Allocation of Resources in Cloud Server Using Lopsidedness

03 Apr 2018

8 (2,819 )

B. Selvi, C. Vinola, Dr. R. Ravi Abstract– Cloud computing plays a vital role in the organizations resource management. Cloud server allows dynamic resource usage based on the customer needs. Cloud server achieves efficient allocation of resources through virtualization technology. It addresses the system that uses the virtualization technology to allocate the resources dynamically based on the demands and saves energy by optimizing the ...

Click here to read more arrow

Comprehensive Study on Big Data Technologies and Challenges

03 Apr 2018

9 (3,202 )

Abstract: Big Data is at the heart of modern science and business. Big Data has recently emerged as a new paradigm for hosting and delivering services over the Internet. It offers huge opportunities to the IT industry. Big Data has become a valuable source and mechanism for researchers to explore the value of data sets in all kinds of business scenarios and scientific investigations. New computing ...

Click here to read more arrow

Content-based Image Retrieval With Ant Colony Optimization

03 Apr 2018

5 (1,668 )

Content-based image retrieval with skin tones and shapes using Ant colony optimization Introduction: Due to the enormous pool of image data, a plenty of data to be sort out has lead the way for analyzing and dig up the data to acquire likely worthwhile information. Heterogeneous fields cover from commercial to military desire to inspect data in a systematic and quick manner. Outstandingly in the area ...

Click here to read more arrow

Optimizing Cash Management Model With Computer Intelligence

03 Apr 2018

11 (4,173 )

Alli and M.M. Ramya   Abstract In today’s technical era, the financial organizations have great challenges to optimize the cash management process. Maintaining minimum cash leads to customer frustration. At the same time, upholding excess cash is a loss to the organization. Hence, soft computing based cash management solutions are required to maintain optimal cash balance. An Artificial Neural Network (ANN) is one such technique ...

Click here to read more arrow

Comparison of Join algorithms in MapReduce Framework

03 Apr 2018

4 (1,373 )

Mani Bhushan, Balaraj J, Oinam Martina Devi   Abstract: In the current technological world, there is generation of enormous data each and every day by different media and social networks. The MapReduce framework is increasingly being used widely to analyse large volumes of data. One of the techniques that framework is join algorithm. Join algorithms can be divided into two groups: Reduce-side join and ...

Click here to read more arrow

Efficient Streaming Protocol for Transmitting Video Files

03 Apr 2018

7 (2,527 )

Chapter one Introduction Chapter One Introduction 1.1 Motivation Information in computer science might be represented in multiple forms. In the beginning the first used forms of information were text and images, after the huge increase of using computers and internet another type of information appears, it is the hyper text which is the combination of text and images. Hyper text is text pages that ...

Click here to read more arrow

Analysis of Online Recruitment Process With TAM

03 Apr 2018

8 (3,042 )

ANALYSIS OF ONLINE RECRUITMENT PROCESS FOR JOBSEEKERS USING TECHNOLOGY ACCEPTANCE MODEL(TAM) 1) S.Munzarin, 2) A. Manimegalai 3) G. Latha, 4) B. Sindhuja ABSTRACT I.INTRODUCTION Today, online recruitment has become a major tool for many organizations. However, little is known about jobseekers' reactions to this new technology. This article is aimed at developing a web-based and central recruitment Process system for the HR Group of the company. ...

Click here to read more arrow

Retrieval of User Interesting and Rank Oriented Results

29 Mar 2018

6 (2,365 )

Abstract: Retrieval of user interesting and rank oriented results is always an important research issue in information retrieval and search engine optimization. The main problem with traditional approaches is, they gives redundant results based relevance score of the search results. In this paper we are proposing sink points based redundant removal approach with rank oriented results for user input query. Here our proposed approach follows the ...

Click here to read more arrow

Development of Dental Billing System

29 Mar 2018

15 (5,945 )

ABSTRACT The application is developed for billing and stocks management for a wholesale dental material seller. The seller mostly sells operational tools, his clients include other retailers, legitimate Doctors, hospitals and medical colleges. As the a result of rapid growth in business, the data to be stored, managed and processed is increasing day by day making it very difficult to manually maintain everything. To fix this ...

Click here to read more arrow

Modified Biogeography Based Optimization

29 Mar 2018

7 (2,545 )

Modified Biogeography Based Optimization and enhanced simulated annealing on Travelling Tournament problem. Abstract: This paper shows the implementation of Modified BBO and Extended BBO on Travelling Tournament Problem. We modified the migration step of BBO by using probabilistic measures into it. Conventional BBO is used to solve deterministic problems but when we are dealing with real world problems which are non deterministic Conventional BBO failed to ...

Click here to read more arrow

Comparative Study of Advanced Classification Methods

29 Mar 2018

12 (4,689 )

CHAPTER 7 TESTING AND RESULTS 7.0 Introduction to Software Testing Software testing is the process of executing a program or system with the intent of finding errors or termed as bugs or, it involves any activity aimed at evaluating an attribute or capability of programming system and determining that it meets its required results. Software bugs will almost always exist in any software module with moderate ...

Click here to read more arrow

Adaptive Block Steganography Based Crypting Technique

29 Mar 2018

17 (6,733 )

A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing AbhipsaKundu, Sudipta Sahana   Abstract The enhancement of using internet system has increased the ease of information communication which throws challenge in data security. Now in current days safe and sound data transfer become more essential and significant. Cryptography and Steganography are two significant areas of research that involve a number ...

Click here to read more arrow

Theory of Automata: Construction of Symbolic Language

29 Mar 2018

15 (5,860 )

Rubina Naz & M Arslan Riaz ABSTRACT: Conventions for translating ordinary language statements into symbolic notation and many of places are use symbolic language for communication. And alphabet is a finite set of discriminatable and irreducible symbols that can be used either as such, or as representations of some other such set for communication. This abstracts and refines the linguistically idea of alphabet where the ...

