The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Advanced Data Reception and Analysis System (ADDRESS) is a software solution used for monitoring data from autonomous buoy systems deployed in Indian Seas by National Institute of Ocean Technology (NIOT), Chennai. Three variants of buoys (Met-Ocean buoys, Deep Sea Instrumented buoys and Tsunami buoys) are being handled by NIOT. ADDRESS acquires data from these buoys which are fitted with meteorological...
We present Brown Dog, two highly extensible services that aim to leverage any existing pieces of code, libraries, services, or standalone software (past or present) towards providing users with a simple to use and programmable means of automated aid in the curation and indexing of distributed collections of uncurated and/or unstructured data. Data collections such as these encompassing large varieties...
DIBBs Brown Dog is a recent cyberinfrastructure effort which aims to create two new services to aid users in the searching, accessing, and usage of digital data and provide these services in a manner that is as broadly and easily accessible as possible. At its lowest level, the Data Access Proxy (DAP) providing file format conversion capabilities and the Data Tilling Service (DTS) providing content...
The paper presents the effects of dynamic mathematics software GeoGebra on student achievement in teaching of geometry at secondary stage. The sample has been taken on 40 students of control group and 40 students of experimental groups. The control group was received teaching by traditional way, i.e. Without using any software while experimental group was received teaching by dynamic learning software...
Hadoop and Map reduce today are facing huge amounts of data and are moving towards ubiquitous for big data storage and processing. Benchmarking tools available are not capable of analyzing performance of the Hadoop cluster system and are made to either run in a single node system. HiBench is an essential part of Hadoop. It is a comprehensive benchmark suit that consists of a complete deposit of Hadoop...
The present world is advancing at the speed of light in the field of trade and business, and the development in technology has been significantly influencing this growth. However, transportation by road is one of the major factors that have been affecting the commercial development of our country. With the increasing vehicular population and their movement on the roads, accidents are also steadily...
Defining the hardware in terms of software is our main motto, In this era of wireless technology it is quite common for rapid change of technology and communication standards, As a result, when technology changes, changes in its circuit Architecture will takes place, so there is a need to design new architecture to use the new technology, In order to design, test and manufacture this new technology,...
Many web applications can be exposed to a variety of Web-based attacks. One of these attacks is SQL injection, which can give attackers unrestricted access to the databases and has become increasingly frequent and serious. This paper presents a new highly automated approach for protecting Web applications against SQL injection that has both theoretical and practical advantages over most existing techniques...
The science of Cryptology dates back to Caesar's time. A wide variety of techniques have been employed for encryption and decryption but cryptanalysis has simultaneously cracked these encryption techniques from time to time. The use of a multilingual approach in cryptography is not prevalent. In this paper we propose an algorithm that focuses on encryption of plain text over a range of languages supported...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.