The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Project Management has long been one of the arduous jobs for individuals as well as companies to pertain to. Yet with the dynamic architecture of Cloud Service facilities, this could easily be managed with respect to the availability and cost efficiency. This paper focuses on the Cloud-Based management of projects through the means of software as a service and its various augmentable utilities. A...
An Identity Is Stolen Every 3 Seconds!! Spoofing is a huge issue for most Internet users - in fact, Identity Theft victimized 10.1 Million Americans last year. In this modern digital world, it is very simple to fool the system and pretend to be anyone. With the identity theft getting simpler day-by-day, make sure you are not being digitally spoofed. These days, it doesn't require a computer genius...
In this paper a novel and simple iris feature extraction technique is proposed for iris recognition of high performance. We use one dimensional circular ring to represent iris features. The reduced and significant features afterward are extracted by Sobel Operator and 1-D wavelet transform. To improve the accuracy, this paper combines uses Euclidean Distance for classification.
In this paper a novel and simple iris feature extraction technique is proposed for iris recognition of high performance. We use one dimensional circular ring to represent iris features. The reduced and significant features afterward are extracted by Sobel Operator and 1-D wavelet transform. To improve the accuracy, this paper combines uses Euclidean Distance for classification.
One of the main design constraints in mobile ad hoc networks (MANETs) is that they are power constrained. Sometimes host may run out of the power or move away without any knowledge of cooperative nodes, which results in change in topology and cause the performance issues in routing protocol. Some routing protocols on node lifetime and link lifetime address this issue. In this paper we presents a lifetime...
A MANET, by definition, comprises of nodes which are mobile. It has a dynamic topology and lacks a central controlling entity. These features along with undefined and unsecure boundaries make its security a very challenging issue. Blackhole and grayhole attacks can in fact seriously compromise the performance of a critical infrastructure like a MANET. In this paper we propose a mechanism to detect...
Spam is a huge issue for most Internet users -- in fact, 52% of participants polled in a recent survey stated that spam was a major problem. And despite the evolution of anti spam software, such as spam filters and spam blockers, the negative effects of spam are still being felt by individuals and businesses alike. It is an examination of the various spam techniques and types of popular email viruses...
Magnetic Levitation is a complex nonlinear mechatronic system and consequently poses a challenging control problem. We propose real time adaptive and nonadaptive controllers based on fuzzy state feedback to stabilize the system using the Lyapunov criterion. We employ Takagi-Sugeno formulation to model our system. The proposed controller is divided into 2 parts -- the first part stabilizes the nominal...
Although relatively new on the scene, social media has become a powerful force -- growing fast in scope, audience and influence. Social Media data comes in many forms: blogs, micro-blogs social networking, wikis, social bookmarking, social news ,reviews, and multimedia sharing. Online social media represent a fundamental shift of how information is being produced, transferred and consumed. Today On-line...
Cloud computing may be defined as management and provision of resources, software, applications and information as services over the cloud (internet) on demand. Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. With its ability to provide users dynamically scalable, shared resources over the Internet and to...
Statistics indicate that more than 1000 phishing attacks are launched every month. With 57 million people hit by the fraudulent attacks so far in America alone, a million-dollar question crops up - how to combat phishing? This paper aims to discuss strategies in the war against phishing. It is an examination of the ways adopted at various levels to counter the crescendo of phishing attacks and new...
With the fast paced development of the internet, exchanging or concealing of private data has become a serious concern. This Paper proposes a new and an unidentified steganographic technique to conceal your data which can be further encrypted (through cryptography) in a .pdf file format. The informative-theoretic method for performing steganography deals with text-to-text steganography while restoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.