The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A software birthmark is a set of characteristics extracted from an executable program. It is difficult to remove by modifying the program binary and is specific enough to distinguish it from other programs. Software birthmark techniques are used to detect program theft by determining the similarity between two different programs. In this paper, we propose a software birthmark based on a graph-based...
Computer recognition of the human faces has evolved as the most successful and demanding field in the computer science world and in particular Computer Vision. A lot of research work has been done in this field in the last two decade. Numerous algorithms have been projected and they have been experimented with different face image database available. In this paper, a comparative study has been carried...
Grey relational analysis (GRA) is part of grey system theory and suitable for solving the problems with complicated interrelationship between the multiple factors and variables. The State ranking scheme of power transformer based on dissolved gas-in-oil analysis characteristically recognized as grey system. In this paper, key gas method of DGA is used for state assessment of power transformer. The...
Morphological analyzer is a tool which identifies and analyzes the internal structure of given word and also gives the morphological and grammatical information associated with the given word. Kannada is an inflectional, derivational, agglutinative and morphologically very rich language. Developing a well-fledged morphological analyzer (MA) for Kannada is a challenging task. In this paper, a hybrid...
Cloud Computing is based on virtualization; it provide users pay-per-use computing resources by internet without managing infrastructure. With the increase demand of Cloud more and more attention is given to energy consumption and power saving of Cloud data centres. Energy savings can be achieved by continuous consolidation of VM's according to current utilization and thermal state of computing nodes...
Energy efficiency is an imperative design consideration in wireless network due to the inadequate battery life of mobile terminals. Next to power management techniques, a considerable investigation needs to be dedicated on low-power routing algorithmic design to augment the energy efficiency of such systems. This work demonstrates an efficient and low-power design in ad-hoc networks with required...
In software industry, there has been a significant focus shift from sequential waterfall model to iterative agile/scrum methods to continuous lean software development in the last several years. Traditional waterfall model is the dominant project management para-digm, agile methodology is direct response to waterfall model, and lean is recent one. In practice, when software companies make an attempt...
This paper presents a rate control algorithm for H.264 Scalable video codec, based on an independent rate control (IRC) scheme for spatial scalable layers. An independent bit allocation scheme was targeted for the impact of spatial scalable layer on bit budget achievements. For each spatial layer, the target bits for the current basic unit is a function of budget allocation for current Group of Pictures...
The challenging task in the field of Document Image Analysis is automatic recognition of handwritten characters present in a scanned document. The recognition of characters in a document is achieved by Optical Character Recognition (OCR) system. In this paper, a hybrid feature extraction technique is proposed for recognizing handwritten Kannada characters. The proposed technique uses the local and...
This paper describes the design and development of a 50W Electronics Power Conditioner (EPC) using planar power magnetics on a multilayer printed circuit board. The EPC outputs are selected as per the power requirement of Ku-Band SSPA Transmit Module for space applications. The main power converter is designed with forward topology using active clamp reset technique. Magnetic feedback technology with...
Intel 8051 microcontroller based capacitance meter has been developed based on the time lag involved in charging and discharging the capacitor. The value of the capacitance is shown using a LED interface. Continuous and precise measurement required for a two phase flow sensor is obtained using the PC connected via RS-232 interface. The instrument covers a range of 0.0125 pF to 1000uF with a resolution...
A new wireless networking paradigm for mobile hosts is Adhoc network. These networks have prompted the development of an alternative way for mobile device communication in which each node communicates with each other over wireless without the support of an infrastructure, forming a Mobile Adhoc Network (MANET). VANET (Vehicular Adhoc Net-work), a subset of MANET is a network in which vehicles can...
Routing has always been one of the key challenges in mobile ad hoc networks. Ad hoc networks prefer reactive routing over proactive routing due to the rapid changes in nodes position. Geographic position based routing is a convenient method to route a packet from a source to a destination based on the local information alone. Geographic forwarding implements a greedy routing technique that selects...
In this paper, we propose a method of genetic algorithm (GA) for information retrieval (IR) based on Singular Value Decomposition and Principal Component Analysis. The main difficulty in GA based IR system is processing of high dimensional input strings, as affects the performance in terms of retrieval time. In proposed work, we tried to reduce the high dimensional input data to low dimensional in...
Clustering is unsupervised learning method to extract hidden patterns and disciplines. Swarm intelligence deals with natural and artificial systems composed of many individuals that coordinate using decentralized control and self-organization. In this paper, we propose a new Swarm Intelligence based hybrid method for data clustering. The main difficulty in clustering is the numbers of resulting clusters...
This paper presents an integrated offline testing of Single-Fault detection technique for the micro-fluidic based biochips and also diagnosis of single defects in order to achieve higher throughput and less time complexity of the execution process. In the field operation, this is to be used to increase chip dependability and reusability. In this paper, a pipelined technique is presented to traverse...
Faults in biochips degrades the performance of the biochips. This paper describes a new multiple fault detection technique for digital micro fluidic based biochips. The microfluidic based biochips are most important revolutionizing laboratory procedures use at a vast scale, e.g., bio sensing, clinical diagnostics etc. Due to mixed energy domains this micro fluidic based biochip exhibits unique failure...
High packing density increases the power consumption and consequently may increase the power density of the VLSI circuit. As heat generation is proportional to the power density, chip temperature increases with the increase of the power density. Again as area increases, power density decreases i.e, power density will be least when area will be maximum and power will be minimum. So, there is a trade...
Wireless Sensor Networks (WSNs) need effective security mechanisms because these networks deployed in hostel unattended environments. Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.