The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Message are send through encrypter, no one can read the text without having the encrypted software and key that has been used. If any user intends to send a open massage to many people(family, friends, colleagues, etc.) and if it being read by many people at other end too(public mail server, ICQ, etc.), discussed method will come in to play. Experiences of using encryptors and steganographers for...
This paper presents a robust watermarking technique to copyright an image. Proposed technique is totally based on DCT and is different from most of the available techniques. Watermark is embedded block-wise into the image to protect the ownership against the ltering, cropping and noise attack. Before embedding the watermark we are converting it into Walsh coded watermark [1]. In proposed approach...
This paper provide a variety of services through multiple service classes where each service class will provide a different performance in terms of response time. These service classes will be designed to provide appropriate levels of service to user applications. Different classes of services and the packets between different classes are classified as per the application request and study and analysis...
Service implementation is done for providing different services to the customer. Layer3 virtual private network implementation using IPv4 and IPv6 routing protocol is done and with this policy is implemented using MP-BGP as exterior gateway protocol. Layer 3 virtual private network in internet protocol version 6 is known as 6VPE technology, which is implemented using BGP and layer 3 VPN (VPRN for...
In the study of networks, such as complex network, social network or biological network; number of different characteristics of many nodes are found common. These characteristics includes small-world property, clustering and community structure, among others. In the context of networks, community structure refers to occurrence of groups of nodes in a network that are more densely connected internally,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.