The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cognitive radio technology enables secondary users (SUs) to opportunistically use the vacant licensed spectrum and significantly improves the utilization of spectrum resource. Traditional architectures for cognitive radio networks (CRNs), such as cognitive cellular networks and cognitive ad hoc networks, impose energy-consuming cognitive radios to SUs' devices for communication and cannot efficiently...
Computer Aided Diagnosis (CAD) acts as a primary tool for the radiologists to have a second opinion for identifying whether the lung is affected by any abnormalities or not. Lung image segmentation and classification plays a vital role in CAD system. Despite many ongoing researches, lung image segmentation has still scope for improvement in terms of accuracy and automation. The proposed blob based...
Social Networks (SN) are popular among the people to interact with their friends through the internet. Users spending their time in popular social networking sites like facebook, Myspace and twitter to share the personal information. Cloning attack is one of the insidious attacks in facebook. Usually attackers stole the images and personal information about a person and create the fake profile pages...
Grid computing involves sharing data storage and coordinating network resources. The complexity of scheduling increases with heterogeneous nature of grid and is highly difficult to schedule effectively. The goal of grid job scheduling is to achieve high system performance and match the job to the appropriate available resource. Due to dynamic nature of grid, the traditional job scheduling algorithms...
Online reputation systems play a significant role in decision support during internet mediated service provision. With the fast development of online reputation systems in various social networks, operations against such systems are growing rapidly. It has been considered as an important but most difficult problem. In this paper, we propose a defense solution TTAUCA [Temporal, Trust And User Correlation...
In this paper, an approach for face recognition combining multi-resolution analysis and transform domain analysis is proposed. Face Recognition system find its use in many applications such as authentication, surveillance, human-computer interaction systems etc. As the applications using face recognition systems are of much importance and demand more accuracy, more robustness in the face recognition...
In recent times, Animation and Graphics industry has grown up with rapid improvements but its development is considered slow because Computer Graphics Characters developed off screen consumes enormous amount of time, money and resources. With Photorealistic rendering special effects regarding computer graphics character/object like lighting, shadowing information can be dynamically created on screen...
A Wireless Sensor Network (WSN) is a self-governing network of sensor nodes organized in autonomous manner to monitor the region; connected using wireless links. Each node communicates with the other neighbor nodes, which lie in its transmission range and the entire region monitored by the combined effort of all the sensor nodes in the network, are termed as coverage area. The purpose of sensor nodes...
Speech synthesis is the most significant applications in linguistic communication process. The Text to Speech structure is the undertaking of accepts the input sentence and converts the audible speech as output. The Tamil language may be a syllable based language. A syllable is the unit of language, which may be spoken independent of the adjacent phones. It consists of an interrupted portion of sound,...
Service-based applications are applications that make use of one or more autonomous computer-based entities owned by third parties known as services, to perform their functions. The identification of similar, reputed services during the execution of service-based applications to replace services in them that are no longer available is an important issue. This paper proposes a framework to support...
User assisted segmentation of lung parenchyma pathology bearing regions becomes difficult with an enormous volume of images. A novel technique using Bayesian Network Model Based (BNMB) Image Segmentation, which is a probabilistic graphical model for segmentation of lung tissues from the x-ray Computed Tomography (CT) images of chest, is proposed. Goal of this work is to present an automated approach...
Documents are becoming more informative and in emerging world, sensitive information from documents which is shared to any community over electronic network has to be periodically redacted to preserve highly confidential and sensitive information from the access of open users who have access to the documents. However, accurate data hiding is difficult, it is often time consuming process to black out...
Distributed Denial of service (DDoS) attacks is the most devastating attack which tampers the normal functionality of critical services in internet community. DDoS cyber weapon is highly motivated by several aspects including hactivitism, personal revenge, anti-government force, disgruntled employers/customers, ideological and political cause, cyber espionage and so on. IP spoofing is the powerful...
Quality of Service (QoS) is considered as the standard check of a conveyance system to show provided services and its availability. For illustration application like video conferencing, voice over ip (VOIP), streaming videos, real time operation feel necessity for draconian assurance on jitter, packet loss, prioritization of services and end-to-end delay. So to overcome these issues a novel scheme...
Reliable dissemination of data in mobile ad hoc network necessitates high degree of connectivity among the nodes present in that environment. The existence of selfish nodes could drastically affect the network connectivity. However, the impact of selfish nodes on network connectivity has been studied either through reputation factor computed based on past history or conditional probability manipulated...
High-rate flooding attack detection and classification has become a necessary component for network administrators due to their attack range that affects the Data Center servers. The main objective of this paper is to propose the Protocol Independent Detection and Classification (PIDC) system in order to prevent the web servers from devastating attacks such as Distributed Reflection Denial of Service...
Cloud computing provides dynamic provisioning for real time applications over the Internet. These services are accessed by number of clients as pay per use over the internet. In this scenario, scheduling the current jobs to be executed with given constraints for the real time tasks is an essential requirement. Hence task scheduling is a major challenge in cloud computing. In general, the main aim...
Modern data center networks (DCNs) often use multi-rooted topologies, which offer multipath capability, for increased bandwidth and fault tolerance. However, traditional routing algorithms for the Internet have no or limited support for multipath routing, and cannot fully utilize available bandwidth in such DCNs. As a result, they route all the traffic through a single path, and thus form congestion...
Fully self-controlled mobile ad hoc networks represent a complex system. Due to the broadcast nature of wireless channel, MANET has many security issues. Especially, Sybil Attack is a very serious threat to the MANET as it creates multiple virtual fake identities per entity, there by affecting the routing table. The multiple virtual identities are obtained by spoofing the victim's node or by creating...
In this new scenario, Wireless communications are very much popular in all aspects, accordingly to provide an effective enactment of broadcasting energy efficiency and latency efficiency are considered by means of Lineage Encoding and Twig pattern queries. Lineage encoding is the scheme to convert the XML byte formats into bit formats, thereby providing effective achieving of bandwidth. Also this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.