The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Privacy-preservation in distributed databases is an important area of research in recent years. In a typical scenario, multiple parties may be wish to collaborate to extract interesting global information such as class labels without revealing their respective data to each other. This may be particularly useful in applications such as car selling units, medical research etc. In the proposed work,...
Problem-based learning has been at the core of significant developments in engineering education in recent years. This term refers to any learning environment in which the problem drives the learning, because it is posed in such a way that students realize they need to acquire new knowledge before the problem can be solved. This paper presents the experience of a structured problem-based learning...
This paper presents a novel technique of document clustering based on frequent concepts. The proposed FCDC (Frequent Concepts based Document Clustering), a clustering algorithm works with frequent concepts rather than frequent itemsets used in traditional text mining techniques. Many well known clustering algorithms deal with documents as bag of words while they ignore the important relationship between...
Persistent Data Library (PDL) manages object persistence in C++ applications. PDL abstracts persisting features and provides an easy programming environment to the programmer. It offers a set of data structures which transparently handles persistence. Data structures in PDL are quite similar to data structures in Standard Template Library (STL) in C++ but STL does not provide functionality to make...
According to IEEE 802.11 based WLAN standard, handoff at link layer (L2) consists of three distinct phases scanning, authentication and re-association. Scanning process takes 90% of the total handoff execution time [7] which is known as handoff delay or handoff latency. So in this paper our main goal is to reduce scanning delay, as a small handoff delay results a seamless and successful handoff. And...
The following topics are dealt with: cloud computing; information technology; Internet; parallel computing; grid computing; network-based computing; data security; data privacy; cluster computing; wireless networks; multimedia networking; service networking; Web applications; and peer-to-peer computing.
Granting efficient and fast accesses to the index is a key issue for performances of Web Search Engines. In order to enhance memory utilization and favor fast query resolution, WSEs use Inverted File (IF) indexes that consist of an array of the posting lists where each posting list is associated with a term and contains the term as well as the identifiers of the documents containing the term. Since...
Computing is being transformed to a model consisting of services that are commoditised and delivered in a manner similar to utilities such as water, electricity, gas, and telephony. In such a model, users access services based on their requirements without regard to where the services are hosted. Several computing paradigms have promised to deliver this utility computing vision and they include Grid...
Compilation Server (CS) is a server-assist mechanism to eliminate or reduce the compilation overhead. CS can compile and optimize code on behalf of clients. Modern JVM implementations interleave execution with compilation of “hot” methods to achieve reasonable performance. Since compilation overhead impacts the execution time of the application and induces run-time pauses, we explore offloading compilation...
Information Security over mobile communication networks is important for secure communication. In GSM mobile standard, A5/1 stream cipher is used to provide security over-the-air voice transmissions. It is strong encryption algorithm among the cryptographic algorithms used in GSM. However, it is cryptanalized by a number of attacks. Recent studies show that it has serious security weaknesses in its...
Securing a Wireless Ad Hoc Network is one of the major concerns for the researchers. Due to wide-ranging characteristics of the ad-hoc networks, it is always at a risk to internal as well as external attacks. Many solutions have been proposed and currently being improved in this area. Most of these solutions involve encryption, secure routing, quality of service etc. Each of them is designed to operate...
The Internet offers an enormous potential for all kinds of services, from Web search to online shopping, from social networks to multi-player online games,from online auctions to online encyclopedias. Many of these services thrive due to a vibrant community support. Making services open to community support offers great potentials but makes them also vulnerable to malicious behavior. Malicious behavior...
This paper deals with a problem on edge-colored graphs. The aim is to find a minimum reload cost spanning tree using Ant Colony Optimization (ACO) approach. Given an edge-colored graph, reload costs arise at nodes and depend on the pair of colors on the edges used in traversal through that node. The problem finds practical applications in several domains viz. telecommunication, energy, transportation...
In today's world of web, everybody desires different types of E-services from the internet, which is a massive storehouse of information, and on demand produces required services in front of the consumer. This brings revolution to the civilization of mankind. Hundreds of researchers are working on easy access of web services. When a user searches web for specific information, the search engine produces...
Wireless sensor networks (WSN) is an emerging technology that has a wide range of applications in various important areas including, environmental, wildlife monitoring, artificial intelligence, medical, battle field, agriculture and research. All these area of applications requires high quality data transmission from source sensor node to destination sensor node. In military applications, electro...
In a structured peer-to-peer (p2p) network, key based routing algorithms are used for searching and locating resources in the network. For dynamic and scalable behavior these algorithms suffer from high overhead to maintain large state information of nodes and to keep them up-to-date. To deal with this problem, a Sub-ring Based Chord model and a lookup algorithm are proposed. The lookup process keeps...
Grid is collection of heterogeneous resources. The availability and searching the appropriate resources for job execution determine the computing performance of grid. In this paper a model namely `Decentralized P2P Grid Resources Discovery' has been proposed and designed with prototype implementation. This model uses the resources information that is stored in data structure called LC-Trie (Level...
The increasing ability to track and collect large amounts of data with the use of current hardware and software technology has lead to immense challenge and consequent interest in the development of data mining algorithms which preserve user security and privacy in a large distributed system. Secure data aggregation with privacy preserving feature is a demanding task. Privacy preservation is becoming...
Radio Frequency Identification Device (RFID) is a fast emerging technology and has generated enormous amount of interest in tracking of vehicles. With RFID technology, vehicles can be tracked accurately in real time. In this paper we propose a novel approach for the application of RFID technology along with network to keep track of mass transportation vehicle by which we can provide information related...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.