The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is the most recent advanced emerging technology that provides every kind of service to its users. It generally based on “pay per usage” term that provides Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) model that altogether form a cloud. However it also has some issues that is to be resolved. One of the major issue for cloud computing...
The worldwide study on causes of death due to heart disease/syndrome has been observed that it is the major cause of death. If recent trends are allowed to continue, 23.6 million people will die from heart disease in coming 2030. The healthcare industry collects large amounts of heart disease data which unfortunately are not “mined” to discover hidden information for effective decision making. In...
We present here an application of Grover's search algorithm for quantum way web search engine. Grover's search algorithm mathematical expression use for interconnected set of servers functions. In this research article we split whole network connection into finite number of blocks. Subsequently, analyze single block function, since each block has similar function as well as architecture of a network...
Opinions about the data has been an important part of analyzing the opinions and sentiments. The sentiment analysis is a major part of data mining that has important applications in various fields. The novice customers get into any field by only getting reviews from the various websites or reviewers. The reviews are not necessarily correct all the time. So, we need to first analyze them and then put...
Among the various applications of high performance computing, security of cloud computing is very essential and greater awareness in India. Security issues in cloud are very challenging, as the data are roaming without any control. The need to keep the security as well as privacy of the information in the cloud becomes a critical issue. On the basis of cloud architectures we can specify the security...
Now-a-days, providing a platform, where customers can obtain first-hand assessments of product information and manufacturers can collect customers reviews cum feedbacks to improve the product quality, is the prime need of any organization. These reviews are the people's opinion about particular product. Every website has reviews of their product and those reviews are difficult to analyze. Thus, the...
In the process of communication the information gets corrupted. Therefore, the signals received by the receiver which is different than the actual information signal. This paper stated that how receiver detect the errors in received signals and how does receiver rectify that error by using hamming code method. We have illustrated with the help of examples that how receiver identified which bit is...
Now a days there is a fantasy to be digitized rapidly. Where digitization is applicable to every domain; no matter its technical or non-technical. So there is a need of effective retrieval of data. Today people are finding some new retrieval schemes over the traditional query based retrieval systems. So moving towards content based approach is an hour's need. Some betterments are definitely needed...
Automatic character recognition of handwritten numerals and characters has been an active subject of research due to its importance on industrial as well as educational platform. The off-line handwritten character recognition is an active area for research towards the new techniques that would help to improve recognition accuracy. Now a day's looking forward for rapidly growing technologies, with...
In multihop wireless network, selfish nodes do not forward other nodes packet and take advantage of cooperative nodes in relaying their packets. In this paper, we propose payment and trust based system which include node reputation value also as a parameter to establish stable and reliable routes in multihop wireless networks. The payment system uses credit values to reward the honest nodes that relay...
Recognition of speech with the help of machine automatically is an important area of research for more than forty years. As Voice is a signal of limitless information, so processing of speech signal by converting into digital is very efficient tool for high and precise automatic signal or voice recognition technology. Speech recognition has found its application in various areas of our daily lives...
The paper explains the use of Internet of Things (IoT), where smart sensors collaborate directly without human involvement to deliver a new class of applications for remote monitoring. The IoT is expected to have significant home and business applications, to contribute to the quality of life and to grow the world's economy. The proposed system is designed to continuously monitor the temperature,...
Cargo loading and planning is the most essential factor in transportation like railways, airlines, trucks and buses. It is the proper arrangement of goods, items or cargo into the available space of container. Due to improper arrangement of cargo and unavailability of proper optimization techniques the space gets wasted and damage of goods occurs in container. The proper arrangement and placement...
Database management system is not enough for new high-tech attack, so Database Intrusion Detection System is required as additional security layer. Over the last few years, many database intrusion detection systems are developed using anomaly method like mining data dependencies among data items, access pattern etc. In this paper we have used signature based approach, which is defined on role hierarchy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.