The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Antenatal care refers to the health care for women in pregnancy period. Periodic and regular supervision to a pregnant woman throughout pregnancy period until labor which will help reducing maternal death rates and miscarriages as well as birth defects, low birth weight, newborn infections and other preventable health problems. e-health plays a vital role to improve and assist independent living of...
Customer Relationship Management (CRM) is of paramount importance in the current business scenario where new start-up companies enter the market and compete with established companies and give tough competition. The Customer Relationship Management tools are used to maintain the leadership position and bridge the gap between customer and business developer. In this paper, we describe a CRM app developed...
Over the last few years, the convincing forward steps in the development of Internet of Things (IoT)-enabling solutions are spurring the advent of novel and fascinating applications. Today's healthcare system is the lack of security and real time monitoring. In the wake of this tendency, this paper proposes a novel, IoT-aware, smart architecture for automatic monitoring and tracking of patients from...
Cloud computing offers applications and infrastructure at low prices and opens the possibility of criminal cases. The increasing criminal cases in the cloud environment have made investigators to use latest investigative methods for forensic process. Similarly, the attackers discover new ways to hide the sources of evidence. This may hinder the investigation process and is called anti-forensics. Anti-forensic...
Finding interesting patterns in the database is an important research area in the field of data mining. Association Rule Mining (ARM) finds the items that go together. It finds out the association between items. Frequent Itemset Mining (FIM) finds out the itemset that occur frequently in the database. But this approach misses out the profit and the quantity of item purchased. This is addressed in...
Centralized crawlers are not adequate to spider meaningful and relevant portions of the Web. A crawler with good scalability and load balancing can bring growth to performance. As the size of web is growing, in order to complete the downloading of pages in fewer amounts of time and increase the coverage of crawlers it is necessary to distribute the crawling process. In this paper, we present client...
The Network Universities is an emerging concept so far as educational collaboration is concerned. This type of collaboration provides a fast and better means for knowledge exchange between member universities [11]. With the help of this collaboration, universities can share their resources, services of research guide and expertise with each other [5]. Some of the countries like Australia and United...
Over the past few years there has been humongous increase in the data volume by the explosion of unstructured machine-generated logs, sensors, networks and devices. This Changing business conditions raise a necessity to process real-time data asset in a faster way. Stream processing frameworks provide solutions to address high volume of data in real time with a scalable, highly available and fault...
Mobile agent (MA) technology plays an important role in today's e-world. MA is a program that consists of code and data that move from one host to another host and performs a task on behalf of the user. MA protection becomes essential when it migrates to the remote hosts in a network. Here, trust and reputation management (TRM) is implemented to provide a secure path for free-roaming MA data protection...
The main concept of this paper is to identify and classify the various types of shunt and line faults in transmission line. The faults may be an insulation failure, lightning or accidental faulty operation. In a transmission line protection important factor is identifying a fault because if any error occurs in finding fault may leads to disoperation of the protection system. So either a disturbances...
In MANETs, mobility of the nodes is high compared to sensor nodes. Due to that, unlimited path breaks occur unnecessarily. The path stability is not maintained properly, so the network partition will occur. From the analysis of the previous work, it is concentrated on either energy or stability of path. So that performance of network will get degraded. In this work, A Multipath Routing based Energy...
With the motivation from NIST's reduction of 128 bit Lucifer to 56 bit DES, experiment was conducted on Tiny Encryption Algorithm with reduced key length of 64 bits. It was found that TEA is unable to withstand the Bit Sum Attack. For more than 40% of the keys, there exists a strong correlation between the sum of the Cipher text and the sum of the key. To be secure, the bit sum of the key should lie...
The non-linear part of the chaotic cryptography when handled through quantum dynamics can be termed as "Quantum Chaotic cryptography". A novel approach using quantum chaos that could aid the cryptographers in the development of cryptographic design is proposed. The dynamics in quantum setup is analyzed through energy packets. The geometry that explains these coordinates is a Riemannian geometry...
CAPTCHA technology is at a boom in the field of information security. When text CAPTCHAs are at a point of break down, it is the time for the image based CAPTCHAs to get a pace. But often the designers of the CAPTCHA forget the issues related to the usability as the objective of a CAPTCHA is to reduce the burden of solving it along with the robustness. In this paper, we have shown an analysis of some...
In this paper we propose a Message Authentication Image (MAI) algorithm to protect against e-banking fraud and the latest e-banking fraud techniques, such as Phishing, Trojans and man-in-the-middle attacks. This MAI Algorithm provides confidentiality, authentication and digital signature. It uses both Cryptographic and Steganographic ideas to conceal the data in the image. MAI generates fractals and...
Denial of Service (DoS) attacks has become a major problem for users of computer systems connected to the Internet. DoS attackers hijack secondary victim systems and use them to wage a coordinated large-scale attack against primary victim systems. In this paper we propose a new countermeasure to mitigate DoS using sensing keys, which does not require human intervention.
SHA-2, the current hash standard may need replacement in near future considering the attacks on MDx family of Hash functions including SHA-0 and SHA-1. National Institute of Standard and Technology (NIST) public competition for SHA-3 is in final rounds and in this paper we have presented the performance comparison of three of the five final round candidate algorithms on ARM Cortex M3 Processor. We...
In the field of information security, CAPTCHA technology is a recent successful achievement. Apart from using different text CAPTCHAs, image-based CAPTCHAs are also in existence. Though text based CAPTCHAs are in regular usage in internet services, the vulnerability in text CAPTCHAs has compiled us to move on to the image based CAPTCHAs. Therefore before implementing image based CAPTCHAs publicly,...
The concentrations of Sulphur di oxide and ground level ozone were estimated in ambient air in Chennai, India during the year 2010 at five stations. Air quality monitors measure concentrations of SO2.A portable Aeroqual series 200 was used to measure O3. There are several methods to communicate the use of different environmental quality parameters. Contour diagrams can simply give the expected value...
Epilepsy is one of the frequent brain disorder that may consequence in the brain dysfunction and cognitive disorders. Epileptic seizures can occur due to transient and unexpected electrical interruptions of brain. EEG (ElectroEncephaloGram) is one of the non-invasive methods for analyzing the human brain dynamics that affords a direct evaluation of cortical behavior. Seizures are featured by short...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.