The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For several decades researchers around the globe have been avidly investigating practical solutions to the enduring problem of understanding visual content within an image. We have focused our work on features extraction ofimage by four different methods and cascaded the features followed by support vector machine classification algorithm. We have used sliding window approach in it to locate the object...
Today's cyber world is highly dependent on the internet. And like any other information and communication system the users of the internet, although enjoy it's services, but also suffer the vulnerabilities. One of the most damaging and ever changing amongst these is degradation in internet quality-of-services due to DDoS attacks. These attacks are easy to launch because of the high availability of...
It has been observed that there is no fixed recognition system to identify and recognize a license plate. As the texture and writing pattern are not same hence, the plate designs are differ from one country to another. License plate recognition system for Vehicle Identification (VI) is a very popular and challenging work. With a high population country like India, identification of the vehicle owner...
A JellyFish (JF) attack is particularly harmful against TCP-based mobile ad hoc networks (MANETs) where a malicious node exploits the behaviour of closed loop protocols such as TCP in order to delay, periodically drop or reorder the packets. This attack is carried out on the network layer, but it affects the performance of the transport layer protocol and causes severe degradation in end-to-end throughput...
Relay node placement problem is a very well-known problem of Wireless Sensor Networks. Many techniques (heuristics and algorithms) have been proposed to solve this problem. However, few meta-heuristics have been suggested till now. In this paper, we discuss a few meta-heuristic techniques for relay node placement problem which are not explored yet. This paper also shows our proposed idea for implementation...
Several dynamic key management schemes have been proposed for wireless sensor networks (WSNs). However, only few have focused specifically on wireless sensor and actor networks (WSANs). This paper proposes an actor node based rekeying scheme for WSANs which follows a three-tier automated architecture. The proposed scheme assigns the responsibility of rekeying to the resource-rich actor nodes, which...
The smart-phones are computing devices used to execute resource intensive applications. Despite considerable progress in the past years, smart-phones still have low computing power with some inbuilt problems such as limited battery, resource deficiency, and limited storage. Mobile Cloud Computing (MCC) improves the overall performance of smart-phones by providing extra resources of remote cloud server...
Data exploration is the process of competently digging out insights from stored data even if the user doesn't know or uncertain on what exactly he want. Iterative interactions of the user with search systems can help to achieve these goals; Interactive data exploration (IDE) is one such system, supporting data exploration by simply incorporating user feedback on retrieve data. These systems are the...
In Aspect Oriented Software Development (AOSD) has been considered one of the most promising abstractions to make software structure more maintainable and configurable. It also helps to overcome two big issues of current object oriented programming principles, to reduce the problem of code tangling and code scattering. Aspect Oriented Programming (AOP) has been focused largely in the implementation/...
As we know that security is an important issue in distributed system, that create many problems when a user want to access, or accessing services through the internet then credential management acting a main role in enhancing the security of that system, or an organization. In this proposed work w provide security solution with the help of Open PGP (RFC 4880) certificates in Grid Framework. Open PGP...
Diabetes is a chronicle disease which increases with time and cause various other complications if not treated in early stage, it is also a reason of early death in diabetes patients due to other complication. There are so many peoples all over the world who are suffering from diabetes and still undiagnosed. Many researchers have developed computational methods for diabetes diagnosis but those systems...
Big data has shown the great potential in optimizing data, making decisions, spotting business trends in various fields such as manufacturing, finance and Information Technology. Applications of big data are dominating the conventional databases and providing more reliable and scalable services to the users, market researchers, data analysts and investors without losing the “4V” (i.e. Volume, Velocity,...
With recent technological advancement in the wireless sensor networks (WSNs), the use of wireless sensors in the fields like pollution monitoring, military applications, health applications, seismic study, under water study has increased rapidly. There are certain applications such as military, environmental and seismic which need time synchronization of the sensor nodes precisely to ensure the exact...
With the advent of Internet and Search Engine Optimization techniques, various factors came into existence like On the Page and Off the Page Optimization of webpages. This gave rise to immediate idea of various methods affecting the appearance of page and generating traffic and getting good ranks in search engines. Optimization is an art combining science and marketing and leads to discovery of success...
The exponential increase in video potential applications and its complexity to manage diverse and complex multimedia resources in the current digital scenario reveals an exigent demand of retrieval techniques which have efficient time and space complexity. In this paper, we propose a key frame based retrieval technique which exploits the clip segmentation for generation of key frames and block based...
This paper presents the role of distributed information systems in enhancing multiple criteria decision making problems. This goal is achieved showing the architecture and implementation of ELIGERE, a distributed software platform designed to rank a discrete set of alternatives with respect to multiple evaluation criteria. ELIGERE distributed architecture provides several features of interest in group...
The present web-app browsers are static in nature. A development wherein the important information from a web-app are extracted and presented via browser extension will enhance the user's accessibility. This paper proposes a novel method for auto extraction of contact details in a web-app and displays them in a dynamic menu with options for voice interface. The user interface enables the operator...
The advent of digital technology and its range of applications in various field witness the importance of retrieving huge and diverse multimedia content from the data repositories. The contents are always under potential threat intended to extract the private information. This paper presents a privacy preserving technique to retrieve images from the corresponding database by using the encrypted feature...
There has been a sudden up-rise in the research activities of Vehicular Ad-hoc Networks (VANET), however it is expected that vehicles of the future will not be able to fully utilize their computational storage and communication abilities. Therefore the next step that is seen for VANET is communication of vehicles using the computing power of cloud. In simpler words, combining cloud computing and VANET...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.