The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Neighbouring cells deteriorates the performance of Orthogonal Frequency Division Multiplexing Access (OFDMA) cellular networks particularly for edge users due to Inter Cell Interference (ICI). In this paper, subcarrier integration with suitable links is proposed for minimizing ICI after Self Organized Resource Allocation (SORA) and Link Grouping Algorithm (LGA) is used to selects the satisfactory...
In the proposed system a solution is given to the problem of “Fishermen Tracking their location in the sea”. For this the sea area is divided into three zones namely; safe, intermediate and danger. The boat is allowed to roam anywhere within the safety zone. If the boat reaches the intermediate zone, a buzzer alert is given to the fisherman. If the boat reaches the danger zone, an intimation is given...
This papers deals with an advanced and effective approach for testing system, by utilizing the hardware-in-the-loop (HIL) with the vision based machine learning technique to make end to end automation in the feature diagnosis and validation of automotive instrument clusters. Recently, numerous HIL systems are in practice for simulating the vehicle networks in real time, by providing necessary signals...
Various fiber-optic dispersion effects on optical transmission system are analyzed and dispersion compensation is done using Delay Line Filter (DLF) [2]. Delay line filter is implemented using X-coupler with single source, multiple source and filter. The optical transmission system consists of transmitter, an optical DLF for compensation, fiber transmission channel and a receiver. The performance...
Hash-routing is an ingenious technique, which is deployed in client-server environment to forward requested content to the corresponding server playing role of origin and disseminate the requested content. Our proposed approach hash based-routing is novel technique which is more suitable to ICN, in which in-network content caches cater for content as a storage that is momentary. Especially, edge-routers...
Adoption of traditional Handover (HO) procedure in LTE-A HetNet degrades HO performance when compared to the Homogeneous Network. To overcome this, triggering of HO procedure need to be executed in time which is achieved by properly configuring the HO control parameters taking into account the Environmental, Network and User Equipment (UE) characteristics. From the literature survey made, it is found...
A function that outputs a feature vector from the perceptual contents of the input video is called a perceptual video hashing function and the output feature vector that characterizes the perceptual contents of the input video is called the perceptual video hash. This hash must be robust to the manipulations that preserves the perceptual contents of the video and fragile to the modifications that...
This paper presents the design of a rounded, truncated hybrid multiplier. The maximum absolute error is ensured to be less than one unit of least position. The proposed strategy includes deletion, reduction of partial product bits of multiplier in order to reduce the number of full adders and half adders used during partial product reduction. The high speed computing system requires high-speed and...
This proposed work explains the design and simulation of a recycling folded cascode OTA based on the conventional folded cascode architecture. The benefit of recycling structure is that it delivers an enhanced performance when compared to that of a conventional folded cascode structure. The enhancement in gain, bandwidth and reduction in power for the recycling structure is achieved by reusing the...
Today security is the prime factor needed in all civic places such as Airport, Railway station and Bus stations. Due to absence of extremely fast security systems, lots of damage to human life and public properties were seen in last decade. The proposed design able to capture, recognize and detect the unauthorized person at high speed. The aim of this research work is to design a system that recognizes...
In this paper, a new automatic histogram equalization algorithm which is based on Bi-Histogram Equalization (BHE) is proposed. The proposed method preserves the brightness and also improves the contrast. Mean value of the intensity is used for selecting the thresholds to avoid over enhancement also improving contrast of the image. The calculated mean limits the valley points to divide the histogram...
This paper expounds the cognitive Image processing techniques involved in medical images. There are several varieties of proliferative cancer that are being well-known by means of the researchers, which has now hit the tally to a hundred. Each and every cancer is unique of its sort to be famous alongside the signs. This paper specializes in the more than a few image processing algorithms involved...
In 6LoWPAN, RPL routing protocol is suggested by IETF standard to enhance the Quality of Service of data transfer that occurs between non-root node to root node. In this paper, the performance of RPL is analyzed in terms of Packet Delivery Ratio and Round Trip Time. The analysis is carried out to study the behavior of topology control strategy in 6LoWPAN. Hence, the analysis is executed on various...
Accident's being the regular topic in this automobile powered world; road safety remains the major concern. Most of the accidents are not aided as fast as possible, because of passing late information about the accident to the help centers. To address this, we have developed a system in order to notify each and every helping hand to save an individual's life during accident and in tough situations...
With advent of technology scaling, the prime objective of design i.e. low power consumption can be easily acquired. For any digital logic design the power consumption depends on; Supply voltage, number of transistors incorporated in circuit and scaling ratios of the same. As CMOS technology supports inversion logic designs; NAND & NOR structures are useful for converting any logic equation into...
In recent years, the chaos based cryptographic algorithms have enabled some new and efficient ways to develop secure image encryption techniques. In this paper, we propose a new approach for image encryption based on chaotic maps in order to meet the requirements of secure image encryption. The chaos based image encryption technique uses simple chaotic maps which are very sensitive to original conditions...
This paper focuses on comparing orientation binning to perform Histograms of Oriented Gradients algorithm for the feature extraction process. The HOG algorithm comprises of gradient computation, orientation binning and block normalization aimed towards object detection. Three angles of binning are considered for (3bins, 6bins, and 9bins) with angles.64×128 image sample is taken from INRIA Person Data...
Image encryption takes been used by armies and governments to help top-secret communication. Nowadays, this one is frequently used for guarding info among various civilian systems. To perform secure image encryption by means of various chaotic maps, in such system a legal party may perhaps decrypt the image with the support of encryption key. This reversible chaotic encryption technique makes use...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.