The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Opportunistic Networks (Oppnets), a permanent fixed path is never assumed to be available between the source and destination. Nodes are not aware of changing network topology. So, static routing is not possible here and dynamic routing is best suited for such networks. In this paper, a Cloud Computing Based Routing Protocol (CCBRP) has been proposed for infrastructure-based Oppnets. It uses the...
Competition is always a good thing in IT world. It forces us to do our best. Nowadays, in the area of cloud computing, it is at the peak between the larger number of cloud users and cloud providers who view for the opportunity to use and provide services. Competition among cloud users means the price of cloud services never fall very low and between cloud providers mean the price of services never...
In the age of internet, when data production has gone off-bounds, organizations are facing a tough challenge in terms of processing, analyzing and storing big data. The major drawback with this data is that it is not only being created at a lightning fast pace but it is also unstructured i.e. does not have a fixed schema. Moreover it is arising from disparate and discrete sources such as the social...
Timely detection of other vehicles in the vicinity is of extreme importance to help avoid accidents and potential loss of human life, traffic jams especially in Hilly areas with hair pins bends and reduced visibility condition in dense foggy areas. This paper introduces a GPS based system which actively and continuously sends vehicle location coordinates (latitude/longitude) to the eye in the sky...
Spam is the most dangerous threat to email systems today. Spam is any unwanted and harmful mail. Separation of spam from normal mails is essential. This paper surveys different spam filtering techniques, Support Vector Machine (SVM) training problems and need to introduce MapReduce Hadoop to train SVM. Techniques to separate spam mails are word based, content based, machine learning based and hybrid...
Rogues are unwanted whether they are access points or clients as they steal critical data and bandwidth. To detect a rogue access point different approaches are used. These approaches are briefly classified as Client-side approach, Server-side and Hybrid approach. Every approach has its own advantages and disadvantages. Clients have limited resources and do not possess much control over network when...
Reducing latency for accessing web objects is a major challenge in Proxy Server and various techniques such as web caching and Web pre-fetching is used for it. In this paper we have integrated the approach of web caching and pre-fetching using sequential data mining techniques to enhance the proxy server's performance. The web access logs collected at squid proxy servers, can be used derive interesting...
With the proliferation of multiple wireless technologies and smartphones with enhanced radio capabilities, it has become imperative to deliver services that can work seamlessly across heterogeneous networks. As smartphones advance in their capabilities, there is an increasing adoption of services with realtime delivery constraints (e.g. video telephony, streaming). In a heterogeneous network environment,...
In this paper, we present “SESGARH”, a scalable and extensible smart-phone based healthcare system, to provide realtime continuous monitoring of health conditions of individuals seeking professional healthcare. The proposed system suggests an “anytime anywhere” health monitoring mechanism via an application providing rich contextual visualization of health data through easy-to-use interfaces. Using...
This paper presents an intelligent traffic management system using RFID technology. The system is capable of providing practically important traffic data which would aid in reducing the travel time for the users. Also, it can be used for other purposes like tracing of stolen cars, vehicles that evade traffic signals/tickets, toll collection or vehicle taxes etc. The system consists of a passive tag,...
Use of High Performance Computing (HPC) for modelling and simulation in the areas of engineering, geophysics, biotechnology etc. is not new. However, there has been a growing demand for HPC over the past few years in other non — conventional areas like architecture, graphics design and even gaming. The prohibitive cost of HPC resources, which are considered to be the costliest in the world of computing,...
In distributed system, deadlock is a common phenomenon. If a transaction requires more than one resource for its task to be accomplished, such request is called an AND model request. In this paper we have proposed a method for elimination of AND model deadlocks in distributed system. A Multi Granular Locking (MGL) technique is proposed which locks the database at various granules. This technique is...
Most live e-Learning systems achieve interactivity and collaboration between online users through audio, video and chat. In this paper we present a system which enhances the current e-Learning methods by the use of collaborative 2D animations. It aids in providing live conceptual and laboratory experience to the student. Collaborative 2D animations are particularly useful for explaining concepts and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.