The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Purpose: This investigation aims to study the various approaches currently used to reduce the load on computer servers in order to better manage data on hospital wastewater treatment and solid waste generation. Design/methodology/approach: This manuscript investigates the taxonomies of deduplication procedures based on literature and other data sources, thereby presenting its classification and its...
The Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret...
The TCP SYN DDoS attack and defense prevention mechanisms is studied. Each prevention mechanism has some exclusive pros and cons over the others. In this paper, we have compared various defence mechanisms for preventing potential TCP SYN DDoS attacks. Router based TCP Intercept is found to provide the best defense while Anti DDoS Guardian gave the worst defese.
Over the last decade many but totally different Total Cost of Ownership reports were generated for a same system. It was even more puzzling since most of the times these reports were sponsored by the vendors themselves. There is more or less a war between Windows and Linux about which one has the best TCO. It is highly likely that the generated TCO is based on vendors' feelings for their operating...
In computer networks, file transfer methods are used as a tool to exchange files among computers. Efficiency of a file transfer method is generally measured in terms of bandwidth usage, integrity, security, scalability and fault tolerance. We have critically reviewed some state-of-the-art patent file transfer methods to know about their shortcomings and strengths for different scenarios. We analyzed...
The essence of High performance computing (HPC) in the field of Nanotechnology and problems encountered by HPC arrangement in applying HPC to Nano-enabled calculations have been presented in the paper. A proposal to optimize computations in an HPC setup and distribution of work in various clusters has been formulated to make Nanotechnology computations more effective and realistic on a Windows Cluster...
Position based routing protocols have lower routing overhead due to exploiting position information of mobile nodes for forwarding data. The performance of location based protocols depends on the precise knowledge of the destination's location. Therefore a location service is a prerequisite, from which a transmitter can find the approximate location of the receiver node. Several location service schemes...
This paper proposes an enhanced recommendation technique for personalized e-commerce portal analyzing various attitudes of customer. The attitudes are classifies into three types such as "purchasing product", "adding product to shopping cart", and "viewing the product information". We implicitly track customer attitude to estimate the rating of products for recommending...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.