The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Social networks form an important platform for information sharing and interaction among users. The content from social networks can be used to generate recommendations for users in order to help them to choose what they desire. There exist a lot of recommendation methods currently. In this paper, we propose a keyword based recommendation system (KBRS), where the user's preferences are indicated by...
Cloud storage facilitates to share the resources with large number of users with low marginal cost. The person who is uploading the file (split into unit unit-blocks) becomes the original user and all other existing users can access the files using their private key. The existing users can also perform modification actions and update using resigning key. The integrity of the unit-blocks can be verified...
Cloud computing is recently developed internet based computing paradigm where ranges of services such as data storage, applications deployment, servers, etc. are delivered over the internet. On the basis of response, cloud allocates the services through internet. The important feature of quality of service in cloud computing is secured way of protecting information over internet. The cloud service...
RFID is a technology similar to that of bar code scanning. An RFID system consists of tags, which use radio frequency signals to transmit its location information to a reader, which usually sends this information to a server that processes it according to the needs of the application. This paper presents a system that can track buses across a city by placing RFID tags in the buses and the readers...
The calibrated heat sensor is used for on chip heat sensing. We suggest an all digital on chip time based heat sensor for system on a chip (SoC) heat management. For on-chip purpose, the proposed temperature sensor achieves area-efficient and fast thermal monitoring by adopting a Digital Controlled Oscillator. The future heat sensor extinguishes the want for double position measurement compare to...
Closed-loop rate adaptive scheme is mutually considered both the rate and CW values. CRAS is a receiver-assisted rate adaptation protocol. It also considers the loss of frames due to collisions. The information about atmosphere energy level of a sender is carried via the DATA packet with one extra byte. It introduces a rate suggestion (RS) chart, that received via continuously observing the atmosphere...
In this paper, the proposed approach efficiently reduces the energy consumption in Mobicast routing protocol for 3D underwater sensor networks (USN). Many numbers of sensor nodes exist in the 3-D USN, which are deployed in the 3-D environment and sensor nodes be buoyant at dissimilar profound to monitor a specific phenomenon. The autonomous underwater vehicle (AUV) travels along a path which is defined...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Due to the specific characteristics, Wireless Sensor Networks (WSN) are severely unsafe and are open to malicious attacks. One of the most malicious threats to WSN is in the form of black hole attack that target the routing protocols. This genre of attacks can have a very serious impact on hierarchical routing protocols. A variety of security solutions have been put forth to safeguard WSNs from black...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Target localization and mobile node tracking problems in WSNs have been receiving considerable concentration recently, because of the requirements to achieve high localization accuracy, with the output of minimum cost. The drawback involved is the crisis of target tracking in Wireless Sensor Networks. Localization primarily refers to revealing of the spatial coordinates of a node. Target tracking...
An online social network(OSN) also referred to as a virtual community is a website on the Internet that serves as an ultimate location for people from different geometric locations to talk, share photos, ideas and interests, or make new friends. With the rapid increase in popularity and large number of user base, the online social networks also face an alarming rate of increase in security treats...
In this automated world, the comfort over handling of any kind of device has become possibly the easiest factor everywhere, having the similar aspect of building comfort zone, a system is designed for the evolution of automation in gardening process. This paper proposes a novel gardening system with automates the working of garden tool in an efficient manner reducing the human effort and reduction...
The overwhelming majority of existing approaches to opinion feature extraction accept mining patterns solely from one review language sets, identifying the different disparities in word spacing characteristics of opinion options across totally different language. In this work we have to consume the different opinion that is identifying through the sentiments, it is an important role in normal life-style...
In a limited allocation scenario of bandwidth, the accommodation of more number of users is very important for any service provider in today's communication technology. To achieve this, Orthogonal Frequency Division Multiplexing (OFDM) is preferred. The existing OFDM is based on Fast Fourier Transforms (FFT) and Inverse Fast Fourier Transforms (IFFT) which imposes some restriction over the data rate...
Nowadays, we have a standard communicating source i.e. On-line Social Networks which are used to share, link and broadcast the substantial quantity of the data of human being's life. Constant and day-to-day communication infers the interchange of numerous kinds of information, comprising image, unrestricted text, video and audial information. A chief portion of social network content is established...
Vehicular Ad hoc Networks adopt the general asymmetric cryptography and credential Retraction Records for its safety. In such arrangement, the substantiation of a received data is achieved by inspecting if the credential of the transmitter is enclosed within the present retraction record and certificatory the genuineness of the credential and signature of the transmitter. Here, we use an Expedite...
Wireless Sensor Network (WSN) is a collection of sensor nodes that involve in gathering of happenings from a nodes' surrounding. They help in supervising all the mission critical applications instead of depending on humans in monitoring cynical areas. Sensor nodes play a important role in alerting us any distinct changes that occur in the sited area and is prone to innumerous attacks. These attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.