The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud Computing is a rising field in the history of computing. It is a way to maximise the capacity and capabilities without spending a lot to buy a new infrastructure and software. When users are online, they can get faster access to their data due to the massive storage. Although Cloud computing has many advantages due to large number of organizations moving towards it, it comes up with lots of...
Digital Watermarking has been used as a tool to protect the Intellectual Property Rights of multimedia documents. Through the watermarking we are able to prevent the unauthorized access, modification, and alteration of digital multimedia document. In today's era distribution of digital documents and e-commerce are widely used. Problem of Intellectual and copyright protection can be solved through...
For faster growing environment there is a need to analyze sentiments with accurate results and limited time consumption. Hadoop architecture uses sentimental data for processing. As it needs large amount of data for analysis so it requires techniques that can give fast and accurate result. Bloom filter has techniques that uses the database and build a log that can be used for searching results faster...
Data accumulated from social media like Facebook, Twitter, Google+ etc. provides real-time information, which can help in preventing unanticipated happenings to a great extent. To acknowledge the existence of Twitter in generating valuable information on versatile domains, ‘Terrorism’ has been chosen as the domain of study. For studying an acute issue like terrorism, it's a prerequisite to study about...
Query optimization is an invigorating task of any database system. A number of heuristics has been designed and implemented to optimize database queries. The imperishable developments in the field of Decision Support System (DSS) databases are presenting data at an exceptional rate. The massive volume of DSS data is consequential only when it is able to access and analyze. Here, an effort is made...
Corporates invest tremendous amount of finance in training workforce. This amount comprises of cost to trainer, infrastructure and time taken to train the workforce. Internet technologies have significantly affected our industries (Gabriele Piccol, 2001) where many industries have started using these internet technologies for providing virtual learning environment. This paper attempts to demonstrate...
The economy of our country is totally dependent on agricultural success or failure. Farmer, the backbone of agriculture is in panic condition as he is not getting precision agriculture information leading to less crop yield. But now, in the era of Digital India, we can form the union of farmers through networking, and make the precision agriculture information reach the farmers through ICT. In this...
The project presents a digital notice board and a home automation system using a GSM SIM900 module. The idea behind this project is to provide its users with a simple, fast and reliable way to put up important notices in an LCD where the user can send a message to be displayed in the LCD. The message can be sent through an android application designed in this project, to the GSM SIM900 module which...
The demand for the high speed broadband communication system is increasing on the moving trains, an alternative to the existing RF technology is the Free Space Optics (FSO) which is capable of providing data rates in Gbps. In recent past, the FSO system for moving trains has been proposed for 850nm wavelength. Considering the eye safety standards, the FSO system is investigated in this paper for 1550nm...
Real world applications of Wireless Sensor Networks such as border control, healthcare monitoring and target tracking require secure communications. Thus, during WSN setup, one of the first requirements is to distribute the keys to the sensor nodes which can be later used for securing the messages exchanged between sensors. The key management schemes in WSN secure the communication between a pair...
To support the incremental bandwidth demand there is need of developing an architecture which is flexible enough to provide wide range of bandwidth. The power consumption of optical access network is low as compared to other technologies. Still it is very important to further reduce the power consumption of optical access network to prevent the global warming. This paper makes the use of next generation...
The research mentioned in this treatise proposes two hybrid approaches towards social networking in delay tolerant networks. The base assumed for the proposals is derived from the BUBBLE Rap forwarding which utilizes a greedy approach for providing a concrete social networking strategy. The proposals take the form of incorporation of knowledge based forwarding strategies namely, computation from the...
Deployment of sensors is a critical issue in the sensor network designing since it has significant impact on the performance of the network and determines the cost of deployment. Coverage and Connectivity can be considered as a performance measure of a Wireless sensor network (WSN) through which the quality of service (QoS) can be evaluated. We proposed a new strategy for sensor deployment and have...
In this modern scientific world, technologies are transforming rapidly but along with the ease and comfort they also bring in a big concern for security. Taking into account the physical security of the system to ensure access control and authentication of users, made us to switch to a new system of Biometric combined with ATM PIN as PIN can easily be guessed, stolen or misused. Biometric is added...
Learning to read correctly is a key requirement of language learning. In rural India, due to lack of teachers and technology, tablets offer a creative and motivating learning environment. Tablet technology has the advantage of mobility, allowing users to learn at their own pace and convenience. However, the non-availability of electricity and Internet can be unique challenges. At Amrita CREATE, language-learning...
Tumblr, a microblogging service, has garnered a lot of prominence in recent past with 269.3 million blogs and 125.9 billion posts which makes it a hub for creative content. Despite this drastic growth of Tumblr since its launch, not a lot of scholarly work has been done on it. This work is an attempt to comprehensively profile the blogger in terms of age, gender and relationship status on Tumblr....
The main focus in software system engineering involves problems associated with upgrading, migrating and evolving existing software system systems. Software evolution is a continuous process which includes activities like software improvement, adaptation and correction that arise after the operational release of the software. Most of the empirical research on software evolution has been conducted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.