The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The technical adoption of optical network is gaining a fast pace to accomplish the internet connectivity in a larger geographic region. The system has proved to be one with effective utilization as photons are used to carry a massive bundle of data packets, something which cannot be done in a conventional networking system which exists today. Significant amount of research attempt have been done to...
This paper presents the 3rd Generation Partnership Project-Long Term Evolution (3GPP-LTE) [10] HandOver (HO) administration to minimize target Femto Access Points (FAPs) list amid macro-to-femto and femto-to-femto handover. HandOver is the procedure that transfer an ongoing call from one cell to another as the users move through the coverage area of cellular system. The femtocell covers a little scope...
Automation testing is efficient and less time consuming as compared to manual testing. Automation testing does not require human intervention to execute the test steps. Test automation tools remarkably reduce human efforts. Automation testing reduces errors. It eases the procedure and is faster than manual testing. Manual testing results in delay of the release. It affects the financial growth of...
The Hierarchical Chinese postman problem is a special type of Chinese postman problem. The aim is to find a shortest tour that traverses each edge of a given graph at least once. The constraint is that the arcs are partitioned into classes and a precedence relation orders the classes according to priority. Different forms of the HCPP are applied in real life applications such as snow plowing, winter...
Dynamic Partial Reconfiguration (DPR) is an efficient technique in terms of power, resources and performance in order to achieve varying user requirements. In this paper we have identified various modes of operation of electronic stethoscope and also studied several existing implementations. We propose a Dynamic Reconfigurable Design for the multi-mode electronic stethoscope with five operational...
The area of underwater acoustic sensor networks (UWASN) is developing expeditiously as it shows a major aspect in various military and civilian practices, such as avoidance of disaster, diplomatic vigilance, seaward analysis, environmental monitoring, oceanographic data collection and mine reconnaissance. There are numerous challenges in UWASN posed by underwater acoustic propagation channel, which...
SQL Injection (SQLI) is a quotidian phenomenon in the field of network security. It is a potent and effective way of intruding into secured databases thereby jeopardizing the confidentiality, integrity and availability of information in them. SQL Injection works by inserting malicious queries into legal queries thereby rendering it increasingly arduous for most detection systems to be able to discern...
Security is the main concern in today's wireless network environment. However, cipher algorithms consume a lot of resources to provide the required confidentiality. Ad-Hoc wireless networks are one area where the devices are extremely resource constrained. Therefore computationally simple yet cryptographically strong cipher algorithms are required for such kind of networks. In this paper a light weight...
The vision of Internet of Things (IoT) is to enable devices to collaborate with each other on the Internet. Multiple devices collaborating with each other have opened up various opportunities in multitude of areas. It has presented unique set of challenges in scaling the Internet, techniques for identification of the devices, power efficient algorithms and communication protocols. Always connected...
Crop yield prediction is important as it can support decision makers in agriculture sector. It also assists in identifying the relevance of attributes which significantly affect the crop yield. Wheat is one of the widely grown crops around the world. Its accurate prediction can solve various problems related to wheat farming. This work analyses how yield of a particular crop is determined by few attributes...
This paper illustrates the application of a Hybrid Quantum Inspired Evolutionary Algorithm (HQIEA) in evolving a variety of Quantum equivalents of classical circuits. Taking the matrix corresponding to an oracle as input, this HIQEA designs classical circuits using quantum gates. A library consisting of single, two and three qubit Quantum gates and the desired circuit matrix were given as input and...
Microarrays store gene expression data of each cell; thereby microarray contains thousands of features. Each row represents gene samples and each column represents conditions. In any classification task, selection of irrelevant or redundant features greatly reduces the performance of classifier. Therefore, selection of optimal number of significant features is a major challenge for any classification...
This research work carried on GI/Geo/1/K queue with N threshold policy. The server resumes it service when the number of consumers in the queue reaches a pre-specified value N. This article describes modeling and detail analysis on the above mentioned model. The arbitrary and prearrival epochs probabilities are being obtained for the steady state distribution. The distribution of the waiting time...
In today's HPC world, numerous applications executed with high speed. The multi core architecture has provided a wide scope of exploration towards any kind of high-end applications. The paper gives an analogy on ability to handle the high-end input triggers by managing the core utilities at the lower end of the computer. The optimized way of memory block utilization, debugging proliferation and data...
In cognitive radio networks (CRNs), the unlicensed nodes opportunistically access the unutilized spectrum that is owned by licensed nodes. The article presents a fuzzy logic based spectrum handoff and assignment approach that enhances the channel utilization and avoids frequent channel switching. The approach considers interference as well as bit error and signal strength in order to find quality...
Software testing is a process which is used to examine the correctness and quality of a computer software. Software testing is important to point out the defects and errors that are made during software development and to ensure that the developed software works fine in the real environment with different operating systems, devices, browsers and concurrent users. Making reliable software applications...
Relay technologies have been studied and considered in the standardization process of the next generation of MIMO system, such as LTE 8, Advance LTE 10, IEEE 802.16e, IEEE 802.16m. Presently two wireless technologies, WiMAX and LTE both based on IEEE standard, are two rival technologies, nevertheless, are technically very similar but deployment is differ. This paper introduces and compares features...
Web Services are emerging technologies enabling machine-machine communication and services reuse over Web. They have an innovative mechanism to render services over diversified environments. Semantic web services are reusable, self-contained software components, to be used independently to fulfil needs or combined with other web services for carrying out complex aggregation through web services composition...
This paper presents HDL implementation of Kalman Filter. Kalman Filter is a mathematical tool, which uses sequence of noisy measurement taken over time to predict unknown state vector parameter. In this paper implementation in HDL has been done using new method that is chebyshev inversion method. The approach of new method is for reducing hardware and complexity. Kalman Filter has very complex matrix...
The existing System on Chip (SoC) design will soon become a critical bottle neck in chip performance with its inability to scale its communication network effectively with decreasing feature sizes and increasing number of transistors. The Network on Chip (NoC) has been recognized as the next evolutionary step to tackle these issues by using an intelligent and common communication network between all...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.