The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent year, Cloud Computing canact as a next generation architecture for computing resource over the internet. Traditionally the business organization and enterprise uses cloud data center with firewall to store their information and uses security methods to protect data from intruders. However in cloud computing managing the log records for their huge information and log auditing has become critical...
Asian countries like Indonesia, Cambodia, Thailand and India used Palm leaves to record vital information, to pass it down the generations. Palm Leaves are innate, organic items and presented to attrition because of climatic elements, light and insects. This poses a hazard in scrutinizing the invaluable details. Preservation and translation of information on these palm leaves into a digital format...
In the bygone, the exploration in computing focused on cloud computing, big data, and the internet of things (IOT). Irrespective of what computing is used, there is always a requirement for storage. The challenge faced in this area is storing the massive amount of data and their integrity. In the cloud, computing resources and services are made available on demand the most significant among them is...
In recent days healthcare domains need a efficient storage and retrieval systems to provide a effective medical services to the health seekers. But there is a vocabulary gap in understanding the medical terminologies due to ambiguity. So, the existing systems need a intelligent medical storage using some natural language processing. Users post their queries in free text so it will result in complexity...
Hopper and Blum suggested a human authentication protocol (HB) for unaided humans based on shared secrets. It does not require specialized hardware or software and it works based on learning parity with noise. Evidently both human and the low cost pervasive devices cannot perform cryptographic authentication as they have inherent resource constraints. The human computer security can be used for pervasive...
The advent of social and collaboration networks has resulted in different methods of forming large groups to deal with complex tasks. Team Formation (TF) in online social networks is crucial in several applications, such as collaborative software development and community based question and answer forums. The problem involves the formation of expert teams from a social network who can collaborate...
Today, Cloud Computing provides many technological oriented applications distributed over the internet. Cloud Computing facilitate tremendous changes in the IT world, to increases the maximum profits from this new platform. In IT industry everyday new applications coming up and increases the complexity of scheduling process. For this purpose, job scheduling plays a most important responsibility in...
Wireless network is based on packet switching concept and is capable of handling various types of applications. The challenge is to attain a better Quality of Service (QoS) for the like applications of real time and non-real time in an intriguing environment with varying bit rate, unexpected channel lay off. The intention of QoS provision is to afford the opted services for the users while utilizing...
The major threats witnessed by mankind in recent years, demands very accurate and trustworthy personal tracking system (PTS). Using the advancement in the current technology, it becomes a promising solution to meet the above requirement. In this research, an attempt is made to integrate both GPS and GSM technologies to detect and track the position of the target (mankind). Initially, the position...
Human Activity Recognition (HAR) based on accelerometer has become an important mobile application. Activity recognition however depends on X, Y, Z the Cartesian coordinate parameters. There are several approaches for activity recognition. Popular methods of activity recognition using accelerometer reading includes machine learning approach, rule based data mining approach, fuzzy inference approach...
Smart technology represents bringing out performance improvements in everything including sensors, control, monitor, decision support systems, and applications in intelligent way. In other words, making every object autonomous in communicating with other devices in a network of objects. With the development of precise sensors, Radiofrequency identification labels and network of devices becomes internet...
Smart home technology for aging people is coming up increasingly as elderly people require living at home with assistive devices. With aging comes associated health problems like mobility impairment and memory related diseases like amnesia, Alzheimer's, etc., They face difficulty in keeping their essential things safely and keeping up schedules. The work aims to develop an assistive device to elderly...
In various applications where the problem domain can be modeled into graphs, the shortest path computation in the graph is an indispensable challenge. In applications like online social networks and shortest route computation problems, the size of the graph is so large; the number of nodes have become close to hundreds of billions. Shortest path graph algorithms like SSSP (Single Source Shortest Path)...
Human beings are dependent on the natural resources that stands for its quality. Climatic changes and environmental impacts have always been under observation. The quality of the products is always measured before use. Water, an inevitable resource, has got a serious significance in checking its quality due to the influence of various external factors like industrial effluents, acid rain etc. This...
Breast cancer is an life threatening disease in USA and UK. It is also one of the major diseases that has greater death rate. Cancer is the erratic growth of cells that originate in the blood tissue and Tumours may be malignant or benign. Early detection increases the chances of survival and reduces the death rate. This paper compares the approach to classify the mammogram based on the features extracted...
People tend to pay bribes to get their work done or get rid of any issue. People are unaware of the existing laws because of which they are defrauded. The illiteracy about laws has become advantageous to the deceiver. Hence, proper education should be given to the people regarding the laws of the Indian Constitution. The mobile application serves the purpose of providing valuable information about...
The development of smartphones has exalted in sucha way that its demand for resources for every single application has also increased. But to process this, mobile devices are incompatible because of its limitations in performance like battery life and poor computation. The solution to overcome this issue is Resource as a service where individual resources are deployed. Merger of mobile computing and...
In recent times the incorporation of Wireless Sensor Network (WSN) with Internet of Things (IoT) has become more conscientious for the researchers. The collection of enormous amount of homogenous sensor nodes forms the Wireless Sensor Network. These sensor nodes have restricted battery power and memory and so the limited amount of energy is considered as the major issue. To overcome this issue several...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.