The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust is the matter of reliance by which one can share information to other for specific task. Trust management gives the schematic survey of trustworthy path selection across mobile ad hoc network. This trustworthiness depends on the reliance of trusted path selection and trust management hierarchy. The trust management is the open area in terms of mobile ad hoc networks, to establish trust across...
Privacy and Security are hot and complicated topics in the modern society within which we live. Information and Communication Technology (ICT) have always been accompanied with security and privacy techniques. Security ensures protection of data of parties in the eco system from unauthorised access and privacy lets the information to be computed and transmitted such that it seems unintelligible to...
Many advancement is made in recent days and number of techniques are proposed by different researchers for processing and extracting knowledge from big data. But to evaluate the consistency in extracted model is always questionable. In this paper we are presenting two techniques for measuring the consistency between extracted model and predicting their applicability. In this paper, Meta learning based...
Big Data has evolved as a challenging technology which will influence our daily life. It is transforming science, engineering, medicine, healthcare, finance, business, and everything in the society. Over the years the research in Big Data, Development, tools, techniques and applications are evolved to deal with the problem of digital data explosion.
The usage of wireless devices has increased drastically from last one decade, and is expected to increase exponentially in the coming age. The advent of wireless sensors, Bluetooth, Radio-Frequency identification tools, Digital gadgets etc, is nowadays a prime source of information generation. This paper presents few aspects related to possible integration of wireless in near future.
The 4G Revolution has begun with many of the advantages in wireless technology. The IEEE802.16 standard worldwide interoperability for microwave access is a technique which is used basically for the wireless and broadband for allowing high speed internet access for long distances. This new technique has made everything an mobile activity whether it is used as in business purpose or any other kind...
Wireless adhoc network is a network which does not have a fixed infrastructure; it works in open medium so it is more prone to attacks. Security is main element for a network to show good performance. Intrusion detection is to protect network from an unknown or known attack. This system acts as a second line of defense for adhoc networks. In this paper we study about the adhoc network, its characteristics,...
In this paper concept of implementation of the soft computing approach is introduced for the environment friendly steel hardening processing unit, i.e. for Plasma Ion Nitriding (PIN) System. In Plasma Ion Nitriding system, a proper and efficient mechanism is required to meet the problem of finding process parameters involved in the surface hardening treatment of different types of steel. The algorithmic...
The Mobile ad hoc networks served as explanatory facts on various issues and challenges to learn threats in security of wireless data. This data is actually moves around various components of ad hoc network to perform various operations. The confliction comes when a data is associated with multiple components and reflects the different outputs inside the network. Then it vanish many legitimate operations...
The Cloud computing which performs the task of the computing and storage capacity for a service to provide the flexibility for users. The providers manage the infrastructure and platforms on which the applications run by user. It relies on the sharing of resources to achieve the coherency and scalability for the utilization. Cloud computing relies on the network as an elementary service. The aim of...
KDSODTEX algorithm extracts second order decision table from first order decision table extracted by KDRuleEx. The KDSODTEX algorithm works well with categorical data sets. One improvement that is required that KDSODTEX should also support the continuous value attribute. In this paper extended version of KDSODTEX algorithm, Ex-KDSODTEX which handles both categorical and continuous valued attribute...
Knowledge representation opaque model like ANN has advantage of accuracy and limitation of interpretability. Transparent models like decision tree, decision table and rules represent knowledge in more understandable form and can easily be integrated with other learning system. Converting an opaque model like ANN to transparent model is called rule extraction. Lot of work has been done in the field...
This study examines the relation of different selected criteria for the assessment of left ventricular hypertrophy (LVH) by using analysis of variance (ANOVA) method in SPSS. For this purpose data set of four hundred and fifty two patients were included. Initial analysis was done by using Cornell voltage criteria and Cornell voltage duration criteria for LVH in association with QRS area for the same...
Wireless Sensor Networks (WSNs) are composed of many sensors which are densely or sparsely deployed to get the necessary information. They are constraint on resources such as energy, memory, computational speed and communications bandwidth. Particularly power is another major issue in WSNs, therefore main stress has been given to minimize the number of transmission to extend sensor service time in...
Because of the wireless media, wireless communication is inherently more susceptible to attack. Because of the popularized use of wireless technology not only communication but business, commerce and all other transactions has also been shifted from wired to wireless paradigm. So it is important to secure wireless communication not only at higher layers but also at physical layer. No one can access...
EDI encourages long-term commitment with trading partners, makes the transmission of information more efficient, and allows firms to be more responsive to customer needs through shorter order cycles. The electronic data interchange technology allows to do the simultaneously reducing costs by reducing paper, mail expense, and delays due to data entry errors This paper presenting here the business issues...
Communication probability depends on various soft and hard parameters. It depends on the link and communications parameters as well as device reliability. Communication probability for wireless sensor network is computed considering environmental parameters. Link probability is used to model the new communication model which takes into account the effect of environmental parameters to develop the...
Nanotechnology enabled RFID (Radio Frequency Identification) has been introduced in recent years but issues regarding their reliability, commerciability and application still needs to be resolved. The current market of Nano RFID is still in embryonic state which will be growing in the upcoming years if these issues are addressed. This paper explores the details of the commerciability of the Nano RFID...
Sometimes the physically distributed computing devices in a network may be interested in computing some function of their private inputs without disclosing these inputs to one another. This type of computation falls under the category of Secure Multiparty Computation (SMC). The solution to SMC problems in Mobile Ad hoc Networks (MANET) can be found with the modification of the data inputs or with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.