The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio frequency Technology (RFID) is an automatic identification technology It consists of a transponder or "tag". The tag is the data carrying element of an RFID system. The "reader" contains a radio frequency receiver and sometimes a transmitter, a control unit and an antenna to provide data retrieval or communication with the tag. The following project proposes to build a Self-Aware...
Plants are one of the most fundamental and important species on earth. Forest eco-system has been an important source of various economically and socially significant plant species which are very difficult to be properly detected and identified. An automated image based species identification technique will be highly helpful, since it is a tedious job to collect and identify the samples manually in...
As the automation in biometric authentication is increasing there is demand for the high security for protecting private information and access control with increased speed and accuracy. One of the very important solutions for the security issues is the human behavioral and physiological features in biometrics. However, the existing biometric systems are not suitable in very high security and are...
Cloud security is becoming bombilate word in IT industry area associated with security measure and concealment. In this paper we outline the security measure of virtual machines in virtualized cloud environment. Since virtualization is key component of cloud computing. Notably, attackers can discover exposure of cloud system and compromise VMs for launching Distributed-Denial of Service (DDoS) attacks...
Utility Mining is one of the recent emerging fields in Data mining. The main objective of utility mining is to discover high utility itemsets from a database. It differs from traditional frequent itemset mining. In frequent itemset mining, frequently occurred items in database are found. But in Utility mining, itemsets with high utility (utility here refers profit, number of items, cost of an item...
Conventional Digital Computer Works using only 0 and 1 bits. 1 bit roughly equates to 1 cycle of signal. It requires 8 bits to define 128 characters. The number of bits also limits calculation power to calculate larger numbers and also demands larger storage. TejRadioComputer is an attempt to use AM/FM signal to replace 0–1, using which we may just need one cycle instead of 8, 16, 32 etc to define...
In this technological world one of the general method for user to save their data is cloud. Most of the cloud storage company provides some storage space as free to its users. Both individuals and corporate are storing their files in the cloud infrastructure so it becomes a problem for a forensics analyst to perform evidence acquisition and examination. One reason that makes evidence acquisition more...
Nowadays the asymmetrical cascaded Multi-Level Inverter (MLI) concepts are predominantly investigated. This paper deals with the multi constant dc carrier modulation strategy for 3Φ 27 level Trinary Hybrid MLI (THMLI). The suitability and qualities of the modulation strategy is investigated by simulation using MATLAB/Simulink and also implemented in real time using dSPACE real time interface controller...
Software Defined Networking (SDN) gives idea about including programming to the network with the opportunity to dynamically actions to be performed related to flow descriptions. Packet Header is the first phase of this process. In this concept, we illustrate improved action detection over conventional algorithms. This is achieved by analyzing various packet parameters (header fields of packet such...
Diabetic Retinopathy is an abnormality of eye in which the retina of patient is affected due to an increasing amount of insulin in blood. The symptoms can distort or blur the patient's vision and thus lead blindness. For automatic detection of exudates we first have to differentiate intensity levels of exudate and non-exudate pixels. Matched filter is used for same. Tuning of matched filter is an...
In this paper, a high speed reconfigurable router has been designed and implemented. The proposed reconfigurable router the buffer slots are dynamically allocated which in turn increases the efficiency of the network with heavy loads. In the proposed router the depth of each buffer used in the inputs can be reconfigured at design time. The dynamic power consumption of the router is 5mW. Area and frequency...
In this study an Overtake Mishap preventive road safety system is designed. The System makes driver aware about the platoon of which its vehicle is a part. The system helps driver to know the overtaking behavior of back vehicle. The system with the help of front vehicle's response also guides driver when it decides to overtake it. The Road-Side-Devices help to maintain the communication amongst vehicles...
A simple septagon slotted, frequency and radiation pattern reconfigurable microstrip patch antenna is proposed in this paper. The antenna operates in the C band and is capable of switching between two different frequencies 3.9 GHz and 5.9 GHz. The radiation pattern can be reconfigured between boresight pattern and conical pattern. Beam Lead PIN diodes (MA4AGBLP912) are used as switching element for...
Mobile Ad-hoc network (MANET), is one of the ideal means for communication using mobile devices, as the devices here can configure themselves without a strict interference by the network administrators. Providing apt security for such networks is a challenging task and this area has proved itself as a vital field for researchers. MANET s are more susceptible to network attacks because of their dynamic...
Network-on-Chip(NoC) has been well accepted for energy efficient on-chip communications for many-core systems. As the technology scaling drives the number of cores upward designers of the on-chip interconnect for many-cores chips are facing with the dilemma of meeting performance and energy requirements with power and thermal constraints. This paper focuses on the Network-On-Chip energy and performance...
The nature of the different types of end-to-end mobile devices in wireless networks where congestion is one of the biggest challenge is been addressed. This paper proposes a congestion aware routing strategy based on an evaluation of the weight value as a link index. The evaluation link cost considers the evaluation of the buffer delay, data rate, the MAC overhead and link quality. This approach uses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.