Click here to read more arrow

Stack Sequential Algorithm to Analyse Adverse Drug Reaction

29 Mar 2018

10 (3,728 )

Amiya Kumar Tripathy, Nilakshi Joshi, Aslesha More, Divyadev Pillai, Amruni Waingankar   Abstract— An adverse drug reaction (ADR) is ‘a response to a medicine which is noxious and unintended, and which occurs at doses normally used in human beings’. During the last decades it has been estimated that such adverse drug reactions (ADRs) are the 4th to 6th largest cause for mortality in different countries. They ...

Click here to read more arrow

Performance Analysis of Algorithms on Shared Memory

29 Mar 2018

4 (1,216 )

Performance analysis of algorithms on shared memory, message passing and hybrid models for stand-alone and clustered SMPs INTRODUCTION INTRODUCTION Parallel computing is a form of computation that allows many instructions to be run simultaneously, in parallel in a program. This can be achieved by splitting up a program into independent parts so that each processor can execute its part of the program simultaneously with ...

Click here to read more arrow

Wearable Motion Detection Technology to Detect Falls

29 Mar 2018

8 (3,133 )

Louise Patterson 1. Project Title The development of a fully working model using wearable motion detection technology to detect and alert to falls within the home. 2. Abstract The focus of this document concerns the research and methodology into the problem of people with care needs being able to live independently within their own homes with minimum intervention. Elderly people particularly tend to have ...

Click here to read more arrow

Novel Approaches to DoS Impact Measurement

29 Mar 2018

8 (2,863 )

J.Anto Sylverster Jeyaraj, C.Suriya, R.Sudha Abstract Over the past few years Denial of service (DoS) Attacks have emerged as serious vulnerability for almost every internet Services. Existing approach to DoS impact measurement in Deter Testbeds equate service denial with slow communication low throughput, high resource utilization, and high loss rate. These approaches are not versatile, not quantitative, not accurate because they fail to specify exact ...

Click here to read more arrow

Proposed System for Plagiarism Detection

29 Mar 2018

6 (2,094 )

Chapter 3 The Proposed System Introduction This chapter introduces ZPLAG as proposed system, and its most important design issues are explained in details. It is very easy for the student to find the documents and magazines using advanced search engines, so the problem of electronic thefts is no longer local or regional, but has become a global problem occurring in many areas. Due to ...

Click here to read more arrow

Delay Aware Multipath Switching Zone Traversal (MSZT)

29 Mar 2018

9 (3,374 )

Delay Aware Multipath Switching Zone Traversal (MSZT) Approach for MANET Abstract Route discovery and data transmission in Mobile Ad-Hoc networks (MANETs) are the key procedures which influence the performance of the network. The data transmission through the discovered route with in minimum delay is considered as a major problem in the MANET. Hence this paper proposed an approach called Multipath Switching Zone Traversal (MSZT) approach to ...

Click here to read more arrow

Survey on the WIFI Positioning Technology

29 Mar 2018

9 (3,275 )

A quick survey on the WIFI positioning technology Abstract Wireless location estimation technology is applied largely into many fields such as in the military communication, Internet of things and social networks. Meanwhile, with the growing need of WIFI technology, access points of WIFI networks have been deployed in large-scale department stores, cafes, schools and general hospitals. WIFI location positioning can not only offset the drawbacks of ...

Click here to read more arrow

Proposed Roadmap for Cloud Adoption

29 Mar 2018

6 (2,393 )

1. Chapter 8: Case Study based on the roadmap 1.1. Introduction This chapter focuses on the case study done by a privately owned company based in India. They were willing to adopt cloud for their IT Department. The proposed roadmap is being tested for the process they followed for the cloud adoption. This was done to know the significance of the proposed steps to be followed ...

Click here to read more arrow

Strategies for the Analysis of Big Data

29 Mar 2018

7 (2,717 )

CHAPTER: 1 INRODUCTION General Day by day amount of data generation is increasing in drastic manner. Wherein to describe the data which is in the amount of zetta byte popular term used is “Big data”. Government, companies and many organizations try to obtain and store data about their citizens and customers in order to know them better and predict the customer behavior. The big ...

Click here to read more arrow

Automation in IT Industry: Uses and Benefits

29 Mar 2018

7 (2,620 )

Automate IT processes Abstract Here is the procedure to analyzing the errors or bugs related to the Project in the IT industry using the automation tools. From this analysis we are able to find the processes of errors caused due to soundness or for syntactical errors Due to this errors the organization is non profitable or losing its profit sales it also lead to downfall of ...

Click here to read more arrow

IDE for Satellite ODL

29 Mar 2018

7 (2,682 )

An Integrated Development Environment for Satellite Operations Definition Language Rachana M C Sajiv Kumar   Abstract— The satellite system has to be maintained in proper operations conditions for optimal throughput and satisfying the mission requirements. This is achievable by monitoring the satellite health parameters, analyse the behavioural characteristics and control the parameters accordingly based on the behavioural patterns. The subsystem experts define the behavioural ...

Click here to read more arrow

Solution of a System of Linear Equations for INTELx64

29 Mar 2018

8 (3,106 )

A multi core hyper-threaded solution of a system of linear equations for INTELx64 architecture Richa Singhal ABSTRACT. A system of linear equations forms a very fundamental principal of linear algebra with very wide spread applications involving fields such as physics, chemistry and even electronics. With systems growing in complexity and demand of ever increasing precision for results it becomes the need of the hour ...

