Botho College

Displaying 1-4 of 4 results

  • White Papers // Sep 2012

    Optimum Course Association Method With Cloud Service Orchestration

    Finest Trail Setup Technique in Cloud Ambience proposes a fuzzy logic based SVM approach to secure a collision free path avoiding multiple dynamic obstacles. The navigator consists of an FSVM -Based Collision Avoidance. The decisions are taken at each step for the providers & consumers to negotiate without collision. Fuzzy-SVM...

    Provided By Botho College

  • White Papers // Jan 2012

    Malicious Attacks Detection in Wireless Ad Hoc Networks by Using SNDP Protocol

    In this paper to detect the Stealthy Attacks such as misrouting, power control, identity delegation, and colluding collision. Those kinds of attacks easily launched against multi-hop wireless ad hoc networks. When every the source and destination are communicate, to appear Stealthy Attacks and dropping or interrupt the packet from reaching...

    Provided By Botho College

  • White Papers // Jan 2012

    Detecting the Intrusion in Relational Database and Responding the System

    It is responsible for the intrusion response component of an entire intrusion detection system to give an appropriate response to an anomalous request. A notion of database response policies have been proposed in order to support the intrusion response system adopted for a DataBase Management System (DBMS). Based up on...

    Provided By Botho College

  • White Papers // Feb 2011

    Eigen Trust Algorithm for Resource Selection in Grid Computing

    Grid computing is an enhanced form of distributed computing where the resources are shared among the heterogeneous resources. The primary goal grid computing is to reduce the overall elapsed processing time while leveraging existing hardware. A grid computing system is a geographically distributed system with different domains, sharing resources. Security...

    Provided By Botho College

  • White Papers // Feb 2011

    Eigen Trust Algorithm for Resource Selection in Grid Computing

    Grid computing is an enhanced form of distributed computing where the resources are shared among the heterogeneous resources. The primary goal grid computing is to reduce the overall elapsed processing time while leveraging existing hardware. A grid computing system is a geographically distributed system with different domains, sharing resources. Security...

    Provided By Botho College

  • White Papers // Jan 2012

    Malicious Attacks Detection in Wireless Ad Hoc Networks by Using SNDP Protocol

    In this paper to detect the Stealthy Attacks such as misrouting, power control, identity delegation, and colluding collision. Those kinds of attacks easily launched against multi-hop wireless ad hoc networks. When every the source and destination are communicate, to appear Stealthy Attacks and dropping or interrupt the packet from reaching...

    Provided By Botho College

  • White Papers // Jan 2012

    Detecting the Intrusion in Relational Database and Responding the System

    It is responsible for the intrusion response component of an entire intrusion detection system to give an appropriate response to an anomalous request. A notion of database response policies have been proposed in order to support the intrusion response system adopted for a DataBase Management System (DBMS). Based up on...

    Provided By Botho College

  • White Papers // Sep 2012

    Optimum Course Association Method With Cloud Service Orchestration

    Finest Trail Setup Technique in Cloud Ambience proposes a fuzzy logic based SVM approach to secure a collision free path avoiding multiple dynamic obstacles. The navigator consists of an FSVM -Based Collision Avoidance. The decisions are taken at each step for the providers & consumers to negotiate without collision. Fuzzy-SVM...

    Provided By Botho College