Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Advent of mobile technology and internet in our daily lives has opened up a new dimension to our data exchange requirements. Multimedia like image, video, audio have emerged out be contributing in significant proportions to the data flowing over inherently insecure networks. The traditional encryption schemes which were designed to provide high security to textual data are unable to secure multimedia...
Extreme learning machine (ELM) which belongs to randomized algorithm categories, is versatile and an emerging learning algorithm. ELM has been developed for different application starting from pattern recognition, function estimation, regression analysis, time series analysis, and big data analysis etc. Unlike feed forward neural networks where slow convergence rate, imprecise learning parameters,...
Easiness of public & tourist's travel within a city is an important task for central and State Government. They have to access a combination of public transport options like metros, trams, buses and private options like cabs services and hired vehicles. Delhi, being the capital city of India, enjoys the usage of public transport by millions of travelers. Currently all route information on mobile...
Education Institutions, Recruitment Organizations, Government Authorities and Students are main stockholders in Education System. Education system relies upona lot of paper-work which is cheap but on environment it has negative consequences. Process of planning and execution of government schemes is inefficient, very slow which lacks even feedback mechanism. Stakeholders are required to do lot of...
The paper proposes an improved, modified version of block cipher PRESENT to make it suitable for use in multimedia applications. For encrypting multimedia one of the core requirements is that the scheme should be computationally less expensive so as to sustain the bulkiness attributed to multimedia. Though, PRESENT is a very lightweight block cipher and is found efficient for textual content yet it...
For the public usage, there are various utilities that exists and operates in many countries. Major utility are in the sector of Power, Gas and Water distribution. Their major role is to distribute the essentials to the customers and in turn provide Customer support and Billing system through offline and online mode. Most of them fall under government control but may be managed by Franchise or Public...
Bat Algorithm is one of the successful metaheuristic algorithms, which is used prominently for the purpose of optimization. But its inherent feature of non-changing parameters with the various iterations makes it less appropriate for optimization of software cost estimation techniques like COCOMO. So the current study proposes a hybrid model for the improvement of Bat algorithm by enhancing the search...
Today's world is fast moving because of innovation and technologies advancements, new ways of defining the rule and life around us. In this fast paced world life is very hectic. According to surveys organised by various agencies it was shown that people are spending their very large time in doing their work and are in offices. They are not aware of the issues around them and their rights provided...
In software development team performances depend on how individual are performing therein. Software development is an economic activity which derives the profit and enlarges profitability of the software development if performance is optimized. Economic performance depends on performance of technical product developed or service and its performance. Revenue is generated only from the high performance...
Efficient and secure search on encrypted data is an important problem in computer science. Users having large amount of data or information in multiple documents face problems with their storage and security. Cloud services have also become popular due to reduction in cost of storage and flexibility of use. But there is risk of data loss, misuse and theft. Reliability and security of data stored in...
Factorization of a number composed of two large prime numbers of almost equal number of digits is computationally a difficult task. The RSA public-key cryptosystem relies on this difficulty of factoring out the product of two very large prime numbers. There are various ways to find these two prime factors, but the huge memory and runtime expenses for large numbers pose tremendous difficulty. In this...
Public distribution system is backbone for delivering benefits and other resources to needy population sections. However in developing countries, PDS system is presently not in good state as it is suffering from problems like resources wastage, corruption, leakage, ghost beneficiary, non-accountability, non-transparency, inefficiency, ineffectiveness and delay in resources and services distribution...
The monoalphabetic substitution cipher encrypts a given text by replacing every letter in the text with a different letter according to some predefined scheme. The cryptanalysis of this cipher involves the identification of this scheme using known language statistical data. The firefly algorithm (FA) is a metaheuristic algorithm, inspired by the flashing behavior of fireflies. This paper discusses...
In today's digital world, encryption has become a prerequisite for many applications requiring data transfer over open and insecure networks. In addition, the advent and fast evolution of mobile technologies has facilitated the need for lightweight encryption schemes which prove to be strong as well as computationally less expensive than the present day standard ciphers. With this as the source of...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.