The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper a multiband fractal based rectangular microstrip patch antenna is designed. FR4 substrate having thickness of 1.58 mm is used as substrate material for the design of proposed antenna and microstrip feed line provides the excitation to the antenna. The antenna operating frequency range is from 1 to 10 GHz. The proposed antenna resonate at twelve different frequencies as 1.86, 2.33, 3...
Cryptography is defined as the practice and study of techniques for secure communication in the presence of third party attackers. It is a good way to protect sensitive information. Over the years, the need to protect information has increased. Confidentiality is of utmost importance. Complete protection of information is not an easy task. In this paper, a method is proposed that consists of three...
De-facto storage model being used by health-care information systems is Relational Database Management Systems (RDBMS). Albeit relational storage model is mature and widely used; they are incompetent to store and query data encompassing high degree of relationships. Health-care data is heavily annotated with relationships and hence are a suitable candidate for a specialized data model - Graph databases...
In this paper we propose an integrated test environment for combinatorial testing and discuss its realization at macro level. We describe the entities that make up the integrated test environment and their interaction, high-lighting the combinatorial test aspects. The proposed environment can be used for the automated as well as manual testing. Test tools supplied by research institutions and commercial...
Hybrid fractal multiband antenna is designed using Koch and meander geometry and its characteristics are investigated. The proposed antenna helps to achieve multiband behavior due to its multiple resonance characteristics. It has planar structure, compact size and suitable for wireless applications. IFS approach has been used to obtain the hybrid structure using MATLAB and scripting method of HFSS...
World-wide interoperability for Microwave Access (WiMAX) is a wireless metropolitan area networks (WMANs). Routing and multimedia application plays an important role in the WiMAX networks. In this study, the main focus is on analyzing and comparing the different routing algorithms such as AODV, DYMO, DSR, Bellman-Ford and Fish-Eye for the WiMAX networks. We have considered few QoS parameters such...
Multipliers are the major contributors to the overall throughput in most SoCs. Vedic arithmetic is a novel and simplified approach to perform complex operations. Any good design must be targeted for optimal Speed-Area Trade-off. Commercial application demands reliable and economical design which makes testability an important parameter. Stuck-at-fault model for the design is to be developed and proper...
This research work focuses on to the development of neural network based detection and characterization of electrocardiogram (ECG) and electroencephalogram (EEG) signal. ECG and EEG signals have prime importance for patients under critical care. These signals have to be continuously monitored and processed as they are inter dependent. In this research Dyadic wavelet transform (DyWT) is used to process...
Nowadays extra attention is being paid to budget management. Including sales marketing sectors, where sales agents have to spend budget wisely and find prospective clients. This paper presents an architecture based on SAP HANA framework a powerful database platform that takes advantage of large main memory and extensive parallel processors, identifies prospective clients based on fuzzy item set approach...
This paper presents a novel method of zooming binary images. An algorithm that utilizes zooming techniques and represents large-dimension 2D binary images on miniature monochrome display screens is presented. An effort has been made to put the display screen to best use for representing the images on such displays by implementation of the zooming techniques very frequently required in microcontroller...
Mobile ad hoc network (MANET) is a decentralized communication network‥ In MANET during real time traffic multicasting, there is increased energy consumption and delay. In order to overcome this issue we propose to design Node connectivity, Energy and Bandwidth Aware Clustering Routing Algorithm. An efficient ENB cluster head selection algorithm [1] based on the combination of important matrices Residual...
Document polarity detection is a part of sentiment analysis where a document is classified as a positive polarity document or a negative polarity document. The applications of polarity detection are content filtering and opinion mining. Content filtering of negative polarity documents is an important application to protect children from negativity and can be used in security filters of organizations...
Non-linear system identification is gaining much importance in present days. The paper introduces a system identification technique based on chaos theory. We observe system output data over a specified period of time and characterize the system behavior (stable, unstable or chaotic). The algorithm is implemented on Cortex M3 development board.
Large scale digitization of essential services like governance, banking, public utilities etc has made the internet an attractive target for worm programmers to launch large scale cyber attack with the intention of either stealing information or disruption of services. Large scale attacks continue to happen in spite of the best efforts to secure a network by adopting new protection mechanisms against...
Hadoop cluster is specifically designed to store and analyze a large amount of data in distributed environment. With ever increasing use of Hadoop clusters, a scheduling algorithm is required for optimal utilisation of cluster resources. The existing scheduling algorithms are limited to one or more of the following crucial problems such as limited utilization of computing resources, limited applicability...
Today the network is seemingly complex and vast and it is difficult to gauge its characteristics. Network administrators need information to check the network behavior for capacity planning, quality of service requirements and planning for the expansion of the network. Software defined networking (SDN) is an approach where we introduce abstraction to simplify the network into two layers, one used...
Present multimedia applications demand highly energy-efficient devices due to need of intensive computation. Most filtering applications engage 2D gaussian smooth filter which is slow and severely affects the performance. In this paper, we propose a novel energy efficient approximate 2D gaussian smoothing filter. The proposed approach is based on “Mirror Short Pixel Approximation” and rounding-off...
Mutation testing is an effective adequacy criteria and has been researched upon a lot in the past decades, but lacks practical application due to its high cost. Mutation testing for test data generation has not been studied much. This paper is an up-to-date review of the technologies that have been applied with mutation testing for automatic generation of test data which is optimized regarding time,...
In this paper, we propose a pattern classification approach to learn and recognize human pulse signal. Different from previous work, the approach introduced in this paper of processing signals is oriented by the perspective of system analysis, and is aimed to recognize the pulse signal of pregnant objects from that of unfertilized female adults. Firstly, we apply homomorphic deconvolution model to...
Some of the challenges involved in current Internet routing are limitations of the process enabling routing techniques, handling of explosion of messages and absence of awareness about the environment. This paper presents a comparative analysis using Bayesian model of a network having a randomly distributed quality parameters when subjected to quality grading and direction oriented for optimal path...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.