The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's era, personal information security is major topic of concern. In this regard many advanced techniques are used but still in all of those biometric is most reliable. Biometric technologies are based on individual's biological and behavioural characteristics. These system includes human finger, vein, iris, hand and many other as its identifiers. Biometric system using finger-vein as one of...
Computers with their growing demands have their applicability in every field, one of the applications is the computer vision, where the function of an human eye has been replaced by using various sensors to capture the environment in the similar way a human eye does. We know that capturing the environment through sensors lead to origin of various kinds of images and videos of different shapes and...
Present work proposes a new method for automatic detection of the QRS complex wave of an ECG signal using digital signal processing (DSP) technique. The main focus in this work is to remove the noises that interfere with the ECG signal. For this purpose, a Hamming window FIR filter is used for the removal of Power line and base line drift noises. Firstly, Noise detection is done using the bit error...
The electroencephalogram (EEG) signals are a sturdy tool for tracing brain variations during different periods of life, also it plays a prominent and considerable role in the diagnosis of various diseases. In our previously published papers [1-8] we have worked on diverse problems that can be analyzed by neural networks. In this paper, we have chosen EEG signals due to its increase its application...
The key frame extraction helps us to make obtainable summary of a video. After studying a variety of diverse methods of Key frame extraction, we will have comparative analysis of the methods depending on their important features and result. If we want to present the entire video within a squat interval of time, video summary becomes the best alternative for this. This has become a very essential work...
In this paper there is a design application of a smart system which detects the stress directly from a human brain, as a Brain Computer Interface provides a direct channel to interface outside object or device and a living brain. This interface helps the person to send the messages or commands from his brain or it can also be said that only thought process can be performed without any muscle movement...
Evolution in the approaches to develop software has been rapid, continuous and tremendous. Crowdsourcing is the phenomenon of outsouring a problem to the public in order to get diverse solutions to that problem. Crowdsouring Software Development is a contest based activity in which organizations use crowdsourcing platforms to float a problem related to any phase of Software Development Life Cycle...
Nowadays Wireless sensor network achieve much attention due to its several real time applications like in military works, fire detection, temperature sensing etc. Sensor nodes are randomly distributed in the network and have limited energy. Due to this energy constraint, efficient routing protocol comes into picture. A sensor node senses the environment and generated the data. It sends the data to...
Cloud Computing is emerging amongst all the ascending technologies as the most prodigious process in the chronicles of computing. As it still takes some time to settle, a new challenge as felt whilst its implementation across has been a relatively more gratuitously new. Today as Cloud technology is increasingly expanding across the globe for its resulting benefits but still it needs time to offer...
Wireless networks can be categorized into infrastructure and infrastructure-less based on the network formation and architecture. Mobile Ad-hoc Networks are infrastructure-less networks with self-configuring property having a dynamic topology where nodes are free to move in any direction, due to this topological changes there are increased chances of link breaks in the network giving rise to path...
Cryptography is the fascinating science that deals with constructing and destructing the secret codes. The evolving digitization in this modern era possesses cryptography as one of its backbones to perform the transactions with confidentiality and security wherever the authentication is required. With the modern technology that has evolved, the use of codes has exploded, enriching cryptology and empowering...
In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS...
Adaptive contention window algorithms are most commonly used in CSMA/CA to improve the throughput, fairness and reduce the latency and the collision probabilities in today's applications. All the calculations are done with keeping perfect carrier sensing in mind. There is a huge role played by sensing errors like probability of false alarm and probability of miss detection, in the carrier sensing...
The role of energy in wireless sensor networks (WSN) becomes very important when network is unattended and it is not possible to recharge sensor node's battery in the sensing region many times. Due to this limited battery energy of sensor nodes it becomes a challenge for WSN to maintain proper functioning for a long time. So for the enhancement in network lifetime of the WSN, here we propose a modified...
The Heterogeneous Wireless Network is a hierarchical structure of different wireless networks. The wireless networks are differ in terms of network coverage, capacity, bandwidth, technology and network operator. In such an environment when a mobile terminal equipped with multiple network interfaces leaves one wireless network and connect to another different wireless network, a Vertical Handoff (VHO)...
VANETs are network of vehicle which is formed dynamically for short duration. Due to this they are susceptible to various types of attacks. This paper discusses the recent techniques used to counter various types of attacks that threaten the VANET. Researchers have proposed many solutions to solve these problems. This paper discusses all the most relevant solutions and analyzed them according to various...
Hierarchical threshold secret sharing (HTSS) schemes can be thought as a generalization of classical threshold secret sharing schemes, and they have been extensively in the literature. In an HTSS, participants are classified into different security levels, and the threshold value of a higher level is smaller than that of a lower level. Participants in each level can recover the secrets, if the number...
Checking data integrity remotely is of essential significance in cloud storage. It enables customers to check if their remotely stored information is intact or not without downloading the entire information. Out of two main focuses, we propose a remote information integrity checking model: ID-DPDP (personality based conveyed provable information ownership) in distributed-cloud storage. The conventional...
A Wireless Sensor Network consists of enormous amount of sensor nodes. These sensor nodes sense the information from the sensing region and transmit to the sink. From the sink a client can access the required information. Essential part of the wireless sensor network is the sensor nodes that are driven with the batteries. Prolonging the network lifetime is very difficult and expensive in many conditions...
Pest detection is crucial to secure crops and ensure food quality. A lot of work is being carried out for the effective identification of pests. In this paper we will develop a novel and fast methodology to detect and enumerate the pests present in an image using rapid feature detection algorithm. The amount of pesticides being used for agriculture pollutes the environment, with sophisticated machine...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.