The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multiplier is the most commonly used circuit in the digital devices. Multiplication is one of the basic functions used in digital signal processing. Most high performance DSP systems rely on hardware multiplication to achieve high data throughput. There are various types of multipliers available depending upon the application in which they are used. Full adder is the main block of power dissipation...
Speech recognition system is the method of implementing protocols and codes to enable a machine to take sound waves in the form of input, interpret it and formulate the desired output. In this paper, a method has been proposed to build up a speech recognition system which could interpret in any language (tested with Hindi and Bengali language) and implement it on Windows 7 platform which could be...
Different applications over the Internet uses Web Services to help them for better communication. Using encryption techniques, these applications can send any type of information to each other. W3C recommends MTOM (Message Transmission Optimization Mechanism) as the standard for transferring binary files as an attachment to SOAP messages. The basic feature of MTOM is that it does not break the XML...
The Gesture Replicating Robotic arm is a servo controlled robotic arm which replicates gestures in a three dimensional environment. It makes use of cameras which detect the motion of one's hand in three dimensions. The cameras provide frames as input to the software which performs segmentation algorithms like background subtraction, color detection and contour detection. Pixel to angle mapping gives...
The paper analysis the existing onboard ship system, shore-based system and the infrastructure of navigation and communication, and introduces the framework of e-Navigation system, based on which, the ship pilot system was developed. Multi-resolution remote-sensing image, geographical spatial data such as IHO-S57 international standards electronic chart, and AIS, 3G, real-time current observation...
Cloud computing is a grid based application which eases "On demand network access to a shared pool of computing recourses". This environment strives to be secure, scalable and customized with guaranteed Quality of Service (QoS). However, QoS is guaranteed through fulfillment of non-functional requirements like Security, Scalability, Mobility and Virtualization in Cloud computing System....
The most popular form of user authentication is the text password, which is the most convenient and the simplest. Users mostly choose weak passwords and reuse the same password across different websites and thus, a domino effect. i.e., when an adversary compromises one password, she exploits, gaining access to more websites. Also typing passwords into public computers (kiosks) suffers password thief...
With the integration of cloud computing, smart phones enormously improved in processing power, storage, communication efficiency, and reliability. The technical architecture of Cloud strongly supports the efficient delivery of services in mobile environment. Whereas the mobile cloud users can access all the resources as a service dynamically in elastic mode. Accessing Digital Intellectual Property...
Intrusion detection is one of the major research problems in network security. It is the process of monitoring and analyzing network traffic data to detect security violations. Mining approach can play very important role in developing an intrusion detection system. The network traffic can be classified into normal and anomalous in order to detect intrusions. In our paper, top-ten classification algorithms...
The worldwide rapid expansion of computer networks and ever growing dependence of organizations on network based information management have led to serious security concerns. Among other security threats network intrusion has been a major concern which requires considerable attention in order to protect the information resources that are accessible via network infrastructure. Though different intrusion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.