The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents, copyright statements, title-page or half title-pages, blank pages, venue maps or other general information relating to the conference that was part of the original...
Computing paradigm plays an important role to study the scientific applications. Here we focus on tool based simulation of Cloud computing Infrastructure for power aware analysis. We introduce the cloud computing paradigm for resource like data center which is enabled with DVFS (dynamic voltage frequency scaling) with power aware deployment across the Globe in different geographic region. In this...
This paper discusses the evaluation of automatic speaker recognition from numerous perspectives. A general discussion of the Speaker recognition task, challenges and issues involved in its evaluation is discussed. Speaker recognition have many factors that found to have an impact on performance of recognition rate such as pitch, frequency, handset type and back ground noise etc. We start with the...
In the present days many immoral activities are taking place in ration shops, which are meant to distribute the commodities to the people who are in below the poverty line, as the distribution process is manually operated and due to which it consumes a lots of time. To overcome this problem we one can use RFID technology. In this paper RFID tags are introduced, The RFID cards are instead of ration...
Our paper develops innovative algorithms for machine translation system based on the innovative algorithms for parts of speech tagger, chunking, word sense disambiguate and word translation in English. Parts of speech tagging and chunking for 1657 tokens with 990 phrases for Hindi languages and to calculate the accuracy we created confusion matrix an evaluate Precision, Recall, F-score, Accuracy for...
Presently, ESME in GSM network uses Short Code to provide service to Mobile subscriber. This short code is not unique and cannot be used everywhere. The acquiring short code by ESME requires service agreement with Mobile Service Provider and availability. Hence, subscribers of different Mobile service provider use different Short Code. And also ESME needs to connect with each and every Mobile service...
The Government of India has undertaken large number of initiatives to improve delivery of public services and simplify the process of accessing them. Electronic Transaction Aggregation & Analysis Layer (eTaal), URL: http://etaal.gov.in, has been developed by Department of Electronics and Information Technology (DeitY) and National Informatics Centre (NIC) to provide an aggregated view of e-Transactions...
Communication system plays a vital role for interacting with other people and transfers their messages in symbolic form, audio or both. People generally use mobile phones to interact with each other. Sometimes there arises a requirement for people to share their confidential data via communicating devices with other people. During such communication people ignore the speech level or pitch used to...
MANET have wide applications in communication of data. MANET is defined as self-configuring adhoc network model of mobile nodes. Each node knows about its neighbors and conveys information to neighbor's nodes. Routing is network layer protocol which discovers the best available path from source to target node and maintains route between source and destination. Performance of MANET network is evaluated...
This manuscript is primarily dedicated on the innovative study of applying filters on 3 D images. Unlike previous studies adroit efforts have been applied in understanding the effects of cascading two or more filters on noise affected colored[12] images. The experiments are performed on Matlab. In today's digital world where one clicks and expresses their emotions across various social media platforms...
Twenty Five years ago, when the first Ant Colony optimization (ACO) algorithm came in existence, taking motivation from ants for designing optimization that time algorithms seemed a fanatical idea. The many thriving applications in this area have altered our perspective. Moreover, as the civilization evolves it generates need for transportation. In the present scenario, an ACO model for TDM in DUA...
Mobile Adhoc Networks or simple MANET, the collection of various tiny nodes, basically, is the network of networks. These are managed by different kind of available network routing protocols like AODV, DSDV, DSR, LEACH etc. In addition, we can also improve the performance and efficiency of any available network on we are working with by using some different techniques like artificial intelligence...
In today's world, there is a humongous amount of data storage and energy consumption taking place which has led to the evolution of going green with IT-hence the term GREEN IT or GREEN COMPUTING. Also taking into consideration the economic issues, this technique is getting viral and widespread all over the world thus showing an annual growth trend. This paper puts emphasis on the major concerns of...
Social Media refers to a set of online tools open for public membership that support idea sharing, creating and editing content and build relationships through interaction and collaboration. During the last decade, the Business infrastructure has become digital with increased interconnections among products, processes and services. In recent years, it have been witnessed that opinionated postings...
This paper presents a comparison of recently developed ranking functions using fuzzy logic to retrieve relevant information against given query from text based datasets. Two fuzzy based hybrid similarity measures and one composite fuzzy based ranking function, using fuzzy logic in different manner are compared for CISI and CACM benchmark datasets. On the basis performance evaluating parameters such...
Co-authorship network is a social network that represents research collaboration between different authors. Each node represents author and an edge can be created between two authors when they have at least one research paper in common. The study of co-authorship networks can reveal interesting patterns of research collaboration such as identifying popular researchers, finding research groups and...
The Object Modeling Technique, a generally used object-oriented software development technique, comprises the object, dynamic, and functional models to provide three corresponding views that graphically express diverse aspects of software systems. This paper adds security engineering into an object oriented model-driven software development for real life web applications. In this paper, we use mining...
Day in day out, the online security attacks are consistently increasing. According to OWASP Top Ten Cheat sheet-2013, SQL Injection (SQLI) is at peak among online attacks. This can be attributed primarily to lack of awareness on software security; skill set shortage, non-availability of right tools to evaluate security as a metric across various phases of SDLC. With the looming deadlines and tight...
This paper is based on the waterlogging problems caused in the metropolitan cities. The people in their day to day life suffer due to the increasing commotion caused by the same. This automated water removal method is used to reduce waterlogging and people will be intimated about traffic caused by it in that particular area using website portal or an android application. It is proposed to reduce the...
The development of internet-of-things and mobile application development taking in consideration the increase in number of smart phone users has opened a new horizon for solving one of the significant issues of saving life in case of emergencies. We present a novel intelligent Traffic preemption systems that allows the vehicles to preempt and operate the traffic intersections with the help of mobile...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.