Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
QR i.e. "Quick Response" code is a 2D matrix code that is designed by keeping two points under consideration, i.e. it must store large amount of data as compared to 1D barcodes and it must be decoded at high speed using any handheld device like phones. QR code provides high data storage capacity, fast scanning, omnidirectional readability, and many other advantages including, error-correction...
A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a program that protects websites from bots by generating and grading assessments that humans can pass but current computer programs cannot. CAPTCHAs provide security from bots in applications such as preventing comment spam in blogs, protecting website registrations etc. Recent breakthroughs in Artificial Intelligence...
Data hiding is a process of concealing recognizable digital data into indiscernible form i.e. imperceptible to the human eye. Secret sharing with steganography is a hot topic of discussion. In this paper, we proposed a secure image hiding scheme to deceive attacker using the concept of steganography and secret sharing. As to recover secret image, we have to apply decryption technique at two levels...
Quantum key distribution is a sub topic under quantumcryptography where two parties distribute a shared random bit stringknown only to them and which can be used as a key to encrypt anddecrypt messages. This paper proposes a novel method of QKD todistribute the secret key. The basic concept of QKD remains the samebut the process by which the key is exchanged between the twoparties is different and...
Encryption of sensitive data is commonly used to preserve confidentiality and integrity. The problem with encrypting data is we have to decrypt it for applying operations on files such as altering a word document or querying a statistical database containing financial data. Decrypting the data will leave it vulnerable. If we want to perform conditional based search queries in an encrypted data entire...
Today's universities are on the forefront of technological advancement which makes University's computing environment vulnerable because of its large open networks. This paper analyzed the security threats specifically evolve in University's network, and with consideration of these issues, proposed risk assessment framework for University computing environment. The proposed framework reduces the risk...
Due to the rapid technological advancements, the Grid computing has emerged as a new field, distinguished from conventional distributed computing. The load balancing is considered to be very important in Grid systems. In this paper, we propose a new dynamic and distributed load balancing method called "Enhanced GridSim with Load Balancing based on Cost Estimation" (EGCE) for computational...
In present scenario, many organizations are trying to minimize the capital expenditure by using the cloud. In the cloud, IT infrastructure and applications are provided as services based on pay-as-you-use model. Cloud providers try to achieve maximum profits in short time, while the cloud users want their work to be done with minimum cost. However, utilization of cloud resources efficiently is an...
This article reports a novel algorithm inspired byscalar premier determination considering reduced cameraactivation while contributing enhanced coverage of the occurringevent zone. The proposed scheme chooses the scalar premiers in ahexagonal fashion, which operate as representatives of the scalarswithin whose sensing ranges the scalar premiers are located. Theselection of the scalar premiers is accomplished...
Scientific workflows and other large complex problems are benefited from cloud infrastructure for processing, storage and communication. Workflow scheduling is recognized as a well-known NP-complete problem. In this paper, we propose a load-balanced scheduling technique for workflow applications in a cloud environment. The proposed algorithm works in two phases. In the first phase, priorities of all...
Water Distribution Networks (WDNs) are the foundation and backbone of any city. There maintenance and energy costs demand a significant amount of planning. Judicious scheduling operations can prompt significant savings in energy and prevent disruptions in supply and damages. Water passes through a great deal of system hubs (like pumps, valves, tanks, and so on) while moving from source (reservoir)...
In Software Defined Network, the controller response time is the bottleneck for Quality of Service parameters for end users. This work aims at optimizing response time by a controller for an OpenFlow device (OFdevices) by selecting appropriate controller inWide Area Network environment. When the OFdevices select appropriate controller for minimization of the response time, they also stabilize the...
This work undertaken, aims to develop pulsed-OFD transmission system, which is used in wide area of wireless communications. It is noteworthy to mention that the system is baseband transmission by excluding the RF (radio frequency) part. Pulsed-OFDM enhances the OFDM that endeavors prominent performance parameters with lesser complexity in implementation. This is possible by pulsating the OFDM symbols...
A data gathering protocol for multi-channel wireless sensor network is proposed in this paper. The sensor field is logically divided into some finite number of grids. Each grid is managed by a potential node called as grid manager. Each grid manager is also responsible for communicating aggregated data generated inside the respective grid to the base station either directly or via multi-hop communication...
Neurons forms interconnected networks to process information. In brain such networks are implemented for the purpose of computation or decision making. Neuron cultures on Multi Electrode Array gives advantage to study the network topology of network of neurons as it facilitates recording from population of neurons. Spike train recorded from the dish is used for analysis of the information content...
In the context of gene expression microarray data, biclustering is a technique to identify clusters of genes that are co-expressed under clusters of conditions. It usually has high computational complexity (NP-Hard). In computer science domain, combinatorial problems like biclustering, refer to the tasks associated with the discovery of grouping, ordering or assigning a discrete set of objects fulfilling...
This paper presents a novel framework for brain tumor diagnosis and its grade classification based on higher order statistical texture features namely kurtosis and skewness along with selected morphological features. These features were extracted from segmented tumorous T2-weighted brain MR images, in order to distinguish high grade (HG) tumor from low grade (LG) tumor. Tumor classification is carried...
In this paper, role of uneven coupling strength in the Hindmarsh-Rose neuronal model is investigated. Coupling strength may be different in between neurons due to multiple reasons. The spiking activity in a coupled neuro-system is affected by the variations in the coupling strength. Therefore, appropriate changes in the coupling strength lead to the interesting seizure like spiking activity.
Early detection of cardiovascular diseases can prevent the premature deaths caused by abnormal heartbeat problems. Application of unsupervised classification by Extreme learning machine is addressed for ElectroCardiogram (ECG) heart-beat time series clustering by a hybrid of Extreme learning machine and Decision rule using full heart-beat time series by alignment of R-peaks of all beats is proposed...
This article reports a novel scheme called minimal mean distant scalar leader selection inspired by event driven camera actuation for redundant data minimization. The proposed algorithm aims at actuating minimum number of cameras while maximizing the event area coverage and reducing the resulting traffic overhead. This is accomplished by effective selection of scalar leaders in each sub-region of...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.