Academy & Industry Research Collaboration Center

Displaying 1-40 of 1783 results

  • White Papers // Apr 2015

    Secured Smart System Desing in Pervasive Computing Environment Using VCS

    Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors embedded in mobile phones. The information generated by these devices is a big task in collection and storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, the authors made an...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Apr 2015

    Adaptive Supply Voltage Management for Low Power Logic Circuitry Operating at Subthreshold

    With the rise in demand of portable hand held devices and with the rise in application of wireless sensor networks and RFID reduction of total power consumption has become a necessity. To save power, the authors operate the logic circuitry of their devices at sub-threshold. In sub-threshold the drain current...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    Clustering Assisted Fundamental Matrix Estimation

    In computer vision, the estimation of the fundamental matrix is a basic problem that has been extensively studied. The accuracy of the estimation imposes a significant influence on subsequent tasks such as the camera trajectory determination and 3D reconstruction. In this paper, the authors propose a new method for fundamental...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    A Review on Evaluation Metrics for Data Classification Evaluations

    Evaluation metric plays a critical role in achieving the optimal classifier during the classification training. Thus, a selection of suitable evaluation metric is an important key for discriminating and obtaining the optimal classifier. This paper systematically reviewed the related evaluation metrics that are specifically designed as a discriminator for optimizing...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    A Data Mining Approach to Predict Prospective Business Sectors for Lending in Retail Banking using Decision Tree

    A potential objective of every financial organization is to retain existing customers and attain new prospective customers for long-term. The economic behavior of customer and the nature of the organization are controlled by a prescribed form called Know Your Customer (KYC) in manual banking. Depositor customers in some sectors (business...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    Improved Text Clustering with Neighbors

    With ever increasing number of documents on web and other repositories, the task of organizing and categorizing these documents to the diverse need of the user by manual means is a complicated job, hence a machine learning technique named clustering is very useful. Text documents are clustered by pair wise...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    An Improvised Frequent Pattern Tree Based Association Rule Mining Technique with Mining Frequent Item Sets Algorithm and a Modified Header Table

    In today's world there is a wide availability of huge amount of data and thus there is a need for turning this data into useful information which is referred to as knowledge. This demand for knowledge discovery process has led to the development of many algorithms used to determine the...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    Data Mining for Prediction of Human Performance Capability in the Software-Industry

    The recruitment of new personnel is one of the most essential business processes which affect the quality of human capital within any company. It is highly essential for the companies to ensure the recruitment of right talent to maintain a competitive edge over the others in the market. However IT...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    A Framework for Outlier Detection in Geographic Spatial Data

    Outlier detection is very interesting, useful and challenging problem in the field of data mining. Because of sparse data clustering algorithm which is based on distance will not work to find outliers in spatial data. Problem of finding irregular feature in spatial data need to be explore. Many existing approaches...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    Product Personification: Parag Model to Successful Software Product Development

    The ubiquity and abundance of web, mobile, hybrid and wearable software in today's technology driven lifestyle is unmistakable in personal, social and professional life highlighting the importance of software product development. With the growth of agile and lean approaches to product development, the responsibilities associated with many of the traditional...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    Effective Data Mining for Proper Mining Classification using Neural Networks

    With the development of database, the data volume stored in database increases rapidly and in the large amounts of data much important information is hidden. If the information can be extracted from the database they will create a lot of profit for the organization. The question they are asking is...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    Time Critical Multitasking for Multicore Microcontroller Using XMOS KIT

    In this paper, the authors presents the research work on multicore microcontrollers using parallel and time critical programming for the embedded systems. Due to the high complexity and limitations, it is very hard to work on the application development phase on such architectures. The experimental results mentioned in the paper...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2015

    A Novel Methodology for Task Distribution in Heterogeneous Reconfigurable Computing System

    Modern embedded systems are being modeled as Heterogeneous Reconfigurable Computing Systems (HRCS) where reconfigurable hardware i.e. Field Programmable Gate Array (FPGA) and soft core processors acts as computing elements. So, an efficient task distribution methodology is essential for obtaining high performance in modern embedded systems. In this paper, the authors...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    Efficient Data Protection for Enterprise Data Centers

