The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The speedy evolution in web environment and progression in technology have led us to access and manage tremendous images easily in various areas. Current internet image search engines purely trust on the text based information around the images. Keywords supplied by user can not specify content of images exactly. Returned images composed of many noisy, doubtful and insignificant images. To solve above...
This paper mainly concentrates on the control of Lunar-bots and is also applicable to other kinds of robots like the one used in warfare, medical surgeries, and even the one that is used for UAV automation using the world wide accessed internet communication with Earth Moon Communication (EMC). This paper discusses the unique way in which we can control the robot deployed in the Moon for space research...
Security is a measure of protecting data during its transmission over a network. In the secured transmission scheme, the message will be encrypted using encryption algorithms which convert it into ciphertext where keys are playing the vital role in encryption and decryption process. Keys will be either secret one or public key. Since public key cryptosystem gain its momentum from its evolution, sharing...
This is a network based application, while transferring file from client to server attackers may hack the files. Internet grows rapidly since it was created. With this network, users can share their information. The use of such networks had a tremendous growth. Meanwhile, attacks to such networks also have increased. There are several types of such attacks. An attacker can possibly launch a DoS attack...
The wide-scale deployment of intranet and internet along with the advancements in hardware and software technologies are leading to the emergence of new applications that mainly involve the delivery of voice, video and images to the end users. One such application that has generated considerable interest is VoIP. The applications of VoIP technology have gained momentum due to the advancements and...
In Wireless Wide Area Network (WWAN), QoS are important, especially in Multimedia applications like Skype calls. The Internet is today facing a change of the traffic type dominating the aggregates at network core and edges. Interactive VoIP and videoconferencing are currently having an exponential growth of usage. To dynamically determine the appropriate streaming bit rate and quality, the server...
Recently many prominent web sites face so called Distributed Denial of Service Attacks (DDoS). DDoS attacks are a virulent, relatively new type of attack on the availability of Internet services and resources. To avoid denigration most of the commercial sites do not expose that they were attacked that is the biggest challenges of the researchers. Network congestion caused by DDoS attack can be managed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.