Hospital Information System (HIS) is a comprehensive, integrated information system designed to manage the administrative, clinical and support aspects of a hospital. It provides numerous advantages in patient care an...
详细信息
Unique Identity (Aadhaar) is issued by Unique Identification Authority of India (UIDAI) to the residents of India. With Aadhaar enrolment happening in full swing across the country, there is a strong need to formulate...
详细信息
Broadcasting is the fundamental operation of mobile ad hoc network, in which a source node transmits the packets that is disseminated to all the nodes in the network. Broadcasting is used in mobile ad hoc network eith...
详细信息
ISBN:
(纸本)9789380043579
Broadcasting is the fundamental operation of mobile ad hoc network, in which a source node transmits the packets that is disseminated to all the nodes in the network. Broadcasting is used in mobile ad hoc network either to broadcast control packets during route discovery or to broadcast the data packets. The simplest method used for broadcast is flooding that degenerates the performance of MANET due to packets collision, contention, and redundancy. This results in the wastage of limited network bandwidth. This paper proposes an efficient approach to broadcast with reduced redundancy and improved performance. The proposed approach is based on the determination of trust between the communicating nodes called as intimacy factor (IF). The IF is calculated for the entire route by the nodes, which is updated. The IF determines whether the packet is to be broadcast or not. The proposed approach reduces the control packet overhead by 40% without compromising the packet delivery ratio and maintaining it above 90%. It also reduces the end-to-end delay of the packets up to 60% and thus leads to the increase in average throughput.
With the ubiquity of new information technology and media, more effective and friendly methods for human computer interaction (HCI) are being developed. The first step for any intelligent HCI system is face detection ...
详细信息
This paper studies the technical characteristics of a Unique Health Identifier (UHID) in Indian and global context while also dwells upon the usage of Aadhaar has a Unique Health Identifier in India. Specifically, we ...
详细信息
In control engineering, any system that takes some input signals, processes it and gives output signals, e.g. an electrical transformer, a mechanical lever, a car's hydraulic brake system, a country's economy,...
详细信息
This research and development on conversion co-processor presents an abstract- level hardware implementation of the conversion between various number formats for FPGAs in modular way. Replacing the floating point expr...
详细信息
Cyber forensics is the process of seizure, acquisition and analysis of digital evidence. development of cyber forensics tools is often challenging as more and more variations of digital devices are marketed rapidly an...
详细信息
Data Encryption Standard (DES) is the most widely used cryptosystem. Faster computers raised the need of high security cryptosystems. Due to its small key length and simple feistel network, many cryptanalysts develope...
详细信息
ISBN:
(纸本)9783642004049
Data Encryption Standard (DES) is the most widely used cryptosystem. Faster computers raised the need of high security cryptosystems. Due to its small key length and simple feistel network, many cryptanalysts developed various methods, like parallel and exhaustive attack, to break DES. DES is most vulnerable to differential cryptanalysis attack. This paper proposes modifications in DES to ensure security enhancement by improving the key length and the weak round function against cryptographic attacks. We show analytically that the modified DES is stronger against cryptographic attacks. The proposed modifications divide the expanded 48 bits of right block into two equal blocks of 24 bits. Then two different functions are performed on these two blocks. The effective key length is increased to 112 bits by using 2 keys. These two keys are used in special sequence with round numbers. The analysis shows that for the proposed approach, the probability of characteristic for differential cryptanalysis is reduced and the unicity distance is better as compared to standard DES.
Smart Rooms integrated with sensors, actuators, wireless networks and context-aware applications will soon become part of our daily life. To build successful context-aware systems, we must develop an architecture to r...
详细信息
ISBN:
(纸本)9780889867307
Smart Rooms integrated with sensors, actuators, wireless networks and context-aware applications will soon become part of our daily life. To build successful context-aware systems, we must develop an architecture to reduce the difficulty and cost of building these systems. This paper presents the architecture of ChaturKartha, developed to setup a context aware intelligent Room. Based on the gathered contextual knowledge, ChaturKartha infer what the users expect and accordingly delivers the expected services. Our architecture explores the use of Semantic Web languages for defining context ontology and for reasoning over such information.
暂无评论