The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Welcome to the First International Conference on Accessibility to Digital World (ICADW), a flagship event of North East Indian institutes organized by Assam Engineering College, Guwahati. This is an annual conference to provide forum for the presentation of technological advances and research findings in the concerned areas. this event is expected to be blossomed into an internationally renowned forum...
A smart grid is an electricity transmission and distribution network that embeds digital and other advanced ICT technologies to sense, monitor, communicate and manage the energy flows, real time electricity asset management, and take online decision from all generation sources to meet the varying electricity demands of end-users. Smart Grids oversees the real time capabilities of the generating, transmitting,...
In this paper, we build an application specific processor based on Artificial Neural Networks (ANN) to monitor seismic activity. The training of the ANN is carried out using a software framework to evaluate the initial weights of proposed architecture. Once the layers and number of neurons of ANN are estimated using the neural heuristic, the proposed architecture is implemented on Xilinx Virtex-6...
This paper presents the design and characterization of a direct interfacing circuit (DIC) for sensor array and its comparison with the built-in analog to digital converter (ADC) of a PIC microcontroller. Before implementing the DIC for the sensor array, we examined its performance on simulated voltages to have a proper understanding of the output characteristics. To explore the DIC for multi-sensory...
In this paper a dedicated processor based on Artificial Neural Networks (ANN) for predicting the daily maximum temperature at a particular location has been implemented. The network architecture and weights are determined with the help of software tools using the daily maximum temperature, pressure and humidity at the specified location as inputs to the network. The model is trained using the data...
Human beings have a natural ability to see, listen and interact with their external environment. Unfortunately, there are some people who are differently abled and do not have the ability to use their senses to the best extent possible. Such people depend on other means of communication like sign language. This presents a major roadblock for people in the deaf and dumb communities when they try to...
Since networked applications have become common place in our daily life, vulnerabilities or attacks on networks are also on the rise. Although a significant number of defense mechanisms have been developed to counter attacks on networks, attackers are often able to evade deployed defense mechanisms. An effective defense mechanism generates alerts when it finds vulnerabilities on a system or in a network...
With the increasing popularity and usage of cryptography and network security, prime generation and primality testing has become a significant issue. Various primality tests have been introduced in the past and we compare and contrast some popular primality tests and formulate our own results by implementing and testing them on a million numbers. Primality tests can be classified on the basis of whether...
In the authentication and key agreement protocol adopted in LTE, pseudonyms are employed for identity presentation, so that the real identity of the subscriber remains confidential. However, there are occasions where pseudonyms may fail to serve its purpose. In such a situation, there is a backup provision that allows the network to request the subscriber for its real identity. But, here lies the...
Modern Authentication system ensures that only the entrusted entities should communicate and ensures that unauthorized user which is trying to establish some connection in order to gain login to the system by impersonating his identity should be restricted to the confidential data. Now a days, modern authentication system receives more and more attention as the data exchanged over the network is important...
Remeshing is an important technique used for the improvement of the quality of 3D models. The original features of a particular mesh may distort or change while using certain remeshing techniques. This may impact further processing on the mesh as remeshing is considered as a pre-processing phase for most of the mesh processing operation. So to preserve the geometrical features or the actual unique...
To ensure effective dynamic spectrum access in cognitive radio proper signal classification in fading channels and low signal to noise ratio environment is essential. Due to lack of information about the modulation scheme used it cannot distinguish between signal present is that of the primary or any other secondary user communication. In this paper a multiclass modulation classification hierarchical...
In medical domain, proper set of information fusion is the vital requirement for quantitative interpretation. In this paper, we present a novel feature fusion technique based on two-fold feature projection (FP) for EMG classification. Canonical Correlation Analysis (CCA) transformation is performed on original feature space and wavelet transformation of original feature. Based on subspace learning...
Classification of hyperspectral remote sensing images is a challenging task because of its high dimensionality. In this paper, a two stepped method for classification of hyperspectral images is presented. The first step performs band selection to reduce the ‘curse of dimensionality’ issue by exploiting neighborhood rough set theory. The second step exploits mathematical morphology, in order to incorporate...
Over the last decade, a war has been taking place which involves the computer security community and the black hat hackers. The security community uses every possible routine and strategies in order to cease and also to remove the damage caused by the malicious programs while at the same time the black hat community advances their techniques that can easily bypass the installed security measures....
Denial of Service (DoS) attacks pose a serious threat to business companies. DoS attacks is hard to defend because of many different ways that hacker may strike. DoS attacks focus on certain applications. DoS attack targets to make the service out of resources, so that it becomes unavailable to the legitimate users. Due to unpredictable behaviour of hacker it is difficult to distinguish between legitimate...
Uninterrupted mobile connectivity in fast moving public transportation systems like bus and train is difficult to achieve. Frequent handovers and security procedures for a large number of mobile users travelling together in these mass transportation systems can cause disruption in connectivity and signaling overload on the network. A possible solution to this problem is to group together all co-located...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.