The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In Medical industry, one of the major problem is that medicines getting expired after its expiry date and because of that, there is huge loss in money for the medical industry. The main reason for that is the expired medicine will be returned back to medical industry with full credit. Even though they paid full taxes for expired medicines, they can't claim back. A survey says average of 1.5% loss...
The nature as always been a source of music be it the thunders, the rustling of trees or the birds chirping. The creative output of composers, writers, and artists is often influenced by their surroundings. Of course, an important part of what we see and hear is not only the people with whom we interact but also our geophysical surroundings. Of all the geophysical phenomena to influence us, the weather...
Apriori algorithm is an influential data mining algorithm which generates a list of most frequent web pages visited. Due to fast changing contents of database one needs an algorithm which is real time. The major drawback of Apriori algorithm is that, it needs to scan main database each and every time to generate frequent patterns which results in more usage of memory and execution time, hence in order...
Text mining is the progression of originating high superiority information from text. As the majority information is presently accumulated as text, text mining is alleged to enclose a high profitable potential significance. The preprocessing steps are performed individually based on their need and there is no common framework for preprocessing. This paper focuses on designing preprocessing framework...
Detecting epidemic out breaks as early as possible and gathering reports to substantiate the cause and carrying out immediate actions for alerting public and taking action are major targets of a public health epidemic surveillance. Challenges for an epidemiologist lies in reaching out and collecting information from a territory especially in getting informal reports from public rather than gathering...
The Internet of things (IOT) can be defined as the structure of interconnected computing devices, machine driven digital devices, objects, monsters, or peoples that are given an unique identifiers and has the potential to convey the data over the network without the help of human to human or human to computer machine communication. Internet of things is a model that has been become more popular for...
One of the core model of the Tutor System is considered to be Student model, which pays special attention to student's cognitive and affective states and their evolution as the learning process advances. As the student works step-by-step through their problem solving process the system engages in a process called model tracing. Anytime the student model deviates from the domain model the system identifies,...
The CLOUD as a ubiquitous global phenomenon, while cloud computing holds a lot of promise for enterprise computing, there are a number of inherent deficiencies in current offerings such as Inherently Limited Scalability of Single-Provider Clouds, Lack of Interoperability Among Cloud Provider, No Built-In Business Service Management Support. To address these issues, we go for federation of Cloud Computing...
In mobile ad hoc network (MANET), a main requirement to maintain the communication to all nodes and each node should amalgamate to each other. In the case of malicious nodes, it may create serious security issues, for the time of malicious nodes may collapse the routing process. In this text, defending the blackhole attack is the issued. This paper is used to solve malicious nodes by using Ad hoc...
Internet of Things (IoT) allows the interconnection of computing and sensing devices over the Internet, allowing them to send and receive data. The applications of IoT range from Smart Home to Wearable devices. An IoT system has high security requirements, owing to the critical and sensitive nature of the information exchanged between devices. In this paper, a schematic consisting of Asymmetric and...
Internet of things (IOT) is a kind of advanced information technology which has drawn societies' attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement...
The prevalence of smartphone has led to creation of various innovative android applications which gives developers an opportunity to incorporate advanced technologies. One such application is location tracking and monitoring. Though there are multiple server based apps in Android and iOS app store, it's always been a challenge to protect the device and secure the data even after the server is hacked;...
Cloud is a logical pool of servers, every one of the servers are interconnected through web, The principle issue in cloud is recovering of information and process that assortment of information and here other issue is security for that information, Now day's usually categories of big data such as Structured, semi-structured and Unstructured data is exited in the distinctive Social data such as social...
Emotion recognition is one of the challenging problems in machine vision systems. The most expressive way humans display emotions is through facial expressions. In this project, we extend texture based facial expression recognition with a method of 2D image processing implemented for extracting of features and a neural network based decision trees. The algorithm applies a set of preprocessing and...
Side channel analysis (SCA) represents frequently occurred and major type of attack against implementation of any cryptographic protocols. SCA has ability to directly attack on small part of the key and aggregate this information over different encryption. We can prevent SCA attack by changing secret key at every run. Leakage resilient cryptography is used to design cryptographic protocol that remains...
Biometric identification has gained a large popularity in recent years. Biometric identification of a person is giving more accurate results comparing to other security methods. In this paper we have proposed a method to recognize a person by the way he walks. This paper mainly focuses on moving subject (human) identification using Gaussian filter, background reduction, joint point plotting and feature...
Traditionally fossil fuels are primary energy resources for generate electricity. Perhaps, it emitting greenhouse gasses which harms the eco system and so it causes climatic changes. Furthermore depletion rate of fossil fuels is increased due to rapid consumption of power plant. Hence, the harness rate of electrical energy from Renewable Energy Sources (RES) is significantly increased. Worldwide accessibility...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.