The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data security is a dominant challenge in the era of big data. These challenges comprise insurance against violation of information security and data leakage, clarity and accuracy in public databases, and third party data distribution. How to exploit security and surreptitious policies constitute a foremost challenge, notably when managing huge amount of distributed data? This paper suggested a framework...
The growth of sharing information on the internet has arises the problem of security of digital data over the network. Steganography is a technique which protects the fact of concealment of message within a cover media i.e. it makes the secret message invisible for any unintended recipient. If anyone notices the secret information within the cover file then steganography is failed. Here we are discussing...
Software Projects are developed with the prior requirements and should be capable to complete on time under a fixed budget but it gets late to delivered, gets over-budget and even not able to meet user expectations. In agile approach, the estimation of software depends on expert opinion or on any historical data which is used as the input to previous methods like planning poker. The accuracy in estimation...
Component-Based Software Development involves integration of many different self-contained units of software that perform a specific task known as software components with the existing software components as plug-ins which can be used again and again. The present crisis in the software development forces on development of the reusable components which build once can be reused when and where ever required...
Vehicular Adhoc Network is basically the solution of several problems associated while vehicles are plying on the road. This paper mainly focuses and encourages to think over the various issues of the VANETs which are needed to be considered very carefully and handled in very focused manner for bringing the VANET implementation a big reality. This paper provides an outline of the common VANET entities,...
Internet Protocol Security (IPSec) is a standard suite of protocols defined by Internet Engineering Task Force (IETF) to provide security which includes data authentication, integrity, and confidentiality. IPSec provides data security at the IP packet level. IPSec developed for IPv6 as well as for IPv4. IPSec protocol provides an elegant solution to the security problem of IP protocol, at IP layer...
From the initial forms of writing to current data centers, the human pursue has constantly collected information. Ascend in tools has led to the deluge of data, which demand more refined data storage systems. Commencement in the 1930s, this timeline covers the sudden increase of information and how Big Data has generated the necessity to manage and save information. As the swiftness of information...
Aspect-oriented programming (AOP) has been coined as a prospective programming approach for the identification of nonfunctional component properties, such as logging, fault-tolerance and exception handling. Weaving Techniques in Aspect Oriented Programming plays an important role for the execution of classes at run time as well as compile time and thus leaves its effect on it. This paper discusses...
Recognizing the digits has become an integral part in terms of real world applications. Since, digits are written in different styles therefore to identify the digit it is necessary to recognize and classify it with the help of machine learning techniques. This research is based on supervised learning vector quantization neural network categorized under artificial neural network. The images of digits...
The Mobile Ad-hoc network (MANET) uses the concept of Dynamic technology in the wireless network. The most important challenge in building of MANET is the power consumption by the nodes. According to the demand of present scenario different energy efficient routing protocol has come into existence that helps in increasing the life time of the battery. Emerging Trends in energy efficient routing protocols...
At with the rapid development of web 2.0, large volume of freely opinion available on the different website, micro blogs, forum, newspaper, article, blogs etc. These opinions are very useful for individual, companies, product vendors and organization to making a crucial decision before buying any product or making the decision before manufacturing of any product and domain. However the individual,...
Steganography is used to hide the secret information within a cover media in such a way that the existence of the message could not be noticeable. Here we are considering audio file as cover media and text message as secret information. The secret information is embedded in a cover media as noise as the HAS cannot detect the sound less than 20Hz or greater than 20000Hz. Generally LSB algorithm is...
Agile methodologies has given a break from traditional software development models and has proved to be powerful in accommodating requirement changes and induce degree of flexibility in the software development life cycle. These characteristics have made agile an obvious choice among all software development models. One of the main objectives of any model is to cater to risk, identify, analyze, assess...
Penetration of media in financial market has changed the way of doing business, media, one of the most growing medium to exchange ideas & thoughts, which plays an important role in influencing thoughts of the investors which in turn affects market transactions figures and index values. Thus machine learning and sentiment analysis can be of great help in deducing the mood and psychology of people...
In literature we have several software reliability growth models developed to monitor the reliability growth during the testing phase of the software development. These models typically use the calendar / execution time and hence are known as continuous time SRGM. However, very little seems to have been done in the literature to develop discrete SRGM. Discrete SRGM uses test cases in computer test...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.