The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This is global challenge to preserve the soft computing data through hard device. By this issue in the field of Computer science and Engineering Technology, the data collection and capturing techniques together with algorithms for combining multiple range, allow us to accurately digitize the internal and external characteristics of many soft computing and hard devices. This capability makes it possible...
Ethernet has grown since its inception by Metcalfe in 1976. Its growth as a wide-area networking technology has led to a need for operations, administration and maintenance (OAM) requirements. The expansion of this technology into the domain of service providers, where networks are substantially larger and more complex and the user-base is wider, makes the idea of robust and reliable connectivity,...
In this paper, we present a system to analyze activities and detect anomalies in a surveillance application, which exploits the intuition and experience of security and surveillance experts through an easy- to-use visual feedback loop. The multi-scale and location specific nature of behavior patterns in space and time is captured using a wavelet-based feature descriptor. The system learns the fundamental...
The security risks of using standard personal computers and operating systems for confidential transactions such as Internet banking are well-known. This is one reason for the interest in the mobile phone/ handset as a Personal Trusted Device (PTD). However, mobile phones have other shortcomings, for example the constraints of working with a small screen. This paper explores the use of a dedicated...
Grid Computing has emerged as core computing technology in many distributed applications initiated by different organizations all over the world. It aims to enable large scale resource sharing. Security is a big and challenging issue as a grid service may impact number of other services/resources distributed over wide area networks. The dynamic and multi- institutional nature of grid applications...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.