The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today people are more interconnected with Internet ever before. Internet not only brought advantages, it also brings security threats, cyberattacks, phishing, etc. To mitigate cybercrimes governments are enforcing cyberlaws. In this process authentication of digital objects are essential. To provide authentication many watermarking schemes are proposed. Among edge based watermarking schemes special...
In terms of data, infrastructure, and virtualization, security is one of the main concerns Private Clouds have been perceived as a relatively impervious deployment model among Cloud models. Confidentiality, integrity, availability, authenticity, and accountability are the essence of security objectives for information systems and the services they offer. Moving assets to remote locations has exposed...
To extract knowledge from Data bases Data mining is being used. Data mining is associated with various techniques. In those Clustering is considered to be one of the best approaches. Clustering a huge data set specifically categorical data is difficult and tedious procedure. In this context a proficient method is proposed that is focused on Rough purity for humanizing accuracy of grouping and keeping...
Most businesses collect and store sensitive information about their work or related like project documents, audio data, video data etc. while sharing files in peer-to-peer system dynamically peer nodes can add may delete. Peer-to-Peer file sharing using P2P application architecture. Shared files will move between different nodes. P2P technology is using by popular services like Napster, Bit Torrent,...
This paper focuses on the enhancement Available Transfer Capability using FACTS devices. ATC is calculated on the location of FACTS devises based on the VAR loss sensitivity index method, Real power loss index method. Comparison is made for performance of FACTS devises based on the optimal location methods. Available Transfer capability is Enhanced by Multi type FACTS devises i.e combination of TCSC...
Clustering is one of the most important method in data mining. Clustering a huge data set is difficult and time taking process. In this scenario a new method proposed that is based on Rough Entropy for improving efficiency of clustering and labeling the unlabeled data points in clusters. Data Labeling is a simple process in numerical domain but not in categorical domain. Why because distance is a...
The power producers and customers share a regular transmission network for wheeling power from the point of generation to the point of consumption in a restructured power system organization. Every parties in this open access surroundings may try to produce the energy from the cheaper supply for greater profit margin, which may lead to overloading, infringement of line flow, voltage and stability...
Cloud computing is a grid based application which eases "On demand network access to a shared pool of computing recourses". This environment strives to be secure, scalable and customized with guaranteed Quality of Service (QoS). However, QoS is guaranteed through fulfillment of non-functional requirements like Security, Scalability, Mobility and Virtualization in Cloud computing System....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.