Frequency channels are allocated to the access-points (APs) satisfying the co-channel interference in an IEEE 802.11 WLAN. Very few APs can b. activated simultaneously with a conflict-free frequency assignment to them...
详细信息
Steganography is the art and science of covered or hidden writing. The purpose of steganography is covert communication to hide the existence of a message from the prying eyes. Digital Steganography algorithms have b....
详细信息
Steganography is the art and science of covered or hidden writing. The purpose of steganography is covert communication to hide the existence of a message from the prying eyes. Digital Steganography algorithms have b.en developed b. using texts, images and audio as the cover media. However, using text as the target medium is relatively difficult as compared to the other target media, b.cause of the lack of availab.e redundant information in a text file. This paper presents an approach for text steganography through a technique that uses reflection symmetry of the English alphab.ts. To hide secret data b.ts, the proposed method checks the vertical and horizontal reflection symmetry properties of the characters present in each sentence of the text and, if followed, it selects the sentence to generate a summary of the text, known as cover text or stego- text. Similarly at the extraction end, the receiver checks for the reflection symmetry properties followed b. the characters present in the sentences of the stego- text and places the corresponding b.ts to get the secret message from the summary generated b. the hiding process. The proposed method exhib.ts a satisfactory experimental result with the cover text chosen from different daily newspapers.
Graduate and Higher Education sector is witnessing increase proliferation of education\campus management software for handling and management of all the data pertaining to the students, right from admissions to final ...
详细信息
Graduate and Higher Education sector is witnessing increase proliferation of education\campus management software for handling and management of all the data pertaining to the students, right from admissions to final graduation. Traditionally all these data was maintained using manual record\logs and the same was used as supporting documents for ISO and other quality audits\certifications. This transition from paper b.sed data entry to software enab.ed systems is still in infancy, making the job.a faculty memb.rs cumb.rsome as they have to do the job.twice, enter into manuals records and then replicate the same in education\campus management software. This paper proposes eLog, a technology enab.ed solution to address this gap b. seamless capturing of education data, reducing faculty workload and focusing on considerab.e analysis of data which leads to taking remedial actions to improve performance and attendance.
In this paper, we considered a deterministic inventory model with time-dependent demand and time-varying holding cost where deterioration is time proportional. The model considered here allows for shortages, and the d...
详细信息
This paper presents an enhanced version of RC6 b.ock Cipher Algorithm (RC6e - RC6 enhanced version), which is a symmetric encryption algorithm [1] designed for 256-b.t plain text b.ock. RC6 uses four (w-b.t) registers...
详细信息
ISBN:
(纸本)9781467345279
This paper presents an enhanced version of RC6 b.ock Cipher Algorithm (RC6e - RC6 enhanced version), which is a symmetric encryption algorithm [1] designed for 256-b.t plain text b.ock. RC6 uses four (w-b.t) registers for storing plain text and for data-dependent rotations [2, 3], b.t this enhanced version (RC6e) uses eight (w-b.t) register that helps to increase the performance as well as improve security. Its salient feature includes two-variab.e algeb.aic expression modulo 2 w and 2 b.x-Type operations, b.x-Type I & b.x-Type II. Each b.x-Type operation uses two (w-b.t) registers. b.x-Type I works much like two registers (A & b.or C & D) operation in RC6 b.t in b.x-Type II b.twise exclusive-or is swapped b. integer addition modulo 2 w used in b.x-Type I and vice-versa, it improves Diffusion in each round. This enhanced version needs 2r+4 additive round-keys and uses every round-key twice for encrypting the file. This enhanced version performs b.tter with respect to RC5 [4, 5] and RC6 [2, 3] when file size is larger.
We propose a new hierarchical collective learning (HCL) strategy for particle swarm optimization. The algorithm shows b.tter performance than popular PSOs on standard b.nchmark functions. The algorithm has three compo...
详细信息
ISBN:
(纸本)9781467345279
We propose a new hierarchical collective learning (HCL) strategy for particle swarm optimization. The algorithm shows b.tter performance than popular PSOs on standard b.nchmark functions. The algorithm has three components: a) initialization b. create exemplars c) fly under guidance of exemplars created in previous step. The HCL strategy is applied for the first two parts. In collective learning (CL), an exemplar is created b. selecting the b.st comb.nation of values for every dimension from the group memb.rs for the fittest one. In hierarchical part, this process is repeated for some levels, where in every level, the exemplars from the last level act as the memb.r for the next higher level. During flying the initial population flies towards the final exemplar in proportion their fitness. These processes i.e. “create exemplars” and flying is repeated till a stop criterion is met. The process of flying reduces the common prob.ems “oscillation” and “two steps forward one step b.ckward” in PSO.
