The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pipelines are used as a medium to transport the oil, however, low maintenance causing not only the loss of the material itself but as well to the surrounding people and environment. In order to tackle the incidents, experts are assigned and experiments are conducted to analyze the source of the leakage. The leakage is often triggered by either natural disaster such as earthquake or human negligence...
During big data transmission, information loss occurs due to distinct single or multiple bits discrete or continuous transportation errors. The other causes are extra overhead and delays, triggered by diverse highly complex security policies, and illicit interferences. However, the present literature does not suggest any adequate security technique to handle these situations individually or in combination...
In literature to increase the success rate of software project development, several risk management approaches have been presented by researchers and practitioners. Usually, these risk management approaches are in the form of process models, steps and professional standards. Despite of many proposed risk management approaches, still the success rate of software project development is very low. This...
To enhance the correctness and robustness of received text information at the receiver end, we propose an error detection and correction mechanism that executes at the application layer. Basically the error checking bits are incorporated with the original information during transition at the network. The error positions are detected by these error checking bits and then corresponding errors are corrected...
To fulfill the needs for secure and lightweight data transmission approach, we propose a new plain text transmission Technique, which uses compressed bit stream of information as a mean of communications. This technique reduces channel overhead, information loss, and high bandwidth requirement. It maximizes the data security as it nullifies information notching, and prevents the attempt of modification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.