    In this paper, the authors address the major challenges that large organizations face in protecting their valuable data. Some of these challenges include recovery objectives, data explosion, cost and the nature of data. The paper explores multiple methods of data protection at different storage levels. RAID disk arrays, snapshot technology,...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    A Low Power CMOS Analog Circuit Design for Acquiring Multichannel EEG Signals

    EEG signals are the signatures of neural activities and are captured by multiple-electrodes and the signals are recorded from pairs of electrodes. To acquire these multichannel signals a low power CMOS circuit was designed and implemented. The design operates in weak inversion region employing sub threshold source coupled logic. A...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    Mining Closed Sequential Patterns in Large Sequence Databases

    Sequential pattern mining is studied widely in the data mining community. Finding sequential patterns is a basic data mining method with broad applications. Closed sequential pattern mining is an important technique among the different types of sequential pattern mining, since it preserves the details of the full pattern set and...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    Transaction Management Techniques and Practices in Current Cloud Computing Environments : A Survey

    Distributed DataBase Management Systems (DDBMS) have limited capacity to manage overhead of distributed transactions due to certain failures. These types of failures don't guarantee the enforcement of transactional properties and which reduces the scalability and availability of these systems. Research in this area proved that scaling out while providing consistency...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    Model Driven Process for Real-Time Embedded Systems Software Development and Validation

    Embedded systems shape everybody world nowadays. It's almost impossible to imagine everybody day to day life without it. Examples can include cell phones, home appliances, energy generators, satellites, automotive components etc. it is even far more complex if there are real-time and interface constraints. Developing real-time embedded systems is significantly...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    Transaction Processing, Techniques in Mobile Database: An Overview

    The advancement in mobile technology and wireless network increase the using of mobile device in database driven application, these application require high reliability and availability due to nature inheritance of mobile environment, transaction is the center component in database systems, In this paper the authors present useful work done in...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    Relationship Between Organizational Factors, Technological Factors and Enterprise Resource Planning System Implementation

    There are three stages of Enterprise Resource Planning system (ERP) implementation; which are pre-implementation, mid-implementation and post-implementation. In pre-implementation stage the pervious researchers found that it fail in organizational and technological factors. Therefore, this paper studies the technological factors availability and the organizational factor readiness at Greater Amman Municipality (GAM)...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    A Cloud Security Approach for Data at Rest Using FPE

    In a cloud scenario, biggest concern is around security of the data. "Both data in transit and at rest must be secure" is a primary goal of any organization. Data in transit can be made secure using TLS level security like SSL certificates. But data at rest is not quite...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    Error Isolation and Management in Agile Multi-Tenant Cloud based Applications

    Management of errors in multi-tenant cloud based applications remains a challenging problem. This problem is compounded due to multiple versions of application serving different clients, agile nature in which the applications are released to the clients, and variations in specific usage patterns of each client. The authors propose a framework...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    An Optimized Round Robin CPU Scheduling Algorithm with Dynamic Time Quantum

    CPU scheduling is one of the most crucial operations performed by operating system. Different algorithms are available for CPU scheduling amongst them RR (Round Robin) is considered as optimal in time shared environment. The effectiveness of round robin completely depends on the choice of time quantum. In this paper a...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2015

    Dynamic Floating Output Stage for Low Power Buffer Amplifier for LCD Application

    With increasing demand of low-power portable LCD panel there was hard-core research to develop it as with the low-power means the authors have to decrease the static loss of the component or the blocks used in the driving scheme of the LCD panel, the driving scheme of LCD panel, which...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    Data Mining in Higher Education : University Student Dropout Case Study

    Now-a-days, higher learning institutions encounter many problems, which keep them away from achieving their quality objectives. Most of these problems caused from knowledge gap. Knowledge gap is the lack of significant knowledge at the educational main processes such as advising, planning, registration, evaluation and marketing. In this paper, the authors...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    A Novel Algorithm for Mining Closed Sequential Patterns

    Sequential pattern mining algorithms produce an exponential number of sequential patterns when mining long patterns or at low support thresholds. Most of the existing algorithms mine the full set of sequential patterns. However, it is sufficient to mine closed sequential patterns from which the total set of sequential patterns can...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    Data-Performance Characterization of Frequent Pattern Mining Algorithms

    Big data quickly comes under the spotlight in recent years. As big data is supposed to handle extremely huge amount of data, it is quite natural that the demand for the computational environment to accelerates, and scales out big data applications increases. The important thing is, however, the behavior of...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    Accessing Secured Data in Cloud Computing Environment

