Version-9 (Jan-Feb 2014)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Data Gathering Mechanisms with Multiple Mobile Collectors in Wireless Sensor Network |
Country | : | India |
Authors | : | Ramarajan C, Ajitha P |
: | 10.9790/0661-16190105 |
Abstract: Energy consumption becomes a primary concern in a Wireless Sensor Network. It have emerged as an effective solution for a wide range of applications. Introduced a new data-gathering mechanism for large-scale wireless sensor network by introducing mobility into the network. An M-Collector(mobile data collector) starts the data-gathering tour periodically from the static data sink, polls each sensor while traversing its transmission range. It directly collects data from the sensor in single-hop communications, and finally transports the data to the static sink. We propose a data-gathering algorithm where multiple mobile collectors traverse through several shorter sub tours concurrently to satisfy the distance/time constraints. To pursue high energy saving at sensor nodes, a mobile collector should traverse the transmission range of each sensor in the field such that each data packet can be directly transmitted to the mobile collector without any relay. Also it minimize the delay caused by the Mobile Collector to connect with the base station.
Keywords: Wireless Sensor Network, Data Transmission, Mobile Collector
[2]. HuiTian, Hong Shen and Matthew Roughan ,"Maximizing Networking Lifetime in Wireless Sensor Networks with Regular Topologies", 2008.
[3]. R. Shah, S. Roy, S. Jain, and W. Brunette ,"Modeling a Three-Tier Architecture for Sparse Sensor Networks" ,Sept. 2003.
[4]. C.Xiaorui Wang, Yuanfang Zhang, Chenyang Lu, Robert Pless, and Christopher Gill, "Integrated Coverage and Connectivity Configuration for Energy Conservation in Sensor Networks", 2005.
[5]. Maxim A. Batalin, Mohammad Rahimi1, Yan Yu ,"Call and Response: Experiments in Sampling the Environment",2004.
[6]. Z. Zhang, M. Ma, and Y. Yang, "Energy efficient multi-hop polling in cluster of two –layered heterogeneous sensor networks," IEEE Trans. Comput., vol. 57,no. 2, pp. 1-9.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparison and Enhancement of Digital Image by Using Canny Filter and Sobel Filter |
Country | : | India |
Authors | : | Rupika Rana, Ashish Verma |
: | 10.9790/0661-16190610 |
Abstract: In this research paper we have defining two different edge detection methods i.e canny edge detection and Sobel edge detection and we are also discussing some image quality parameters like PSNR, SNR, MSE, RMSE, UQI and MAE. Edge detection is a technique that is used to identifying points in a digital image at which the image brightness changes sharply or, more formally, has discontinuities. The points at which image brightness changes sharply are typically organized into a set of curved line segments termed edges. Results shows that our strategy on the nature of comparison between canny and sobel edge detection methods by using image quality parameters on Medical images [ MRI and CT Scan] and to further finding a better and more accurate edge detection method .The values of these methods are interpreted and illustrated in results section .
Keywords: Canny, Sobel, Edge Detection, Medical Images, Quality Measurement, MRI, CT scan.
[2] Muthukrishnan.R and M.Radha of Edge Detection Techniques for image Segmentation, International Journal of Computer Science & Information Technology (IJCSIT), Dec 2011.
[3] A Study on Image Edge Detection Using the Gradients, International Journal of Scientific and Research Publications, December 2012.
[4] A Brief, Early History of Computer Graphics in Film (Larry Yeager, 16 August 2002 (last update), retrieved 24 March 2010).
[5] Edge Xiangjian, Jianmin Li, Darning wer', Wenjing Jia 2 and Qiang Wu2, Canny Detection on a Virtual Hexagonal Image Structure.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Zinc oxide (ZnO) thin films were prepared by DC- magnetron sputtering technique on glass at 500 0C substrates temperature. The effect of γ-irradiation on the structure and optical properties of the films was investigated. The crystal structure and orientation of the films were studded by XRD pattern. The deposited film is polycrystalline and the dependence of preferred orientation, peak intensities and grain size on the gamma (γ)-irradiation are investigated. The absorption and transmission spectra recorded in the UV/VIS/NIR region for the as deposited and irradiated films The absorption coefficient, optical energy gap, Urbach energy, optical constants (refractive index, extinction coefficient, dielectric constant) and dispersion parameters, such as single-oscillator energy, dispersive energy were determined of irradiated and un- irradiated samples and analyzed.
