swimming hasbecome one of the major routines nowadays among people. People mostly use swimming pools for exercise or recreation. According to statistics one hour of swimming burns 30% more calories than one hour of r...
详细信息
A mobile ad hoc network (MANET) is a decentralized network that consists of mobile nodes. Each node operates with the limited battery power to forward the data packets from the source to a group of the nodes. In a MAN...
详细信息
biometrics is a technique of identity verification that isbased on the principle of measurable physiological characteristics like vein patterns from sclera region. sclera vein is a new biometric recognition method fo...
biometrics is a technique of identity verification that isbased on the principle of measurable physiological characteristics like vein patterns from sclera region. sclera vein is a new biometric recognition method for human identification. sclera vessel pattern's images are saturated and the arrangement of vessel patterns is multi layered and also it is quite complex to extract the features of vein from sclera. In order eliminate high frequency noise components present in sclera, low pass filter is used. To extract the features, a set of vessel segments combine to create Y shaped branches often belonging to same sclera layer. Mapping scheme isbased on Y shaped structure in the sclera that is observed to be more stable feature and is used to efficiently eliminate the most unlikely matches. The observational result shows that the proposed method can dramatically provide more secure authentication without compromising the recognition accuracy.
A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmi...
详细信息
A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit data each other directly, because the distance between the source and destination is greater than the transmission range between them, hence the demand for intermediate node(s) to relay. Relay nodes in applying network coding, follow the decode-and-forward protocol. In proposed work, we consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector are generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. There are several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sourcessend independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node.
The growing complexity and scale of Industrial Internet of Things (IIoT) networks have made them increasingly vulnerable to cyber-attacks, underscoring the need for reliable and precise Intrusion Detection systems (ID...
详细信息
The use of multiple languages with different scripts is a common theme in India. There is an emerging need to digitise documents that may be handwritten or available solely as images. This necessitates a system for mu...
详细信息
sketching and drawing is the hallmark of an architect's toolkit. Architect needs to somehow show his idea from hissketch and also designing a sketch image from a building image will help the architects to record ...
详细信息
In the network data sharing is an important functionality. In many organizations data ownersstore their data into the storage server which can certainly share data with other followers (users). Earlier approaches eit...
详细信息
In the network data sharing is an important functionality. In many organizations data ownersstore their data into the storage server which can certainly share data with other followers (users). Earlier approaches either unreasonably expose the uniqueness of a data owner to the untrusted server or any unexclusive vouchers, or innovate substantial expenses on confirmation metadata to preserve concealment. In the proposed system, group manager is introduced and takes charge of user registration, and enlightening the real uniqueness of a dispute data proprietor. Group manager will generate a key and provide to the user, who want to access the data from the storage server. Consequently proposed method reduces the computation overhead and provides high performance due to revoke verification procedure.
Agriculture is the major factor contributing to Indian Economy. According to the statistics its GDP sector composition is 17.9%. India is the second larger producer of agricultural products. In order to produce more a...
详细信息
The utilization of social Networking sites (sNs) like Twitter is expanding quickly and particularly by the more youthful age. The profit capacity of sNs enables us to express their interests, emotions and offer their ...
详细信息
暂无评论