The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Provision of sufficient network capacity for the wireless data protocol is presently the biggest challenge in telecom industry; Discussions are underway to take advantage of hundreds of megahertz in an unlicensed spectrum. In late 2013, telecom companies were presented a proposal by the Third Generation Partnership Project to retool and deploy Long Term Evolution technologies in unlicensed bands....
Augmented reality (AR) is a growing phenomenon. We are on the verge of ubiquitously adopting Augmented Reality (AR) technologies to enhance our perception and help us see, hear, and feel our environments in new and enriched ways. AR will really change the way people see the universe. This paper provides a review on classification of different augmented reality challenges ranges from human factors...
Unmanned Aerial Vehicles (UAVs) are used in wide ranging applications by civil as well as military organizations all over the world. In an autonomous UAV, a controller onboard the vehicle automatically controls the aircraft's flight and navigation. Airspeed is an important aircraft state that is generally controlled using Proportional Integral Derivative (PID) controller in most of the commercially...
Assets are the resources used by the organization and play central role to meet the organizational objectives. The most critical asset of an organization is information which can be of any type i.e. electronic or in hard form. Different assets like backup drives, office files in either soft or hard form, networking devices etc. have large amount of information that needs to be protected from unauthorized...
Cryptographic algorithms are widely used for security purposes in embedded systems domain. Hardware implementations of cryptographic algorithms have a significant importance because of maximum security provision. There are various approaches for hardware implementation such as ASICs (Application Specific Integrated Circuits), GPPs (General Purpose Processors) and ASIPs (Application Specific Instruction...
Current study is intended to examine, explore and review the current literature on e-government, and different aspects of e-Government. The role of constantly evolving technology is very important. It is categorically significant and has been proved as an excellent way of improvising the traditional and manual systems of any organization. E-Government is becoming a more popular way of administrating...
From ancient to modern world stories are used to build meaning and to communicate. The use of new technology in education system has increased worldwide. Along with technology advancement children of this century have various mode of interaction for learning, listening, interpreting and thinking. Storytelling in class room has seen development by unifying ancient art of telling stories with multimedia...
In multi-antenna systems, the spatial degree of freedom can be efficiently exploited to enhance the system capacity by effectively scheduling the multiple users. This article analyzes the interference based scheduling for multiuser MIMO (MU-MIMO) communication in terms of performance gains, fairness, and computational complexity. We also consider the significance of specifiec selection criteria for...
In this research the aim is to highlight the role of social networks in identifying and controlling the spread of diseases. Small world network is specifically explored as it reflects the real world network among people. A comparison is done among small world, regular and random networks with reference to disease spread and controlling behavior. It is observed that Small World network has medium frequency...
Controlling underwater glider brings a unique challenge for control engineers and academic researcher. The dynamics, nonlinearity and multivariable nature of glider plus the highly turbulent underwater disturbances has disregarded many effective control techniques. The Internal Model Control (IMC) structure, where the controller implementation includes explicit model of the plant has shown to be very...
Indexing is a common technique used by search engines for a fast and efficient search and retrieval process. XML search engines are no different. But the search engines consider XML file as single unit completely ignoring the fact that XML document contains records in the form of semi-structured data. This hierarchal structure of XML inherits a parent/child relationship. This relationship make two...
System identification of an Unmanned Aerial Vehicle (UAV) for its mathematical modeling is an important step towards the automation of aircraft. A reliable mathematical model is also required for simulator design, aircraft crash analysis, studying the effects of aircraft modifications, preflight testing, stress distribution analysis and fatigue life appraisal etc. In this research work flight experiment...
This paper proposes a partial state Active Queue Management (AQM) technique, called CHOKe-FS, which addresses the problem of fair-bandwidth allocation among different flows sharing a common bottleneck link. CHOKe-FS is a packet-dropping mechanism for classifying and restricting unresponsive or misbehaving flows during congestion. It utilizes a direct bitmap technique, which estimates the number of...
Research in software architecture (SA) can be seen in two perspectives: a traditional and modern one. Software architecture is represented using graphical diagrams (Models, Frameworks) of the system, Architecture Description Languages, Ontology. The main focus of this paper is to know about the software architecture and to find out the strength of evidence in empirical work reported within literature...
Energy Efficiency has been categorized as one of the major challenges for Body Area Networks (BAN) due to the limited power supply and expected long life of nodes and networks. This work proposes to reduce the energy consumption of BAN through monitoring and eliminating the spatial correlated contention in the BAN nodes. The issues of spatial correlation contention have been studied for traditional...
During the past two decades there has been a prodigious growth in the field of wireless communication networks in terms of voice, data and video applications. This growth has become an essential part of the life of the cellular users who use the high bandwidth internet services on their PDA's. In order to accommodate the cellular user's use of Software Define Cognitive Radios (SDCR) is encouraged...
Mobile Learning is gaining popularity especially in distance learning higher educational institutions. Latest technology used in mobiles leads to better delivery of educational resources to students. The major aim of this study is to assess students' readiness for m-learning through assessing four factors: available mobile phone features, cellular service availability and affordability, students'...
Applications like content-based image indexing, automatic geocoding of businesses and real-time robotic navigation have generated research interest in the problem of text reading from natural images. This paper tackles the problem of character recognition which constitutes the last phase of the text detection and extraction pipeline. We employ the stroke width transform[12] used for the text detection...
CONTXEXT:-Success of any Software depends on the successful implementation of all of the Requirements. The paper is about successful implementation of requirement engineering (RE) practices in the context of global software development (GSD)., OBJECTIVE: — Development of requirement implementation model (RIM) which can address the challenges and success factors in successful implementation of the...
In this paper, we propose a framework for focused Linked Data (LD) crawler based on context graphs. A focused crawler searches for a specific subset of web, in our case it targets interlinked RDF data stores. The proposed crawler constructs set of context graphs for the given seed URIs by back crawling the web, and classifiers are trained to detect and assign documents to different categories based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.