Learn More
Use case based approaches for software requirement analysis have been used extensively in software development industry to capture functional and behavioral requirements. But use-case based techniques for requirement analysis has not been found to be much effective and supportive enough for capturing non-functional requirements such as safety requirements.(More)
The current progression and communication in the corporate, military and industrial sectors. Nevertheless, these progressions have likewise brought new security vulnerabilities. The uses of the security methods of wired systems, for example, access control and confirmation/authentication have been unsuitable to wireless network because of the extraordinary(More)
Signals acquired through any modern sensors suffer from variety of noises resulting from stochastic variations and deterministic distortions or shading. Hence it is desired to smooth the noisy signal to obtain a signal with higher quality. The paper proposed a neural network based adaptive noise cancellation technique for a system with multichannel(More)
Security is the major anxiety in mobile ad hoc network because of its characteristics such as lack of central coordination, dynamic topology; infrastructure less. In such network nodes can easily be in and out and each node has capability to route the packets.Ad hoc network is more susceptible to various kinds of threats such as black hole, Sybil attack,(More)
Wireless Broadband Access service is now a day's more popular for data transmission. Traditional high-speed broadband solutions rely upon wired technologies specifically digital subscriber line (DSL). Wi-Fi is helpful in providing any type of connectivity such as the fixed or portable connectivity while not the need of LoS (Line of Sight) of the base(More)
Recent trends have indicated the increased use of object oriented technology not only for the design and development of traditional softare but also for safety critical software. There has been an ongoing effort for the application of traditional well documiented and well tested hardware safety and reliability analysis techniques to software. Software(More)
In this research work adopted the frequency domain watermarking scheme which is embedded using discrete wavelet transform (DWT) singular value decomposition (SVD) and High Boost Filtering (HF). By singular values factoring it represent smaller set of values and it can preserve constructive feature of an original image. After that, apply high boost filtering(More)
  • 1