    "Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider's software and hardware to managing security and other issues. Some of the...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    Service Oriented Configuration Management of Software Architecture

    "Software Configuration Management (SCM) is an important activity in the software engineering life cycle. SCM by control of the evolution process of products leads to constancy and stability in software systems. Now-a-days, use of software configuration management is essential during the process of software development as rules to control and...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    A Secure Service Provisioning Framework for Cyber Physical Cloud Computing Systems

    Cyber Physical Systems (CPS) is mission critical systems engineered by combination of cyber and physical systems respectively. These systems are tightly coupled, resource constrained systems and have dynamic real time applications. Due to the limitation of resources and in order to improve the efficiency of the CPS systems, they are...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    Agent Based Frameworks for Distributed Association Rule Mining: An Analysis

    Distributed Association Rule Mining (DARM) is the task for generating the globally strong association rules from the global frequent itemsets in a distributed environment. The intelligent agent based model, to address scalable mining over large scale distributed data, is a popular approach to constructing Distributed Data Mining (DDM) systems and...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    Advanced Compression Technique for Random Data

    In this paper, the authors propose a technique to compress any data irrespective of its type. Compressing random data especially has always proved to be a difficult task. With very less patterns and logic within the data it quickly reaches a point where no more data can be represented within...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    Disparity Map Generation Based on Trapezoidal Camera Architecture for Multi-View Video

    Visual content acquisition is a strategic functional block of any visual system. Despite its wide possibilities, the arrangement of cameras for the acquisition of good quality visual content for use in multi-view video remains a huge challenge. This paper presents the mathematical description of trapezoidal camera architecture and relationships which...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    Leader Follower Formation Control of Ground Vehicles Using Camshift Based Guidance

    Autonomous ground vehicles have been designed for the purpose of that relies on ranging and bearing information received from forward looking camera on the Formation control. A visual guidance control algorithm is designed where real time image processing is used to provide feedback signals. The vision subsystem and control subsystem...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    Review of Black Hole and Grey Hole Attack

    Black hole and grey hole attack is most happening attacks in mesh networks. Mesh networks means non-static networks with making loops of networks with the help of active hotspots. In wireless networks all the communication between the nodes is happening wirelessly and the nodes are so much resource constraint that...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    Error Resilient for Multiview Video Transmissions with GOP Analysis

    In this paper, the authors examine the effects of group of pictures on H.264 multiview video coding bitstream over an erroneous network with different error rates. The study considers analyzing the bitrate performance for different GOP and error rates to see the effects on the quality of the reconstructed multiview...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    A Case Study: Task Scheduling Methodologies for High Speed Computing Systems

    High speed computing meets ever increasing real-time computational demands through the leveraging of flexibility and parallelism. The flexibility is achieved when computing platform designed with heterogeneous resources to support multifarious tasks of an application where as task scheduling brings parallel processing. The efficient task scheduling is critical to obtain optimized...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    An Effective Pre-Processing Algorithm for Information Retrieval Systems

    The Internet is probably the most successful distributed computing system ever. However, the authors' capabilities for data querying and manipulation on the internet are primordial at best. The user expectations are enhancing over the period of time along with increased amount of operational data past few decades. The data-user expects...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    Implementation of an Arithmetic Logic Using Area Efficient Carry Look-Ahead Adder

    An Arithmetic Logic Unit (ALU) acts as the basic building blocks or cell of a central processing unit of a computer. And it is a digital circuit comprised of the basic electronics components, which is used to perform various function of arithmetic and logic and integral operations further the purpose...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    A H-K Clustering Algorithm for High Dimensional Data Using Ensemble Learning

    Advances made to the traditional clustering algorithms solve the various problems such as curse of dimensionality and sparsity of data for multiple attributes. The traditional H-K clustering algorithm can solve the randomness and apriority of the initial centers of K-means clustering algorithm. But when the authors apply it to high...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Aug 2010

    Design & Deploy Web 2.0 Enable Services Over Next Generation Network Platform

    The Next Generation Networks (NGN) aims to integrate for IP-based telecom infrastructures and provide most advanced & high speed emerging value added services. NGN capable to provide higher innovative services, these services will able to integrate communication and Web service into a single platform. IP Multimedia Subsystem, a NGN leading...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Oct 2010

