WMN technology is different from traditional wireless networks due to its several characteristics such as increased reliability, low installation costs, large coverage area, automatic network connectivity etc. WMN is multi-hop network consisting of routers and gateways and mobile nodes. Routing in such a heterogeneous environment has put enormous challenges to participating nodes and routers to deliver packet from one corner to other. The difficulty in managing or controlling the link quality and reliability in wireless mesh networks makes it very hard to find and maintain a good and stable path from the source to the destination. Also, the wireless medium is broadcast in nature, transmission on one link may interfere with the transmissions on the neighboring links. This broadcast medium contention brings fundamental constraints on the routing performance, such as throughput, delay, mobility, bandwidth etc. It is very challenging to achieve optimal routing performance. In WMN, any node may compromise the routing protocol functionality by disrupting the route discovery process. In this paper, we understand the various routing problems related to throughput, bandwidth, and mobility. In this paper, we have proposed a new routing technique that is totally network dependent and will remove all the routing problems in WMNs.
Keywords: - Bandwidth, Mobility, Wireless Mesh Networks, Mobile Ad hoc network, topology, AODV, DSR
The Texture classification is an important task in the field of object recognition. The texture classification is highly dependent on the segmentation of objects in the input image. So, the present paper proposes a morphological approach to detect the objects and extract the edges of the detected objects. Then the present paper measures recurrence of the square primitive pattern (SPP) in each of the 3×3 local window. Based on this measurement, the textures are precisely classified. This is proved by the experimental results conducted on different textures.
Keywords: - About five key words in alphabetical order, separated by comma
In this paper, the results showed experimental transition strengths of 52V by two-step gamma cascades, lifetime levels, width levels and branch ratio. 51V nucleus was activated by thermal neutron at the 3rd horizontal channel of Dalat nuclear reactor, and the 51V(nth, 2 gamma)52V reaction was applied in this research. The two-step gamma cascades were collected by event-event gamma coincidence system. The Summation of Amplitude Coincidence Pulses method (SACP) was treated with the experimental data. The results were not affected by background based on SACP method. This method got intensities, energies of two-step cascades directly. The experimental gamma transition strengths were applied to the single particle model. In comparison with the electromagnetic transition probabilities, and rule of multi orders, the spin and parity of intermediate levels were calculated and refreshed.
Keywords: - Two-step gamma cascade, 51V (nth, 2 gamma)52V, Gamma transition strength, Lifetime, Branch ratio, Spin and parity.
In this paper an influence of simulated thermal cycle on properties and HAZ structure of 10 mm thick S700MC steel plates. Simulation and recording of thermal cycles were tested on laboratory stand equipped in thermovision camera and resistant heat source. Simulation was prepared for simple and complex thermal cycle. Specimens were tested on impact, strength test and also hardness and metallographic tests. Results of researches gave the possibilities to show an influence of welding thermal cycle on properties and HAZ structure of S700MC steel. It was possible also to indicate an optimal linear energy range for welding with high quality.
Keywords: - HAZ, S700MC steel welding, TMCP welding thermal cycle
[1] Park K. S., Cho Y. H.: Comparison of fatigue properties of welded TMCP steels and normalized steel, Pohang University of Science and Technology, Pohang, Korea 2003.
[2] TMCP steel plates for building structures. Nippon Steel Corporation.
[3] Sueyoshi T., Ishikawa N., Iwase A.: The role of niobium in the retardation of the early stage of austenite recovery in hot-deformed steels. Materials Science and Engineering, vol. 250 (1998), No. 1, pp. 2-7.
[4] Yurioka N.: TMPC steels and their welding. Welding in the World. Vol. 35, 6/1995
[5] Zając Z., Langeborg R., Siwecki T.: The role of nitrogen in microalloyed steels. Microalloying 95. Pitsburg 1995
This paper presents the reducing method of the complexity in motion estimation for video coding by using the depth information. We obtain two regions of each picture within video sequence from distance information calculated by depth camera. Background region has large distance, but object region has small distance. If a current block is the object region, then motion is searched within the object region of reference picture. Also if a current block is the background region, then motion is searched within the background region of reference picture. From simulation results, we can see that the proposed method compared to the full search method remains the almost same as the motion estimated difference signal and significantly reduces the searching complexity.
Keywords: - Depth Information, Motion Estimation, Searching Complexity
[1] S.-k. Kwon, A. Tamhankar, and K. R. Rao, Overview of H.264/MPEG-4 Part 10, Journal of Visual Communications and Image Representation, 17( 2), 2006, 186-216.
[2] K. Ugur, K. Andersson, A. Fuldseth, G. Bjøntegaard, L. P. Endresen, J. Lainema, A. Hallapuro, J. Ridge, D. Rusanovskyy, C. Zhang, A. Norkin, C. Priddle, T. Rusert, J. Samuelsson, R. Sj¨oberg, and Z. Wu, High Performance, Low Complexity Video Coding and the Emerging HEVC Standard, IEEE Trans. Circuit Syst. Video Technology, 20(12), 2010, 1688-1697.