Keywords: Zinc oxide (ZnO), thin film, γ- irradiation, optical properties, Structural properties, DC- magnetron sputtering.
[2] Y. J. Lee, D.S. Ruby, D. W. Peters, B. B. Mckenzie and J. W. P. Hsu," Nano Lett.", 8 (2008) 1501.
[3] J. J. Schneider, R. C. Hoffmann, J. Engstler, O. Soffke, W. Jaegermann, A. Issanin and A. Klyszcz, "Advan. Mater.", 20 (2008) 3383.
[4] A. M. Ibrahim and L. I. Soliman," Rad. Phys. & Chem.", 53 (1998) 469
[5] E. Atanassova, A. Pasksleva, R. Konakova, D. Spassov and V. F. Mitin ,"Microelectronics J.", 32 (2001)553
[6]
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Nowadays, technology increases, so the risk related to technology is also increasing. Risk is the possibility of suffering loss. Therefore, we have to adopt some risk management methodology to reduce the number of risks. There are many risks are present in the organization. So it is the primary concern in risk management which risk we have to deal with because reducing every risk is not possible in any way. There is some risk that is always present, which is known as residual risk. Risk Assessment is the part of risk management. In this paper, we are focusing on quantitative approaches for risk assessment related to information security.
Keyword: Risk, information security, risk assessment, quantitative approach.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security Measures in Aodv for Ad Hoc Network |
Country | : | India |
Authors | : | Nidhi Gour, Monika Agarwal, Heena Singh, Ajay Kumar |
: | 10.9790/0661-16192133 |
[2] Preeti Bathla, Bhawna Gupta "Security Enhancements in AODV Routing Protocol" International Journal of Computer Sci ence and Technology Vol. 2,page no 295-298,june 2011
[3] Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer "A Secure Routing Protocol for Ad Hoc Networks" http:/www.aran.icnp02.pdf
[4] Yih-Chun Hu, Adrian Perrig, David B. Johnson "A Secure On-Demand Routing Protocol for Ad Hoc Networks" Springer,11,page no 21-38,2005
[5] Rajendra Prasad Mahapatra "Taxonomy of Routing Security for Ad-Hoc Network" International Journal of Computer Theory and Engineering, Vol. 2, No. 2 April, 2010
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Empirical Evaluation of machine learning techniques for software effort estimation |
Country | : | India |
Authors | : | NehaSaini ,Bushra Khalid |
: | 10.9790/0661-16193438 |
Abstract: Accurate estimation of software development effort is a very difficult job.Both under estimation as well as over estimation can lead to serious consequences. So its very important to find a technique which can yield accurate results for software effort estimation. Here in our paper we have evaluated various machine learning techniques for software effort estimation like bagging, decision trees, decision tables, multilayer perceptron and RBF networks. Two different datasets i.e. heiatheiat dataset and miyazaki94 dataset have been used in our research. Decision trees outperform all other models in term of MMRE value. Results of machine learning algorithms can be different from dataset to dataset.
Keywords: bagging, decision trees, decision table ,effort estimation, , multilayer perceptron, Radial basis function.
[2] A.L.I. Oliveira,"Estimation of software effort with support vector regression Neurocomputing", vol. 69, pp. 1749-1753, Aug. 2006.
[3] C.J. Burgess and M.Lefley, "Can genetic programming improve software effort estimation? A comparative evaluation, Information and Software Technology", vol. 43, pp. 863-873, 2001.
[4] G.R. Finnie and G.E. Wittig, "A Comparison of Software Effort Estimation Techniques: Using Function Points with Neural Networks, Case-Based Reasoning and Regression Models",Journal of Systems and Software, vol. 39, pp. 281-289, 1997.
[5] G.R. Finnie and G.E. Wittig, "AI Tools for Software Development Effort Estimation", in Proc. SEEP '96 , 1996, International Conference on Software Engineering: Education and Practice (SE:EP '96).
