The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Air pollution is a challenging problem globally and the complete globe is facing the hazards caused by it. In the recent years, it draws an attention of all as it is directly related with the health concern of an individual. Air pollution is a big concern for Delhi. More than 15 million people are exposed to severely high pollutant concentrations. Air pollution have a high impact on the environment...
In the wide growth of information technology, security has one challenging phase for computer and networks. Attacks on the web are increasing day-by-day. Intrusion detection system is used to detect several types of malicious attacks that can compromise the security of a computer system. Data mining techniques are used to monitor and analyze large amount of network data & classify these network...
Data classification in medical field is distinct from that in other fields, because the medical data are heterogeneous, skewed and complex in nature and medical data classification involves multi class classification. In this paper we present the experimental analysis of well-known traditional classification algorithms on bio-medical datasets in order to observe their performance. This experimental...
Nowadays large portion of web-based businesses, research projects, and scientist use recommendation systems to help their business to thrive & flourish. Standard recommendation system utilises either user CF, item CF or content based recommendation system, these furthermore confront issues like item cold start, user cold start and real-time prediction problem. In the perspective of these challenges,...
Enormous amount of genomic and proteomic data is available to us in the public domain and there is need for faster and more sensitive algorithms for genomic study in view of this rapidly increasing amounts of genomic sequences. Basically genomic data falls under the category of ‘Big Data’ and thus processing these large data has become a difficult task. In this regard, people working in the area of...
Intrusion Detection Systems is one of the most useful tools which are used nowadays to identify the attacks happening on the network. But the high false positive and false negative rates are major limitations in Intrusion detection System. To overcome these limitations new techniques should be introduced. In our research we used Ontology in Intrusion Detection System. As Ontology describes the semantic...
The project aims to develop a professional Virtual Machine Manager for the KVM hypervisor. It will be a libvirt-based Web Interface for managing virtual machines. It allows creating and configuring new domains, and adjusting a domain's allocation of the underlying hardware resources. A VNC viewer will present a full graphical console to the end-users in the guest domain. To work with this service...
This research paper shows the performance analysis of the differential dual hop relaying system over Alpha-mu fading channels under different types of modulation schemes and two symbol non coherent detection. For performance analysis different channel scenarios between source relay (SR) channel & between relay destination (RD) channels have been acknowledged. Such as SR is slow with RD slow, SR...
An idea or a concept can be classified as transformational, operational or tactical. In the recent past, there have been more rational developments in software testing techniques outsmarting the ones prevailing earlier which weighed more in favor of empirical rather than logical aspects of software testing. This paper presents one of a kind of developments in software testing methodologies that were...
World Wide Web is expanding day by day in number of users and websites. How a website could stand out in millions of websites to satisfy its users. This is where the role of website evaluation becomes crucial. Website evaluation methods help website designers to understand behavior of users, to improve the design and layout of the website and are useful to improve the website experience for users...
Cloud computing allows hosting of multiple services on different datacenters where resources are allocated to users on demand. It uses virtualized environment for functioning services, because without virtualization computing is inefficient and not flexible. Load balancing assure that all the processors in the system does generally the equal load of work at any instant of time. The various traditional...
Cloud computing has emerged as a new paradigm of distributed computing. A cloud encompasses data centers in order to facilitate cloud computing. A data center consists of a large number of servers or hosts which are the key factor of cloud environment. The use of the enormous amount of computing and data centers generally leads to consumption of large amount of energy which further causes the increasing...
Now a day, Cloud computing is one of the most stimulating on demand service oriented technology. Virtualization is an emerging approach utilizing resources effectively in cloud computing environment. Virtualization has an intellectual abstraction layer which hides the complexity of essential hardware or software. Virtualization technology is not a novel technology possessing security issues that can...
Parity checking is one of the extensively used approaches for error detection in conventional digital systems. This work presents a 4×4 reversible logic gate (SMS gate) integrated with parity preserving property, which produces all primitive Boolean gates. The hardware complexity in terms of total logic count of SMS gate is 6α+1β only, which found to be minimal compared to all the existing gates....
In recent years the Smartphone has undergone significant technological advancements but still remains a low computational entity. Mobile Cloud Computing addresses this problem and provides a solution in form of Mobile Computation Offloading (MCO). Computation offloading is a concept in which certain parts (tasks) of an application are executed on cloud whereas the rest of them on the mobile device...
Cloud computing is emerging technology due to pay-as-you-go pricing model. It is spreading globally due to its easy and simple service oriented model. Some people are having perception that cloud computing is just another name of Internet. The numbers of users accessing the cloud are rising day by day. Cloud is based on data centers, which are powerful to handle large number of users, who can access...
Various types of noise affect Magnetic Resonance Images and consequently interrupt in correct diagnosis. Thus, noise reduction is a major task while working with Magnetic Resonance (MR) Images. The process of denoising reduces the undesirable noise, but at the same time the denoising process needs to preserve the image features as well. Various techniques are available for noise removal from MR Images...
Breast cancer is one of the most incurable diseases, which leads to the death of women globally every year. For early detection of a tumor in the breast, a basic technique called ‘Mammography’ is used, which is an x-ray analysis of breast. This work emphasizes on the proper selection of denoising techniques for the mammographic images. To achieve the objective of this work, exhaustive experiments...
The paper presents a VLSI architecture of three dimensional discrete cosine transform (3D DCT) for video recent compression. By making use of the separability property of DCT, the 3D DCT is decomposed into 1D DCTs computed in each of the three dimensions. Each 1D DCT is carried out as an integer DCT using the butterfly structure. It is useful for reducing the computation time and also makes our structure...
Vehicle accidents are growing extremely lack of control over the system during dark. The unexpected crossing of objects, animals or humans on the highways makes the driver make indecisive actions due to the loss of his cognition at that state, results in loss of control of the vehicle which causes accidents. Nowadays, sensor technology is moving forward to play several roles in order to serve various...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.