    Semantic Query Optimisation With Ontology Simulation

    Semantic Web is, without a doubt, gaining momentum in both industry and academia. The word "Semantic" refers to "Meaning" - a semantic web is a web of meaning. In this fast changing and result oriented practical world, gone are the days where an individual had to struggle for finding information...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2010

    Image Compression and Watermarking Scheme Using Scalar Quantization

    This paper presents a new compression technique and image watermarking algorithm based on Contourlet Transform (CT). For image compression, an energy based quantization is used. Scalar quantization is explored for image watermarking. Double filter bank structure is used in CT. The Laplacian Pyramid (LP) is used to capture the point...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jun 2010

    Cross Layer Aware Adaptive MAC Based on Knowledge Based Reasoning for Cognitive Radio Computer Networks

    In this paper the authors are proposing a new concept in MAC layer protocol design for Cognitive radio by combining information held by physical layer and MAC layer with analytical engine based on knowledge based reasoning approach. In the proposed system a cross layer information regarding Signal to Interference and...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2011

    A Qos Routing Protocol Based on Available Bandwidth Estimation for Wireless Ad Hoc Networks

    At the same time as the emergence of multimedia in mobile Ad hoc networks, research for the introduction of the Quality of Service (QoS) has received much attention. However, when designing a QoS solution, the estimation of the available resources still represents one of the main issues. This paper suggests...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jul 2011

    Assured Neighbor Based Counter Protocol on MAC-Layer Providing Security in Mobile Ad Hoc Networks

    In this paper, the authors have taken out the concern of security on a Medium Access Control layer implementing Assured Neighbor based Security Protocol to provide the authentication, confidentiality and taking in consideration High speed transmission by providing security in parallel manner in both Routing and Link Layer of Mobile...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jul 2010

    Pattern Analysis and Signature Extraction for Intrusion Attacks on Web Services

    The increasing popularity of web service technology is attracting hackers and attackers to hack the web services and the servers on which they run. Organizations are therefore facing the challenge of implementing adequate security for Web Services. A major threat is that of intruders which may maliciously try to access...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    Disparity Map Generation Based on Trapezoidal Camera Architecture for Multi-View Video

    Visual content acquisition is a strategic functional block of any visual system. Despite its wide possibilities, the arrangement of cameras for the acquisition of good quality visual content for use in multi-view video remains a huge challenge. This paper presents the mathematical description of trapezoidal camera architecture and relationships which...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    Leader Follower Formation Control of Ground Vehicles Using Camshift Based Guidance

    Autonomous ground vehicles have been designed for the purpose of that relies on ranging and bearing information received from forward looking camera on the Formation control. A visual guidance control algorithm is designed where real time image processing is used to provide feedback signals. The vision subsystem and control subsystem...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    Review of Black Hole and Grey Hole Attack

    Black hole and grey hole attack is most happening attacks in mesh networks. Mesh networks means non-static networks with making loops of networks with the help of active hotspots. In wireless networks all the communication between the nodes is happening wirelessly and the nodes are so much resource constraint that...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    Error Resilient for Multiview Video Transmissions with GOP Analysis

    In this paper, the authors examine the effects of group of pictures on H.264 multiview video coding bitstream over an erroneous network with different error rates. The study considers analyzing the bitrate performance for different GOP and error rates to see the effects on the quality of the reconstructed multiview...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    Data Mining in Higher Education : University Student Dropout Case Study

    Now-a-days, higher learning institutions encounter many problems, which keep them away from achieving their quality objectives. Most of these problems caused from knowledge gap. Knowledge gap is the lack of significant knowledge at the educational main processes such as advising, planning, registration, evaluation and marketing. In this paper, the authors...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    A Novel Algorithm for Mining Closed Sequential Patterns

    Sequential pattern mining algorithms produce an exponential number of sequential patterns when mining long patterns or at low support thresholds. Most of the existing algorithms mine the full set of sequential patterns. However, it is sufficient to mine closed sequential patterns from which the total set of sequential patterns can...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    Data-Performance Characterization of Frequent Pattern Mining Algorithms

    Big data quickly comes under the spotlight in recent years. As big data is supposed to handle extremely huge amount of data, it is quite natural that the demand for the computational environment to accelerates, and scales out big data applications increases. The important thing is, however, the behavior of...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2014

