The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Renewable Energy is a pressing need in the 21st century as non-renewable sources are no longer fit for our energy needs. This is especially important in a country like India, where supply to demand ratio is very low. In this paper, we intend to identify the geographical areas for solar and wind energy generations at low cost. It is achieved by monitoring atmospheric weather conditions, such as temperature,...
When a user accesses a resource, the accounting process at the server side does the job of keeping track of the resource usage so as to charge the user. In cloud computing, a user may use more than one service provider and need two independent service providers to work together. In this user-centric context, the user is the owner of the information and has the right to authorize to a third party application...
Vehicular Ad hoc Network (Vanet) is one of the emerging technology to support safety, traffic monitoring and comfort related services. Vanet is a subclass of Manet but its topology changes rapidly and network gets disconnected frequently. The prevailing routing protocol of Manet is very much applicable to Vanet. Because of its frequently disconnecting routes it is difficult to design an efficient...
In this paper a novel receiver window function, for the reduction of Inter carrier Interference(ICI) in Orthogonal Frequency Division Multiplexing (OFDM) system, is proposed. The performance of the proposed window has been compared with raised-cosine (RC) window, better than raised-cosine (BTRC) window, rectangular window, and the modified bartlet hanning(MBH) window with reference to ICI and SIR...
The business continuity is essential for any enterprise application where remote replication enables customers to store the data on a Logical Disk (LDisk) at the local site and replicate the same at remote locations. In case of a disaster at local site, the replicated LDisk (remote copy) at remote site is marked as primary copy and the remote copy is made available without any downtime. The replication...
Existing approaches for monitoring Service-based Systems assume monitor rules are pre-defined and known in advance. Furthermore, in most of the cases, monitor rules are associated to a set of actions, triggered by the deviations from the expected behaviour, to compensate for an unexpected conduct. Such a reactive strategy, based on pre-defined rules, is not really suitable in dynamic systems where...
Considering the proliferation in the number of cloud users on an everyday basis, the task of resource provisioning in order to support all these users becomes a challenging problem. When resource allocation is non-optimal, users may face high costs or performance issues. So, in order to maximize profit and resource utilization while satisfying all client requests, it is essential for Cloud Service...
Modern multi-core processors propose new cache management challenges (more cache conflicts and misses) due to the subtle interactions of simultaneously executing processes sharing on-chip resources. To address this issue, thread group scheduling scheme that cluster threads with high sharing cache as one group to schedule has been proposed. It has led to numerous academic and industrial attentions...
In this paper, we propose a novel carrier frequency offset estimation algorithm in Binary Phase Shift Keying (BPSK) burst transmission based on pilot symbols and modulated data symbols. Its estimation range is large, about ±0.5 of the symbol rate. The simulation results show that this algorithm has low SNR threshold, and its estimation mean square error (MSE) is close to Cramer-Rao Lower Bound (CRLB)...
Conceptualization of different aspects of cloud applications and formal representations of interactions among the different components of SaaS are most crucial issues towards the design of an effective cloud architectural framework. In this paper a graph-based specification called Cloud Service Architecture Graph (CSAG) has been proposed to model such interactions among various components of Software...
This paper describes the password habits of web users, particularly in Greece. A study was conducted online to ask users questions about the length of the password they use today, in how many web sites they use the same password, whether they use personal data while constructing their passwords and if they ever used as a password some of trivial words. They were also asked whether they reveal their...
Security as a condition is the degree of resistance to, or protection from harm. Securing gadgets in a way that is simple for the user to deploy yet, stringent enough to deny any malware intrusions onto the protected circle is investigated to find a balance between the extremes. Basically, the dominant approach on current control access is via password or PIN, but its flaw is being clearly documented...
Cloud computing is one of the emerging computing technology where costs are directly proportional to usage and demand. The advantages of this technology are the reasons of security and privacy problems. The data belongs to the users are stored in some cloud servers which is not under their own control. So the cloud services are required to authenticate the user. In general, most of the cloud authentication...
In this paper, we propose static analysis of android malware files by mining prominent permissions. The proposed technique is implemented by extracting permissions from 436 .apk files. Feature pruning is carried out to investigate the impact of feature length on accuracy. The prominent features that give way to lesser misclassification are determined using Bi-Normal Separation (BNS) and Mutual Information...
Introduced by Yao in early 1980s, secure computation is being one among the major area of research interest among cryptologists. In three decades of its growth, secure computation which can be called as two-party computation, or multiparty computation depending on the number of parties involved has experienced vast diversities. Research has been carried out by exploiting specific properties of functionalities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.