Click here to read more arrow

Manuscript Submission and Peer- review System

29 Mar 2018

4 (1,297 )

World’s First Manuscript Submission and Peer- review System Integrated with Social Networking Dr. Antony Raj*, Balaji Jagadeesan, Muthumariappan M and Bhuvaneswari Ranganathan   Abstract: Any major change in the way people communicate is bound to have major implications for education. Today, in the fast paced life, promoting self written research article/publications is very important to improve the citation of the article and credit to the author’s ...

Click here to read more arrow

Computer Vision In Bad Weather.

29 Mar 2018

7 (2,716 )

Saswati Rakshit     Aim: To take advantage of bad weather in estimation of depth of a scene from its image. As in bad weather atmosphere modulates original information of an image to the observer so based on observation,we develop model & methods for recovering scene properties(e.g. 3D structure,depth etc). Scope/Application: Computer Vision is widely used in various fields now a days. It is used in ...

Click here to read more arrow

Clone Detection in Object Oriented Systems

29 Mar 2018

7 (2,771 )

Program Slicing based Clone Detection in Object Oriented Systems Ishu Singla Rajesh Bhatia   Abstract— Program slicing is an efficient technique for understanding programs by simplifying them. It is a program analysis technique that extracts a particular set of statements relevant to any computation. For the last 25 years, the technique has found its application in a number of research areas like testing, debugging, ...

Click here to read more arrow

Macro Management Scheme in NEMO Environment

29 Mar 2018

8 (2,884 )

An enhanced Macro Management Scheme in NEMO Environment to Achieve Seamless Handoff Qoutibah AlAssi   1. Abstract In NEMO(NETWORK MOBILITY) and when they are connected to the Internet through mobile or even laptops and during the move from one place to another process occurs disconnect this process its output practically at the point of contact with SMR within the network NEMO have changed any ...

Click here to read more arrow

Overview of Cryptographic Techniques

29 Mar 2018

4 (1,529 )

Gunasekaran, Priya Dharshini   Cryptographic Techniques The backbone of many organization is the electronic communications. Most of the information are communicated online. Hence the important informations are to be maintained confidentially. To maintain the highly confidential information, a secure and robust system is required. Som and Banerjee (2013, p. 1) states that “Cryptography is the science of making communication unintelligible to everyone except the intended receiver(s).” ...

Click here to read more arrow

Alternatives to Proprietary Digital Forensics for SMEs

29 Mar 2018

9 (3,476 )

Realistic alternative to expensive Proprietary Digital Forensics and Security products for SMEs. Alan David Blais   Abstract Organisations have recently developed an awareness about the necessity of having their systems secure and protected from external as well as internal threats. This sudden awareness is believed to be due to recent major events about breaches and security issues faced by many organisations. The consequences of these breaches ...

Click here to read more arrow

Concerns in Implementing Biometric Technology

27 Mar 2018

5 (1,760 )

Though this seems to be an advantage, the integration of this system into the existing system is tedious. Some of the major concerns in implementing biometric technology are as follows, The system relies on complex data processing algorithms which consumes considerable amount of time. Lack of manufacturing and integration of special purpose hardware in the existing system. Adoption of biometric technology in the day-to-day life ...

Click here to read more arrow

Steps in System Design

27 Mar 2018

10 (3,892 )

CHAPTER 3 HIGH LEVEL DESIGN 3.0 High Level Design The high level design discusses an overview of how a system be supposed to work and how the higher stage sections to contains the suggested answer. It would be supposed to have very less information about implementation that is no clear class descriptions and during case not even details such as data base type (relational or object) ...

Click here to read more arrow

The Blocking of Viber in Saudi Arabia

27 Mar 2018

8 (2,908 )

Mansour Alaithan Ali alakalifa   INTRODUCTION What’s Viber ? Viber is a app for instant messaging also for Voice over IP (VoIP) for smart phones owned by Viber Media. Not only voice messaging but also users able send and receive images, video and audio media messages, Viber was founded by four Israeli partners and they are Talmon Marco, Igor Megzinik, Sani Maroli and Ofer Smocha. Viber Mediais ...

Click here to read more arrow

Evaluation of Code Smells Detection Using Meta-heuristics

27 Mar 2018

10 (3,690 )

Evaluation of code smells detection using Meta-heuristics Optimization algorithm Ragulraja.M   Abstract-The development of software systems over many years leads to needless complexity and inflexibility in design which leads to a large amount of effort for enhancements and maintenance. To take code smells detection as a distributed optimization problem. The intention is that to aggregates different methods in parallel way to achieve a common goal detection of code ...

Click here to read more arrow

Database Migration and Architecture: Bee Colony Optimization

27 Mar 2018

7 (2,741 )

Abstract: It is compulsory for two servers to be compatible if you have to either import or export the data. All the servers have unique protocol service through which they communicate. It is not possible for a server to directly transmit or receive the data from any other server. A live example is the developed codes at different platforms like JAVA, Visual Studio and others. This ...

Click here to read more arrow

Veracity Problem: A Review of Various PageRanking Algorithms

27 Mar 2018

8 (3,028 )

Abstract Enormous availability of web pages containing information leaves user in confusion of which webpage to trust and which link provides the right information. This paper provides a survey of the most relevant studies carried out in regard of ranking web pages. First, it introduces the problem of “Veracity” , conformity to truth. It then goes on to list the most common algorithms that have been ...

Click here to read more arrow

User Behavior Mining in Software as a Service Environment

27 Mar 2018

9 (3,335 )

Abstract—Software as a Service (SaaS) provides software application vendors a Web based delivery model to serve large number of clients with multi-tenancy based infrastructure and application sharing architecture. With the growing of the SaaS business, data mining in the environment becomes achallenging area. In this paper, we suggest a new metric along with a few existing metrics for customer analysis in a Software as a Service ...

