The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is important to characterize the noise accurately before including its structure in the formulations of algorithms. The distribution suggested in this paper is suitable for the ambient noise having kurtosis between 2.30 and 3. The ambient noise having low kurtosis is mainly dominated by shipping traffic which is having low frequency range.
The proliferation of XML based web services in the IT industry not only gives rise to opportunities but challenges too, Namely the challenges of security and a standard way of maintaining it across domains and organisational boundaries, OASIS, W3C and other organisations have done some great work in bringing about this synergy. What this paper looks in are some of the more popular standards in vogue...
Farming sector in India is highly un-organized, most of the systems followed are passed down through generations. We follow the extensive farming model which has low yield per hectare compared to intensive farming methods adopted by various western countries. To change this system we need experts with practical knowledge of farming, unfortunately we do not have that many personals and most experts...
This paper proposes a CMOS charge sharing dynamic latch comparator along with the Buffer stage in 130nm and 90nm technologies. The supply voltage for this comparator is 1.3v and 0.9v for 130nm and 90nm respectively. Various analysis of different characteristics of the comparator such as offset, ICMR, propagation delay, power dissipation has been carried out in both the technologies and the result...
In this paper a CMOS Differential current sensing comparator along with the Buffer stage has been introduced. The simulation is carried out in 130nm and 90nm technologies. The supply voltage for this comparator is 1.3v and 0.9v for 130nm and 90nm respectively. Various analysis of different characteristics of the comparator such as offset, ICMR, propagation delay, power dissipation has been carried...
Contents in image repository are highly complicated and semantically unknown. The image annotation task is categorized as classification of low-level or atomic concepts and classification of high-level concepts in a domain-specific ontology. The Semantic Web is an extension of the current web in which information is well-defined that acts as an interface between system and people for performing information...
In the 21st century network security is rated as one of most demanding domain in computer science and engineering where numerous organizations and researchers are giving their contribution to enhance the existing network security framework in various ways. This paper is aimed at discussing about the enhancement of firewalls policies in the network. The network security and firewalls are two words...
With the development of economy urbanisation and technology it is necessary to design intelligent energy saving lighting systems [2], and efficient power management on ATM counters. The information of pedestrians and the ATM users are sensed by the pyroelectric infrared sensors. The sensors are placed on the door pole, thus the selection and installation of sensors are directly affect the control...
Harmonics are a major source of pollution in power system networks. These harmonic current and voltage are to be estimated with great accuracy. Several methods exist for the estimation of harmonic voltage magnitude like FFT, FIR filters etc. But these methods have a common drawback of requiring high sampling frequency and difficulty in making them adaptive. Adaptive Comb filter is a potential solution...
Biometric palmprint identification is a technology used for identification and verification of palmprints using image acquisition, preprocessing, feature extraction and template matching. Even though the existing palmprint authentication systems have several advantages, there exist many disadvantages such as less accuracy, computational complexity, implementation expense, high resolution and storage...
This paper proposes a steganography method using the digital images. Here, we are embedding the data which is to be secured into the digital image. Human Visual System proved that the changes in the image edges are insensitive to human eyes. Therefore we are using edge detection method in steganography to increase data hiding capacity by embedding more data in these edge pixels. So, if we can increase...
Internet Protocol version 6 (IPv6) is a new generation protocol that is designed to solve the issues which arises in IPv4. The introduction of IPv6 may pose additional security risks and give potential vulnerabilities in addition to those which are provided by IPv4. This paper analyzes the security vulnerabilities exist, network security improvements and implementation, and the distributed security...
Microstrip patch antenna has small size, low cost, easy in construction and provides high performance over wide band of frequencies. Here, a new approach for designing a very small size bow shaped microstrip patch antenna has been proposed. The proposed bow shape microstrip patch antenna having Benzocyclobutene as a substrate has good resonant frequency (4.35 GHz). Also, the size is reduced more than...
. Wireless communication technology has proven to be one of the fastest and most widely used throughouttheworld. Eventhoughantennasaresatisfyingtherequirementsofusersinwirelesserabutstillthe challengeofreducingthedimensionsfurtherandenhancingtheperformanceneverendsandthispaperaimsto presentsanimprovementincommunicationtechnologybyreducingthesizeandincreasingtheperformance using sierpinski carpet antenna...
Wireless sensor network is a self-configured, infrastructure less wireless network consisting of a large number of sensor nodes equipped with specialized sensors that can monitor various physical attributes such as temperature, pressure, vibration and sound. WSN relies on hardware simplicity to make sensor field deployments both affordable and long lasting without any maintenance support. Security...
A turbo block code (TBC) technique for improving the performance of a multi-carrier code division multiple access (MC-CDMA) system in terms of bit error rate (BER) is proposed in this paper. The objective of this work is to develop a coding scheme that generates low BER code-words. By implementing a time domain TBC, designed using powerful low density parity check (LDPC) code, the BER performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.