The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a cooperative wireless network all the nodes will cooperate for the transmission of all other nodes. But there may be some malicious nodes which does not comply with the cooperation rule and act as selfish to reserve its resources for its own use. In this paper we present a review of the various approaches that are used to detect and eliminate the malicious nodes. We concentrated our review mainly...
We all agree with the fact that the reality is pretty good this will be experience by our sensory organs. Even the virtual world is amazing but the virtual and real world together working is complex. Gratefully this is changing now a days by new tool by which we can see our world with a layer of new information that's we called as Augmented reality (AR). Simply we can say that it's a combination of...
Learning Materials are structured as Learning Objects and are available in Learning Object Repository(LOR) which are used in various courses of an Elearning environment. Learning Management System aggregates these objects found in LOR, provides an infrastructure and platform through which learning content is delivered and managed. Adaptation, personalization, usage statistics are some of the LMS functionality...
This paper deals with data hiding in uncompressed video. Unlike using motion vector for data hiding which gives only a coarse representation of the actual motion. We target the motion at the pixel level. The frame difference is used to construct a motion histogram and the cover sequence for hiding data is obtained from the histogram. The secret message bitstream is embedded into this sequence by finding...
Communication is one of the significant features of existence. All the way through the innovation in era and its expanding burden, swift development has occurred within the communication field. Electrical quantities, which were initially transferred in the continuous sphere, are drived further and further in the discrete sphere in existence. In favor of enhanced diffusion, distinct rate influences...
Noise removing algorithms of spatial domain and various other domains find much useful in real time noise removal techniques such as medical imaging and satellite imaging applications. The order of noise and performance measures to be analyzed decides the type of denoising algorithm. The intensity based image denoising procedures and image fractal based denoising procedures are providing wider applications...
In many fields the traditional ontology cannot represent and handle the inaccurate and uncertain information existing in the real world. The usual solution is introducing fuzzy logic into ontology to deal with such fuzzy information [1]. Currently, a large number of studies have been devoted to the construction of fuzzy ontology and made some achievements [2]. However, it is necessary to choose a...
Channel routing is a key problem in VLSI physical design. The main goal of the channel routing problem is to reduce the area of an IC chip. If we concentrate on reducing track number in channel routing problem then automatically the area of an IC chip will be reduced. Here, we propose a new algorithm to reduce the number of tracks using four layers (two horizontal layers and two vertical layers)....
In recent years, data mining has become a global research area for acquiring interesting relationships hidden in large data sets. Data Mining has been used in various application domains such as market basket data, bioinformatics, medical diagnosis, web mining and scientific data analysis. In this paper, we have tried to optimize the rules generated by Association Rule Mining using Biogeography Based...
Opportunistic networks are delay tolerant networks with sparse nodes. Nodes in an opportunistic network make use of a store-carry-and-forward method to communicate among themselves. Performance of routing protocols that have been developed for opportunistic networks vary based on the movement pattern of the nodes. This paper introduces an individual path based mobility pattern and analyzes the performance...
In the literature, multiplexer has been proposed for the ASIC implementation of unrolled CORDIC (COordinate Rotation DIgital Computer) processor. In this paper, the efficacy of this approach is studied for the implementation on FPGA. For this study, both non pipelined and 2 level pipelined CORDIC with 8 stages and using two schemes — one using adders in all the stages and another using multiplexers...
The 3rd Generation Partnership Project — Long Term Evolution (3GPP-LTE) is the best choice for multimedia data transmission in demanding situation. The 3GPP LTE provides high data transmission rate between the User Equipment (UE) and Evolved Node B (eNB) with lower latency and better throughput. However, with the advancement and increasing traffic of data load, it is necessary to have data scheduling...
This study aims to apply unsupervised machine learning algorithms on Cricket players' career statistics dataset. K-means clustering algorithm is used to find the natural grouping that exists within the cricket players using player's batting average, strike rate, bowling average, economy etc. as input features — in this case players are grouped into 3 groups. Further separate probability density models...
The discrete logarithm problem (DLP) is assumed to be hard from computational point of view. Side channel attacks are used to reveal information about the key if proper countermeasures are not used. We study the discrete logarithm problem assuming that partial information about the key is known. K. Gopalakrishnan et al. provided algorithms to solve the discrete logarithm problem for generic groups...
Today, there are an increasing number of attack technologies among which ARP spoofing attack is considered as one of the easiest but dangerous method in local area networks. This paper discusses ARP spoofing attack and some related works about it first. On these bases, the paper proposed an efficient algorithm based on ICMP protocol to detect malicious hosts that are performing ARP spoofing attack...
Edge is the boundary between an object and the background, and identifies the boundary between overlapping and non-over lapping objects. This means that if the edges in an image can be identified accurately, all of the objects can be located and basic properties such as area, perimeter, and shape can be measured. Here fuzzy logic based image processing is used for accurate and noise free edge detection...
This paper mainly deals with three different topologies of cascaded H-Bridge multilevel inverter. The Existing Topology is a general type of multilevel inverter and has two DC sources for each phase. In Proposed Topology-I the number of DC sources has been reduced to one for all the three phases and the usage of transformers comes into picture. Proposed Topology-II has also only one DC source for...
This paper proposes the design of continuous and discrete optimal controller based on Continuous and Discrete time Linear Quadratic Regulator (CLQR and DLQR). The controllers have been implemented in Pneumatically Actuated Inverted Pendulum system which is basically non-linear in nature. The main aim is to design the optimal controllers with the given specification for the system and to study the...
An intutive segmentation technique to separate the microcalcification regions from the mammogram is given in this article. This mechanism, first enhances the input image using an image-dependent threshold value and binarizes it to obtain an enhanced image. Then the pixels constituting the edges of microcalcification regions are grown in the enhanced image, with respect to the neighbourhood pixels...
In this paper, we proposed an analysis of Eigen functions of the n-Dimensional Fourier transform. We extended the theory developed in our previous publication [1]. We applied our extended theory of systematic construction of Eigen function concept for sine and cosine functions. We explained the concept in a clear way through example construction of Eigen functions of 1-D and 2-D Fourier transform...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.