The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing provides the secured data sharing among the groups. In which, dynamic group data sharing in a multi-owner environment in the untrusted clouds is the vital problem. While, the group manager updates the revocation list every day, even when no user currently moving away from the group it creates the storage overhead and high data encryption. To overcome this, the proposed technique is...
DCIM is a Distributed Cache Invalidation Method for maintaining cache consistency in wireless mobile network. DCIM is a client based cache consistency schemes for caching data in wireless mobile network. For cache maintenance an adaptive TTL mechanism is used in DCIM that has update rates of data sources to update cache, where expired TTL values are grouped in validation requests rates are prefetched...
Cervical cancer is the second most common gynecologic cancer worldwide. Unlike the other cancers it does not show any symptoms in its earlier stage which causes mortality among women. It takes 8 to 10 years to develop from precancerous to severe stage. The important reasons for higher cervical cancer in developing countries are lack of resources, lack of effectual screening programs and inadequately...
Location estimation is a very useful concept in the real world. The assessment of the localization system is based on the wireless technology used, positioning algorithm, complexity, scalability, accuracy, power consumption, size and cost. GPS based localization are inconvenient due to cost and poor signal coverage area. Modern localization system use techniques like AoA, ToA, TDoA & RSS. Among...
According to WHO 2013 report, India is the highest burden country for Tuberculosis disease. Earlier diagnosis of TB may save many patient's life and their neighbor. The earlier diagnosis of TB disease is still a challenging problem in India. Zeihl Neelson(ZN) staining, a microscopic method is most common and conventional way for manual diagnosis of Tuberculosis bacteria. In this proposed work, the...
In recent days, image processing is an interesting research field and mainly the medical image processing is increasingly challenging field to process various medical image types. It is widely used in diagnosis of disease such as brain tumor, Cancer, Diabetes etc. and brain tumor is one such dangerous disease and currently moreover 600,000 people have this type of disease. Image segmentation is an...
Fingerprint matching is one of the most important problems in Automatic Fingerprint Identification System (AFIS). It has emerged as an effective tool for human recognition due to its uniqueness, universality and invariability. The significance of this work is to monitor the matching and similarity for two or more fingerprint images simultaneously. This proposed algorithm has been formulated based...
CAPTCHA is a software programming which is introduced to differentiate the human from the robots. CATCHA intends to generate a code which can only be identified by the human and machines cannot. In the real world, due to the massive increase in the usage of smart phones, tablets and other devices with the touch screen functionality poses a many online security threats. The traditional CAPTCHA requires...
A botnet is group of compromised computers that are controlled by a botmaster, who uses them to perform illegal activities. Centralized and P2P (Peer-to-Peer) botnets are the most commonly used botnet types. Honeypots have been used in many systems as computer defense. They are used to attract botmasters to add them in their botnets; to become spies in exposing botnet attacker behaviors. In recent...
Activity recognition, which takes the sensor reading from mobile sensors as inputs and predicts a human motion activity using data mining and machine learning techniques. In this paper, we analyze the performance of two classification algorithm in an on-line activity recognition system working on Android platforms that supports on-line training and classification using only the accelerometer data...
Computational intelligence plays a vital role in heart disease diagnosis. Researchers have been using several intelligence techniques to improve the heart disease diagnosis accuracy. Data mining plays an important role in the field of heart disease prediction. Classification is a supervised learning in data mining, used to accurately predict the target class for each case in the data. Naive bayes...
The increasing number of users and services on Internet day by day resulting in high traffic and load on the web servers. This is in turn degrading the quality of service. A well known solution to this problem is to use cluster of web servers. An optimum server load balancing policy is needed to achieve scalability and high performance of the service offered by cluster of web servers. In this paper,...
Partial hand disability represents a serious problem for many people, which occurs due to debilitative disorders including Muscular Dystrophy, Chronic Carpal Tunnel Syndrome and Multiple sclerosis, accidents and trauma, Stroke and other age related problems. These patients who although have mobility and sensitivity in their hands, are not strong enough to hold even a simple remote control. Hand's...
In this paper, Modified Teaching Learning Based Optimisation is used to solve the Economic Dispatch problems of the generating units considering valve point loadings effects. The formulation of the objective function is carried out in such a way that the losses are neglected and a clarified solution is obtained from the generating units. A recently developed optimisation is the Teaching Learning Based...
Dual Steganography is the process of using Steganography combined with Cryptography. Steganography is the process of hiding confidential data'sin the media files such as audio, images, videos etc. Cryptography is a branch of mathematics concerned with the study of hiding and revealing information and also for proving authorship of messages. In this paper, Dual Steganography concept has been applied...
This work describes the recognition of Bengali Handwritten Numeral Recognition using Deep Denoising Autoencoder using Multilayer Perceptron (MLP) trained through backpropagation algorithm (DDA). To bring the weights of the DDA to some good solution a layer wise pre-training is done with Denoising Autoencoders. Denoising Autoencoders using MLP trained through backpropagation algorithm are made by introducing...
In this paper, a reordered search mechanism is introduced for high-speed low-power content-addressable memories (CAMs). Only by searching a few bits of a search word the mismatches can be occured. So to reduce the power consumption, search word circuit is partitioned into two sections that are searched sequentially. Searching will be faster if the last few bits is compared other than the rest of the...
Buyers express their opinions openly in free text feedback comments. The users are attracted to online-shopping not only due to the convenience in accessing the information of items on-sold, but also the availability of the other buyer's feedback on their purchasing experience, item-related and/or seller-related. The Mining E-Commerce feedback comments for trust evaluation System proposes a novel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.