The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents, copyright statements, title-page or half title-pages, blank pages, venue maps or other general information relating to the conference that was part of the original...
Information retrieval has taken an important turn when the researchers started using user behavior to improve their ranking algorithms. With the advent of user behavior in information retrieval, the interactive information retrieval is beginning to make its mark. In this paper we discuss how user behavior is being used in information retrieval. We survey various strategies used for incorporating user...
Internet is a very powerful tool for information sharing; it provides email, chat, and audio/video talk for communication. All these email are widely used for official and non official communication because it is freely available to users and it also provides file transfer up to some limit. Hence use of Email (Electronic mail) services increasing rapidly due to higher dependency of organizations and...
Registration of aerial images is a necessary step as valuable information for studying; monitoring, forecasting and managing natural resources can be obtained from it. This paper presents an algorithm for registration of aerial images using orthogonal moment invariants. Initially reference aerial image and test aerial image are resized to same size and converted to gray scale and contrast enhancement...
In this paper, Modified Ant Colony Optimization (M_ACO) algorithm is proposed to optimize the modified Discrete Frequency Coding Waveform (DFCW) sequence sets in lesser computation time. The sequence sets are optimized to generate orthogonal DFCW code sets. M_ACO algorithm is the combination of Ant Colony Optimization (ACO) and Hamming Scan algorithm. This algorithm is a graph based approach to find...
ECG is a method of measuring, displaying and recording the electrical activity of heart. In this paper, wavelet de-noising method has been examined to eliminate noise from the ECG signal. Using soft and hard thresholding process, the significant wavelet coefficients from each level are selected and denoised. ECG signal is reconstructed with inverse wavelet transform. Different thresholding algorithms...
Wireless sensor network consists of micro electro-mechanical sensor nodes which are operated by battery power. Sensor nodes lose energy for computation and communication. It is very difficult to recharge their battery as they are deployed in a remote place. Thus, power efficient routing in wireless sensor network is the main challenge for researchers. Hierarchical routing is one of the efficient techniques...
MANETs are wireless networks consisting of dynamic nodes that are self-configurable and infrastructure-less. The traditional layered architecture is designed for wired networks, and it runs into performance issues when deployed for Ad-hoc networks. Research focus has shifted towards cross layered architecture to break the traditional layered architecture. This paper proposes a joint optimization of...
Cloud is a new trend in the computing. It is the combination of distributed, parallel and grid computing. It is a pay on demand computing. Basically cloud is a shared pool of resources. The resources are shared among users who are geographically distributed. As the area of cloud is increasing, several issues are also increasing. These issues are related to security, resource allocation, performance...
In VANET, nodes or vehicles on the road can communicate with each other and with RSUs (Intelligent System) through wireless medium. The vehicles can exchange the traffic information through other vehicles to take decision for forwarding in the road map. We assume that each vehicle is aware about the sections vehicles and RSU contains the information of location, speed and arrival time of vehicles...
Vehicular Ad hoc Network (VANET) is a special kind of Mobile Ad hoc Network. VANETs are becoming a technology for connecting vehicle to computer networks. VANETs consist of dynamic nodes in the form of fast moving vehicles whose movements are restricted to road layouts and static nodes in the form of Road Side Units (RSU). Frequent communication disconnections between vehicles are happening due to...
For protecting the sensitive data from the hackers while transmitting the data OSI model provides security mechanism such as Internet Protocol Security (IPSec) in network layer and Socket Secured Layer (SSL) in transport layer etc. In the data link layer Point to Point Tunneling Protocol (PPTP), which is used to make secure tunnel for exchanging information, is one way to implement the so called VIRTUAL...
As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. So adaptation of dynamic key is very important for secure key management, for encrypting messages for communication.
Cognitive Radio Networks (CRNs) is an impressive invention in wireless technology due to its capacity to resolve spectrum scarcity crisis. It takes benefit of the underutilized licensed spectrum band to create effective or useful consumption of overall frequency spectrum band. The best spectrum is selected in an opportunistic manner, shared with other users with no violation to licensed users. Dynamic...
A Mobile Ad hoc Network (MANET) is temporary, transient and infrastructure less. This kind of network plays inevitable role in the different domains of wireless communication such as remote areas, disaster areas and military activities. Routing overheads, integrity, authenticity and secure data transmissions are some of the challenges of MANETs. Proposed CBSRP is a cluster based approach to decrease...
The fast emerging of new technology called (IoT) i.e., Internet of Things technology, every network like WSN etc and every object like mobile phones, smart phones etc., can be interconnected via insecure public communication channel called Internet, to form scalable and inter operable networking system. IoT also brings numerous security challenges as it is working on top of Internet. Recently Liou...
In this paper we propose a remote password authentication scheme based on a circle. This scheme is simple and practically feasible in a multi-server environment. In this scheme, we use some simple tangent theorem like secant tangent theorem and a strong one way function to authenticate the user and the server. Furthermore, a legal user can freely choose and change his password using his smart card...
A new approach for securing data while transmitting or storing in Smart phones has been proposed in this Research paper. The proposed method employs Multi-Level Steganography with Defense in Depth mechanism for enhanced protection of embedded data and a compression method to effectively compress the data. Multi-Level Steganography have many levels of steganography employed one after the other. It...
Workflow Management Systems (WfMSs) help big enterprises in automation of their business processes and thus help the management to take critical decisions fast. The WfMSs can be combined with the power of Cloud Computing to harness the strengths of both the technologies. The use of WfMSs for critical and strategic applications, which is common in case of business and scientific community, gives rise...
There is an urgent need to encrypt data in databases to protect sensitive data. But, encrypted data cannot be efficiently queried because the data has to be decrypted. To resolve this problem, many Order Preserving Encryption (OPE) schemes were suggested. The comparisons operation can be directly performed on encrypted data using OPE schemes. According to the literature, the precise security target...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.