Click here to read more arrow

Obfuscated Data Storage For Cloud Environment

27 Mar 2018

7 (2,549 )

Ravi Pandey, and Kamlesh Chandra Purohit   Abstract. Data storage service is one of the most attractive services provided by the cloud service provider. Despite the benefits of cloud computing threat to data confidentiality, integrity and availability may stop the data owner from switching to a cloud environment. Handing over the data to a third party to store and manage may generate data security ...

Click here to read more arrow

Network Aware Adaptive Media Streaming in Mobile Cloud

27 Mar 2018

6 (2,047 )

Authors Name/s per 1st Affiliation (Author) line 1 (of Affiliation): dept. name of organization line 2-name of organization, acronyms acceptable line 3-City, Country line 4-e-mail address if desired Authors Name/s per 2nd Affiliation (Author) line 1 (of Affiliation): dept. name of organization line 2-name of organization, acronyms acceptable line 3-City, Country line 4-e-mail address if desired Abstract—This electronic document is a “live” template and already defines ...

Click here to read more arrow

Input and Output Devices in Computer

27 Mar 2018

5 (1,613 )

Name: THENG WEI JUN   Question 1 A computer receives incoming data, processes them and produces an output. Hence, in a typical computer, there is An input device i.e, a key board A Central Processing Unit (CPU) I.e, a box and An output device i.e, a monitor or a Visual Display Unit (VDU). Discuss in detail how these devices work together to ...

Click here to read more arrow

Friend Recommendation System Software Design

27 Mar 2018

7 (2,787 )

CHAPTER 4 SOFTWARE DESIGN DESCRIPTION 4.1 INTRODUCTION The Software Design Document provides transcript which will be used to aid in the software development phase of this project by providing the details for how the software should be built. Within the Software Design Document are narrative and graphical documentation of the software design for the project including use case models, sequence diagrams, object behaviour models, and other supporting ...

Click here to read more arrow

Android-based English Grammar Checker with Voice Recognition

27 Mar 2018

5 (1,871 )

ABSTRACT In this paper, the Researchers describe an Android-based Voice Recognition system that acts as a grammar checker specifically geared to the needs of non-native speakers who are willing to learn and be familiarized with English language. This paper also examines how wrong usage of grammar can affect the communication of people both orally and in writing. Most commercial grammar checkers on the market today are ...

Click here to read more arrow

Result Analysis using Fast Clustering Algorithm

27 Mar 2018

8 (3,165 )

Result Analysis using Fast Clustering Algorithm and Query Processing using Localized Servers. P.Jessy Abstract—This paper identifying records that produces compatible results using Fast Clustering Selection Algorithm. A selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time required to find a record, the effectiveness is related to the quality of the record. The selection algorithm fetches ...

Click here to read more arrow

Current Computing Research on Long Term Data Storage

27 Mar 2018

7 (2,596 )

Samuel Kahura Wachira Evaluation of Current Computing Research on Long Term Data Storage   Abstract The increasing number of digitized documents and the content explosion that has been experienced in this digital age has necessitated the research into the Long Term Data Storage. There are various methods, modes and approached to this problem. Whichever the solution, it must adhere to these principles: the media ...

Click here to read more arrow

Location Privacy in Wireless Networks

27 Mar 2018

4 (1,504 )

ARUN TEJA KANUKOLU   Introduction: In the past decade we have an enormous development of different wireless technologies a lot of wireless technologies like Wi-Fi, Bluetooth are being implemented. With the development of wireless technologies and the convenience they provide in the aspects of space and time they are being widely used and there comes numerous security issues. A lot of work has been ...

Click here to read more arrow

Overview of Ethernet Technology

27 Mar 2018

3 (1,189 )

Ethernet Network2 Research Assignment Reem Alajmi   Introduction Ethernet technology has evolved to meet new bandwidth and market requirements. In addition to computers, Ethernet is now used to interconnect appliances and other personal devices. It is used in industrial applications and is quickly replacing legacy data transmission systems in the world's telecommunications networks. In this research, we shall discuss interface options for Ethernet and ...

Click here to read more arrow

Website Quality Evaluation Based on Sitemap

27 Mar 2018

9 (3,453 )

M.Chandran A.V.Ramani   Abstract Website quality evaluation can be made based on creating site map for the WebPages for a single website which works properly. A website is taken for the analysis where we check every link under that website are checker and split it according to status code. By analyzing every status code from all those webpage links, we are ignoring every other ...

Click here to read more arrow

Pixel and Edge Based Lluminant Color Estimation

26 Mar 2018

8 (3,176 )

Pixel and Edge Based Lluminant Color Estimation for Image Forgery Detection Shahana N youseph and Dr.Rajesh Cherian Roy   ABSTRACT Digital images are one of the powerful tools for communication. So Image security is a key issue when use digital images. With the development of powerful photo-editing software, such as Adobe Photoshop Light room 4, Apple Aperture 3, Corel PaintShop Pro X5, GIMP 2.8, photo manipulation is ...

Click here to read more arrow

System Requirements for Electric System for Car Rental

26 Mar 2018

10 (3,796 )

  1. Introduction XYZ is a car rental company located in Saudi Arabia, and has branches in all major cities. XYZ main business line is to provide rental service of small civilian cars for individuals. XYZ is planning to expand its business and to approach larger customer base by allowing customers to book from online. Also XYZ needs to automate its current paperwork processes ...

Click here to read more arrow

Ontology Development Through Concept Maps Using Text Indices

26 Mar 2018

8 (2,930 )

      Abstract- Ontology acts as a platform for knowledge sharing and description to represent a particular domain in the form of customized web information gathering. While developing those ontologies for a particular domain, it emphasizes the knowledge base across the global information than the local in information. In this project represent a customized ontology system for a particular domain. Data mining is chosen ...

