The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The number of crime incidents that is reported per day in India is increasing dramatically. The criminals today use various advanced technologies and commit crimes in really tactful ways. This makes crime investigation a more complicated process. Thus the police officers have to perform a lot of manual tasks to get a thread for investigation. This paper deals with the study of data mining based systems...
McAfee SecurityCenter Firewall is one of the most popular security software installed on millions of Internet connected computers worldwide. ??McAfee claims that if you have installed McAfee SecurityCentre with anti-virus and anti-spyware and Firewall version 9.3 then you always have the most current security to combat the ever-evolving threats on the Internet for the duration of the subscription??...
The IBM Blue Gene/P (BG/P) system is a massively parallel supercomputer succeeding BG/L, and it comes with many machine design enhancements and new architectural features at the hardware and software levels. This paper presents techniques leveraging such features to deliver high performance MPI collective communication primitives. In particular, we exploit BG/P rich set of network hardware in exploring...
Data Mining and warehousing is very challenging and interesting field in Computer Science and Information Technology. This field is still in its infant stage and thus a limited documentation on Data Warehousing processes available. As we know that now a days the definition of Educational Institutions are going to be changed and they are now being taken into consideration as a business oriented Organizations...
Teaching software engineering looks easy. Given that there is more of explanation of various lifecycle models and phases of software development such as planning, requirements, design, testing, validation, maintenance etc. However one can easily observe that the concepts cannot be illustrated easily on the blackboard as it can be learnt through experience. In this tutorial, we present an innovative...
The paper deals with the design fabrication and cold testing of vacuum RF window for C-band 250 kW CW power klystron. The simulation of the window has been carried out using the CST microwave studio software. The proposed window is designed for 5 GHz operating frequency for handling 250 kW of RF power. In the proposed window geometry, metallized alumina disc (99.5 % purity) of diameter 56 mm and thickness...
TCP-SYN attack is one of the commonly used DDoS attacks aimed at bringing down a computer system connected to Internet. There has been an increased targeting of Windows end-users and servers. The attackers and intruders are leveraging easily identifiable network blocks to target and exploit Windows end-user servers and computer systems. In order to provide some level of security and protection against...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.