Algorithms are the foundation of computerscience and engineering, which instruct the computer to do the required task efficiently. Design and Analysis of Algorithms (DAA) course is aimed to develop prob.em solving sk...
详细信息
Algorithms are the foundation of computerscience and engineering, which instruct the computer to do the required task efficiently. Design and Analysis of Algorithms (DAA) course is aimed to develop prob.em solving skills, choose appropriate design strategy and analyze given algorithm for its performance in the student community. In this paper authors propose active learning methodologies like Manifold Prob.em Assignment, Inspection of Algorithms, technique b.sed Learning, Identification and Designing Method and Realization of Algorithm to meet ab.ve mentioned ob.ectives. Since the course is taught along with tutorial, different set of prob.ems are given across the b.tches to develop and analyze an algorithm b. choosing appropriate design technique. Tests are conducted on each design strategy, which helped the students to apply them to the design process. At the end of the semester students are given set of prob.ems, where they are expected to choose suitab.e design strategy like divide and conquer, decrease and conquer and transform and conquer to write and analyze the algorithm. Through this pedagogical activity, the Program Outcomes 3a and 3c of Ab.T 3a-3k are achieved. 70% of learners strongly agreed that their prob.em solving ab.lity is enhanced and 30% of learners agreed that there is an improvement in algorithm design ab.lity.
Wireless Mesh Network is one of the b.dding technologies in wireless networks. Routing in WMN is complicated and unpredictab.e than wired network, due to unstab.e link states and interference b.tween neighb.r routers....
详细信息
Wireless Mesh Network is one of the b.dding technologies in wireless networks. Routing in WMN is complicated and unpredictab.e than wired network, due to unstab.e link states and interference b.tween neighb.r routers. Since WMN is supporting hyb.id architecture, a primitive metric like hop count is not efficient to route the information in the network. The Expected Transmission count (ETX) is radio b.sed metric and it reveals the link conditions in the form of delay, loss of packets and b.ndwidth etc. It uses cross layer approach to direct the data b. considering asymmetric nature of wireless links in WMN and captures the link state through the numb.r of retransmissions. Thus ETX forwards the data b.sed on link quality (or state) and provides effective communication b.tween routers. Hyb.id Wireless Mesh Protocol (HWMP) is b.sed on IEEE 802.11s and it is prominent protocol for hyb.id WMN. The authors aspire to provide effective communication in WMN using link state b.sed metric ETX. This paper discusses ab.ut the HWMP with ETX (HWMP-ETX) and analyses the performance of WMN using end-to-end delay and good put parameters. The results show that considerab.e improvement exists in all the ab.ve mentioned parameters b. using HWMP-ETX than HWMP with hop count.
Faculty selection procedure in any educational organization is a multi-criteria decision making (MCDM) prob.em. Faculty memb.rs play an important role while judging the quality of an educational institute. Thus, educa...
详细信息
Faculty selection procedure in any educational organization is a multi-criteria decision making (MCDM) prob.em. Faculty memb.rs play an important role while judging the quality of an educational institute. Thus, educational organizations are interested to recruit the b.st faculty in order to provide a quality education to their students. As, this MCDM prob.em requires multiple criteria and a finite set of candidate alternatives, an amalgamation of various MCDM methods can b. used to solve such prob.em. In this paper a study has b.en made on ranking five alternatives with the help of three step methodology comb.ning FAHP with PROMETHEE-2 and TOPSIS, comparing the results and finally determining the rank using group decision making method. This proposed model yields the ranking of the five candidates in a faculty interview considering several experts' opinion.
A review of the effects of proton, neutron, γ-ray and electron irradiation on GaN materials and devices is presented. Neutron irradiation tends to create disordered regions in the GaN, while the damage from the other...
详细信息
ISBN:
(纸本)9781632660008
A review of the effects of proton, neutron, γ-ray and electron irradiation on GaN materials and devices is presented. Neutron irradiation tends to create disordered regions in the GaN, while the damage from the other forms of radiation is more typically point defects. In all cases, the damaged region contains carrier traps that reduce the mob.lity and conductivity of the GaN and at high enough doses, a significant degradation of device performance. GaN is several orders of magnitude more resistant to radiation damage than GaAs of similar doping concentrations. In terms of heterostructures, preliminary data suggests that the radiation hardness decreases in the order AlN/GaN >AlGaN/GaN > InAlN/GaN, consistent with the average b.nd strengths in the Al-b.sed materials. The radiation damage can alter electric field profiles and drain current due to trapped negative charge and lead to increased b.eakdown voltages and apparent reliab.lity. Simulations of this effect show good agreement with experiments. We also discuss the literature on effects of different radiation types on the performance of GaN-b.sed high electron mob.lity transistors.
暂无评论