstructured data. Geospatial data has already exceeded the storage capacity and is now considered as a big data problem. Visualizing data makes things a bit easier as data visualization helps in finding patterns...
Pedestrian detection is one of the significant task in any intelligent systems involving video surveillance, since it provides essential information regarding the semantic behavior of pedestrians from video footages. Pedestrian detection along with tracking serves as an obvious extension to automotive applications in design and improvement of safety systems. However, various challenges arise while...
The cold start problem is a long-standing problem in recommender systems where systems are unable to recommend relevant items to the users due to unavailability of adequate information about them. In literature, several researchers have addressed this problem by collecting missing information, but their approaches differ in the way they collect missing information. According to literature study on...
A facial expression is exhibited by the movement of muscles underneath the face skin. Automatic Facial Expression Recognition comprises of three main phases: Feature Extraction, Feature Selection and Expression Classification. Facial Expression Recognition (FER) has a very important role in computer vision, human machine interaction and modern gaming. The objective of this research work is to explore...
Convolutional Neural Networks have been performing exceptionally well for the recognition of worldly objects and there are various trained models available which can give you the class of an object if an image of the object is fed as their input. But, we can also retrain an already trained model for anotherset of classes of our interest and we have retrained such a model to check the severity of Diabetic...
Visual analytics is a newly emerging field. It is progressing at a high pace around the world. There are a lot of domains and areas where this field has shown the presence in the last decade. It has improved business and has helped technology grow in a better way. So here in this paper we would highlight the application areas of visual analytics. Although the growth is rapid but still many of the...
The system security has turned into an extremely critical worry as system assaults have been extending with the ascent of hacking devices, inconvenience of systems and interruptions in number and brutality. This paper is centered around interruption identification by utilizing Multilayer Perceptron (MLP) with various calculation of backpropagation neural network. In this paper, performance of various...
Cloud Environment allows enterprises to scale their application on demand. Microservice design is a new paradigm for cloud application development which is gaining popularity due to its granular approach and loosely coupled services unlike monolithic design with single code base. Applications developed using microservice design results in better scaling and gives extended flexibility to the developers...
In today's world, sorting is a basic need and appropriate method starts with searching. Several sorting algorithms has been developed on CPU (Central Processing Unit). But according to current scenario, CPU is not so efficient in sorting. To get the more speedup of sorting algorithms parallelization should b e done. There are many ways of Parallelizing sorting methods which can be performed by using...
Enterprises are moving into cloud, so deployment and configuration of virtual machines and application software are becoming highly complex. The solution to this problem is to automate the deployment and configuration using templates. These templates allow the users to specify the information about resource requirements of an application. In this paper, firstly, we present the methods for development...
Cloud offerings serve workloads with diverse needs in terms of compute, memory, storage and networking. In this work, we address the problem of workload-aware virtual machines (VMs) placement in Infrastructure Cloud. The goal is to co-locate VMs with heterogeneous workload characteristics to optimize performance and reduce energy consumption. We design and implement the proposed placement technique...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.