The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information security is the rapidly rising area of concern in today's world of network technology. Traditionally, secure access to information is guarded by combination of username and password. The idea of graphical password as an alternative to text based approach was proposed by Blonder in 1996 motivated by the fact called as “picture superiority effect” i.e. tendency of human brain to memorize...
Data compression plays a vital role in various video processing applications. Basically video compression is implemented in a video stream frame by frame. Live video processing is a cumbersome task which usually reduces the video transmission rate. So, multimedia data transmission is carried out using suitable hardware modems. The question that arises here is that whether it is possible to achieve...
Ductal carcinoma in situ and invasive ductal carcinoma are two major radiological issues which have drawn the attention of not only Medical Practitioners but also Engineers and Scientists. Mammographic images are generally examined visually by radiologists and now-a-days with the help of available image analytics support system. Yet the problems of ‘false negative’ and ‘false positive’ remain unsolved...
Digital filters play a vital role in the era of digital communication system. Digital bandpass filter basically provide high attenuation to the unwanted frequency components in stop band and offer very low or ideally zero attenuation to desired signal components in passband when its impulse response is adjusted as per required specifications. The selection of an appropriate Field Programmable Gate...
Bi Swapped Networks (BSN) is a symmetrical hybrid Opto-electronic network architecture related to the family of Swapped/OTIS interconnection networks. In fact, the symmetrical nature the network supports ease of design and implementation of parallel algorithms in comparison to its well known counterpart asymmetrical Opto-electronic network named OTIS networks. BSN mesh contains 2n4 copies (n represents...
A Mobile ad-hoc network comprises mobile nodes that communicate with one other without any aid from a fixed infrastructure. Every hub itself goes about as a switch for transferring and getting packets to/from different terminals. The nodes in the network are mobile in nature and are driven by battery. If a node moves out of the radio range of the other node there are probable chances of link breakage...
Wireless Sensor Networks (WSNs) are made up of number of sensor nodes which can sense the physical quantity, process it and transmit/receive it to base station (BS) via single hop and multiple hops. These sensor nodes needs the power or energy to operate which is generally provided by battery. since these batteries have limited amount of energy so energy consumption in sensor network is a serious...
Orthogonal frequency coding is often used for surface acoustic wave (SAW) based systems. This paper presents the theoretical analysis of orthogonal frequency coding technique used with on-off keying in communications systems. The interference encountered in multiuser environment is formulated and a code selection criterion for minimizing the interference is proposed. The analytical expression for...
The military wireless systems often have specific constraints such as achieving very good receiver sensitivity, very high tolerance to frequency shifts and best possible dynamic range. Direct spread spectrum (DSS) is the proven threat free technology in many militarized wireless systems, which will also gives the advantage of good receiver sensitivity because of spreading gain it offers. The RF dynamic...
The advancement in the world of internet has made information retrieval an easy task. Search engines provide users the information they need but not in specific form, instead floods the user with lots of documents/web pages that contain the information required by user. User waste their time to scan all documents in order to retrieve the needed information. Question Answering System reduces this drawback...
Copy-move Image Forgery Detection is an important topic in forensic laboratories. In this research, a hybrid method is proposed to detect the copy-move forgery in an image, by comparing extracted keypoints. Proposed scheme consists of two steps, in first step keypoints are extracted by using SIFT and then extract blocks by using kernel PCA. In second step, Extracted keypoints by using support vector...
Wireless Image Compression is embedding scheme for reducing size of image so that image can be store in less disk space and faster attachment possible in communication. Research issues in Image Compression are to increase efficiency in term of the image quality of decompressed image on higher compression ratio and robustness against visual attacks. Discrete Wavelet transform domain based Image Compression...
The paper presents a VLSI architecture of three dimensional discrete cosine transform (3D DCT) for video recent compression. By making use of the separability property of DCT, the 3D DCT is decomposed into 1D DCTs computed in each of the three dimensions. Each 1D DCT is carried out as an integer DCT using the butterfly structure. It is useful for reducing the computation time and also makes our structure...
Twitter1 is a micro-blogging website which provides platform for people to share and express their views about topics, happenings, products and other services. Tweets can be classified into different classes based on their relevance with the topic searched. Various Machine Learning algorithms are currently employed in classification of tweets into positive and negative classes based on their sentiments,...
The Semantic Web is a compilation of various technologies designed to work together. Research on Semantic Web proposes to advance individual web services or technologies to integrate them to promote rapid development of semantic web services as flexible changes are occurring. Diverse methods are considered in order to construct systematic composition of services. The intent of paper is to differentiate...
A Quantum Evolutionary Computational Technique (QECT) is proposed in this paper. The approach is based on the integration of quantum computing concepts such as superposition of states, application of quantum gate with the concept of genetic algorithm and simulated annealing. To demonstrate effectiveness and applicability of QECT, simulations are carried out on five Benchmark Test functions, which...
Paraphrase generator tool is essential component of any NLP application. This paper presents paraphrase generator tool for Dravidian language of Kannada language using dictionary lookup approach. The paraphrase generator developed by using the morphological analyzer, dictionary lookup and morphological generator approach, generates paraphrases for a given sentence. The paraphrasing is a task that...
Botnet is a collection of infected computers i.e. collection of zombie PCs which are remotely controlled by a single person or a group so called botmaster. In the recent years, botnets are becoming stealthier in nature by implanting certain techniques to hide themselves such as fast flux or DGA algorithms to generate the domain names. Generally, the class of botnet can be categorized into two major...
Today, the world is moving beyond the imagination of the people, day by day new era in technology comes which create huge impact on their lives. As the invention of the computer takes place, now most of the work is performed with the help of computer. In order to protect the main resource of the people, it is important to make the modification in older technology or create a new one. Level of security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.