[6] M.O. Elish,"Improved estimation of software project effort using multiple additive regression trees",Expert Systems with Applications, vol. 36, pp. 10774-10778, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The focus of this paper is to analyse the utilisation of information communication technology (ICT) among small and medium enterprises (SMEs) in Zimbabwe, as one of the major factors contributing to their limited growth. The data was collected using interviews, questionnaires and observations. The findings revealed that most SMEs have and are still increasingly acquiring state of the art information communication technologies but are not fully utilising the technology which has a negative impact on profit margins, market share and overall business effectiveness. The research paper recommends intensive training programs and workshops for SME owners on effective utilisation of ICT for them to experience business growth and success. The findings avail valuable information to both the Zimbabwean SME community and the entire business community in the country in terms of development of economy and creation of employment opportunities.
Keywords: acquisition, information communication technology, small and medium enterprises, utilization
[2] M. Ayyagari, T. Beck and A.D. Kunt, Small and medium enterprises across the globe: A new database, 3127, 2003. World Bank Publications.
[3] I. Elmazi, H. Vukaj, E, Gega and L. Elmazi, Information technology and its effects in SME. The case of Albania. International Journal of Management Cases, 13, 2011. 291-298.
[4] C. Kowalkowski, D. Kindström and H. Gebauer, ICT as a catalyst for service business orientation. Journal of Business & Industrial Marketing, 28, 2013, 506-513.
[5] A. Bharadwaj, O.A.E. Sawy, P.A. Pavlou and N. Venkatraman , Digital business strategy: Toward a next generation of insights, MIS Quarterly, 37, 2013, 471-482.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Wireless Sensor Networks consists of tiny devices capable of processing, routing the sensed data and are capable of detecting the intruders. The process of detecting any suspected(anomalous) moving object(attacker) within the reach of a Wireless Sensor Network area is referred to as intrusion detection. In this paper, we propose an algorithm to detect the intruder by the cluster heads in a 2D and 3D homogeneous Wireless Sensor Networks. This algorithm overcomes the attacks on implementation and also, reduces the energy consumption.n
[2] Perrig A, Robert S, J D Tygar, Victor W and David C, SPINS: Security Protocols for Sensor Networks, in Journal on Wireless Networks, 8(5), September 2002, 521-534.
[3] S Zhu, S Setia and S Jajodia, LEAP: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks, in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, 62-72.
[4] Yang Xia Luo and Ye Guo, A Survey on Intrusion Detection of Wireless Sensor Network, in Proceedings of the Second International Conference on Information Science and Engineering(ICISE), 2010, 1798-1802.
[5] William Stallings, Cryptography and Network Security, in 3rd Edition, (Singapore: Prentice Hall, Pearson Education, 2004).
[6] SutharshanRajasegarar, Christopher Leckie and MarimuthuPalaniswami, Anomaly Detection in Wireless Sensor Networks, in IEEE Wireless Communications, 2008, 34-40.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Client-Server Model |
Country | : | Malaysia |
Authors | : | Haroon Shakirat Oluwatosin |
: | 10.9790/0661-16195771 |
Abstract: Client- server is a system that performs both the functions of client and server so as to promote the sharing of information between them. It allows many users to have access to the same database at the same time, and the database will store much information. This paper will provide information about client-server model in terms of its introduction, architecture, recent development and issues. Keywords: client-server, 2-tier, 3-tier, Interprocess communication, thick client, middleware SaaS, PaaS, IaaS.
[1]. Zhang, H. (2013). Architecture of Network and Client-Server model. arXiv preprint arXiv:1307.6665. [2]. Kambalyal, C. (2010). 3-tier architecture. Retrieved On, 2.
[3]. Kratky, S., & Reichenberger, C. (2013). Client/Server Development based on the Apple Event Object Model. Atlanta. [4]. Dewire, D. T. (1993). Client/server computing. McGraw-Hill, Singapore
[5]. Jenkins, N. (1996). Client/server Unleashed. Sams, USA
[6]. Davis, P.T.(Editor) (1996). Securing Client/Server Computer Networks. McGraw-Hill, USA
[7]. Cloud Computing – Issues, Research and Implementations" by Mladen A. Vouk, Journal of Computing and Information Technology - CIT 16, (2008), 4, 235–246 doi:10.2498/cit.1001391
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper maps the idea of software maintenance cost estimation process onto cloud computing service cost. We have many models for effort estimation in maintenance. Here we implement any cost estimation model to calculate the service cost in cloud computing. As in cost model there are 14 major cost drivers, in cloud environment there are also cost drivers which hold major expenditure. Considering cloud environment cost drives, an effort estimating equation is developed which can be implemented for finding the service cost. Using that service cost a third party server gives back pre-deployment maintenance estimation to the cloud user on request. There is also an analysis of data sets from different organizations which shows the comparative cost involved in cloud services and in traditional services.
