The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional authentication methods are vulnerable to different types of attacks. The authentication scheme like password or PIN-based have proven to be vulnerable to different forms of observation attacks such as, video-recording, key-logging or shoulder surfing attacks. In order to reduce these type of attacks, a number of solutions have been proposed. More used proposed system is the cognitive authentication...
If power quality is poor, then it becomes the major issue due to mal-operation of the equipments, increase in loss and heat, over burdening of the power system. This is due to the widespread use of sensitive microprocessor-based controls and power electronics devices for higher efficiency, pf improvements, and adjustable speed drives etc. The proliferation of large computer systems into many businesses...
The proposed antenna mainly used for wireless applications. The size of the antenna is 28 × 28.5 × 0.635 mm3. Low dielectric loss substrate material used for the antenna design. Antenna consists of circular radiator and is fed by CPW feeding line. Proposed antennas have operational bands covering 1.8GHz and 5.8 GHZ. The antenna have good omni directional radiation pattern. The antenna suitable for...
In this technologically accelerating era, wireless message passing is playing an exceptional role. These messages being transmitted over an open environment is vulnerable to various security threats. To hold back these impedances several cryptographic measures have been introduced. Computation complexities, key management etc are some of the common hindrances that the existing cryptographic techniques...
In this paper, the effect of three device parameters, gate electrode work function (WF), device layer/film thickness (Tc) and channel doping concentration (Nd), on DC parameters has been studied in 20 nm gate length Bulk Planar Junctionless Transistor (BPJLT) using Sentaurus TCAD simulator. Using the above device parameters (ION/IOFF) ratio of the BPJLT is optimized with IOFF constraint. The results...
In today's computing world in the cloud user can easily modify and share data as group. The main issues in the cloud computing was data privacy, data integrity, data access by unauthorized users. TTP (Trusted Third Party) is used to store and share data in cloud computing. To verify integrity of data, users in the group need to compute signature on all the blocks in shared data. In shared data different...
Food is the basic need of life. The quality of food is very important factor for proper nourishment of life so that, there is a requirement of assessment of food quality. In this paper, we proposed the system that assesses the food grain quality using image processing. It is proposed to work at ration shop to avoid the distribution of low quality grain. In this system, visual inspection for quality...
Many Technology experts consider Internet of things as major step for the future endeavors that are going to happen in computer network field. According to CISCO, IoT can be considered as a situation or time where more things are connected to internet than human beings. Things represent the physical objects which are provided with unique identification numbers and their purpose is to collect and transmit...
A split ring resonator metamaterial antenna for WiMax/WLAN applications was proposed in this paper. Antenna 1 takes a spit ring resonator as its radiator fed by a coplanar waveguide (CPW). Antenna 1 covers the frequency range of 1.7–1.8GHz which is used for WiMax applications. Antenna 2 is further developed, which adds a complementary spit ring resonator on the ground, and the improved design has...
Online banking is on the up each day with a persistent rise in the number of people using this novel service to carry out their financial transactions. This amplified interest in the use of online banking has consequently raised the concerns over the security. This has raised the need to protect online banking in to guard these transactions as well as establishing secure mechanisms for information...
Data mining is the process of extraction of relevant information from a collection of data. Mining of a particular information related to a concept is done on the basis of the feature of the data. The accessing of these features hence for data retrieval can be termed as the feature extraction mechanism. Different type of feature extraction methods are being used. The feature selection algorithm should...
This study deals with posture analysis, human Posture Analysis focuses on how human posture can affect task performance by analyzing local and global postures, preferred angles, and comfort. Thus by analyzing the posture of individual through photography with appropriate position (such as aligning the subjects to stand in back coronal pose) and obtaining the image in mathematical tool, and then quantization...
The Intelligent vehicle is an interesting area of research now a day which can be used for the intelligent transport system. It can help to maintain lane and changing lanes travelling lane information necessary to provide smart vehicle to achieve a smooth, safe driving. The system is developed to detect the lanes on the road along with the departure system. The concept in such systems works towards...
This paper is about the biometric attendance management. The automatic attendance management will replace the manual method, which takes a lot of time consuming and difficult to maintain. There are many biometric processes [10], in that face recognition is the best method. In this paper we are going to describe the attendance without human interference. In this method the camera is fixed in the classroom...
Eclipse is an integrated development environment (IDE). Eclipse has imposed its own compiler called as Eclipse Compiler for Java (ECJ). Eclipse compiler is a compiler for Java programming language. Java class files are the most common form of output of an Eclipse compiler. Common subexpression elimination (CSE) is an optimization technique of compiler. It searches for instances of identical expressions,...
The limitations introduced by Mutual coupling have triggered vivid research for its reduction and analysis using different methods. In this paper antennas are arranged such that a particular antenna is affected by the E plane, H plane and E-H plane Mutual coupling with the remaining antennas. The analysed 2×2 antenna structure describes a generalised test case for many practical situations, where...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.