647 resultados para arindam chowdhury


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of RHFID (Radio Frequency ldentification) technology can be employed for not only reducing companies management costs but also to track uniquely each shipping container, pallet, case, and product being manufactured, shipped and sold, to increase visibility and accountability in the supply chain. RFID technology connects the supply chain players (i.e., suppliers, manifacturers, distributors, retailers and customers) and allows them to exchange data and product information. Despite these potential benefits, there are challenges and obstacles with the deployment of a RFID-enabled system in the global supply chain. The paper outlines the major RFID issues faced by supply chain management. In this paper, we also present a case study on pharmaceutical supply chain management (SCM) applications by addressing and examining the issues of RFID implementation in a SCM system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless sensor networks (WSN) are attractive for information gathering in large-scale data rich environments. In order to fully exploit the data gathering and dissemination capabilities of these networks, energy-efficient and scalable solutions for data storage and information discovery are essential. In this paper, we formulate the information discovery problem as a load-balancing problem, with the combined aim being to maximize network lifetime and minimize query processing delay resulting in QoS improvements. We propose a novel information storage and distribution mechanism that takes into account the residual energy levels in individual sensors. Further, we propose a hybrid push-pull strategy that enables fast response to information discovery queries.

Simulations results prove the proposed method(s) of information discovery offer significant QoS benefits for global as well as individual queries in comparison to previous approaches.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we have proposed a spam filtering technique using (2+1)-tier classification approach. The main focus of this paper is to reduce the false positive (FP) rate which is considered as an important research issue in spam filtering. In our approach, firstly the email message will classify using first two tier classifiers and the outputs will appear to the analyzer. The analyzer will check the labeling of the output emails and send to the corresponding mailboxes based on labeling, for the case of identical prediction. If there are any misclassifications occurred by first two tier classifiers then tier-3 classifier will invoked by the analyzer and the tier-3 will take final decision. This technique reduced the analyzing complexity of our previous work. It has also been shown that the proposed technique gives better performance in terms of reducing false positive as well as better accuracy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last decade, the rapid growth of the Internet and email, there has been a dramatic growth in spam. Spam is commonly defined as unsolicited email messages and protecting email from the infiltration of spam is an important research issue. Classifications algorithms have been successfully used to filter spam, but with a certain amount of false positive trade-offs, which is unacceptable to users sometimes. This paper presents an approach of email classification to overcome the burden of analyzing technique of GL (grey list) analyzer as further refinements of synthesis based email classification technique. In this approach, we introduce a “majority voting grey list (MVGL)” analyzing technique which will analyze the GL emails by using the majority voting (MV) algorithm. We have presented two different variations of the MV system, one is simple MV (SMV) and other is the Ranked MV (RMV). Our empirical evidence proofs the improvements of this approach compared to existing GL analyzer [7].

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last decade, the rapid growth of the Internet and email, there has been a dramatic growth in spam. Spam is commonly defined as unsolicited email messages and protecting email from the infiltration of spam is an important research issue. Classifications algorithms have been successfully used to filter spam, but with a certain amount of false positive trade-offs, which is unacceptable to users sometimes. This paper presents an approach to overcome the burden of GL (grey list) analyzer as further refinements to our multi-classifier based classification model (Islam, M. and W. Zhou 2007). In this approach, we introduce a ldquomajority voting grey list (MVGL)rdquo analyzing technique which will analyze the generated GL emails by using the majority voting (MV) algorithm. We have presented two different variations of the MV system, one is simple MV (SMV) and other is the ranked MV (RMV). Our empirical evidence proofs the improvements of this approach compared to the existing GL analyzer of multi-classifier based spam filtering process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of emerging technologies ( such as RFID - Radio Frequency Identification and remote sensing) can be employed to reduce health care costs and also to facilitate the automatic streamlining of infectious disease outbreak detection and monitoring processes in local health departments. It can assist medical practitioners with fast and accurate diagnosis and treatments. In this paper we outline the design and application of a real-time RFID and sensor-base Early Infectious (e.g., cholera) Outbreak Detection and Monitoring (IODM) system for health care.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sensor Networks have applications in diverse fields. They can be deployed for habitat modeling, temperature monitoring and industrial sensing. They also find applications in battlefield awareness and emergency (first) response situations. While unique addressing is not a requirement of many data collecting applications of wireless sensor networks, it is vital for the success of applications such as emergency response. Data that cannot be associated with a specific node becomes useless in such situations. In this work we propose a novel dynamic addressing mechanism for wireless sensor networks that are not location-aware. The scheme enables successful reuse of addresses in event-driven wireless sensor networks introducing minimal latencies and efficiently addressing packet loss. It also eliminates the need for network-wide Duplicate Address Detection (DAD) to ensure uniqueness of network level addresses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we present a strategy to design the RSA parameters in such a manner so that the CRT-RSA decryption becomes more efficient than the existing methods. We achieve around 21% improvement in speed over the currently best known implementation strategy for CRT-RSA decryption with our properly chosen parameters that also helps in terms of less memory requirement. Moreover, we argue in detail the cryptographic security regarding our choice of the secret parameters.