Keywords: Cloud, Total Bandwidth Cost, Total Instance Cost, Total Storage Cost, Total Cost Ownership
[2] Pragya Siddhi, Varun Kumar Rajpoot, A Cost Estimation of Maintenance Phase for Component Based Software, IOSR Journal of Computer Engineering,ISSN : 2278-0661 Volume 1, Issue 3 (May-June 2012), PP 01-08
[3] Sugandha Chakraverti, Prof Sheo Kumar, Dr. S.C. Agarwal , Ashish Kumar Chakraver, Modified Cocomo Model For Maintenance cost Estimation of Real Time System Software ,,IJCSN ,Volume 1, Issue 1, February 2012
[4] Yi-Kuei Lin 1, and Ping-Chen Chang , Estimation of Maintenance Reliability for a Cloud Computing Network, International Journal of Operations Research Vol,2010. 7, No. 1, pp 53-60
[5] Yunsik Ahn, Jungseok Suh, Seungryeol Kim and Hyunsoo Kim, Journal of Software Maintenance and Evolution: Research and Practice,2002;15:71-85.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Visual Search Reranking |
Country | : | India |
Authors | : | Thalla Shankar, Lalitha Manglaram, Murali Sadak |
: | 10.9790/0661-16197881 |
Abstract: Search reranking is considered as a best and common way to improves retrieval precision. However the problem is not trivial especially when we are considering multiple features or modalities for search in image and video retrieval. This paper suggests a new kind of reranking algorithm, the circular reranking, that supports the mutual exchange of information across multiple modalities for improving search performance, and follows the philosophy of strong performing modality could learn from weaker ones, and weaker modality does benefit by interacting with stronger modalities.
[2] C. A. Bhatt and M. S. Kankanhalli, "Multimedia data mining: State of the art and challenges," Multimedia Tools Appl., vol. 51, no. 1, pp. 35–76, 2011.
[3] K. M. Donald and A. F. Smeaton, "A comparison of score, rank and probability-based fusion methods for video shot retrieval," in Proc. ACM Int. Conf. Image Video Retr., Jul. 2005, pp. 61–70.
[4] R. Fergus, L. Fei-Fei, P. Perona, and A. Zisserman, "Learning object categories from google's image search," in Proc. IEEE Int. Conf. Comput. Vis., Oct. 2005, pp. 1816–1823.
[5] W. Hsu, L. Kennedy, and S.-F. Chang, "Video search reranking via information bottleneck principle," in Proc. ACM Int. Conf. Multimedia, 2006, pp. 35–44.
[6] W. Hsu, L. Kennedy, and S.-F. Chang, "Reranking methods for visual search," IEEE Multimedia, vol. 14, no. 3, pp. 14–22, Jul.–Sep. 2007.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Automatically facial recognition has become more and more important today. But FR still remains a challenge problem in computer vision .so in this paper we proposed a new approach that use Gabor wavelet for facial feature extraction and robust structured sparse representation for classification. Gabor wavelet has beenwidely used in the face recognition task because it's good imitation of human visual. The structured sparse representation based classification (SSRC) is used for classifying the test images robustly. Unlike sparse representation based classification (SRC),the SSRC explicitly takes structure of the dictionary into account for a better classification.
Keywords: Gabor Wavelet, Structured sparse representation classification,Face Recognition.
[2] H. Jia and A. M. Martinez, (2010) "Face recognition with occlusions in the training and testing sets" IEEE Int. Conf. Autom. Face Gesture Recognit, pg no. 1–6.
