The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Public Distribution System is a government-sponsored chain of shops entrusted with the work of distributing basic food and non-food commodities to the needy sections of the society at very cheap prices. It is also an important constituent of the strategy for poverty eradication and is intended to serve as a safety net for the poor people whose number is more than 33 Crores and are nutritionally at...
Sentiment analysis is the process of analyzing the text about a topic written in a natural language and classify them as positive or negative based on the human sentiments, opinions expressed in it. Due to the increasing growth in use of social media (e.g. reviews, forum, blogs, Twitter and postings in social network sites) on the Web, users now have many opportunities to express their opinions about...
Outsourcing of data is increasing with the rapid growth of internet. There is every possibility that data reaches illegal hands. As a result, there is increase in illegal copying of data, piracy, illegal redistribution, forgery and theft. Watermarking technology is a solution for these challenges. It addresses the ownership problem. It deters illegal copying and protects copyright of data. Watermarking...
Intrusion Detection System (IDS) is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network. A set of rules are used by Signature based Network Intrusion Detection Systems (NIDS) to detect hostile traffic in network segments or packets, which are so important in detecting malicious and anomalous behavior over the network like known attacks that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.