The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Eliminating Shadows from the acquired images is an important preprocessing task for image analysis. In the work a novel shadow removal technique has been developed to eliminate shadows from the images acquired from the rice fields. Since the images are from the agricultural field, to remove shadow, vegetative indices, Normalized Difference Greenness Index (NDGI) and Redness Index (RI) of the image...
There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output...
Securing Voice over IP (VoIP) is a crucial requirement for its successful adoption. Since SIP is the predominant protocol used for signaling to create, manage, monitor and tear down the VOIP sessions, this paper will focus on building a strong defense system around the signaling protocol layer. In this paper, we examine and investigate the concerns and requirements of VoIP security. After a detailed...
Wireless mesh networks (WMNs) can be sequenced by itself and adapt themselves to the nodes in the network in order to maintain the default mesh connectivity. WMN compromises of mesh router which is the backbone of the mesh network and mesh client gives access for both mesh and conventional networks. Transaction of data between wireless mesh node results in privacy transgresses. We propose privacy...
We propose to design and develop awireless based continuous health monitoring system for old age people and kindergarten children. The vital parameters such as body temperature, heart pulse rate data is transmitted and monitored through wireless sensor network(WSN). WSN consists of a large number of low-cost, low-power, multifunctional sensor nodes to monitor physical conditions, such as temperature,...
A MANET is a collection of mobile nodes communicating and cooperating with each other to route a packet from the source to their destinations. A MANET is proposed to support dynamic routing strategies in absence of wired infrastructure and centralized administration. In such networks, limited power in mobile nodes is a big challenge. So energy efficient techniques should be implemented with existing...
In recent days, the intelligent transportation system (ITS) become one of the major thrust areas in the field of electronics and communication engineering. Here an architecture of multi-channel cognitive radio (CR) has been proposed to encounter the challenges in ITS. Spectrum sensing, decision and data fusion are the three major activities performed by the CR. A novel model, using dynamic Bayesian...
This paper presents a double layered secure data transfer technique using Cryptography and Audio Steganography for mobile network. Firstly, the characters of secret text message are converted to bit values and are encrypted by XOR operation using a Symmetric key. Then using a secret key-box, it is again scrambled and then divided into 2bit blocks. These blocks from MSB are replaced by the Left Significant...
Relays can be classified into digital and analog relays. Analog relays amplify and-forward (AF) the received signal without any decoding while digital relays fully decode and forward (DF) a regenerated version of the received signal. Here we are using digital relays as it is the focus of most of the next generation wireless networks standards such as IEEE 802.16j/m [2] and LTE-Advanced. The single-user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.