Click here to read more arrow

Design of Automated Biomass Gasifier

26 Mar 2018

7 (2,650 )

ABSTRACT: Biomass gasifiers have found a promising place in renewable energy resource field. Even then, these gasifiers are facing lots of practical difficulties on operational effectiveness due to shortage of man power. So small scale biomass gasifier is fabricate and further the fuel feeding system and switching functions (On/Off Operations) are also changed by means of automation. Bucket conveyors are used to feed the fuel from ...

Click here to read more arrow

Evolution of Storage Media Technology Within the Data Centre

26 Mar 2018

7 (2,632 )

AN INVESTIGATION INTO THE EVOLUTION OF STORAGE MEDIA TECHNOLOGY WITHIN THE DATA CENTRE TO SUPPORT THE I/O REQUIREMENTS OF MODERN APPLICATIONS. Chandan Chandapura Ramesh (x14111306) Abstract Technology has always played a tremendous role in evolution of data storage media from the very starting punch cards to the present flash drives and from kilobytes to terabytes. The evolution of storage included from the standardization of storage ...

Click here to read more arrow

Developing a Brain Computer Interface

26 Mar 2018

8 (2,964 )

A Seminar Report On “Brain Computer Interface” Submitted by: Name: Sachin Kumar Roll No: 1214310301 ABSTRACT Brain Computer Interface allows users to communicate with each others by using only brain activities without using any peripheral nerves and muscles of human body. On BCI research the Electroencephalogram (EEG) is used for recording the electrical activity along the scalp. EEG is used to measure the voltage ...

Click here to read more arrow

Securing MANET From Routing Attacks

26 Mar 2018

4 (1,344 )

CHAPTER 3 RESEARCH METHODOLOGY 3.1 RESEARCH PROBLEM The increasing demand and utilization of wireless technology is making the need for more secure wireless networks. From the security viewpoint MANET is one of the most interesting research fields. A MANET is generally exposed to vulnerabilities due to its open medium, rapidly varying network topology, lack of centralized control and lack of clear line protection and it suffers ...

Click here to read more arrow

Zero-Day Vulnerability Attack

26 Mar 2018

7 (2,748 )

As Forensics Expert discuss the process involve in investigating Zero-Day Vulnerability attack Introduction The Internet became essential in this 21st generation and people can’t live without Internet. As the growth of the use of Internet, new technologies are also invented to support our life. However this new technologies may also exploit to the vulnerability attack. One of the vulnerability attack is zero-day attack (0day). A zero-day ...

Click here to read more arrow

Analysis of Data Leakage Prevention Solution

26 Mar 2018

8 (3,127 )

Anuja Vasant Kale, Vishwajeet Bajpayee, Shyam P Dubey   ABSTRACT: In any organization or institution we have to deal with lots of data. Those data may contain confidential information about the customer, project related data, employee personal data etc. If such type of confidential data is leaked from the organization then it may affect on the organization health. Hence we have to enforce some policies in ...

Click here to read more arrow

Efficient Prediction System Using Artificial Neural Networks

26 Mar 2018

7 (2,655 )

Jay Patel   Abstract- Predicting is making claims about something that will happen, often based on information from past and from current state. Neural networks can be used for prediction with various levels of success. The neural network is trained from the historical data with the hope that it will discover hidden dependencies and that it will be able to use them for predicting ...

Click here to read more arrow

Trust Inference Model Proposal

26 Mar 2018

5 (1,771 )

(step1-13 in Alg. 4) in the continu-ous case. For advogato data set, we directly report the results on all the six snapshots (i.e., advogato-1, . . . , advogato-6). For PGP, we use its subsets to study the scalability. The result is shown in Fig. 6, which is consistent with the complex-ity analysis in Section 4.3. As we can see from the figure, MATRI scales linearly ...

Click here to read more arrow

Cryptography: Types, Methods and Uses

26 Mar 2018

10 (3,892 )

CHAPTER-1 INTRODUCTION 1.1 Introduction to Cryptography Cryptography is art of writing and reading the secret information. It is used to send the information between the various participants. It can be used in such a manner so that it could not be seen by the others. Cryptography is used to prevent the information from the attacker. It provides various services as : Integrity checking Authentication ...

Click here to read more arrow

Content Management Application on Cloud Platform

26 Mar 2018

11 (4,057 )

ABSTRACT The aim of the project is to develop a versatile Content Management application on cloud platform that serves common business purpose of ZTE Telecom Pvt. Ltd. With increasing numbers of orders and product enquiries, the company experiences a few problems such as difficulty in managing the content effectively and in a secure manner so that the user has a wonderful experience from purchase to payment. ...

Click here to read more arrow

Static Code Analysis

26 Mar 2018

9 (3,363 )

Jim Kielt Table of Contents (Jump to) 1.0 Analysis 1.1 Cross-Site Scripting: 239 vulnerabilities detected. 1.2 File Manipulation: 9 vulnerabilities detected. 1.3 SQL Injection: 4 vulnerabilities detected. 2.0 Bibliography Table of Figures Figure 1 - RIPS results output for bWAPP Figure 2 - Line of code from xss_json.php vulnerable to Cross-Site Scripting detected by RIPS Figure 3 - Returned message from xss_json.php Figure 4 - Returned ...

Click here to read more arrow

Performance Analysis for AD-HEED and N-HEED

26 Mar 2018

12 (4,602 )

4.1 Results and Discussion In this section, we exhibit and discuss the results of the simulation. This section shows the performance analysis for AD-HEED and N-HEED compared to the original HEED protocol. Every result presented is the average of five experiments. The following sections give a detailed description of the experiments and the results. 4.4.1 Network Lifetime The number of alive nodes for each round is ...

Click here to read more arrow

Multi Cloud Database Service Providers (MCDSP)

26 Mar 2018

9 (3,487 )

A Multi cloud service provider is expert in building the distributed database cloud and can manage those cloud storage servers also. And this multi cloud database service provider is capable of operating the cloud computing system in an interactive way. When a user wants to store the data in the multi cloud, he needs to log with his credentials. MCD service provider of the multi cloud ...

