Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents, copyright statements, title-page or half title-pages, blank pages, venue maps or other general information relating to the conference that was part of the original...
The growth of E commerce has led to the abundance growth of opinions on the web, thereby necessitating the task of Opinion Summarization, which in turn has great commercial significance. Feature extraction in Opinion Summarization is very crucial as selection of relevant features reduce the feature space which successfully reduces the complexity of the classification task. The paper suggests extensive...
Ciphertext-policy attribute based encryption (CP-ABE) is becoming very significant in distributed computing environment. Distributed computing environment is very popular way of storing and distributing information, because it is easy to store some information at one place and distribute the information from there. In CP-ABE scheme, every information is encrypted under an access structures, this access...
Network-on-Chip (NoC) is a new approach for designing the communication subsystem among IP cores in a System-on-Chip (SoC). NoC applies networking theory and related methods to on-chip communication and brings out notable improvements over conventional bus and crossbar interconnections. NoC offers a great improvement over the issues like scalability, productivity, power efficiency and signal integrity...
As technology improves, it is possible to integrate more number of transistors on a single die, which means it is possible to design any complex system on single chip. The networking in such system is very difficult as compared to less complex systems one which uses switching and bus technique. In order to overcome this, a special networking technique is used which is Network on Chip. In this paper,...
Magnetic field effects the charge transport in quantum dot. The grain(quantum dot) I–V characteristics are subject to change due to magnetic field, extent of variation in the Quantum Dot I–V characteristics is function of magnetic field strength, size and type of the Quantum Dot. We present the study of the I–V characteristics of the grain in non-equilibrium and steady state conditions in a magnetic...
A rapid growth and development of life styles as well communicating media in recent years have changed considerably and called as information age. In this information age lot of changes were taken place in all domine like speed, data capacity, and distance of communication due to the development. Also hacking, tracing communicating bodies are also in place. The news channels and cameras are playing...
Now-a-day's monitoring the objects (human beings, animals, buildings, vehicles etc.,) in a video is a major issue in the areas such as airports, banks, military installations etc., Classification of objects in a video involves the process of searching, retrieving and indexing. This process is implemented by extracting the features such as color, texture and shape. This technique is difficult but it...
Now-a-days large amount of data is generated from various stake holders such as data from sensors and satellites regarding environment and climate, social networking sites about messages, tweets, photos, videos and data from telecommunications etc. This big data, if processed in real-time, helps decision makers to make timely decisions when an event occurred. When source data sets are large (velocity,...
Vehicular Ad-Hoc Networks is an ad hoc network connecting mobile vehicles which possess dynamic topology thus low link stability in terms of connectivity. The critical concern in ad hoc routing is routing which is handled via various routing solutions. This paper focuses on improving the I-AODV routing by considering V2V and V2I communication. The I-AODV (Infrastructure based AODV) is routing protocol...
The advancement of wireless communication leads researchers to conceive and develop the idea of vehicular networks, also known as vehicular ad hoc networks (VANETs). In Sybil attack, the WSN is destabilized by a malicious node which create an innumerable fraudulent identities in favor of disrupting networks protocols. In this paper, a novel technique has been proposed to detect and isolate Sybil attack...
Heuristic redundancy optimization with ST (Source-Terminal) reliability measure for complex network; an extensively studied problem has been modified to heuristic redundancy optimization with SAT (source to all terminal) reliability measure.
Computer based automated system is one of the important diagnostic tools in medical field. Diabetic Retinopathy is an eye disorder in which red lesions due to blood leakages can be spotted on retinal surface. This disease is commonly observed in long term diabetic patients. Ignorance to this disease can result into permanent blindness. Early stage signs of diabetic retinopathy are called as Red lesions...
In sensing it's the ad-hoc sensor and data routing which is an important research direction. Security work is prioritized in this area and focusing primarily at medium access control or the routing levels on denial of communication. Attacks focusing on routing protocol layer are known as resource depletion attacks in this paper. This attack impacts by persistently disabling the network and causing...
An effective content-based image retrieval system is essential to locate required medical images in huge databases. This paper proposes an effective approach to improve the effectiveness of retrieval system. The proposed scheme involves first, by detecting the boundary of the image, based on intensity gradient vector image model followed by exploring the content of the interior boundary with the help...
The main purpose of optimization of relay coordination in an extensively large electrical network is to enhance the selectivity and at the same time reducing the fault clearing time to improve reliability of the system. The relays provided are set to function properly in normal as well as abnormal condition. In this paper; the main focus is to find out minimum Time Dial Setting (TDS) for the relays...
In the Twenty First Century wireless communication being used like essential communication mean for data transfer, video streaming & multimedia applications. To use buoyant application fit for such growing demand for data transfer in smart phones latest technology is being searched. To satisfied such demand; two hop Orthogonal Frequency Division Multiple Access (OFDMA) relay network are being...
A sincere and ingenious effort has been made towards addressing the localization problem in the modern world by marrying the primary and well established inter-vehicular communication assisted localization (IVCAL) using GPS method to newly devised previous path detection (PPD) technology. The outcome is a new robust methodology combining the two systems standalone benefits of absolute and relative...
Cognitive Radio networks (CRNs) implement dynamic spectrum sensing and management techniques to address the underutilization of limited available spectrum in wireless networks. Both dynamic and opportunistic spectrum sensing techniques are frequently used by the cognitive radios (CRs) to identify the spectral holes in licensed spectrum of the primary users (PUs) and allocate these bands to the unlicensed...
Green computing is the environmentally responsible use of computers and related resources. Such practices include the implementation of energy-efficient computing solutions. Multi-core and General Purpose Graphics Processing Units (GPGPUs) computing has become trend of high performance processors and energy efficient computing. Video processing technique like moving object detection which is a computationally...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.