The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a simple scheduling algorithm to minimize the energy consumption in weakly hard real time systems. It uses the (m, k)-model, which requires at least m out of k consecutive instances of a task meet their deadlines. In the first phase real time jobs are partitioned into mandatory and optional to satisfy weakly hard real time constraint. While, the second phase, introduces a scheduling...
Extraction of interesting negative association rules from large data sets is measured as a key feature of data mining. Many researchers discovered numerous algorithms and methods to find out negative and positive association rules. From the existing approaches, the frequent pattern growth (FP-Growth) approach is well-organized and capable method for finding the item sets which are frequent, without...
Internet has been used for Critical Infrastructure and E-commerce business activities along with communication. The Information and Communication Technology (ICT) sector, finds itself confronted with sizeable Network Security problems. Computer Networks Security is of primary concern in the world over today. Hackers has been using various innovative techniques to steal the crucial information and...
Association rule mining is the task of data mining, which generates rules based on the relationships between the set of items purchased.We propose an algorithm, namely utility pattern rare itemset (UPRI), for mining high utility rare itemsets with a set of strategies. The information of high utility itemsets is maintained in a tree-based data structure namely utility pattern rare tree (UPR-Tree)....
Classification of web services through semantic service discovery of a similar event will be the feature services. However, to improve the selection and matching process is not enough. The existing service discovery approaches often published keyword matching to find web services practices. In this paper we propose a framework for automatic service classification and categorization of web service...
Nuclear Weapons are subtle Weapons with State-of-art Technology that usually utilized in warfare. These are high level explosives with huge heat and radiation they emit. just in case of Fusion Energy discharged is associate quantity of 14Mev. Currently considering these aspects …. Quantum cryptography that uses quantum physics to create a secured manner of communication protocol can have a sway on...
Cloud computing has emerged as a major way of reducing the information technology costs incurred by organizations. For a cost-sensitive organization which stores its data in the cloud and retrieves files via keyword search, the primary focus is on the issues of cost effectiveness as well as privacy. Three keyword-based secure search protocols, namely Ostrovsky protocol, Cooperative Private Searching...
Cloud computing has emerged as a technology in demand both from the industry as well as from the academia's perspectives. Wide spread use of cloud computing has not reached its potential owing to various challenges - security being the foremost one. Customers still hesitate to trust the cloud environment as they feel that security mechanisms are inadequate. Building trust on the Cloud Service Providers...
Routing in Wireless Sensor Networks (WSNs) is an emerging research area. This paper presents a survey of routing techniques in WSNs which support node mobility. In recent years, advancement in WSNs lead to the development of many routing protocols specifically designed for WSNs. The routing protocols discussed in this paper in general can be four main category such as Network structure, Communication...
The Real-Time Simulation (RTS) of an aero space interceptor is an integrated approach to model and simulate the dynamic onboard subsystems by putting them in hardware-in-loop simulation. To achieve the design, development, testing and validation of such vehicles, modelling of each flight subsystem has to be carried out with greater accuracy by studying & simulating the various target trajectories...
The Strategic organizations need highly secure methods for identity verification and to control physical access to various facilities. In addition to improving overall security, an integrated identity system helps to make Strategic operations more efficient and builds trust that can be leveraged throughout interagency programs. This paper discusses a detailed view of design, development and implementation...
In the present article, the cooperative spectrum sensing with a weighted fusion (WCSS) scheme has been analyzed in Rayleigh fading. Cognitive radio (CR) uses an improved energy detector (IED) with several antennas. Antenna selection diversity combining (SC) is performed at each CR on the basis of the values of decision statistics measured from different antennas at IED. Every CR takes 1-bit decision...
Integrated Internet-MANET (IIM) architecture is a hybrid network which is an interconnection of the wired Internet and wireless MANET. This interconnection is facilitated through gateways. Some of the important issues in this integration are gateway discovery and gateway load balancing. So far, these issues have been addressed separately in the literature. The issues of gateway load balancing and...
Adders play an important role in digital circuits. Logarithmic adders are efficient in delay reduction of carry generation/propagation in contrary to linear adders. It is found from simulations that even logarithmic adders suffer from delay, chip area over head and additional latches in the presence of ripple carry adders at the time of FPGA realization. The main motive of this work is to design and...
Nowadays, it is more demanded for techniques that are efficient in retrieval of small results from large data sets. Iceberg queries are such a kind of queries which accepts large data as input and process them for retrieve small results upon user specified threshold (T). Earlier, the iceberg queries are processed by many ways but are compromised in speed with which the data is retrieved. Thus lots...
In the current era of web applications such as e-retail business, the web services focused to provide personalized search systems to the targeted user intents based on the navigation patterns. Intelligent collaborative filtering recommender system tries to recommend the web pages considering the similar patterns of the other users along with the usage knowledge of the current user session. This recommender...
Many tools and frameworks have been developed to process data on distributed data centers. MapReduce most prominent among such frameworks has emerged as a popular distributed data processing model for processing vast amount of data in parallel on large clusters of commodity machines. The JobTracker in MapReduce framework is responsible for both managing the cluster's resources and executing the MapReduce...
Testing of mobile applications which run on smart devices is more complex due to diversity of mobile devices and computational resources. Mobile testing using emulators which doesn't include real network traffic and testing mobile applications in more than one portable device in single system was also not possible in normal testing. In order to overcome the draw backs of normal testing, in this paper...
The focus on R&D planning is gaining importance due to the ever increasing investments made in the sector as realisation has dawned upon the decision makers that investments are bound to generate benefits at a later stage. For better R&D planning, it is imperative that tools and mechanisms, particularly with the explosion of data due to the advancement in information and communication technologies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.