The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret...
Emergence of the information age and the growth of Internet and communication technologies in Saudi Arabia have changed the way of teaching and learning process. The education community in Saudi Arabia believes that the legacy methods of teaching are not able to create a good impact on the E-Learning capability of Saudi learners while compared with that of E-Learning. The emergent of E-Learning has...
Cloud computing is getting increased attention of the information and communication technologies (ICT) industry recently. The cloud service providers foresee it as a source of promising financial gains, the clients find it a convenient solution where the enterprises may get started on their computing activities without investing on the in-house facilities of hardware and software. They can outsource...
Recently, chaos has attracted much attention in the field of cryptography. It describes a dynamical system which is sensitive to initial condition. It generates apparently random behavior but at the same time the system is completely deterministic. Towards this direction, this paper presents a new encryption scheme based on a new chaotic map derived from a simplified model of Swarm Intelligence (SI)...
Communication architecture for substation automation is one of the challenging and subtle tasks to address in order to visualize the substation into digital world under the umbrella of IEC61850. Communication paradigm for substation automation demands critical importance because of two reasons; as communication arena is changing day by day so it is convenient to opt for something that is simple to...
The design of cost-effective, interoperable, and efficient communication architecture is indeed one of the pressing needs not only for the realization of substation automation (SA) as per specification of IEC61850 but also to inter-connect different substations with minimum cost to bring data from all substations on the single information highway thereby paving a smooth way to centralize all the available...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.