The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Grid computing, the interconnecting photo-voltaic (PV) control system needs an efficient converter to convert the low direct current (DC) voltage into DC. Design has been improved for the PV, by using a modified fuzzy logic along with an improved switched capacitor (SC) and a DC Converter. An optimized SC DC–DC converter’s performance in steady state for improving the efficiency and the regulation...
Fully self-controlled mobile ad hoc networks represent a complex system. Due to the broadcast nature of wireless channel, MANET has many security issues. Especially, Sybil Attack is a very serious threat to the MANET as it creates multiple virtual fake identities per entity, there by affecting the routing table. The multiple virtual identities are obtained by spoofing the victim's node or by creating...
A first proposal to use a secure open cloud architecture (OpenCloudCare) for remote patient health monitoring defines the front end and back end architecture that would integrate healthcare devices into the enterprise cloud. This service oriented architecture (SOA) uses existing open source resources for easy implementation, migration and rapid deployment. The introduction of the atlas middleware...
Intruder is one of the most publicized threats to security. In recent years, intrusion detection has emerged as an important technique for network security. Data mining techniques have been applied as a new approach for intrusion detection. The quality of the feature selection methods is one of the important factors that affect the effectiveness of Intrusion Detection system (IDS). This paper evaluates...
Human detection and tracking from video stream is important for many applications. Existing detection methods were based on skin-color segmentation or gray level face detection to detect the human. In this paper human detection is based on a silhouette oriented feature called edgelet feature. The system automatically detects and tracks possibly partially occluded humans from a single camera, which...
We introduce a translation of the simply typed λ-calculus into C++, and give a mathematical proof of the correctness of this translation. For this purpose we develop a suitable fragment of C++ together with a denotational semantics. We introduce a formal translation of the λ-calculus into this fragment, and show that this translation is correct with respect to the denotational semantics. We show as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.