Click here to read more arrow

Link Lifetime based Border Node (LLBN) Protocol

26 Mar 2018

5 (1,673 )

Link Lifetime based Border Node (LLBN) Protocol for Vehicular Ad Hoc Networks Sanjay Batish, Manisha Chahal, Sanjeev Sofat, Amardeep Singh   Abstract Vehicular ad hoc network (VANET) attracts rising attentions of researchers for safety related and other communication applications. These networks have many challenging characteristics such as high mobility, fast changing topology and limitation of bandwidth. Under these problems, we proposed LLBN (link lifetime based ...

Click here to read more arrow

Application White-listing With Bit9 Parity

26 Mar 2018

5 (1,755 )

K.PADMAVATHI   I. Introduction Antivirus is a requirement for a host of compliance standards and is championed to be a critical component for any security baseline (PCI-DSS 3.0-5.1). A recent google search for “Cyber Security Breaches” in Google News shows 16,700 results in Google News. Even NIST has stated that that AV is not an adequate control. The basis for this argument is that ...

Click here to read more arrow

Steganography: Uses, Methods, Tools and Examples

26 Mar 2018

9 (3,446 )

Steganography by Mohammed Almintakh   ABSTRACT This paper talks about steganography, steganography is the art or hiding data within a medium without letting others to know about that data is exsisting. I will go through an introduction about it , then explaining the background of it and more information about the uses of this technique , and how organization use it in their own good. This ...

Click here to read more arrow

Web2py Layout Features

26 Mar 2018

4 (1,501 )

CHAPTER 5. DEVELOPMENT In the Web2py framework there are two objects that contribute in designing both static and dynamic web pages. The SQLFORM.factory object is used for developing static web pages and SQLFORM object for developing dynamic pages. The framework consists of three files, namely db.py which is created in the model, default.py created in the controller and "default/index.html" file for designing the web page in ...

Click here to read more arrow

Approaches to Data Cleaning

26 Mar 2018

5 (1,666 )

Data Cleaning approaches: generally, data cleaning contains several steps Data Analysis: A detailed analysis is required to check what type of inconsistencies and errors are to be resolved. An analysis program should be used along with manual analysis of data to identify data quality problems and to extract metadata. Characterization of mapping rules and transformation workflow: We might have to execute a great amount of data ...

Click here to read more arrow

Case Study of DFA and NFA Implementation

26 Mar 2018

21 (8,150 )

Muhammad Danial Waseem Hania Farooq Table of Contents (Jump to) Digital Social Media Popular Social Media Tools and Platforms Blogs Face book WhatsApp Viber Twitter YouTube Flickr Instagram LinkedIn Groups Vimeo STATE 1 (login state) Regular expression for the state 1 (After login ) Regular expression for the state 2 Combined automata Table (3) Transition table for combined states of facebook Scenario 2 Language ...

Click here to read more arrow

Raspberry Pi Foundation DDoS Attack

26 Mar 2018

12 (4,434 )

E Crime The perfect ‘E Crime’ – The Raspberry Pi Foundation   Assessment: The perfect ‘E Crime’ – The Raspberry Pi Foundation   Table of Contents 1 Introduction 1.1 Aim 1.2 Methodology 1.3 Justification 2 What is E-Crime? 2.1 Types of E-Crime? 3 The Raspberry Pi Foundation 4 The Attack 5 DoS attacks 5.1 DDoS attacks 5.2 Botnets 5.3 Protocol Attack 5.4 SYN Flood 6 Tools ...

Click here to read more arrow

Issues with Cameras and Privacy in Modern Day Technology

26 Mar 2018

6 (2,244 )

Scam Cams Nick Doran   Introduction and Significance of Issue As a citizen, governmental laws have always played a major role in the way we conduct ourselves. Whether it’s when we vote or when we sit down in our car to travel, they always have a say or way to regulate us. When it comes to the motor vehicle, being a daily driver of suburban and ...

Click here to read more arrow

History and Development of Programming Languages

26 Mar 2018

9 (3,245 )

Yash Ojha   Introduction Programming languages play the most important role in the creation of various Software’s. Application, and Webpages etc. Just because of the existence of programming languages today everything related to New Technology is possible. For example the various Social Networking sites that we use is a result of Programming Language, the Mobile phones that we use in our daily life is a brilliant outcome ...

Click here to read more arrow

DDS Based Communication Middleware

26 Mar 2018

4 (1,213 )

CHAPTER 1 INTRODUCTION “Data Distribution Service based communication middleware” to addresses the communication needs of distributed applications. Middleware placed between a software application and the operating system as shown in Figure 1.1[33]. Network middleware segregates the application from the subtle elements of the underlying computer architecture, operating system and network stack. Figure1.1 Middleware (Software layer between OS and application) Network middleware simplifies the development of ...

Click here to read more arrow

Energy Efficient Firefly Scheduling in Green Networking

26 Mar 2018

8 (3,131 )

An energy Efficient Firefly Scheduling in Green Networking with Packet Processing Engines S.S.Saranya S.Srinivasan   Abstract-The investigation of force sparing system gadgets has been situated as of late on Theoretical With the point of controlling force consumption in center systems, we consider energy mindful gadgets ready to lessen their energy prerequisites by adjusting their execution. We propose new algorithm for scheduling the errand to ...

Click here to read more arrow

Comparison of Database and File Storage

26 Mar 2018

9 (3,344 )

Author: Noronjon Qalandarov CONTENTS (Jump to) ACKNOWLEDGEMENTS SUMMARY 1. INTRODUCTION 2. AIMS AND METHODOLOGIES 3. LITERATURE REVIEW 3.1 Technologies and definitions 3.1.1 RDBMS 3.1.2 Native XML DB 3.2 DATABASE PRODUCTS 3.2.1 MySQL database 3.2.2 eXist and Sedna databases 4. DATABASE BENCHMARKING 4.1. Storing XML in file systems 4.2. Document size 4.3. Updates 4.4. Description of soil sampling and sample preparation 4.5. Determination of pendimethalin in methanol ...

