The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Agricultural productivity is that thing on which Indian Economy highly depends. This is the one of the reasons that disease detection in plants plays an important role in agriculture field, as having disease in plants are quite natural. If proper care is not taken in this area then it causes serious effects on plants and due to which respective product quality, quantity or productivity is affected...
This paper reveals the study of sub methods of the phases of SDLC i.e. Software Development Life Cycle. Some methods or sub-practices are always required to execute each and every phase. There is always a need of some procedures, steps, methods and processes to build anything whether it is software or anything. Even a recipe needs a proper steps otherwise it will give a bad taste. An appropriate approach...
A mutation system possess the extensive theoretical components called mutation operators that are designed to evaluate the effectiveness of fault detection. Mutation testing of a software system rely extremely on the kinds of faults detected that the mutation operators are designed to represent. Therefore, the quality of the mutation operators is very significant to mutation testing. The interaction...
In recent years there are various way of predicting the current measurement through nanoscale device has been established. One of the most widely used and accepted is non-equilibrium Green's function method (NEGF). After NEGF method is approached scientist has worked a lot for describing the electronics characteristics in an easier way. Among them recursive algorithm is easier way of analyzing the...
Recent improvements in designing the scheduleing algorithms for cluster mainly focuses on the advance reservations and Backfilling algorithms. Backfilling has been proposed and launched in various flavors to have an idealistic utilization of the resources and computing capacity of the cluster. However backfilling demands the runtime prediction of the job. Preemption of process in the scheduling queue...
Decentralized networks such as mobile ad-hoc networks (MANETs) are susceptible to many types of security attacks. Ideally, each node in a MANET should be associated with only one identity, but such networks are not equipped with a mechanism that can check whether one physical device is bound to exactly one identity or more. As a consequence, a malicious node can easily obtain more than one identity...
A handwritten text categorization technique using supervised and unsupervised learning is proposed in this work. The learning system based on neural network is used for alpha numeral identification. The identified characters are subsequently merged to convert the handwritten text into the closest printed form. A word matching algorithm along with a programmed glossary finds out the most appropriate...
This paper presents a state of art review of image segmentation using soft computing techniques. Some of these techniques are explained by in what ways they similar to GAs and in what ways they differ. Different soft techniques of implementing image segmentation have been reviewed in this paper. Finally, summaries and review of research work on image segmentation using soft computing techniques has...
The content of web is increasing rapidly and search engines are used to search the web content. Along with this, it is also becoming a point of focus for academic research. Computer programs are needed in order to conduct any processing of web pages. Many web search engines as well as many more specialized search tools rely on web crawlers to acquire large collection of pages for indexing and analysis...
Requirement Elicitation identify as one of the most crucial knowledge intensive activities of software development. Most of the system fails due to use of wrong elicitation practice. A requirement is defined as a demand or needs. A System may have a dozen to thousands of requirement. Without the Elicitation technique it is impossible to find out the requirement and need of developing system. After...
Cryptography involves different cryptographic algorithm that contributes in the security purpose of the programs. The cryptography algorithms are divided into two parts symmetric and asymmetric. There are many different challenges to implement cryptography algorithm specially throughput in terms of time execution. So, it is important that it runs with minimum encryption and decryption time and hence...
In today's fast moving world, it is a challenge to continuously maintain, improve the quality and efficiency of software systems development. In many software projects, testing is neglected because of time or cost constraint which leads to lack of product quality. Test automation reduces the future maintenance efforts and cost significantly. Automated test suite can run fast and frequently, which...
The reuse of Software Component is a common practice in the field of software engineering for developing a new software product from existing components. Component based approaches in case of software development is used for reusability. This paper describes how reusable components are stored and how they can be retrieved as per the need depending upon the activity of the required component.
Performance expressions of Dual maximal ratio combining (MRC) receiver are derived for the receiver over non-identical two wave diffused power (TWDP) fading channels are derived. The probability density function (PDF) of the receiver output signal-to-noise ratio (SNR) is derived using characteristics function of the output SNR expression. The derived PDF expression is then used to obtained the various...
Job scheduling (JS) is one of the most important issues in a Cloud system. The objective of job schedulers in cloud computing is to meet users' requirements and optimize the utilization of cloud resources. To achieve better QoS with high resource utilization in a cloud environment, an improved backfill algorithm (IBA) using balanced spiral (BS) method can be used. Results show that IBA minimizes resource...
Sleep is a great natural occurring state in which everything is forgotten for a while, become fresh and ready for next coming daily routine exercises. Any person can lag in these exercises, if their sleep is not well taken. But, sometime it is observed that the sleep gets disturbed due to some awkward behaviors known as sleep disorders. The various intelligent techniques/methods are proposed for the...
One of the significant indicators of the Quality of Service that can be achieved by a wireless communication system is the findings of capacity analysis. Hence, these results are of enormous significance to wireless communication system designers and engineers. Channel capacity expressions for dual branch Maximal Ratio Combining (MRC) diversity system with various adaptive transmission techniques...
Routers can also function as firewalls and perform various operations on the incoming and outgoing packets. In case when all the packets share common header characteristics, it is termed as a packet flow. In order to classify a packet, routers perform a lookup on a classifier table using one or more fields from the packet header to classify the packet into its corresponding flow. A classifier is a...
Lossless compression technique compresses the data file or image file without any changes in the original file. This method is generally applicable for the text data and the medical images. This paper proposes a new methodology to compress online data using an adaptive Huffman tree for encoding and decoding data with lesser height. This technique saves the transmitting power and decreases the communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.