The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a new model for parent alerting and automatic attendance marking using of RFID (Radio-Frequency Identification) and GSM(Global System for Mobile Communication). This system will enable automated and reliable attendance, informing parents and school administration about the same. For implementing this system each student and professor will be having a unique RFID card. A micro...
In the concept of network layers, a failure at one layer can cause failures in preceding layers of the network architecture. With that in mind, it is very likely that the methods to handle such problems in traditional networks may not work as effectively in Multilayer Networks. The focus of this team is to maximize the connectivity of Wavelength Division Multiplexing layered networks as efficiently...
Wireless sensor networks are one of the fast growing technologies in communication field, because of their compact size and ability to work in rugged conditions where human reach is not possible. This paper discusses about H-LEACH, which is used to solve problems of energy considerations while electing a channel head. H-LEACH considers residual and maximum energy of nodes for every round while electing...
Traceroute is widely used, from the diagnosis of network problems to the assemblage of internet maps. However, there are a few serious problems with this tool, in particular due to the presence of load balancing routers in the network[1]. We provide a new publicly-available traceroute, called Paris traceroute, which controls packet header contents to obtain a more precise picture of the actual routes...
Wireless Sensor Networks (WSNs) have become prolific in the past few years as low cost and easily deployable means to collect environmental data. With the increased scope of applications of WSNs it is imperative to assure security of the network itself against attacks, as well as to assure privacy and integrity of the data that is being collected and transmitted through the network. The I-TRM (Integrated...
Security for Pebble Watch is necessary. The lack of security and efficient connection leads to major attacks. In this paper, we introduce a two way authentication process to improve the pebble watch security. This two way authentication uses a secured Bluetooth pairing. The main aim of this paper is to find the major factors which are attacking pebble and to find a way in solving these issues. There...
Quantum key distribution (QKD) is the future of the cryptography world. The QKD was invented to increase the security rate when exchanging a private key. Since 1984, several experimental attempts to design protocols have been developed based upon the rule of physics. These QKD protocols were represented by different algorithms with limited ability to stand up against quantum attacks. This paper evaluates...
Digital image processing, i.e. the use of computer systems to process pictures, has applications in many fields, including of medicine, space exploration, geology and oceanography and continues to increase in its applicability. The main objective of this paper is to demonstrate the ability of image processing algorithms on a small computing platform. Specifically we created a road sign recognition...
Wireless Cloud computing delivers the data and computing resources through the internet, on a pay for usage basis. By using this, we can automatically update our software. We can use only the space required for the server, which reduces the carbon footprint. Task scheduling is the main problem in cloud computing which reduces the system performance. To improve system performance, there is need of...
Cloud computing refers to the services supplied over the internet and the hardware and software that delivers such services. It has the capability to cover a large part of the IT industry and make software even more appealing as a service. It can also reshape how IT hardware is designed and acquired. Nevertheless, datacenters that offer cloud applications consumes a large amount of power which can...
Deep Convolutional Neural networks (ConvNets) have achieved impressive results in several applications of computer vision and speech processing. With the availability of a large training set, it is common to find that the set contains useless samples (instances), either redundant or noisy. The process of removing these instances is called instance selection in the machine learning field. This paper...
Over the last 15 years the world as seen a surge in users owning smartphones and electronic devices. People today have smartphones that have the computational capabilities of computers from more than 45 years ago. With the growing populous under this information age, individuals have access to so much data. It is a fantastic time to spread ideas as anyone can reach anybody else over the internet almost...
Glaucoma is a disease that destroys the optic nerve of the eye. As a result, it causes vision loss or blindness. However, with immediate diagnosis and treatment, eyes can be protected against severe vision loss. Most vision loss cases due to Glaucoma are preventable if the disease is treated in the early stages. Most Glaucoma cases happen without signs and symptoms because peripheral vision can be...
Wireless Sensor Network (WSN) are of paramount significance since they are responsible for maintaining the routes in the network, data forwarding, and ensuring reliable multi-hop communication. The main requirement of a wireless sensor network is to prolong network energy efficiency and lifetime. Researchers have developed protocols Low Energy Adaptive Clustering Hierarchy (LEACH) and Power-Efficient...
The cloud computing environment enables cloud users to outsource their data into the cloud environment because of its cost efficiency and ease of management. However, by out sourcing the data to the cloud, cloud users lose their control over the data. This situation becomes more critical when using a cell phone and initiating the handoff process. There is a problem when cloud users invalidate some...
The corporate system / network is frequently utilized for sharing data or information among the cloud in considering interest in organizations and encouraging cooperation in a certain industry segment where organizations share a common interest. It can adequately help the organizations to decrease their operational expenses and expand the revenues. Nonetheless, the inter-company (organization) information...
Quantum algorithms have gained a lot of consideration especially for the need of searching unsorted database in a faster way rather than using the classical search mechanisms. This paper introduces a new quantum sort algorithm by employing the quantum features to expedite the searching process in conventional environments. The proposed efficient sorting algorithm emphasizes entanglement qubits property...
With the emergence of fast growing communication technology, the necessity of conserving energy has been paramount, particularly in the field of wireless sensor network fields that are enabled with sensor devices that have limited energy, because it is impossible to replace and recharge the battery in the nodes. This paper introduces a novel dynamic allocation of slot to the node (DASN) mechanism...
Cloud computing is a model to access computing resources from anywhere. Cloud provides companies the opportunity to store their large amount of sensitive and confidential data on three different platforms-SaaS, PaaS, and IaaS. Among these three models of Cloud, SaaS has more security threats. So how is SaaS architecture improved to withstand security threats? In this paper, we present the vulnerabilities...
Text data is defined as sequences of characters that may become big data that has no specific format and only can be processed using the original Hadoop. Amazon Web Services AWS provides virtual Cloud Computing services such as storing data using S3 service and processing big data using EMR service. Amazon Elastic MapReduce EMR uses the original Hadoop as a processing environment to its Cloud Computing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.