Click here to read more arrow

Current Voltage Relation of Different Memristor Models

26 Mar 2018

9 (3,375 )

Abstract: Memristor a two terminal passive non volatile device is considered as the fourth circuit element and can be used in many applications which includes memory, logic and neuromorphic systems. The memristor provides many advantages like scalability, compatibility with CMOS and offers no leakage current. Various models of memristor have been discussed in this paper. The main focus is on the Current-Voltage (IV) relation of different ...

Click here to read more arrow

AQM: A Mechanism of Congestion Control in Networks

26 Mar 2018

6 (2,320 )

Saira Saeed, Bilal Shams,   Abstract: Congestion in the network occurs when node or link carries so much data that its quality of service downgrade. Active queue management is the most well-known algorithm to control congestion in the network. This paper discussed some of the queue length based and load based algorithms in AQM, we also highlighted its pros and cons. Keyword: congestion, ...

Click here to read more arrow

Developing Expected Forwarded Counter (EFW)

26 Mar 2018

5 (1,912 )

Abstract Wireless mesh networks have emerged as adaptable and low cost networks. Expected forwarded Counter (EFW) is a cross layer metric introduced to deal with the problem of selfish behaviour in order to provide reliable routing. This paper proposes an enhancement to the EFW, by considering congestion incurred due to selecting only high quality paths. The performance of proposed metric is evaluated through simulation. Simulation results ...

Click here to read more arrow

Privacy Preserving Data Mining in Partitioned Databases

26 Mar 2018

7 (2,617 )

A survey : Privacy preserving data mining in horizontally partitioned databases Komal Kapadia, Ms.Raksha Chauhan   _______________________________________________________________________________________________________ Abstract – Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. The success of data mining relies on the availability of high quality data. To ensure quality of ...

Click here to read more arrow

Detecting Complex Image Data Using Data Mining Techniques

26 Mar 2018

9 (3,542 )

Detecting complex image data using data mining techniques IMRAN KHAN ABSTRACT The Internet, computer networks and information are vital resources of current information trend and their protection has increased in importance in current existence. The intrusion detection system (IDS) plays a vital role to monitors vulnerabilities in network and generates alerts when found attacks. Today the educational network services increasing day today so that IDS becomes ...

Click here to read more arrow

Image processing Techniques to Forecast Plant Disease

26 Mar 2018

4 (1,445 )

A Synopsis on A Feasibility Study on The Prediction/Forecasting of Disease for Plant Leaf Using Image processing Techniques by Chaitali Pandya  INDEX PAGE (JUMP TO) Introduction Scope of the proposed study Review of work already done on the subject Objectives of the proposed study Research Methodology Hypotheses to be tested Tentative Chapterization Bibliography Introduction India is a country where the agricultural plays a very important role. ...

Click here to read more arrow

Artificial Intelligence in Web Design

26 Mar 2018

9 (3,514 )

Richard Roško   Abstract—This paper deals with a new trend in web design and that is to introduce some degree of artificial intelligence into the task of designing a website. One of the first companies that came up with implementation of this idea id thegrid.io, which we will be mostly discussing in this paper. We will take a deeper look as to what does in fact ...

Click here to read more arrow

Feature Extraction in Face Recognition: A Review

26 Mar 2018

10 (3,668 )

Feature Extraction in Face Recognition: A Review Gurpreet Kaur, Monica Goyal, Navdeep Kanwal   Abstract: Face recognition is a type of biometric software application by using which, we can analyzing, identifying or verifying digital image of the person by using the feature of the face of the person that are unique characteristics of each person. These characteristics may be physical or behavior. The physiological characteristics as ...

Click here to read more arrow

Survey on Traffic Pattern Discovery in Mobile Ad hoc Network

26 Mar 2018

9 (3,489 )

Priyanka Sen Priti Saktel   Abstract— Mobile Ad-hoc Network (MANET) is one of the networks of mobile routers that is self-configuring and connected by wireless links. Anonymity communication is one of the major issues in MANET. Though there are many anonymity enhancing techniques that have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks. There are still ...

Click here to read more arrow

ATM Deployment Strategy Using Rank Based Genetic Algorithm

26 Mar 2018

5 (1,841 )

ATM Deployment Strategy using Rank based genetic algorithm using convolution CHAPTER 4 SYSTEM DESIGN AND DEVELOPMENT 4.1 System Design Data processing can be shown by data flow models. At the early stage of examination, these models are used to show data processing in existing system. This data flow model consists of various notations which denotes functional processing, passing of data between two functions and storing data ...

Click here to read more arrow

Service Mechanism for Diagnosis of Respiratory Disorder

26 Mar 2018

11 (4,315 )

Service Mechanism for Diagnosis of respiratory disorder Severity Using Fuzzy Logic for Clinical Decision support system Faiyaz Ahamad Dr.Manuj Darbari Dr.Rishi Asthana   Abstract: Respiratory disorder is a chronic inflammatory lung disease. Globally Respiratory disorder is based on the functional consequences of airways inflammation, clamitous nature and not proper diagnosis. In this paper our aim to develop Service Discovery Mechanism for Diagnosis of respiratory disorder Severity ...

Click here to read more arrow

Development of Geographic Information System

26 Mar 2018

5 (1,905 )

CHAPTER 1 INTRODUCTION GEOGRAPHIC INFORMATION SYSTEM A geographic information system helps to create maps, integrate information, visualize scenarios, present powerful ideas and develop effective solutions. GIS can be used in wide areas for the purpose of decision making. This technique used in many areas such as traffic measurement, asset management and weather forecasting. A geographic information system helps to analyze large quantity of data ...