[3] J. Wright, A. Yang, A. Ganesh, S. Sastry, and Y. Ma, (2009) "Robust face recognition via sparse representation", IEEE Trans. Pattern Anal. Mach Intell, pg no. 210–227.
[4] M. Yang, L. Zhang, J. Yang, and D. Zhang, (2011) "Robust sparse coding for face recognition", IEEE Int. Conf. Comput. Vis. Pattern Recognit, pg no. 625–632.
[5] Y. C. Eldar and M. Mishali, (2009)"Robust recovery of signals from a structured union of subspaces", IEEE Trans. Inf. Theory.
[6] Jing Wang and ChenganGuo,(2012) "Face Recognition based on Sparse Representation and Error Correction SVM", IEEE Trans. Conf Computational Intelligence, pg no. 10-15
[7] Zhao Lihong, Yang Caikun, Pan Feng and Wang Jiahe, (2012) "Face recoginition based on gabor with 2DPCP and PCA" 24th Chinese Control and Decision Conference no. 1–6.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In mobile adhoc network (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the manet. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The primary goal of such an adhoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may be delivered in a timely manner. Zone Routing based on Zone Routing Protocol (ZRP) is the famous techniques which is used to provide better result in Video transmission. Video transmission in this area is became popular and useful technique. This paper introduces WEAC-VBS-O Protocol with Zone Routing Algorithm. In this work WEAC Protocol with Zone Routing algorithm is discussed. It provides better result for video transmission. Keywords: MANET, Video Transmission, Zone Routing algorithm, WEAC Protocol.
Science and Engineering (IJCSE) june 2012.
[2] V. D. Park and M. S. Corson, "A highly adaptive distributed routing algorithm for mobile wireless networks, " presented at the
IEEE INFOCOM, Kobe, Japan, Apr. 1997.
[3] B. Bellur and R. G. Ogier,"A reliable, efficient topology broadcast protocol for dynamic networks," presented at the IEEE
INFOCOM, Mar. 1999.
[4] Z. J. Haas and M. R. Pearlman, "The performance of query control schemes for the zone routing protocol," IEEE/ACM Trans.
Networking, vol. 9, pp. 427,438, Aug. 2001.
[5] Z. J. Haas, M. R. Pearlman, and P. Samar, "The bordercast resolution protocol (BRP) for ad hoc networks," IETF, MANET Internet
Draft, July 2002. [6]"The interzone routing protocol (IERP) for ad hoc networks," IETF, MANET Internet Draft, July 2002.
[7] A. Iwata, C.-C.Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalablerouting strategies for ad hoc wireless networks," IEEE J.
Select. Areas Commun., vol. 17, pp. 1369–1379, Aug. 1999.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The present paper proposes a novel scheme of application of linear wavelets in Digital image processing and statistical evaluation of tongue image for diagnosis in Ayurvedic medical system. The proposed method attempts to differentiate the tongue of a person with healthy or unhealthy conditions. It consists of two techniques applied sequentially: first, enhancement of the tongue image for extracting the true nature of colors and textures on different parts of the tongue and applying wavelets transform; second, computing the statistical features to identify, whether the tongue image belongs to a healthy or unhealthy person. The scheme is implemented on a database including images from internet and selected college hostel students. The analysis of the results reveals that our method can significantly assist in the tongue diagnosis. This proposed method helps in expanding the scope of tongue diagnosis system in Ayurvedic medical system towards reliable and computationally inexpensive diagnostic model.
Keywords : Ayurvedic Tongue diagnosis, Digital Image Processing, Wavelets, Statistical Features.
[2] "Introduction About Traditional Tongue Diagnosis With Scientific Value Addition‟, Dr. Debasis Bakshi, Dr Sujata Pal, Proceedings of 2010 International Conference on Systems in Medicine and Biology, 16-18 December 2010, IIT Kharagpur, India.
[3] "Ayurvedic Tongue Diagnosis‟ by Walter‟ Shantree "Kasera, Eddition 2007, Mothilal Banarsidass publishers, No. 3, June 2012.
[4] Wangmeng Zuo, Kuanquan Wang, David Zhang, and Hongzhi Zhang, "Combination of Polar Edge Detection and Active Contour Model for Automated Tongue Segmentation", In Proceedings of the Third International Conference on Image and Graphics, pp: 270-273, 2004.
