The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on designing an Intrusion Detection System(IDS), which detects the family of attack in a dataset. An IDS detects various types of malicious traffic and computer usage which cannot be detected by a conventional firewall. In this proposed work, the data is extracted from UNSW_NB15 dataset. To identify the data cluster centers, the k means algorithm is used. A new and one dimensional...
Trash Collection and management in residential locality is the basic considerations referred to in Smart Cities. The concept of trash collection in India is quite tedious. For efficient trash collection, we use the concept of Internet of Things (IOT) which acts as a backbone Technology. Surveillance systems can be used to improve Quality of Service in Trash collection. “This paper proposes an advanced...
This paper describes a tool evidence be used to formalize the software requirements. This formalization is based on Z-language. The tool converts the informal to formal Z-language. For this the informal requirements are written in well-defined templates. The tool focuses the requirements and converts it to Z-specification automatically. Test cases are generated to express the correct and completeness...
Wireless communication has become a basic utility in personal and business life such that it becomes a fundamental of our lives and this communication uses the radio spectrum for data transfer. There are issues in using the radio spectrum further, they are, capacity, efficiency, availability and security. The defects of Wi-Fi technology has given birth to the concept of Li-Fi (Light Fidelity) technology...
“The true sign of knowledge is not intelligence but imagination”-Albert Einstein. One of the most common and noticeable accidents is bomb blast which takes away the lives of millions of people. The major percentage of death rate which has occurred due to the bomb blasts is in the period of 1996–1998 with a death toll of nearly 2500. Our proposed system (lavie enregistrer) aims at providing security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.