The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Watching movies has been one of the oldest sources of recreation. Standing in long queues for availing tickets has been a problem though. In the present day scenario the possibility of terrorist attacks in movie halls has also increased. In our paper, we have described a novel scheme how the movies can be seen in a multiplex without standing in long queues. Also, the security of multiplexes can also...
The strategy of using an effective scheme to screen out a large number of stable contingencies and to apply detailed simulation programs only to potentially unstable contingencies is well recognized. This strategy is implemented in on-line voltage security assessment (VSA). This paper presents a hybrid of linear, quadratic and nonlinear methods for on-line VSA. Linear methods are fast but may not...
There is a need for rigorous analysis techniques that developers can use to uncover security policy violations in their UML designs. There are a few UML analysis tools that can be used for this purpose, but they either rely on theorem-proving mechanisms that require sophisticated mathematical skill to use effectively, or they are based on model-checking techniques that require a ldquoclosed-worldrdquo...
In this paper a masking based data hiding and image authentication technique (MDHIAT) has been proposed by embedding a message/image into a colour image. Bits from authenticating message/image are embedded in single bit position under each byte of the source image by choosing a standard 3 times 3 mask in row major order. Point of insertion of a bit is obtained by computing modulus operation of the...
Protecting the network layer is an important problem in an ad hoc network. Several base network later protocols were built under the assumption that nodes forming an ad hoc network do not have enough power or processing capabilities to launch a powerful malicious attack. Thus they do not offer any immunity. AODV-S offers enhancement to the AODV protocol by incorporating protection against several...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.