The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Long Term Evolution (LTE) receiver processing involves decoding of complex valued received symbols from each antenna port to detect the codeword sent by the transmitter. The main objective of this paper is to design and implement the receiver hardware architectures for the control channels, PCFICH (Physical Control Format Indicator Channel) and PHICH (Physical Hybrid ARQ Indicator Channel) using fixed...
Search engines have always played an important role in helping web users to rapidly find information on the Web. However, their function is limited to returning a list of query relevant documents with reasonably good precision, but huge recall. The task of actually processing the returned documents to get the required information is the responsibility of the user. In recent years, Question-Answer...
Generally, feature-based image watermarking uses the local image features present in an image. The invariance of the features is exploited for achieving robustness against attacks, but the leakage of information is often unconsidered. Here an image adaptive watermarking approach is proposed which uses invariant feature regions for enhancing the robustness and security. Feature regions are determined...
System security has become significant issue in many organizations. The attacks like DoS, U2R, R2L and Probing etc., creating a serious threat to the appropriate operation of internet services as well as in host system. In recent years, intrusion detection system is designed to prevent the intruder in the host as well as in network systems. Existing host based intrusion detection systems detects the...
Cloud Computing is the delivery of computing as a service, which is specifically involved with Storage of data, enabling ubiquitous, convenient access to shared resources that are provided to computers and other devices as a utility over a network. Storage, which is considered to be the key attribute, is hindered by the presence of redundant copies of data. Data Deduplication is a specialized technique...
Vehicular ad hoc networks are a subclass of wireless networks in which vehicles on the road act as nodes, exchanging traffic and road safety information. The traditional MANET specific routing protocols is not as effective in VANET environment. The occurrence of link breakage is very frequent in VANET when compared to MANET due to the swift movement of the vehicles. Hence, this highly dynamic behaviour...
In wireless ad hoc networks, Quality of Service (QoS) can be obtained efficiently using the power control scheme. Power control can be achieved by incorporating cooperation among the available links. In this paper, we propose an adaptive pricing scheme that enables the nodes in the networks to determine the maximum allowable power that can be used for transmission of data within the networks so as...
Automated Condition Monitoring (ACM) of rotating machines is necessary to avoid sudden machine breakdown due to wear and tear of Rolling Element Bearings (REBs). Hence, detecting faults in REBs well before machine outage is important. The aim of the proposed system is to develop a prototype to detect mechanical wear, by capturing acoustic signals with frequencies between 20 Hz to 20 kHz, from the...
In Cognitive Radio network, the Secondary Users (SU) makes use of the spectrum of licensed primary user when they are unoccupied. Here we have studied and expressed the normalized throughput for both single secondary user and multiple secondary users coexisting under cooperative sensing technique. We have also incorporated the consequences due to imperfect sensing and analyzed the throughput under...
Denial of service attack in computing involves blocking of resources to particular user. This kind of blocking may be temporary or indefinite blocking to access web server in the network. This attack is usually done by a victim web server. Distributed denial of service attacks is given by more than two web servers. The flood of incoming network flows to the victim web server forces it to shut down...
The Optimized Link State Routing is a proactive link state routing protocol for Mobile Ad hoc Network. The Multipoint Relays nodes which are one-hop neighbors are used as a means for flooding of control and traffic messages into the network. The RFC 3626 does not consider the security issues. The secured OLSR framework consists of security module which provides the security with minimum overhead....
Mobile Cloud Computing has emerged as a promising technology and its application is expected to expand its features in storing personal health information, e-governance and others. Although data security and privacy have been the major concern to the users. These issues originated from the fact that the cloud is a semi-trusted environment and the sensitive information stored in the cloud can be accessed...
Most of the real world applications use data clustering techniques for effective data analysis. All clustering techniques have some assumptions on the underlying dataset. We can get accurate clusters if the assumptions hold good. But it is difficult to satisfy all assumptions. Currently, not a single clustering algorithm is available to find all types of cluster shapes and structures. Therefore, an...
In real time biometric based authentication environments, wavelet based functions are widely incorporated as one of the promising methods for feature extraction of biometric traits. In this paper, we propose a novel finger knuckle print (FKP) recognition technique based on Haar-Wavelet Transform (HWT). Haar - Wavelet transform is used to transform the original knuckle image into a subset of its feature...
Neural Network making use of Radial Basis Function (RBF) in the hidden layer maps the input of a lower dimension to a higher dimensional space in order to make the input linearly separable. The traditional RBF model is normally referred as cognitive component. The major issues in the traditional model are large number of fixed neurons, use of complete training set, prior center selection etc,. These...
Detection of spam twitter social networks is one of the significant research areas to discover unauthorized user accounts. A number of research works have been carried out to solve these issues but most of the existing techniqueshad not focused on various features and doesn't group similar user trending topics which become their major limitation. Trending topics collects the current Internet trends...
This paper focuses on the design and working of a microcontroller based Adaptive Headlight System (AHS) for automobiles. The main purpose of this system is to present a cost effective technique to illuminate blind spots while driving in the night and during the times when the visibility is reduced significantly so as to make the objects visible in those darkened locations and thereby prevent accidents...
Flash-memory-based solid-state disks (SSDs) provide faster random access and data transfer rates than electromechanical drives and today it can often serve as rotating-disk replacements, but the host interface to SSDs remains a performance bottleneck and also I/O subsystem causes unnecessary latencies, translations in the Read/Write commands. In order to completely utilize the performance of SSDs...
As technology improves day by day communication and browsing has become very much easier. However lots of information floods over the internet every moment thereby confusing the user as to select what or make decisions. To assist the user in identifying their interests and provide suggestions, recommendation systems came into existence. These systems filter the necessary content from large volumes...
Weather forecasting is an important application of science for planning our day to day activities. Weather predictions are used in agriculture, air traffic, marine, forestry, severe weather alerts and advisories, military applications and utility companies. The weather forecasting information is provided by various systems with different formats and parameters. As the weather forecasting data are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.