The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biometrics simply means to recognise a person based on his behavioural or physiological characteristics. With this, we can establish an individual on the basis of “who the person is”, rather than “what does he possess” or “what he remembers”. With the increase in security requirements and increase in forging of data, a single fold or unimodal biometric verification is not of much accuracy. Hence,...
The paper presents the design and implementation of an Ethernet-based Smart Home intelligent system for monitoring the electrical energy consumption based upon the real time tracking of the devices at home an INTEL GALILEO 2ND generation development board, which can be used in homes and societies. The proposed system works on real time monitoring and voice control, so that the electrical devices and...
A space-based system plays a vital role within national critical infrastructures. They are being incorporated into energy distribution software, advanced air-traffic management applications, rail signalling systems, etc. These infrastructures are susceptible to a broad range of security threats thus unfortunately; the end users of communications, location sensing and timing applications often fail...
Delay Tolerant Network (DTN) is basically a disconnected mobile ad hoc Network. It is intermittent and sparsely connected because of limited transmission range and mobility. It is characterized by intermittent connectivity, long or variable delay, asymmetric data rate and high error rates. Many malicious nodes misbehave to hamper the network. Shielding algorithms for adhoc networks cannot be directly...
The use of the Internet has become an integral part of everyone's life. Due to this, the introduction of virus and other malicious crackers is increasing everyday. This in turn leads to the introduction of defects which adversely affect the security. Thus, protecting vital information in this cyber world is not an easy task. We need to deal with security related defects to ensure failure free and...
Software requirements, for complex projects, often contain specifications of non-functional attributes (e.g., security-related features). The process of analyzing such requirements is laborious and error prone. Due to the inherent free-flowing nature of software requirements, it is tempting to apply Natural Language Processing (NLP) based Machine Learning (ML) techniques for analyzing these documents...
The use of Internet is immensely growing and applications are stretching in our daily lives. Be it for household purpose or use to government organizations, no matter what the person is or what job he does, Internet is important. Security is also needed for applications such as shopping, banking transactions, education, public services etc is important too. With wider usage, internet is also known...
The concept used in the research paper includes program slicing which is referred as the process of computing the chosen set of instructions of the program, The slicing criterion refers to the slice that is likely to affect the values at some point while executing the program. The paper highlights the different test cases and comparative analysis of program slicing methods which corresponds to the...
In present scenario only computer system is not a medium of cyber crime, smart phones and tablets also have become targets for cyber criminals to attack. With the growing use of mobile devices, new mobile applications are developing daily and user download these apps onto their mobile devices from different sites. Attacker may utilize these sites by injecting malicious codes to mobile devices without...
Data mining is the process in that analyzing of data from different perspective and summarizes that data into some useful information which can be used to enhance the revenue generation, cost cutting etc. In data mining, cluster formation plays a vital role which is data can be divided into different groups. Clustering is the technique in which grouping is based on similar type of data relevant to...
Information security for banking application of online services is mandatory aspects to protect the information and information system assets of the bank. Protection depends upon the mechanism and aligned tools and technologies with the assets such as networking components and software applications. Online functionalities of banking system is more prone to be attacked due to use of open public network...
In today's fast moving day to day life almost everything is more or less dependent on software. This dependence on software has increased the demand of reliable software in no time. Hence software firms are now a days releasing multiple versions of the software instead of providing a software with less number of bugs and removing the bugs of the previous version in the next up-gradation Firms remove...
The conventional power grid is now maturing to smart grid that incorporates a heterogeneous amalgam of operating measures like smart appliances, meters, renewable energy resources. Smart grid merges the conventional electrical power grid with ICT. Electric convenience can now realize three sets of amendments: framework upgrade, digital inclusion; the ethos of smart grid; and business process transformation,...
For the last century, the healthcare services and delivery including financing in India has been shrouded by life insurance challenges and importantly, shares key landmarks with general insurance. Many experts, practitioners and policy makers including researchers identified that, there is a big gap in the knowledge about innovations in public and private health financing and delivery. Apparent entails...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.