The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One Time Password (OTP) is a type of password that is valid for only one time use (use them once and throw them away). It is an automatically generated string of numbers that will authenticate a user for a single session or transaction. In this paper we propose a way of generating alphanumeric one time passwords (OTPs) using automaton theory with linear functions which enhances the level of security.
In Today's era the role of information technology has seen a great influence on the upcoming or existing inventions. The need of storage and computational power has all always been an issue until cloud computing came into emergence. Due to emergence of big data it has been difficult to manage data so for this purposes cloud computing is a great technique. In this paper the advantages and various service...
Designing a collaborative framework for offloading computation from mobile Phone is an interesting idea. People expect all the features of desktop in mobile Phones but the mobile systems are resource constrained by battery life, network bandwidth and storage capacity and processor performance. The Mobile resource limitations are overcome through improving quality of hardware E.g. smaller and powerful...
In recent years, online social networks such as Facebook, Twitter, LinkedIn are most popular visited sites over the internet. Presently, there is a great interest in understanding and studying the relationships among the users in social networks. Existing link prediction methods predicts the links based on the topological structure features and the node attribute features but overlook the benefit...
Synthetic Traffic generation plays a vital role in research related to computer networking. Most of the efforts taken so far by several researchers in the network community are relied on the synthetic traffic generation. Therefore to generate the synthetic traffic; traffic generators are used. Further this synthetic traffic behaves like real traffic and can be used to capture the behavior the network...
Electric power systems constitute the fundamental infrastructure of modern society. Though continental in scale, they have virtually penetrated across places. Thus, access to electricity is a challenge during the blackout situation. Though failures are rare events, when they occur cause an catastrophic effect on the society on the whole. The services have to be restored as quickly as possible in order...
Data mining has gained much importance in the field of research these days. It makes perfect blend for analyzing data of any fields and provide decision based output. Data generation and storage these days are done at high speed. Non stationary systems play holistic role in providing such data. Availability of such data creates scope of analysis for researchers. Such data which are continuous, unbounded,...
Human beings have the ability to express their emotions and feelings through the speech but some unfortunate ones do not have the ability. They cannot speak and listen. This paper presents a man machine interface using video camera. The system will use a single, color camera mounted above a neutral colored desk surface next to the computer. The output of the camera will be displayed on the monitor...
Region duplication or copy move forgery is a common type of tampering scheme carried out to create a fake image. The Held on blind image forensics depends upon the authenticity of the digital image. As in copy move forgery the duplicated region belongs to the same image, the detection of tampering is complex as it does not leave a visual clue. But the tampering gives rise to glitches at pixel level...
To meet the demand for low data rate, low power and cost-effective wireless communication IEEE 802.15.4 has grown its popularity. As it has low power it is potentially susceptible to interference by other wireless technologies with much higher power that also works in the same 2.4 GHz ISM band such as IEEE 802.11 standard, Bluetooth, and microwave. IEEE 802.11 standard operate random file transfer...
Cryptography is a technique used to transmit data in a secured way using encryption and decryption. Encryption is the process of converting information from its original form into an unintelligible form. In Cryptography many traditional algorithms introduced to provide security to sensitive data but encrypted data changes its length and format. There is a requirement to change existing database schema...
The human face aging is a typical process, which the facial images have different face patterns in aging feature space. This paper present a Novel human age estimation technique using Discrete cosine transform and PLO for human age estimation. The technique shows the greatest experimental outcomes of with proposed method, as well as the corresponding optimum numbers of the selected features. Evaluate...
Skin cancer, melanoma has become a precarious issue in European continents. It can be easily cured if diagnosed and excised at very early stages. In this article we have focused our research on the lesion extraction from melanoma sample using entropy-based approaches. Various ideal and general entropy functions viz Havrda, Shannon, Renyi, Kapur, Vajda respectively are investigated for the evaluation...
Diabetes is one of the most commonly found health ailment globally. Early detection of Diabetes aids in better diagnosis & treatment. With this consideration, Real-time Continuous monitoring of the blood glucose level is highly desirable. A number of invasive and non-invasive techniques have been proposed in past. In this paper, we propose a unique Real time Invasive Blood Glucose Monitoring system...
DNA (deoxyribonucleic acid), is hereditary in humans which stores the information as a code made of four chemical base: A (adenine), C (cytosine), T (thymine) and G (guanine). DNA bases pair up with each other, A with T and C with G, to form units. Each base is also attached to a sugar and a phosphate molecule, which are arranged in two strands and form a spiral called a double helix, together are...
This article proposes a color image quantization algorithm based on Gaussian Particle Swarm Optimization (GPSO). PSO is a population-based optimization algorithm modeled after the simulation of social behavior of swarms to find near-optimal solutions. The algorithm randomly initializes each particle in the swarm to contain K centroids (i.e. color triplets). The K-means clustering algorithm is then...
Ciphertext-Policy Attribute based Encryption (CP-ABE) is a widely adopted access control technique in cloud computing. It offers “one to many user access services” which forms the basis of the point to multipoint communication systems. In such type of technique, the number of user attributes increases with the increasing number of data users, which complicates the process of user attribute management...
In 21st Century, everyone is running on trade-mill of life. In this cut-throat competition, Dementia/Alzheimer can be disheveled consequence of such stressful life. Alzheimer is most common type of dementia. Generally it happens at an age of 65 or greater. In our country, taking care of patients who have been suffering from this disease is very difficult. Majority of them have been admitted to the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.