The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio Frequency IDentification (RFID) is the wireless non-contact system that uses radio-frequency waves to transfer data from a tag attached to an object, for the automatic identification and tracking. An internet based concept is incorporated with RFID technology to form an internet based application for the library management. The RFID reader Motorola MC9090 is used for the entire process which...
Computational grids have the potential for solving large scale scientific problems using heterogeneous and geographically distributed resources. Before this potential is realized, there are several technical overheads that must be overcome. This paper introduces PRAG — a resource allocation technique that is pre-emptive in nature. The critical problem for grid users is efficient allocation of resources...
In the 21st century network security is rated as one of most demanding domain in computer science and engineering where numerous organizations and researchers are giving their contribution to enhance the existing network security framework in various ways. This paper is aimed at discussing about the enhancement of firewalls policies in the network. The network security and firewalls are two words...
Steganography is a data hiding process in which information is secured, while transferring data from sender to receiver. In audio steganography, encoding process is carried out through inactive frames of low bit rate audio streams by performing iLBC (Internet Loy Bit rate Codec). This methodology can be used in applications such as VoIP(Voice Over Internet Protocol), streaming audio archival and messaging...
In this paper, we examine the significance of expansion of the user query by two techniques namely Efficient Clustering-By-Direction and Theme Clustering. These two techniques produce the clusters of keywords extracted from the set of retrieved documents for the user query. The former clustering is based on statistical approach whereas the latter clustering is based on semantic approach. Empirical...
ICT has become an indispensable factor in the modern life of every individual. The elements of information and communication technology related sources are perceived as essential parameters in day today operation of banking both in private and public nature while deal with customers and stakeholders. The applications of ICT are augmenting in every sphere of our action includes both consumption and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.