[5] Bo Pang, David Zhang, Kuanquan Wang, "Tongue image analysis forappendicitis diagnosis", Transactions on Information Sciences, Vol. 175, No. 3, pp: 169-176, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Learning data samples from a non-stationary distribution has been shown to be a very challenging problem in machine learning, because the joint probability distribution between the data and classes changes over time. Most real time problems as they change with time can suffer concept drift. For example, a recommender or advertising system, in which customer's behavior may change depending on the time of the year, on the inflation and on new products made available. An additional challenge arises when the classes to be learned are not represented equally in the training data i.e. classes are imbalanced, as most machine learning algorithms work well only when the class distributions are balanced. The objective of this paper is to review the ensemble classification algorithms on the framework of non-stationary and imbalanced dataset, with focus on two-class problems. In addition, we develop a thorough comparison of these algorithms by the consideration of the most significant published approaches.
Keywords: Concept Drift, Ensemble, Imbalanced Data, Incremental Learning, Non-stationary Data
[2] L. Rokach, Ensemble-based Classifiers, Artif. Intell. Rev.,vol. 33, pp. 1–39, 2010
[3] R. Polikar ,Ensemble Based Systems in Decision Making, IEEE Circuits and Systems Magazine, Vol. 6, No. 3, pp. 21-45, 2006
[4] G. Widmer and M. Kubat, Learning in the presence of concept drift and hidden contexts, Machine Learning, vol. 23, no. 1, pp. 69-101, 1996.
[5] Martin Scholz, Ralf Klinkenberg, An Ensemble Classifier for Drifting Concepts, Second International Workshop on Knowledge Discovery in Data Streams, pp. 53-64 , Vol. 11 ,2005.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Intrusion detection system is a software which is used to monitor network for anyintrusion .There are various types of IDS which are stated as Anomaly based, Host based, Network based and Signature based. In this paper, a review is made on various intrusion detection systems. The review analysis the whole active intrusion detection system. Through the extensive survey we analysed the whole pose of the active intrusion detection system. We employed the survey towards overall IDS not only for the specific. Since the security threats are in increased level, hence the study and survey about IDS has paid a lot of attentions.
Keywords:IDS, IPS, Intrusion, WSN
[2] K. Sanzgiri, B. Dahill, B. N. Levine, E. B. Royer, and C. Shields, "A Secure Routing Protocol for Ad-hoc Networks," in the Proceedings of International Conference on Network Protocols (ICNP), 2002.
[3] Yih-Chun Hu, Adrian Perrig, and David Johnson. Ariadne: "A Secure On-Demand Routing Protocol for ad hoc Networks," in the Proceedings of MobiCom, 2002.
[4] Y. Zhang, W. Lee, and Y.-A. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM J. Wireless Networks, pp. 545-556, 2003.
[5] A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wireless Ad-Hoc Networks," in IEEE Wireless Communications, pp. 48-60, February 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Best Practices in Implementation of Cloud |
Country | : | India |
Authors | : | Navjot Kaur |
: | 10.9790/0661-1619113119 |
Abstract: Cloud computing is one of the latest developments in the IT industry also known as on-demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. This technology has the capacity to admittance a common collection of resources on request. It is proving extremely striking to cash-strapped IT departments that are wanted to deliver better services under pressure. The hype around Cloud Computing is undeniable, especially regarding how it can result in huge savings in terms of I.T. costs for an enterprise. This has persuaded many enterprises to shift to cloud based software services.
[2] L.R.Rewatkar and U.A.Lanjewar, Implementation of Cloud Computing on Web Application, International Journal of Computer Applications (0975-8887), Volume 2 -No.8, June2012, pp 28-32
[3] J. Varia, ―Architecting for the cloud: Best practices‖, May 2010
[4] M.Sharma, A.Mehra, H.Jola, A.Kumar, M.Misra and V.Tiwari, Scope of cloud computing for SMEs in India, Journal of Computing, Volume 2, Issue 5, May 2010, ISSN 2151-9617.
[5] B.D. Payne, M. Carbone, M. Sharif, and W. Lee. Lares: An architecture for secure active monitoring using virtualization. Security and Privacy, IEEE Symposium , 0:233-247, 2008