The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Every enterprise wants to protect their data from both the internal and external attackers. In this initiative firewall, encryption, and authentication serve as the first line of defense. And Intrusion Detection serves as the second line of defense. IDS may use either anomaly based approach or misuse based approach. Traditional IDS were making use of misuse based approach. The drawback of misuse based...
Nowadays interaction with computer is essential, effective process and also the storing and retrieving of data from database will play vital role in the database application. To access the Database the user should have a strong knowledge in SQL command and procedures. But this is not possible for all users. So in this we present Human Language Query Processing for Temporal Database. This will help...
To provide better quality of service in scalable video streaming services for SoC design a cross-layer designing approach is presented in this paper. The available transmission bandwidth is implemented by multiple connections with feedback for supporting video streaming applications. Transmission packets are separated into multiple levels on their importance. The approach of Design modeling and implementation...
Today's economic climate requires that each industry aims at achieving maximum production capability, while minimizing capital investment. So, there is an increasing need of risk identification and management during the development, construction and operation process of coal-fired power projects. Presently, the coal-fired power plant construction projects and the risk of operating the initial research...
Wireless sensors are used for monitoring environments such as climate change, water quality and disaster management. Disaster management is a critical and emergent operation now, especially tsunami warning and prediction system. The Indian National Centre for Ocean Information Services (INCOIS) runs a tsunami early warning system for mitigation of oceanogenic disasters. The early warning system comprises...
A digital image watermarking technique based on Back-Propagation neural networks (BPNN) is proposed. The BPN is a type of supervised learning neural networks. It is a very popular in neural networks. Using improved BPNN, the watermark can be embed into Discrete Wavelet Transform(DWT), which can reduce the error and improve the rate of the learning, the trained neural networks can recover the watermark...
Recently, the necessity for power saving in Wireless Sensor Networks (WSNs) is crucial particularly in mission essential fields like military and medical applications. A communication network consists of nodes, every of that has computing power and may transmit and receive messages over communication links, in wireless. During this paper think about zigbee network formation and provides network protection...
Internet traffic measurement and analysis have been usually performed on a high performance server that collects and examines packet or flow traces. However, when we monitor a large volume of traffic data for detailed statistics, a long- period or a large-scale network, it is not easy to handle Tera or Peta-byte traffic data with a single server. Thus, in this paper, we propose separate server for...
Delivering the data in real time is important for the sensors deployed for monitoring and control applications of critical systems. If wireless sensors are used in such systems, interference from other wireless devices operating in the same premises is a major problem that can cause transmission errors and data delivery failures. Design and implementation of Interference mitigation schemes that offer...
This paper presents a new routing protocol named OEERP (Optimized Energy Efficient Routing Protocol), that improves the life time of Wireless Sensor Network (WSN). It is a cluster based protocol in which the node that acts as cluster-head is changed in every time slot. This approach improves the lifetime of the WSN for two reasons mainly. The first reason is the uniform battery drain of the nodes...
Internet congestion occurs when the aggregate demand for a resource (e.g., link bandwidth) exceeds the available capacity of the resource. TCP is used as a Transport Protocol for most of the applications on the Internet and is also responsible for adjusting to network congestion dynamically. TCPs congestion control mechanism is insufficient in a wireless environment because packet loss does not always...
Network Intrusion Detection is the most happening field of the network security research. It is a new kind of defense technology of the network security, used as a countermeasure to preserve data integrity and system availability during an intrusion. An ideal IDS system should be capable of evolving itself to identify not only known attacks but also unknown attacks. Algorithms based on Genetic Engineering...
A homogeneous, intensity modulated salinity sensor using Photonic Crystal Ring Resonator (PCRR) is proposed and designed for monitoring the salinity of seawater from 0 to 40%(0 to 40g/L) over the temperature between 0 to 25°C. The capability of the proposed sensor for sensing the salinity between 0 – 40% is theoretically examined. The sensor is composed of periodic Si rods embedded in an air host...
This paper aims at designing an oxygen level monitoring technique in an oxygen cylinder. The amount of oxygen present inside the oxygen cylinder is very vital information when such cylinder is in use for supply of oxygen to a critical patient. The amount of oxygen present inside the cylinder is measured by the pressure at the outlet nozzle. The pressure is measured using a high precision MEMS Pressure...
Wireless mesh networks (WMNs) experience frequent link failures caused by channel interference, bandwidth demands causes severe performance degradation in WMNs. Link failure will lead to produce a sequence of disruptions to deliver the packets to the destination. To overcome this ART rerouting the traffic via an alternative path from a node whose local link is down without the need to wait until the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.