The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intrusion prevention system is an important technique in the network security architecture. Most of the modern intrusion detection systems lack the ability to process massive data streams to achieve anomaly detection. Instead of Intrusion detection, Intrusion prevention system can be used for both servers and end-hosts to handle the dual challenges of accuracy and performance which the former lacks...
The structural material is based on the mechanical properties, force component of the materials used to manufacture. At present, the theory of formal concept analysis has been successfully applied to software engineering, data mining, information retrieval and other fields. Association rule mining is in order to find interesting association or contact between the item sets in large amounts of data...
Association Rule Mining is an important data mining technique and Maximal frequent item sets mining is an essential step in the process of Association rule. Here presented is BM-MFI, a new algorithm based on matrix, for mining maximal frequent item sets. Its basic idea is trans-forming the event database into matrix database by operating the rows and columns of matrix to compress the data-base. Using...
Data mashups enable users to create new applications by combining Web APIs from several data sources. Although data mashups have become very popular over the last few years, there are several challenging issues when combining Web APIs into data mashups, especially when compatible APIs are manually discovered and composed by mash up developers. In this paper, we propose an approach for automatic discovery...
Network Virtualization has helped in achieving the most complex tasks when it comes to Quality-of-Service (QoS) provisioning to all the end-users. In our paper we are trying to show the efficient way to allocate fixed-capacity network services in the VNs when multiple service requests are handled over the Wide Area Virtual Network (WAVN), and thereby maintaining the QoS issues associated with it....
At present, digital content has permeated every part of human social life, and has become a valuable resource. However, while the vast amounts of information continue to occur, human beings are persecuted by the loss of information, especially those carrying human culture and civilization. The prolonged preservation technology of digital content faces enormous challenges. Therefore, the managers should...
Top-k queries are widely used in analyzing and processing uncertain data. In the uncertain database, the xtuple consists a number of alternatives which are mutually exclusive, the independence still remains among the x-tuples. Probabilistic threshold top-k queries (PT-k queries) return the tuple taking a probability of at least threshold p to be in the top-k list, but it didn't take alternatives in...
The paper proposes a Genetic Algorithm solution for solving a short term hydro thermal scheduling problem. The scheduling has been done for a period of twenty four hours. The algorithm is first applied on hydro plants for calculating hydro generation and then on thermal units for calculating economic load dispatch among the given units. The various constraints like load balancing, thermal and hydro...
We live in a collaborative world. Arguably, the most productive way of data collection is to recruit a large number of people for data entry. Internet provides a very powerful and versatile medium to bring together such a large number of people With this in mind, we have developed a framework which enables neophyte users to build applications for social co-creation of geographic data, called Geoinformer...
The latest technological development in web and mobile communication technology has made access to the Internet on the Internet enabled mobile handset quite simpler. But can the same be said by the less privileged section of the society measured not in terms of economic wealth but in terms of the accessibility of the resources. Therefore, in this paper we make an effort to measure the accessibility...
Dynamic topology and without infrastructure provide a great facility for Adhoc network. In such facility packet dropping is a serious challenge for quality performance of Adhoc network. Adhoc network suffered some security attack such attacks are wormhole attack, black hole attack, and malicious attack that attack occurred a packet dropping problem in Adhoc network. For the minimization of attack...
Economic load dispatch (ELD) is an important optimization task in power system. It is the process of allocating generation among the committed units such that the constraints imposed are satisfied and the fuel cost is minimized. Particle swarm optimization (PSO) is a population-based optimization technique that can be applied to a wide range of problems but it lacks global search ability in the last...
The Power System Stabilizer (PSS) is added to excitation system to enhance the damping during low frequency oscillations. In this paper, the design of decentralized PSSs for 10 machines with 39 buses using fast output sampling method via reduced order model is proposed. In multi-machine power system the order of the states matrix is very large. The main objectives of order reduction is to design a...
Data sharing between two organizations is common in many application areas like business planning or marketing. When data are to be shared between parties, there could be some sensitive data which should not be disclosed to the other parties. Also medical records are more sensitive so, privacy protection is taken more seriously. As per requirement by the Health Insurance Portability and Accountability...
An identity-based proxy re-signcryption scheme proposed by Wang Huige[9], is a cryptographic technique which provides both confidentiality and authenticity. It is a dual signcryption technique. First, signcryption is done by originator of data and another signcryption performed by semi-trusted entity called âproxyâ to convert signcryption addressed to a âdelegatorâ...
Network Modelling is a useful working domain for generating an insight about the events occurring in a network. In today's scenario, Network security is one of the most important concerns and Black hole attack is one of them. Most of the proposed works for preventing Black hole in MANET are being simulated through a network simulator for performance evaluation. But the result of simulating an algorithm...
Dynamic aggregation of coherent generators is the main step in constructing dynamic equivalent model of power systems. In this paper two typical algorithms of coherent generators dynamic aggregation are reviewed briefly, the first model is traditional frequency domain algorithm, namely the generator terminal bus aggregation algorithm which uses the iterative process in frequency domain to derive the...
Grid technology has emerged as an important implement for solving the computation intensive applications. Grid systems must exhibit high Reliability to continuously provide correct service. Moreover, Grid scheduler, as a core part of Grid systems, must use the available resources efficiently to make mutually conflicting goals satisfied. Therefore, multiple factors such as execution time, flow time,...
Telecom power supplies are mostly rich in harmonics which leads to poor power quality. Analysis, design and performance of a three-phase power factor corrected (PFC) isolated zeta DC-DC converter based 9 kW power supply (PS) meant for telecom tower is carried out here for power quality improvement. High power rating of the proposed power supply is achieved by using series connection at the secondary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.