The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Built in Logic Block Observer (BILBO) is a bank of flip-flops which are used for self-testing for complex digital IC's in pipeline approach. As per the Launder's principle, KTln2 heat is dissipated if there is any loss in bit. Since BILBO is designed with irreversible logic gates we observe large amount of leakage power which affects its performance. So by keeping this as main criteria, our paper...
In the decoding of the Bose Chaudhuri Hochquenghem (BCH) codes, the most complex block is the Chien search block. In the decoding process of the BCH codes, error correction is performed bit by bit, hence they require parallel implementation. The area required to implement the chien search parallel is more, hence strength reduced parallel architecture for the chien search is presented. In this paper,...
With the recent advancements in the field of robotics and cloud computing, one technology backing the other can have a huge potential under the domain of Cloud Robotics. Majority of systems are still operating independently using on-board computation, and confined memory and storage. Cloud Computing is a promising technology which is intended to harness the power of networked computers and communication...
In recent times, the Convolutional Neural Networks have become the most powerful method for image classification. Various researchers have shown the importance of network architecture in achieving better performances by making changes in different layers of the network. Some have shown the importance of the neuron's activation by using various types of activation functions. But here we have shown...
This paper presents the design of tangible interaction natural user interface (TIxNUI) of smart TV applications in the scenario of future classroom. This research begins with proposing the integration architecture of 4E future classroom scenario with ARCS learning motivation model. Then, we present the design of TIxNUI by using user journey map and service blueprint. A system, called IxHOLS, is based...
Today, the transition of traditional networking model to SDN-type architectures poses several major challenges. In typical SDN settings, the routers and switches frequently generate requests to the controller which ensures the proper and efficient operation of the network. Increased workload on the controller results in larger control plane response times, which, in turn, leads to a delayed response...
Now a days verification has become one of the most important challenges in getting advanced SOC devices in the market. With the advancement of technology, there is a need to integrate more components in SoC that results in increased chip complexity. This complexity issue in SoC must be resolved by some advanced methodology. Industry experts consider that in the overall design effort, the verification...
Software testing is designed in various company hierarchy, such as end product/service providers and subcontractors. An end product/service providers generally has a severe responsibility for their software quality, while a subcontractor has a limited responsibility. There can be a hypothesis that there is differences in software quality between service providers and subcontractors. To examine the...
RecDroid is a smartphone permission management system which provides users with a fine-grained real-time app permission control and a recommendation system regarding whether to grant the permission or not based on expert users' responses in the network. However, in such a system, malware owners may create multiple bot users to misguide the recommendation system by providing untruthful responses on...
Software Fault Tolerance is an ability of computer software to continue its normal operation despite the presence of system or hardware faults. Most companies are moving towards a microservices-based architecture where complex applications are developed with a suite of small services, each of which communicates using some common protocols like Hypertext Transfer Protocol (HTTP). While this architecture...
As the adoption of Cloud Computing is growing exponentially, a huge sheer amount of data is generated therefore needing to be processed in order to control efficiently what is going within the infrastructure, and also to respond effectively and promptly to security threats. Herein, we provide a highly scalable plugin based and comprehensive solution in order to have a real-time monitoring by reducing...
In the modern world of digitization, processing of data in real time requires an increase in the operating speed of a system. The processing more often than not utilizes multiplication which is time consuming and introduces considerable amount of delay. As such, there is a need to reduce this delay and achieve faster real time processing of data. This paper proposes a novel architecture for implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.