Click here to read more arrow

Cluster Computing: History, Applications and Benefits

26 Mar 2018

7 (2,668 )

Abstract This report will provide a detailed review of the cluster computing. In this report we look at the birth of cluster computing till the present and the future direction the technology is headed. After the literature review, we move on to the explanation of theories involved from the author’s point of view. The final section of the report covers the current trends and future evolution ...

Click here to read more arrow

Security System for Local Area Network

26 Mar 2018

9 (3,474 )

Raman Sidhu   Windows Server 2008 offers a very good Windows consistency and Performance monitor tool. Within minutes, you can have a comprehensive and graphical view of your server. In the past, you had to pull information from a variety of management tools, but no more. In Server Manager, under Diagnostics, select Windows System Resource Manager. You can connect to the local or a ...

Click here to read more arrow

External Support for Programmers in Tool Building

26 Mar 2018

4 (1,252 )

2. LITRATURE SURVEY In a software development process a literature survey is the utmost imperative step. It is necessary to regulate the time factor before developing the tool economy and company strength. Once these things are satisfied ten next steps are to determine which operating system and language can be used for developing the tool. Once the programmers start building the tool the programmers need lot ...

Click here to read more arrow

Web Personalization Using Feedforward Backpropagation

26 Mar 2018

10 (3,875 )

WEB PERSONALIZATION USING FEEDFORWARD BACKPROPAGATION NEURAL NETWORK Chapter 4: Methodology Chapter 4 shows the methodology of the present work. Section 4.1 present the methodology, section 4.2 includes flow chart of the present work. Section 4.3 present the proposed algorithm. 1.1 METHODOLOGY Start Configure search engine Training on data according to user’s context. Testing on data ANN optimization for search optimization. Stop 1.1 Training: ...

Click here to read more arrow

Overview of Image-Based Shading Techniques

26 Mar 2018

7 (2,482 )

Rishabh chand sharma Brahmdutt bhora   Abstract— Image processing input, such as a photo or video frame is an image for which any form of signal processing functions by using images using mathematical is processing. Most image processing techniques, such as a two-dimensional or three-dimensional image signal is treated. Image processing methods used are two types of analog and digital image processing. Shading is ...

Click here to read more arrow

Migration Plan from UNIX to Microsoft Server

26 Mar 2018

4 (1,324 )

Data Migration is the process of transferring data between different storage types, servers or formats. It’s not just about copying data, but also about validating the data according to constraints and since different databases uses different data types, this step also include modifying the data as per the target server. One essential requirement is that the data migrated should verify the Business logic to run applications ...

Click here to read more arrow

Software Development Theory: A Survey

26 Mar 2018

8 (2,916 )

Pushpakumar R   Abstract— Nowadays, during the Software development process, software developers are involved and their efforts to generate correct approach are the major challenge. In this survey, the planned model is Coat Hanger, for theorizing about development practices. This model focuses on the projected justification for the actual recognition and resulting effects of using particular practices in changing contexts. In the recent practice concerned with ...

Click here to read more arrow

Quality of Service (QoS) Requirements for ROIA

26 Mar 2018

3 (1,077 )

Real-Time Online Interactive Applications (ROIA), demand very high Quality of Service (QoS) on the underlying network. These demands can vary on run time depending on number of users. However, Traditional networks cannot fulfill dynamic QoS requirements. SDN based networks use Northbound API to provide communication between applications and SDN. For SDN community, creating and standardizing Northbound API is still in progress. In this paper specifications of ...

Click here to read more arrow

Change Management in Semantic Web Services

26 Mar 2018

14 (5,334 )

Change Management in Semantic Web Services in Legal Domain using FSM & XXM Introduction With the new paradigm of Service Oriented Computing, many enterprises attempt to utilize services as fundamental elements for developing applications/solutions as an additive layer on top of existing components. The Web Service Controller Architecture (WSCA) for service-based, enterprise-scaled business solutions provides exactly this flexibility. The design, exposure and management of services can ...

Click here to read more arrow

QOD Protocol for Wireless Network Service Quality

12 Mar 2018

6 (2,234 )

CHAPTER 1 INTRODUCTION Overview A generalized treatment of a topic - a summary oroutline The development of the wireless network must be prevented in various applications of wireless networks and they can be used in several areas of the hybrid networks respectively. Here the wireless network such as Wi-Fi in laptops and in mobiles can be used to increase the use of wireless networks. ...

Click here to read more arrow

Improving WPA and WPA2

12 Mar 2018

5 (1,882 )

Introduction: WPA is an acronym for “Wi-Fi Protected Access”. It was designed and developed by Wi-Fi alliance as a reponse to the weaknesses and vulnerabilities in the previous wireless security protocol i.e. WEP (Wired Equivalent Privacy). It is a certification program developed by WiFi alliance to indicate compliance with the previous security protocol and secure wireless networks. WPA2: WPA2 is vulnerable to insider attack(If attacker is ...

Click here to read more arrow

Development of Human Computer Interface

12 Mar 2018

9 (3,211 )

Development of Human Computer Interface Based on Cognitive Model Integrated With Data Mining Techniques M. Mayilvaganan, D. Kalpanadevi   Abstract First review concern about the relevant literature survey in order to evaluate the performance of learning ability and knowledge, behavior, attention, by the category of cognitive skills which is analyzed by various data mining techniques. In this paper focus the concepts of cognitive process and data ...

Click here to read more arrow
Get in Touch With us

Get in touch with our dedicated team to discuss about your requirements in detail. We are here to help you our best in any way. If you are unsure about what you exactly need, please complete the short enquiry form below and we will get back to you with quote as soon as possible.