The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research gives a novel approach for fast encryption of images using chaotic maps and pixel shuffling using modified RC4 stream cipher algorithm. In this, the given image will be first divided into the three blocks of same size which represents red, green and blue color intensity matrices respectively. These 2d blocks will the converted to horizontal vectors and these vectors will then undergo...
Ad hoc network provides facilities to access devices in infrastructure less system without centralized approach. Android based smart devices are able to transmit data in ad hoc network of all active devices without centralized approach. In Comparison of Bluetooth devices the Wi-Fi devices are used for faster speed over longer distance. In this era Android convert the simple phone into Smart phone...
In a recent paper, a new modulation technique called Dual Three Pulse Modulation (DTPM) was proposed to improve the efficiency of the power converters of the Electric/Hybrid/Fuel-cell vehicles. It was simulated in PSIM 9.0.4 and uses analog multiplexers to generate the modulating signals for the DC/DC converter and inverter. The circuit used is complex and many other simulation softwares do not support...
In a network, the process of selecting the best path is called routing. Routing is necessary to establish a communication between mobile nodes. In an ad-hoc network, routing becomes more challenging due to the assumption of the traditional routing protocols about friendliness between nodes in the network. Various network layer attacks can be launched which affect routing of ad hoc networks. Along...
Cloud computing is a rapidly growing model of computation. It is the delivery of computing services by shared resources, software and information over the network (Internet or Intranet). It allows user to store large amount of data in cloud storage and use as when required from any part of the world by networks. Cloud computing is network based technology since security issues like privacy, data security,...
A load balancing algorithm which considers the different characteristics of the grid computing environment is needed as grid computing is emerging all over the internet. Therefore, this research presents a Novel fault tolerant job Scheduling and load balancing strategy named as NovelAlg_FLB, which focuses on grid architecture, computer heterogeneity, communication delay, network bandwidth, resource...
Cloud Computing is a platform that relies on sharing resources, software and information between remote servers and users over the network. Since cloud computing share distributed resources in open environment, it must be considered from privacy and security viewpoints. In this paper, we have discussed the security risks and concerns, key management, and mutual authentication of cloud computing. The...
As we know Energy is crucial research in today's world. Due to emerging trends in technology, consumption of energy is growing independently but energy production capabilities are not growing as fast so, efforts to produce more energy is proving hazards for our environment that is usually becoming very important to adopt energy saving. Cloud is an energy hungry technology with data centre running...
Data encryption is the best way to provide secure communication. The paper presents a novel approach to data hiding using a symmetric stream cipher known as A-S Algorithm. Here the user can have two keys: Encryption Key and Data Hiding Key. Using the A-S Algorithm the image encryption is performed. After encryption the additional data will be hided in the encrypted image with the use of data hiding...
Now-a-days we are leading a life with world wide access technologies. Cloud computing is one of such technologies via which we can ensure security, disaster recovery, and better availability of data. Cloud computing basically focus on deployment of remote servers and software network together. Cloud computing allows us online access of the resource remotely. It benefits us while we use it for distributed...
In today's world, almost every individual uses computational machines for their day to day activities. Contribution of Cloud Computing in our day to day life is commendable. Even a common man has the privilege to use cloud services in the form of email, games, storage and etc., because of Cloud Computing. Cloud services tend to be cheaper and affordable with pay as you use policy. Scalability and...
Using the same key for both encryption as well as decryption is the key principle in symmetric algorithm. This mechanism involves the existence of centralized Key Distribution Centre also known as KDC, responsible for distributing and maintaining attributes and secret keys to its users. There also is a decentralized access control scheme used to make data storage in clouds more secure. The security...
Development in technology enabled us to use virtual money for online transaction. It is proven through a developed technology, when transaction can be done not only using real money but also virtual money. This technology is also supported by NFC. This paper gives an overview of NFC technology for generating tickets using intelligent NFC based android phone. We will see how through machine learning...
An ad hoc network is a suburbanized types of wireless network. The ad hoc which means “for this purpose” formed network instantly when nodes are connected in network for communication. Ad hoc network is a temporary network built for specific purpose. It does not require any pre-established infrastructure. The dynamic nature of ad hoc networks makes them more utilisable. On the other hand, selfish...
States growing with or crawling with digital technology, it has been pushed to enter into an interface leveraging extensive power of digital technology, pushing conventional approach of international relations (IR) in new form. Increasing e-readiness of state come up with new actors and new set of structural adjustment within organization and department of state in digital world. Digital technology...
Wireless sensor networks (WSNs) have started receiving enormous research incentives for its omnipresence in numerous applications. The Energy constraint of sensor networks has always been focus of researchers. Data aggregation is an effective technique to save energy and to enhance the lifetime for the sensor networks. Among various approaches, Hierarchical cluster-based data aggregation protocols...
A process of de-identification used for privacy protection in multimedia content should be applied not only for primary biometric traits (face, voice) but for soft biometric traits as well. This paper deals with a proposal of the automatic hair color de-identification method working with video records. The method involves image hair area segmentation, basic hair color recognition, and modification...
Information and communication technology (ICT) can cause rapid development in government processes, especially in developing countries like Nepal. ICT strategies and ICT plans should be evaluated to align with organization visions and missions in order to achieve effective use of ICT in their organizations. The main purpose of this research study is to evaluate whether the process of system auditing...
The Internet of Things enable the next wave of real life services in the physical world across many sectors. We are in the post PC era where all the PC are replaced by the handheld mobile devices. This paper presents a novel approach to collect the data from the devices using sensors and many case studies in which it can be applied. It also implements a sample demonstration for smart home which makes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.