The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Clustering is a very widely used data mining task practiced to partition data in to similar groups/clusters. Data clustering can be challenging, when it has to be done for huge data sets as no single clustering algorithm proves to give optimal results. Clustering ensembles is an emerging solution to the above issue for improving robustness, stability and accuracy of unsupervised clustering. The clustering...
This paper focuses on the algorithm which can be very efficient for the purpose to minimize the delays introduced in the circuit because of placement and routing. Placing and routing operations are performed when an FPGA device is used for implementation. The delay introduced by logic block and the delay introduced by interconnection can be analyzed by the use of efficient place and route algorithm...
In Wireless Sensor Networks, sensor nodes depends on battery power thus energy efficiency plays a major role as critical challenge in the lifetime improvement of networks. The lifetime of network is also based the key characteristics like number of nodes, mobility, coverage area and connectivity of nodes in the network. Recent research works says that the important of Wireless Sensor Network in various...
Due to the dynamic nature of the web plenty of webpages are deleted and added newly and as the web is large collection of data in form of the webpages or in the group of webpages as websites. So every time a surfer searches the web using the search engine, the data should be fresh and relevant. Due to the large size of web, corresponding to any query made by the user number of pages are being retrieved...
A review based on different types of clustering algorithms with their corresponding data sets has been proposed. In this paper, we have given a complete comparative statistical analysis of various clustering algorithms. Clustering algorithms usually employ distance metric or similarity metric to cluster the data set into different partitions. Well known clustering algorithms have been widely used...
Reconstruction of fragmented pieces is essential in archaeology, art conservation, and forensics. Digital automation in reconstruction reduces time complexity and yields interesting results. Questioned forensic documents can be machine-torn or hand-torn. Apictorial reconstruction of hand torn questioned document concentrates only on the shape of fragments and the algorithmic approach of Apictorial...
A novel technique is proposed for encryption and compression. Here an image is first encrypted using the stream cipher and then compressing the encrypted image using SPIHT. The panorama here stands for using the highly efficient encryption standard and unabating experience of compression techniques. The stream ciphers are chosen for their high encryption rate and they are mainly of bit-by-bit encryption...
This paper introduced a method for producing massive and immediate result in multi-join query (DAP Join, for short). Mostly previous research are based on single join operator while DAP join is based on multiple join operators. DAP join distinguishes itself from all previous techniques by concluding benefits of Hash Merge join, Rate Based Progressive Join and State Spilling and its own new approach...
Anti Torpedo Defense System (ATDS) is a very vast system with infinite geometrics and corresponding Tactical Solutions. Also, a few geometries do exist, where the Tactical Solution can never be arrived optimally. The Purpose of the system is to analyze the generated Tactical Solution which enhance the ships survivability against enemy Torpedo using the Optimal decoy deployment logic and maximizing...
One of the most important parameters to be studied in Wireless Sensor Networks (WSNs) is its life time. There are two typical data mining processes that support to reduce the energy consumption of WSNs is clustering and data summarization. Several energy aware, communication aware, coverage aware, data dissemination and data aggregation/sensor fusion protocols and algorithms have been specifically...
Parallel computing operates on the principle that large problems can often be divided into smaller ones, which are then solved concurrently to save time (wall clock time) by taking advantage of non-local resources and overcoming memory constraints. Merge sort is not only a fast and stable sort algorithm, but it is also an easy to understand and popular representative of the rich class of divide-and-conquer...
Many of the distributed environments like internets, intranets, local area networks and wireless networks have different distributed data sources. Inorder to analyze and monitor these distributed data sources specialized data mining technologies for distributed applications are required. A variety of distributed document clustering algorithms exists for this purpose. This paper presents an Enhanced...
Wireless sensor networks (WSNs) are widely used in many environments and adverse terrains. Location estimation of sensor nodes is still a crucial area of research because of new localization requirements. One of the main hurdles facing sensor localization in WSNs is accuracy. Many localization algorithms and techniques have been proposed to estimate the position of nodes. In this paper, we consider...
Regionalization is one of the major issues faced by spatial data mining while representing social and economic geography. The purpose of this paper is to develop a system that applies data mining techniques to study air quality distribution of Chennai, a metro city in India using vehicular networking and map the distribution to geographic locations for effective policy making. Three different hybrid...
Designing of Very Large Scale Integrated (VLSI) portable devices require less power, minimal time to market, high performance in order to achieve reliability and efficiency. The design constraints include speed, area and cost. Hence, the innovative techniques must optimize the above design constraints. In this work, a new approach is used to find the optimistic primary inputs, which is indirectly...
In this paper we proposed a steganography with maximum data, hiding capacity. In order to increase data hiding, 2D Anaglyphic stereography images are used for this process. The 2D Anaglyphic stereo input images of different colours and coloured filters in front of each eye allows only the appropriate image to pass. Some international standards body has decided that the right eye filter should he blue...
To represent very large or small values, large range is required as the integer representation is no longer appropriate. These values can be represented using the IEEE-754 standard based floating point representation. This paper presents high speed ASIC implementation of a floating point arithmetic unit which can perform addition, subtraction, multiplication, division functions on 32-bit operands...
The shape of an object displayed on-screen is specified by a collection of triangles, or micro-polygons. Micro-polygons are defined by the (x, y, z) co-ordinates of the three vertices. Rasterization uses the vertex locations of the micro-polygon to determine the co-ordinates of all the pixels covered by the micro-polygon on the display screen. A pixel is determined to be inside the micro-polygon by...
New improved methods for denoising Electrocardiogram (ECG) signal are proposed based on adaptive filter with Empirical mode Decomposition (EMD) and Ensemble Empirical mode Decomposition (EEMD). EMD and EEMD methods are used to decompose the ECG signal into intrinsic mode functions (IMF). Performance of traditional EMU based denoising methods improved by adaptively processing the IMF components which...
This paper presents a very low power and area efficient ASIC implementation of Advanced Encryption Standard Algorithm (AES). The implementation results of S-Box, MixColumn Transformation and overall AES encryption/ decryption are given in this paper. The AES has been implemented in 90nm standard CMOS library using Synopsys Design Compiler with a core voltage of 1.2V. The power dissipation of S-Box...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.