The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter. OpenStack lets users deploy virtual machines and other instances which handle different tasks for managing a cloud environment. A cloud usually possesses profound resources, and has full control and dynamic allocation capability of its resources. Cloud offers us the...
Prediction in the stock market is challenging and complicated for investors. Many researches have performed to sense the future market movements. In the stock market, social media data have high impact today than ever. In this work, various prediction algorithms are analyzed to build a prediction model. The prediction model will be based on monthly prediction and daily prediction to forecast the next...
Lung cancer is the most common cancer for death among all cancers and CT scan is the best modality for imaging lung cancer. A good amount of research work has been carried out in the past towards CAD system for lung cancer detection using CT images. It is divided into four stages. They are pre-processing or lung segmentation, nodule detection, nodule segmentation and classification. This paper presents...
Control flow graph represents the flow of a program by a directed graph. They are used in Software engineering, Compilers and Static program analysis. Control flow graph represents various paths a typical program may undergo for different inputs. Control flow graphs play a prominent role in the selection of test cases. In this paper, we present a simple method which uses control flow graph to find...
The consumption of banking applications are more and popular on Android devices but it is not secure. To make secure on those confidential application such as banking, business application and personal data, password is provided to enhance privacy. Nowadays those passwords are easily usurped by hackers through shoulder side attacks or observing videos. To overcome from this inconveniences of accessing...
Plenty of video stuff is created, broadcasted, shared and stored each and every day by industry experts, beginners, and hobbyists. Video summaries aim at showcasing the semantics and content of a clip in reduced time and space to enable a quick overview of video clip relevance. This paper focuses on static summaries showing key frames from the video. The key frames are extracted by leveraging the...
Software refactoring is a crucial and necessary activity for the quality enhancement during maintenance and evolution of a software system. Stability is a key quality aspect that needs to be monitored especially for the process of refactoring. Due to the nature of the larger possible options for refactoring, search based software engineering practices provide a best possible way in improving the code...
Video streaming applications over wireless networks have been turned out to be immensely popular in recent times. In this thesis, we study the buffering schemes streaming in heterogeneous wireless networks for the VBR video. An analytical framework is presented to derive the number of expected jitters and buffering delay in average. Through experimenting with a wide range of buffering schemes, we...
NewsOne is a dedicated platform that aggregates all the latest news updates from multiple national and international resources and summarizes them to present in a short and crisp words. This online platform provides a service oriented interaction among the users from across web. The main motto of this application is to access the news fast. It will bring news directly without wasting any time for...
In the emerging field of big data, a large volume of data has to be managed, operating on data of huge volume becomes easier when it's sorted and structured. The data can be structured using a simple algorithm i.e. index algorithm which stores and categories data on basis of their application. This in turn will be very beneficial on business level as well as on software level.
From the precise location data calculated from satellite signals, Global Positioning System makes itself the effective navigation system in the mobile devices yet the cost of which being the higher energy consumption. Being the energy constrained device, the mobile devices thus need the alternative energy efficient navigation system. The pedometer that counts the foot steps taken by the pedestrian,...
One of the most predominant technology is the cloud storage that deploys the storage server in public cloud. The security policies that protects and preserves the data integrity may fail due to load and the software stack that runs in various servers in datacenter. The main objective of this paper to controlthe sensitive data managed under IT infrastructure that manage, protect, integrate and extend...
Huge numbers of images are produced today with advent of the 'big data' era. To store and transmit data traditional compression methods are no longer satisfying. In this paper, we face this challenge and to achieve a higher compression rate we are taking the advantage of the correlations existing between images. An image compression system that encodes each image by referencing its correlated images...
Delay Tolerant Network (DTN) is developed to cope with intermittent connectivity and long delay in wireless networks. Due to the limited connectivity, DTN is vulnerable to black hole and grey hole attacks in which malicious nodes intentionally drop all or part of the received messages. Although existing proposals could accurately detect the attack launched by individuals, they fail to tackle the case...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.