The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid increase in urban population is alleviating various kinds of problems such as long hours traffic-jams, pollution which is making cities life insecure and non-livable. The notion of a smart city is proposed to improve the quality of life. Smart cities are emerging to fulfill the desire for the safety of its users' and secure journeys over in the urban scenario by developing the smart mobility...
Bank organization is considered as an honest party, strictly adhering the protocols. Bank depends on secure internet protocols, to fulfil the demand of remote access. As, the Bank is in physical possession of information about Client’s identity and his transactions in the form of databases, a vicious insider may exploit this opportunity to perform targeted attacks. Currently, no secure mechanism exists...
The emergence of e-commerce has created new financial needs that in many cases cannot be effectively fulfilled by the traditional payment systems. Recognizing this, virtually all interested parties are exploring various types of electronic payment system and issues surrounding electronic payment system and digital currency. Broadly electronic payment systems can be classified into four categories:...
Ethernet has grown since its inception by Metcalfe in 1976. Its growth as a wide-area networking technology has led to a need for operations, administration and maintenance (OAM) requirements. The expansion of this technology into the domain of service providers, where networks are substantially larger and more complex and the user-base is wider, makes the idea of robust and reliable connectivity,...
Protecting the network layer is an important problem in an ad hoc network. Several base network later protocols were built under the assumption that nodes forming an ad hoc network do not have enough power or processing capabilities to launch a powerful malicious attack. Thus they do not offer any immunity. AODV-S offers enhancement to the AODV protocol by incorporating protection against several...
Image enhancement is very important for increasing the sensitivity of screening luggage performance at airports. On the basis of 11 statistical measures of image viewability we propose a novel approach to optimizing the choice of image enhancement tools. We propose a neural network predictor that can be used for predicting, on a given test image, the best image enhancement algorithm for it. The network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.