[3] W.-J. Han, J. Min, I.-K. Kim, E. Alshina, A. Alshin, T. Lee, J. Chen, V. Seregin, S. Lee, Y. M. Hong, M.-S. Cheon, N. Shlyakhov, K. McCann, T. Davies, and J.-H.Park, Improved Video Compression Efficiency through Flexible Unit Representation and Corresponding Extension of Coding Tools, IEEE Trans. Circuit Syst. Video Technology, 20( 12), 2010, 1709-1720.
[4] F. Bossen, V. Drugeon, E. Francois, J. Jung, S. Kanumuri, M. Narroschke, H. Sasai, J. Sole, Y. Suzuki, T. K. Tan, T. Wedi, S. Wittmann, and P. Yin, Y. Zheng, Video Coding using a Simplified Block Structure and Advanced Coding Techniques, IEEE Trans. Circuit Syst. Video Technology, 20(12), 2010, 1667-1675.
[5] S. Zhu and K.-K.Ma, A New Diamond Search Algorithm for Fast Block-Matching Motion Estimation, IEEE Trans. Circuit Syst. Video Technology, 10(2), 2000, 287-290.
In recent decades the tourism sector has grown rapidly to become a pillar of the global economy, political cooperation, social change and far - reaching advances in technology; both in communications and infrastructure. Tourism has closely been connected to progress of Information Communication Technology for over 30 years. With increasing complexity of tourism business models and tasks, there is a clear need of the next generation in tourism sector. Therefore, we proposing here new structure e-tourism which can support flexible automation, integration, computation, storage, and collaboration. In every year, millions of pilgrims visiting our Holy City, But on the part of tourism and development, Saudi Arabia is less than Europe, America and Asia in the sector of tours and travel development. There is no much significance research proposal or article on e-tourism & development in our Saudi Kingdom. This paper deals with e-tourism, innovation and designing proposal suitable for Kingdom of Saudi Arabia. Also we discussed about problems and solutions related to the e-tourism sector adoptable by the industry and government organization in Saudi Arabia.
Keywords: - E-tourism, Travel Agent, Web portal, Customer, ICT etc.,
Ad hoc wireless networks consist of mobile nodes that communicate with each other without an infrastructure. A reduction in routing overload and efficient use of resources are two very important issues in these networks. In this paper, a new routing algorithm called POSITION BASED HYBRID ROUTING ALGORITHM (PBHRA)with BANDWIDTH. The main goal is effective use of static bandwidth by reducing the routing overload but also battery life, density, cost and delay time are efficiently used by reducing the amount of data to be held and the number of operations to be done for routing by any node in the network. In order to achieve above goals, the principle of DYNAMIC SOURCE ROUTING (DSR) protocol has been utilized.
Keyworkds: - Ad – Hoc, Routing, Wireless Routing, MATLAB
Digital Watermarking may be a technology used for the copyright protection of digital applications. During this paper, a comprehensive approach for watermarking digital video is introduced, and a hybrid digital video watermarking scheme based on Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). PCA helps in reducing correlation among the wavelet coefficients obtained from wavelet decomposition of each video frame thereby dispersing the watermark bits into the uncorrelated coefficients. The video frames are first decompose using DWT and also the binary watermark is embedded in the principal components of the low frequency wavelet coefficients. An imperceptible high bit rate watermark embedded is robust against various attacks that will be carried out on the watermarked video, like filtering, geometric attacks and contrast adjustment.
Keywords: - Binary Watermark., Digital Video, Discrete Wavelet Transform , Inverse DWT, Inverse PCA, Principal Component Analysis.
[1] Yeo and M.M. Yeung, "Analysis and synthesis for new digital video applications," icip, International Conference on Image Processing (ICIP'97),vol. 1, pp.1,1997.
[2] M. Natarajan , G. Makhdumi1,"Safeguarding the Digital Contents: Digital Watermarking," DESIDOC Journal of Library & Information Technology, Vol. 29, May 2009, pp. 29-35.
[3] C.I. Podilchuk, E.J. Delp "Digital watermarking: algorithms and applications," Signal Processing Magazine, Vol 18,pp. 33-46,IEEE, July 2001.
[4] G. Doërr, J.L. Dugelay, "Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking," Signal Processing, IEEE, Transactions, vol. 52, pp. 2955 – 2964, 2004.
[5] M. K. Thakur, V. Saxena, J. P.Gupta, "A Performance Analysis of Objective Video Quality Metrics for Digital Video Watermarking," Computer Science and Information Technology (ICCSIT), 2010, 3rd IEEE International Conference ,Vol. 4, pp. 12 - 17,2010.
Matrix transpositions is a fundamental operation in linear algebra and in Fast Fourier transforms and applications in numerical analysis, image processing and graphics. The optimal cache oblivious matrix transpositions makes Ο (1+N2 / B) cache misses. In this paper we implement divide and conquer based algorithm for matrix transposition through recursive process.
Keywords: - Cache Memory; Cache oblivious; Cache hit; Cache miss; Tag.
© 2019 All Rights Reserved | Design by iosrjen