Advanced Computing
57 Followers
Recent papers in Advanced Computing
The increasing popularity of web-based applications has led to several critical services being provided over the Internet. This has made it imperative to monitor the network traffic so as to prevent malicious attackers from depleting the... more
The present paper discusses the problem of estimating the finite population mean in simple random sampling. A class of estimators has been proposed using information on an auxiliary variable and its properties are studied. It has been... more
Horizontally overlapping lines are normally found in printed newspapers of any Indian script. Along with these overlapping lines few other broken components of a line (strip) having text less than a complete line are also found in text.... more
In ant societies, and, more in general, in insect societies, the activities of the individuals, as well as of the society as a whole, are not regulated by any explicit form of centralized control. On the other hand, adaptive and robust... more
https://cndc2020.org/acity/index.html Scope & Topics 10 th International Conference on Advances in Computing and Information Technology (ACITY 2020) will provide an excellent international forum for sharing knowledge and results in... more
In content-based image retrieval (CBIR), content of an image can be expressed in terms of different features such as color, texture, and shape. In this paper, the color information of an image is represented by the Global HSV Color... more
In digital electronics, the power dissipation is the major problem. So that the reversible gate can be implemented in microelectronics and electronics which have low power dissipation in the digital designing because, in the reversible... more
In this paper Advanced Encryption Standard (AES) algorithm has been designed and implemented as custom hardware. The algorithm is controlled through C-code written in NIOS II IDE. AES as a custom hardware is interfaced with the system... more
Advanced Computational Intelligence: An International Journal (ACII) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of computational intelligence. The goal of this... more
Distributed, event based applications executing on publishsubscribe middleware (aka Event Based Middleware or EBM) are subject to many disruptive changes at runtime. These changes can be caused either by a change in environmental... more
In ant societies, and, more in general, in insect societies, the activities of the individuals, as well as of the society as a whole, are not regulated by any explicit form of centralized control. On the other hand, adaptive and robust... more
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and... more
Security/privacy issues are of paramount importance for widespread acceptance and use of RFID tags. Over the past few years, researchers have addressed this issue through lightweight cryptographic means. A majority of existing literature... more
Integration testing of Complex Embedded systems (CES) and associated interconnection network has not been discussed much in the literature. This paper focuses on integration testing among Embedded Processing Components (EPCs) that are... more
The finite cell method (FCM) belongs to the class of immersed boundary methods, and combines the fictitious domain approach with high-order approximation, adaptive integration and weak imposition of unfitted Dirichlet boundary conditions.... more
Wireless capsule endoscopy (WCE) is relatively a new device which investigates the entire gastrointestinal (GI). About 55000 frames are captured during an examination (two frames per second). Thus, it is bene icial to ind an automatic... more
The focus of this work is to provide authentication and confidentiality of messages in a swift and cost effective manner to suit the fast growing Internet applications. A nested hash function with lower computational and storage demands... more
8 th International conference on Advanced Computing (ADCOM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information... more
- Though beaconless geographic routing protocols get rid of the overhead caused by the periodic beacon messages to be broadcast in case of beacon based approaches. But, most of the existing beaconless routing protocols do not consider... more
8th International conference on Advanced Computing (ADCOM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information... more
AI-based security systems utilize big data and powerful machine learning algorithms to automate the security management task. The case study methodology is used to examine the effectiveness of AI-enabled security solutions. The result... more
In the domain of image processing, face recognition is one of the most well-known research field. When humans have very similar biometric properties, such as identical twins, the face recognition system is considered as a challengeable... more
Automatic data clustering through determination of optimal number of clusters from the data content, is a challenging proposition. Lack of knowledge regarding the underlying data distribution poses constraints in proper determination of... more
Though beaconless geographic routing protocols get rid of the overhead caused by the periodic beacon messages to be broadcast in case of beacon based approaches. But, most of the existing beaconless routing protocols do not consider... more
Color, texture and shape information have been the primitive image descriptors in content based image retrieval systems. This paper presents a novel framework for combining all the three i.e. color, texture and shape information, and... more
Intermittent availability of grid resources results in delays or failures of application execution. Hence, the reliability of application execution declines. In order to achieve a reliable application execution, a consistent availability... more
8th International conference on Advanced Computing (ADCOM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Engineering and Information... more
February 20~21, 2021, Dubai, UAE https://necom2021.org/adco/index Scope 8 th International Conference on Advanced Computing (ADCO 2021) will provide an excellent international forum for sharing knowledge and results in theory, methodology... more
Hand gestures recognition is the natural way of Human Machine interaction and today many researchers in the academia and industry are interested in this direction. It enables human being to interact with machine very easily and... more
Hand gestures recognition is the natural way of Human Machine interaction and today many researchers in the academia and industry are interested in this direction. It enables human being to interact with machine very easily and... more
In digital electronics, the power dissipation is the major problem. So that the reversible gate can be implemented in microelectronics and electronics which have low power dissipation in the digital designing because, in the reversible... more
The success of web services has influenced the way in which Grid applications are being written. Web services are increasingly used as a means to realise service-oriented distributed computing. Grid users often submit their applications... more
Abstract Grid is a collection of distributed computing resources that performs tasks in co-ordination to achieve high-end computational capabilities by dividing a given task into sub-tasks. Each sub-task could be large and run for several... more
Page 1. STUDY OF PATTERN STORAGE TECHNIQUE IN SELF ORGANIZING MAP USING HOPFIELD ENERGY FUNCTION ANALYSIS Sumeet Gill*, Dr. Manu Pratap Singh# and Naveen Sharma# Government Polytechnic ...
- Though beaconless geographic routing protocols get rid of the overhead caused by the periodic beacon messages to be broadcast in case of beacon based approaches. But, most of the existing beaconless routing protocols do not consider... more
This paper presents efficient methods of vertical A comparison of UMTS and WLAN [4] shows that they handoffs from UMTS to WLAN and vice versa in a loose possess many desirable and complementary features. As coupling architectnre. When a... more
August 24 ~25, 2019, Vienna, Austria https://necom2019.org/adco/index.html SCOPE 6 th International Conference on Advanced Computing (ADCO 2019) will provide an excellent international forum for sharing knowledge and results in theory,... more
The user-level brokers in grids consider individual application QoS requirements and minimize their cost without considering demands from other users. This results in contention for resources and sub-optimal schedules. Meta-scheduling in... more
This paper presents an agent oriented approach for grid computing. As opposed to existing approaches, agent technology promises a more flexible approach, easier installation and management of the agent framework, and better ability to... more
The success of web services has influenced the way in which Grid applications are being written. Web services are increasingly used as a means to realise service-oriented distributed computing. Grid users often submit their applications... more
The mobile ad hoc networks (MANETs) are highly vulnerable to attacks because of its unique characteristics such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic network topology. In... more
This paper presents efficient methods of vertical A comparison of UMTS and WLAN shows that they handoffs from UMTS to WLAN and vice versa in a loose possess many desirable and complementary features. As coupling architectnre. When a... more