    A Near-Duplicate Detection Algorithm to Facilitate Document Clustering

    Web mining faces huge problems due to duplicate and near duplicate web pages. Detecting near duplicates is very difficult in large collection of data like "Internet". The presence of these web pages plays an important role in the performance degradation while integrating data from heterogeneous sources. These pages either increase...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2014

    Incremental Learning From Unbalanced Data with Concept Class, Concept Drift and Missing Features: A Review

    Recently, stream data mining applications has drawn vital attention from several research communities. Stream data is continuous form of data which is distinguished by its online nature. Traditionally, machine learning area has been developing learning algorithms that have certain assumptions on underlying distribution of data such as data should have...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Students' Performance Prediction System Using Multi Agent Data Mining Technique

    A high prediction accuracy of the students' performance is more helpful to identify the low performance students at the beginning of the learning process. Data mining is used to attain this objective. Data mining techniques are used to discover models or patterns of data, and it is much helpful in...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Experiments on Hypothesis "Fuzzy K-Means Is Better Than K-Means for Clustering"

    Clustering is one of the data mining techniques that have been around to discover business intelligence by grouping objects into clusters using a similarity measure. Clustering is an unsupervised learning process that has many utilities in real time applications in the fields of marketing, biology, libraries, insurance, city-planning, earthquake studies...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Finding Frequent Subpaths in a Graph

    The problem considered is that of finding frequent sub-paths of a database of paths in a fixed undirected graph. This problem arises in applications such as predicting congestion in network and vehicular traffic. An algorithm, called AFS, based on the classic frequent itemset mining algorithm Apriori is developed, but with...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jul 2013

    Low Power-Area GDI & PTL Techniques Based Full Adder Designs

    As the applications requiring low power and high performance circuits increasing, this has intensified the research effort in low power microelectronics. Full adder circuit is functional building block and most critical component of complex arithmetic circuits like microprocessors, digital signal processors or any ALUs. Full adder circuit is functional building...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jul 2013

    Semi Adiabatic ECRL and PFAL Full Adder

    Market demands have compelled the VLSI industry stake holders to integrate more and more number of functionalities and which is also being well supported by the advances in fabrication techniques. This has challenged the circuit designers to design the power ware circuits and in the process many experts are using...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2014

    Design of Radix-8 Booth Multiplier Using Koggestone Adder for High Speed Arithmetic Applications

    In this paper, the authors present the design and implementation of radix-8 booth Multiplier. The number of partial products are reduced to n/2 in radix-4We can reduce the number of partial products even further to n/3 by using a higher radix-8 in the multiplier encoding, thereby obtaining a simpler CSA...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2014

    Implementation of Unsigned Multiplier Using Modified CSLA

    Multiplications and additions are most widely and more often used arithmetic computations performed in all digital signal processing applications. Addition is the basic operation for many digital application. The aim is to develop area efficient, high speed and low power devices. Accurate operation of a digital system is mainly influenced...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // May 2012

    FPGA Implementation of Pipelined CORDIC Sine Cosine Digital Wave Generator

    The COordinate Rotation DIgital Computer (CORDIC) algorithm is well known iterative algorithm for performing rotations in digital signal processing applications. Hardware implementation of CORDIC results increase in critical path delay. Pipelined architecture is used in CORDIC to increase the clock speed and to reduce the critical path delay. In this...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2014

    Analysis of Signal Transition Activity in FIR Filters Implemented by Parallel Multiplier Accumulator Based on Modified Booth Algorithm

    The MAC architecture is used in real time digital signal processing and multimedia information processing which requires high throughput. A novel method to estimate the transition activity at the nodes of a multiplier accumulator architecture based on modified booth algorithm implementing finite impulse response filter is proposed in this paper....

