The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the era of big data, the applications generating tremendous amount of data are becoming the main focus of attention as the wide increment of data generation and storage that has taken place in the last few years. This scenario is challenging for data mining techniques which are not arrogated to the new space and time requirements. In many of the real world applications, classification of imbalanced...
Technical support service providers receive thousands of customer queries daily. Traditionally, such organizations discard the data due to lack of storage capacity. However, value of storing such data is needed for the better results of analysis and to improve the closure rate of the daily customer queries. Data mining is the process of finding important and meaningful information, patterns through...
Translation of English documents into Hindi language is becoming an integral part for facilitating communication. The major population of India where 366 million people uses Hindi as primary language, for them providing information in Hindi is an important task the translation of English documents may be manually or automatically. When translation done manually the chances are rare for errors, but...
One of the major causes of vision loss is Diabetic Retinopathy (DR). Presence of Hard Exudates (HE) in retinal images is one of the prominent and most reliable symptoms of Diabetic Retinopathy. Thus, it is essential to clinically examine for HEs to perform an early diagnosis and monitoring of DR. In this paper, a classification-based approach using Functional Link Artificial Neural Network (FLANN)...
Network of things is expanding day by day, with that security, flexibility and ease of use became concern of the user. We do have a different technique to full fill user's demands. Some of them are: Single Sign On (SSO), Cryptography techniques like RSA-VES, Serpent etc. In this paper an effort is made to provide all mentioned facilities to the user. Single Sign On (SSO) authorizes user only once...
This article compares the Bit Error Rate (BER) performance of soft and hard decision decoding algorithms of LDPC codes on AWGN channel at different code rates and Signal to Noise Ratio (SNR) levels. Even though, hard decision decoding algorithm is computationally simple, its BER performance is not appreciable. Devising soft decision decoding algorithms which are simple and good in BER performance...
This paper proposes a new dynamic packet scheduling scheme which guarantees the delay and jitter properties of differentiated services (DiffServ) network for both real time and non-real time traffics. The proposed dynamic packet scheduling algorithm uses a new weighted computation scheme known as dynamic benefit weighted scheduling (DB-WS) which is loosely based on weighted round robin (WRR) or fair...
Nearly 70% of the earth is surrounded by water; hence it is appropriate to use underwater sensor networks to enable oceanographic research. In case of UWSN radio waves are not suitable for communication as propagation capability of radio waves is very poor in under water. Hence UWSN uses acoustic signals for communication. The transmission speed of acoustic wave is less than the transmission speed...
This paper deals with the study of the control mechanism and the practical application of electrical appliances using an android phone in a Zigbee network. The system measures the voltage and current parameters of electric devices and thus helps to view the power consumed. The proposed system is a flexible system which provides an efficient and effective control mechanism from a remote location. The...
Authentication is one of the important security aspects to secure the critical or sensitive information in a system. The authentication system must allow only the authorized users to access the critical information. So it must be strong enough to identify only the valid users and at the same time it should be user friendly. There are many authentication systems designed and used, but most commonly...
Time series analysis is one of the major prediction techniques for forecasting of time dependent variables. These days the time series analysis is applicable to a variety of applications. In this work the time series analysis technique using ARIMA model is applied on per capita disposable income for future forecasting. Per capita disposable income is the average available money per person after income...
In cloud computing scenario, efficiency of application execution not only depends on quality and quantity of the resources in the data center, but also on underlying resource allocation approaches. An efficient resource allocation technique is necessary for building an efficient system. The objective of this work is to propose an agent based Best-Fit resource allocation scheme which increases utilization...
Cloud computing systems host most of today's commercial business applications yielding it high revenue which makes it a target of cyber attacks. This emphasizes the need for a digital forensic mechanism for the cloud environment. Conventional digital forensics cannot be directly presented as a cloud forensic solution due to the multi tenancy and virtualization of resources prevalent in cloud. While...
In this paper a novel and enhanced version of Modified Decision Based Unsymmetric Trimmed Median Filter (MDBUTMF) have been proposed for removing high density impulse noise from images. The MDBUTMF algorithm fails at high density noise. Hence a new algorithm is presented to remove high density noise. Histogram estimation technique is used to decide whether the processing pixel is noisy or noise free...
In a Wireless Sensor Networks (WSNs) the sensor nodes are placed in an environment depending on the applications where secure communication is in high demand. To ensure the privacy and safety of data transactions in the network, a unique identification for the nodes and secure key for transportation have become major concerns. In order to establish a secure communication channel in the network, care...
In the world of image processing domain, removal of high density impulse noise is always a prominent area for research. In this paper, an efficient Modified Decision based unsymmetric trimmed median filter algorithms for the removal of impulse noise has been proposed with color images rather than gray scale images by separation red- green- blue plane of color image. The performance of the system is...
Mobile application developers and users can feel a direct advantage within mobile based cloud computing for overcoming the inherent constraints present in mobile devices - be it battery life, memory space or processing power. However, ubiquitous adoption of programmable smart mobile devices and connecting them to unsecured public domain of Internet raises newer privacy and security challenges across...
The field of Network Centric Warfare seeks to use information technology in order to gain competitive advantage over the enemies during war. An essential part of network centric warfare deals with the firing of highly destructive weapons. It includes the determination of exact direction of firing the weapon so as to successfully destroy the target for a given unguided shell. This can be done using...
Session Initiation Protocol is an IP based signaling protocol used for establishing, modifying and terminating sessions. During the signaling process, both the peers may initiate similar or controversial signaling messages resulting in Race / Glare conditions. SIP protocol handles glare conditions by transmitting the signaling messages after a random interval of time, within a specified time range...
Voltage pulse or current pulse can be used as the main monitoring parameter of the sparks that occur in micro electrical discharge machining (μEDM) process. The spark gap should be monitored for many purposes including study of material removal characteristics, which can be followed by tool wear monitoring and compensation. The system which fulfils the requirements of monitoring spark gap by using...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.