Abstract View invariant action recognition method based on adaptive neuro fuzzy inference system (ANFIS) is proposed. ANFIS is an intelligence system which combines both fuzzy inference system and neural networks. Human body posture prototypes are identified by self organizing map. Fuzzy inference system are proposed to identify the action classification. This method maps, set of input data onto a set of desired output and it matches the data from the training and testing phase. Bayesian...
Mobile Wireless Sensor Network adds new design dimension to the existing MAC protocols due to the mobility of nodes. Collision probability and communication power consumption is increased in MWSN. In this paper, a hybrid MAC protocol which minimizes collision and achieves energy efficiency is proposed. Clustering of mobile nodes is done here and scheduled slots are provided by fusion nodes to each mobile sensor node during intra precinct communication. Contention based communication with...
It is possible to establish RAS in many ways such as Virtual Private Networks (VPNs) or POTS/PSTN. Regardless of the technique used to establish RAS, first it is essential for certain technologies called protocols to be in place. Protocol allows accessing the server and it secures the data transmission process once the connection is established. It is equally important to ensure that only authorized user access the remote access features. All the major OS include built-in support for remote...
This paper proposes a cache consistency scheme based on a previously proposed architecture for caching database data in MANETs. The original scheme for data caching stores the queries that are submitted by requesting nodes in special nodes, called query directories (QDs), and uses these queries to locate the data (responses) that are stored in the nodes that requested them, called caching nodes (CNs). The consistency scheme is server-based in which control mechanisms are implemented to adapt...
Distributed Denial of Services is today one of the most powerful vulnerabilities of the internet. The different types of DDoS attacks, the potential means of limiting them and the methods to trace and locate the attacker are discussed below in this paper. This is a coordinated attack done in large scale on the availability of services at a network resource or a victim system. It is performed by sending a huge number of packets to a destination machine by concurrent cooperation of a vast number...
Memories are the most universal component today almost all system chips contain some type of embedded memory, such as ROM, SRAM, DRAM, and flash memory. In the embedded domain, embedded RAMs of the StrongArmSA110 occupy 90% of the total area. The projection is, by 2014, memory will represent more than 94% of the chip area in average SOC environment According to the International Technology Roadmap for Semiconductors 2007[7] the percentage of chip area occupied by memories in a design and the...
Encryption is the process of making information indecipherable to protect it from unauthorized Viewing or use. A key is required to decode the information. (EFS) provides encryption for data in NTFS files stored on disk. This encryption Is public key-based and runs as an integrated system service, making it easy to manage, Difficult to attack, and transparent to the file owner. SUPPORT OF THE USE OF GROUP ON ENCRYPTED FILES IS NOT PROVIDED BY EFS In Microsoft Windows XP, EFS supports file...
Augmented reality can give a useful user interface for visualization in a satellite navigation system and mobile technology, the application user can access and augmented with path or location based information at the exact location. This application allows one or more than one peoples roam the city with correct maps to go selected destinations. Behind the augmented reality system they use XML data base to access the path way. The objective is to explore how these technologies might together...
Robot vision provides the robot controller with information about objects in the environment. Robot vision systems supply valuable information that can be used to automate the manipulation of objects. With the use of robotic vision, the position, orientation, identity, and condition of each part in the scene can be obtained .This high level information can then be used to plan robot motion such as determining how to grasp a part and how to avoid collisions with obstacles [6].The robot vision...
Since the economists have special interests on online auction and bidding process, several logics and techniques were proposed by researchers for predicting end bid prices. In such way, researchers proposed the prediction logic using the concepts of Data Mining, Fuzzy Logic, Genetic Algorithm, Neuro Fuzzy, Grey System Theory, etc.Data Mining ConceptsData Mining technique are being approached using Neural Network and Bayesian Network. To forecast the winning bid prices, this progresses four...