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2014

    Delineation of Techniques to Implement on the Enhanced Proposed Model Using Data Mining for Protein Sequence Classification

    In post genomic era with the advent of new technologies a huge amount of complex molecular data are generated with high throughput. The management of this biological data is definitely a challenging task due to complexity and heterogeneity of data for discovering new knowledge. Issues like managing noisy and incomplete...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Apr 2014

    Towards a Low Cost ETL System

    Data warehouses store integrated and consistent data in a subject-oriented data repository dedicated especially to support business intelligence processes. However, keeping these repositories updated usually involves complex and time-consuming processes, commonly denominated as extract-transform-load tasks. These data intensive tasks normally execute in a limited time window and their computational requirements...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2014

    Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method

    "Information security risk analysis becomes an increasingly essential component of organization's operations. Traditional Information security risk analysis is quantitative and qualitative analysis methods. Quantitative and qualitative analysis methods have some advantages for information risk analysis. However, hierarchy process has been widely used in security assessment. A future research direction may...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jun 2011

    Digital Signature and Watermark Methods For Image Authentication using Cryptography Analysis

    The digital signature and watermarking methods are used for image authentication. Digital signature encodes the signature in a file separate from the original image. Cryptographic algorithms have suggested several advantages over the traditional encryption algorithms such as high security, speed, reasonable computational overheads and computational power. A digital watermark and...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Mar 2013

    Speech Recognition Using Euclidean Distance

    Digital processing of speech signal and voice recognition algorithm is very important for fast and accurate automatic voice recognition technology. The voice is a signal of infinite information. A direct analysis and synthesizing the complex voice signal is due to too much information contained in the signal. Therefore, the digital...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Aug 2011

    The Role of Technology Acceptance Model in Explaining Effect on E-Commerce Application System

    Today e-commerce has become crucial element to transform some of the world countries into an information society. Business To Consumer (B2C) in the developing countries is not yet a normalcy as compared to the developed countries. Consumer behaviour research has shown disappointing results regarding the overall use of the Web...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    Accessing Secured Data in Cloud Computing Environment

    "Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider's software and hardware to managing security and other issues. Some of the...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jan 2015

    Service Oriented Configuration Management of Software Architecture

    "Software Configuration Management (SCM) is an important activity in the software engineering life cycle. SCM by control of the evolution process of products leads to constancy and stability in software systems. Now-a-days, use of software configuration management is essential during the process of software development as rules to control and...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2014

    A Case Study: Task Scheduling Methodologies for High Speed Computing Systems

    High speed computing meets ever increasing real-time computational demands through the leveraging of flexibility and parallelism. The flexibility is achieved when computing platform designed with heterogeneous resources to support multifarious tasks of an application where as task scheduling brings parallel processing. The efficient task scheduling is critical to obtain optimized...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Oct 2012

    Design of a Reconfigurable DSP Processor With Bit Efficient Residue Number System

    Residue Number System (RNS), which originates from the Chinese remainder theorem, offers a promising future in VLSI because of its carry-free operations in addition, subtraction and multiplication. This property of RNS is very helpful to reduce the complexity of calculation in many applications. A residue number system represents a large...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Apr 2012

    Microcontroller Based Testing of Digital IP-Core

    Testing core based system on chip is a challenge for the test engineers. To test the complete SOC at one time with maximum fault coverage, test engineers prefer to test each IP-core separately. At speed testing using external testers is more expensive because of gigahertz processor. This paper is to...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Aug 2014

    Structural and Hardware Complexities of Microprocessor Design According to Moore's Law

    The most important factors of the microprocessors' development are improvement in the performance and increasing the speed of a microprocessor. Increasing the performance and the speed of a microprocessor majorly depends on the increasing of the number of transistors on a chip, which causes rapidly growing of microprocessor design complexity....

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Feb 2012

    Algebra of Three Dimensional Geometric Filters and Its Relevance in 3-D Image Processing

    In this paper, the authors give a novel concept of what they call as Geometric Filters defined over a 3-D rectangular grid of pixels. These G-Filters have potential applications to processing of volumetric images. In addition, the paper describes in brief the algebra of G-Filters by formulating a lattice of...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Apr 2012

    Real Time Facial Expression Recognition Using a Novel Method

    In this paper, the authors discuss a novel method for facial expression recognition system which performs facial expression analysis in a near real time from a live web cam feed. Primary objectives were to get results in a near real time with light invariant, person independent and pose invariant way....

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jun 2012

    Using MPGF for Querying MPEG-7 RDF Descriptions

    MPEG-7 and MPEG Query Format (MPQF) are two related standards developed by the Moving Picture Experts Group (MPEG) to address the multimedia retrieval problem. MPEG-7 aims to provide standardized comprehensive set of tools for description of audiovisual content, while MPQF aims to provide a standardized interface which unifies the retrieval...

    Provided By Academy & Industry Research Collaboration Center