The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, robotics in agriculture sector with its implementation based on precision agriculture concept is the newly emerging technology. The main reason behind automation of farming processes are saving the time and energy required for performing repetitive farming tasks and increasing the productivity of yield by treating every crop individually using precision farming concept. Designing...
Advancement of technology, has furnished several terabytes of data for companies which can be effectively summed under Data Mining. Finding useful pieces of information from such huge data has been the need of the hour. A term called Anomaly Detection [8] is used in the pretext to refer to data objects which do not confer to a notion of normal data objects. There are various density based clustering...
This paper makes an endeavor to plan and build up a Remote Fuel Monitoring System (RFMS) with a 8-Bit Microchip Microcontroller. The configuration of this model gives an entrance of ongoing operational parameters, for example, Diesel/Petrol Fuel Levels, Temperature, Oil Levels and Voltages Generated and a correlation with their separate basic edge limits. The RFMS ceaselessly screens these parameters...
An enterprise that uses a private addressing scheme can connect to an Infrastructure as a Service (IaaS) cloud to enhance its server capacity for a limited period. The IaaS cloud service provider partitions a portion of its public cloud to realize a private cloud for the enterprise. The private cloud is reachable as an extension to the servers of a business computing environment through an appropriate...
Now a days, most of our data is travelled over internet so the security of that data is most important. Visual cryptography plays a very crucial role for security of image based secret. Visual cryptography encrypts the image in to shares and in decryption process all shares are stacked together to reveal the secret image. Here we are proposing a new scheme for color share generation. In this scheme...
Forests are one of the most important natural resources on this earth and they offer huge potential share in our GDP by producing many consumables. This paper deals with the detection of fire smoke plume in forests using Unmanned Aerial Vehicle (UAV) and then sending immediate information to EFS&T inorder to protect our forests. Because it prevents the spreading of fire in forest and also gives...
Fall is an unusual activity and it is a serious problem among the elderly people. In the proposed system, we present an automatic approach for detecting and recognizing falls of elderly people in the home environments using video based technology. The focus is on the protection and assistance to the elderly people. Fall causes a very high risk of the elderly's life that may cause death. The fall incident...
With every passing year since the mid 1970s, we see a large increase in the data rates in the core networks. That is mainly driven by the improved techniques to carry data in the optical fibers. The speed of communication or the data rates in the fiber kept on increasing for almost 40 years. That trend of increase in data rates is commonly known as Keck's law. Like Moore's law, fiber data rates have...
The implementable decoders and large collection of data transmission and storage channels can be admitted at the same time using low density parity check (LDPC) group of Linear block codes. We will review some of the LDPC construction techniques and encoding problem for LDPC codes. Also certain special classes of LDPC codes which will resolve encoding problems will be introduced. Performance analysis...
This presents a two-fold feature extraction technique for biomedical signals classification. In this work, signals are uniformly decomposed to form a set of uniform matrices. Then using Canonical Correlation Analysis (CCA) each pair matrices are mapped to orthogonal space. Next, Wavelet transformation is performed on original feature matrices and then mapped to orthogonal space. Both domains are statistically...
Nowadays cloud computing is the most advanced paradigm promising to show the vision of computing applicability into reality. It provides a versatile and straightforward way to store and retrieve immense information left-out concern the hardware required. Cloud based Storage (CS) incorporates a resource manager, cluster head and server clusters. Inside the resource manager the client's request for...
In addition to the existed, current mode circuit applications, a novel square wave generator using second generation differential current conveyor (DCCII) as a dynamic edifice with three more components of two resistors and single capacitor is proposed. The circuit is constructed on the basis of grounded capacitor and resistor to limit the parasitics during tape out and make it more designer friendly...
Recently various Junctionless Transistor (JLT) structures have been proposed to improve performance parameters such as drain induced barrier leakage (DIBL), sub threshold slope (SS), on state current, off state current etc. which includes bulk planar JLT, silicon on insulator (SOI) JLT, dual gate JLT, Double gate JLT etc. In this paper, to improve those parameters more attention has been given to...
WSN considering clustering mechanism for optimization of energy is very popular among the researchers here also author used clustering mechanism in densely deployed sensor network. Intra cluster and inter-cluster communication is considered, for large distance communication relay nodes are used to reduce the energy consumption. A tradeoff between node density and sleep/active nodes are establish,...
Fingerprint recognition, one of the important biometric verification tools plays an important role in maintaining good security in any sort of systems. The fingerprint recognition in this paper deals with the extraction of features followed by codebook formation by Linde Buzo Gray Vector Quantization. The system also adds a sophisticated multi class Support Vector Machine classifier with a comparator...
The Discrete Cosine Transform (DCT) is a standard in the media industry for video and image compression techniques like MPEG2 and JPEG. Even though the Discrete Wavelet Transform (DWT) performs better, DCT computation is faster which entails its use in real time applications. This is especially useful in the internet of things era which require real time processing. As such, it is required to efficiently...
The most important kind of authentication used is PIN authentication which is simple, effective and usable, but it is prone to an attack known as shoulder surfing. Shoulder surfing refers to a direct observation, such as looking over a person's shoulder, to obtain information. The previous work was done with the visibility of the PIN, but here we propose an innovative way to authenticate user by providing...
Many real systems can be represented as networks whose analysis can be informative with respect to the original system. Networks (or graphs) appear as dominant structures in diverse domains. The graphs can be directed, making the semantics of the edges non symmetric as the source node transmits some property to the target one but not vice versa. Community detection divides a network into groups of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.