The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a power-management infrastructure, referred to as Smart Drivers, devised for efficiently managing the data sensing phase in a wireless sensor network (WSN). The key idea is that the data sensing phase can be logically decoupled from data processing, which can be in turn decoupled from data transmission, the last being already done in classical approaches of data aggregation. By...
Web Usage Mining (WUM) is one of the categories of data mining technique that identifies usage patterns of the web data, so as to perceive and better serve the requirements of the web applications. The working of WUM involves three steps - preprocessing, pattern discovery and analysis. The first step in WUM - Preprocessing of data is an essential activity which will help to improve the quality of...
The authentication and key agreement (AKA) protocol for Long Term Evolution-Advanced (LTE-A) which is proposed to solve the vulnerabilities found in previous communication systems such as 2G and 3G systems. They still contain the vulnerabilities like redirection and man-in-the-middle attack. They gave way to the eavesdroppers to utilize and misuse the subscriber's resources and make the communication...
The new generation of applications like Business Intelligence, data warehouses, Social networking etc. requires processing of terabytes or petabytes of data. This is achieved by distributed processing. This is the major reason for the power of web companies such as Google, Amazon, and Salesforce etc. In this case, relational databases are found to be inadequate in distributed processing involving...
We consider the following Constraint Satisfaction Problem: Given a set C of constraints in which each constraint has a subset of Variables V that maps to the set of nodes N(T) of a given tree T . Does their exist c: V → N(T) such that for each constraint of C, the variables can take one of the nodes specified in that constraint as its values. This node assignment to the variables is said to be feasible...
This paper deals with the design of Natural Language Interface for Web-based information Retrieval. In this model, natural language query is analysed for understanding its meaning and depending on its meaning, the most relevant documents are retrieved from the World Wide Web. The proposed algorithm is based on Statistical machine learning. Natural Language text is converted to more formal representation...
Data everywhere should possess some level of se-curity in a network or a host based system. This is an impor-tant task that needs to be implemented with the global reach standards. This scenario basically happens to be started with communication, which itself is a tedious issue sometimes over a network. The global reach is headed by intruders where the need for survey is required. In this regard,...
As the number and size of image databases grows, accurate and efficient content-based image retrieval (CBIR) systems become increasingly important in business and in the everyday lives of people around the world. Accordingly, there has been a substantial amount of CBIR research, and much recent interest in using probabilistic methods for this purpose. However, there exist some shortfalls or limitations...
In Current era, internet is playing such a vital role in our everyday life that it is very difficult to survive without it. The World Wide Web (WWW) has influenced a lot to both users (visitors) as well as the web site owners. Enormous growth of World Wide Web increases the complexity for users to browse effectively. To increase the performance of web sites better web site design, web server activities...
Information technology is growing day by day, at the same time security of information is major concern. There are various users and organizations who want to prevent their crucial data from attackers and hackers. Various cryptographic systems are developed in past years. A new field of cryptography is emerging based on DNA computing due to high storage capacity, vast parallelism and exceptional energy...
Providing the survivability in optical networks over wavelength-division multiplexing (WDM) is a critical concern. The design issue on WDM network is to minimize the buffer size and providing survivability based on differential delay and Multipath provisioning with the support of Virtual Concatenation (VC). In this paper, we propose the Shared Protection of the Largest Individual Traversed link (SPLIT)...
This paper focuses on mathematical rigor to provide explicit solution for gender recognition by extracting feature vector. This paper implement face recognition system using Principal Component Analysis (PCA) algorithm. In addition by using face-rec database we will use kernel SVM to find k Eigen for which error of classification is smallest then project data points along these vector to reduce dimensionality.
Detecting objects in an image and tracking them through a video sequence has been a fundamental problem in computer vision and has led to a significant amount of research in the last few decades. The main challenge is achieving invariance to facial appearance and motion. Variations result from many factors, including environmental conditions (lighting, clutter), imaging sensors (frame rate, quantization,...
Text watermarking schemes is one of the most effective method for digital document protection. The direct implementation of text watermarking to the web document can detract the invisibility and robustness of embedded watermark. This problem can be solved by using unicode based web document protection technique. This paper includes a new technique which is comprised of three processes like generation...
This paper proposed a new method for recognizing human by their gait using CPNN. In the modified CPN model, there was no need of training parameters because it is not an iterative method like back propagation architecture which took a long time for learning. The model based approach is chosen so that the effect of exterior factors like clothing, shoes, briefcase and environmental context is minimized...
This paper proposes a prototype model of robust iris pattern recognition (PR) system for classification of ten different persons using neural network. Feature extraction algorithms are developed and an optimal feature vector comprising of features in relation to image statistics, texture and 2-D transform domain is formed. It is observed that 2D Walsh Hadamard Transform (WHT) entails the best performance...
An efficient feature set for retrieving color images from the image database is proposed in this paper. Features chosen here play an important role in bringing back the images from huge databases. This paper proposes a unique color feature based on vector quantization and texture feature based on the pattern of traversal. The Dominant Codebook (DC) is the new color feature designed from the compressed...
The issue of multicast routing in TCP over Optical Burst Switched (OBS) networks was dealt before and here few parameters are presented to determine the efficiency of the OBS Virtual Source heuristic. Such QoS parameters include Burst Throughput (η), Burst Latency (τ) and Burst Loss Probability (φ). It is mathematically proved that using the Virtual Source (VS) heuristic for OBS Networks under TCP...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.