The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Image enhancement as an optimization process is being used rapidly in Image processing system. To enhance the contrast of the images various common methods are proposed in literature including HE and linear Stretching but they give unnatural contrast and brightness in the images. GA as well as PSO both as an optimization method improves contrast and gives better result. This paper reviews an introduction...
A compact multiband internal antenna that is composed of a coupled structure with an inverted-L patch and two step-shape forky strips is designed. The antenna has two operating bandwidths 698~1100 MHz and 1570~2910 MHz to cover LTE/GSM/UMTS. Therefore, the proposed antenna can support current all 2G/3G/4G wireless communication network services. The limited volume of the antenna is only 40 × 12.5...
In this letter, a new design of compact band-reject frequency selective surfaces is proposed. Compared to previous compact structures, the FSS proposed has a better compact performance with the dimension of a unit cell only 0.082λ ×0.082λ, where λ represents the wavelength of the resonant frequency. Above design rejects Wimax band (3.3-3.8) GHz. Moreover,...
The web is becoming the main information dissemination means for many organizations. Web documents may have a nested or hierarchical, inter-linked structure. XML is hierarchical organization of data. It requires different confidentiality and integrity for different portions of same document. Data that a consumer is not authorized to access but belongs to complete data set is extraneous data. Flow...
Circuit Partitioning generally formulated as graph partitioning problem is an important step in physical design of circuits. The use of Evolutionary techniques is increasingly used to solve NP complete problems i.e. Applications for logic minimization and simulation heuristics. This paper explores the evolutionary approach of genetic algorithm and propose a hybrid technique involving the strengths...
In order to fill the research gap of energy efficient hardware design in natural language processing, this project reports the designing of an energy efficient Gurumukhi Unicode Reader on Field Programmable Gate Array (FPGA). To avoid transmission line reflection, a usual problem in hardware design, impedances of transmission line, device and port should be equal. In order to avoid transmission line...
This paper, deals with Latch Free Clock Gating technique for reduction of clock power and total power consumption in Low Power Arithmetic and Logic Unit and we have analysed power reduction on different FPGA devices. Without latch free clock gating technique in Low Power Arithmetic and Logic Unit the Contribution of Clock power was 39mW in Virtex-6 FPGA, 14mW in Virtex-5 FPGA, 24mW in Virtex-4 FPGA,...
This paper presents a novel scheme for reversible data hiding with lossless recovery of original image. Scheme applies a method for hiding data in an image before encryption and then utilizes a novel method for encrypting the image using visual cryptography. A modified algorithm for reversible data hiding using difference expansion technique is used in this scheme. The proposed scheme thus increases...
Present day scenario shows a drastic increase in the growth of the malware. According to Kaspersky Security Lab report, India ranks seventh in offline threats and ninth in online threats caused by malware, among top ten countries of the world. Advancement in the evasion techniques like code obfuscation, packing, encryption or polymorphism help malware writers to avoid detection of their malwares by...
Battery driven devices are need more routing strategy and their caring to safe against attack. WSN is also vulnerable to attack like wormhole, in which a malicious node captures packets from one location (or from intermediated path) in the network, and channelized it to the wrong direction towards another malicious node at a remote point, that recursively replays it again or start dropping. A wormhole...
In modern times, it has become very essential for e-commerce businesses to empower their end customers to write reviews about the services that they have utilized. Such reviews provide vital sources of information on these products or services. This information is utilized by the future potential customers before deciding on purchase of new products or services. These opinions or reviews are also...
In view of the requirements for high reliability and strong time constraints in emergency rescue under disasters, an improved template-based information search method is proposed to meet these requirements. The method builds a search template based on features of emergency rescue field. Based on the HTML structure and template, the valid information in webpages can be extracted. A reliable correction...
Data mining automates the process of finding predictive records in large databases. Clustering is a very popular technique in data mining and is a significant methodology that is performed based on the principle of similarity. The segregation of a large database is a challenging and time consuming task. For this purpose, an approach called data labeling through sampling technique is used. Using this...
Cloud computing is a provider of dynamic services which offers readily elastic on demand computing resources as per the customer's request in economical way. As there are a lot of requests fabricated by cloud users which are processed by the accessible resources, there exists a need for better and effective scheduling mechanism for efficient allocation of resources. In this paper, a genetic algorithm...
In the future, the mobile station will comprise a wide range access technology (RAT) providing user with a flexible and efficient access to the multimedia service and high data rate communication. Although much work has been done for coexistence analysis between different systems base station (BS), most of them have not addressed the interference within multimode terminal. Hence, to fill this gap,...
Algorithm customizable modules in video encoder play important roles in coding performance, and their algorithms can be optimized by adjusting multiple coding control parameters under a certain rate distortion complexity constraint. There are inter-correlated relationships among these modules. This paper analyzes the inter-module influence mechanism among algorithm customizable modules, and gives...
The turbulence scintillation has significant effect on wireless communication. This paper studies the intensity of turbulence, scintillation index and scintillation BER of the 2.4 GHz band. We estimate the intensity of turbulence on microwave band by combining the coefficient A, B and measured data. We find that the parameter of temperature-humidity has great influence on the microwave band than that...
This paper presents Seeker Optimization Algorithm (SOA) to the optimization of current excitation weights and uniform inter-element spacing for the optimal design of hyper beam forming of linear antenna arrays. Hyper beam forming is based on sum and difference beam patterns, each raised to the power of hyper beam exponent parameter for linear antenna arrays. In the SOA, the act of human searching...
This paper describes design and analysis of voltage controlled oscillator using NPN Silicon Germanium RF transistor operating in Ku-band frequencies. Novel topology is proposed with tunable active matching filter networks are used as resonators connected to parallel emitters. Resonator contains varactor diodes to provide voltage controlled frequency tuning. Series LC network connected at the base...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.