Journal of Global Research in Computer Science (JGRCS)

Displaying 1-40 of 135 results

  • White Papers // Apr 2014

    Save and Secure Data on Clouds

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. In the cloud environment, resources are shared among all of the servers, users and individuals. So it is difficult for the cloud provider to ensure...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2014

    Detection and Prevention of Leaks in Anonymized Datasets

    With a wide spread of modern technology, person specific data dissemination has been increasing rapidly, leading to a global concern for preserving privacy of an individual. Several principles like k-anonymity, i-diversity etc., have been proposed to protect the person specific information during data publishing. However, the presence of dependencies in...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2014

    An Overview and Survey of Various Cloud Simulation Tools

    Cloud computing is a distributed kind of internet based computing in which the resources like infrastructure, platform, software etc are provided by the cloud service providers to the customers on their request on a pay per usage basis. Today, everybody is moving towards traditional computing towards cloud computing as it...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    A Survey on Cloud Model-Based Resource Sharing Security Issues From Multi Cloud Environment

    Cloud computing has emerged as a major trend in information and communication technology and has been proven as a key technology for the development and market analysis for multiple domain users. The practice of computing in two or more data centers separated by the Internet in popularity due to an...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Algebraic Operation in Fuzzy Object-Oriented Databases (FOODBS)

    In this paper, some algebraic operations are investigated based on a kind of fuzzy object-oriented database model. When extraction of data from conventional database is being performed with the algebraic operations. Such as projection, selection, join, union, intersection, cross/product, division, difference etc. To retrieve and manipulate data/information from fuzzy object...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Approach to Build a Web Crawler Using Clustering Based K-Means Algorithm

    Central to any data mining project is having sufficient amounts of data that can be processed to provide meaningful and statistically relevant information. But getting the unstructured data is only the initial stage and that data must be transformed into a structured format which is suitable for further processing. In...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2013

    Privacy Preserving Ranked Keyword Search Over Encrypted Cloud Data

    The authors present a scheme that discusses secure rank based keyword search over an encrypted cloud data. The data that has to be outsourced is encrypted using symmetric encryption algorithm for data confidentiality. The index file of the keyword set that has to be searched is outsourced to the local...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Cloud Computing Testing Backgrounds and Challenges Based on Its Environment

    Cloud computing is a rising platform of service computing designed for speedy and dynamic delivery of assured computing resources. Cloud computing has a solution which helps organizations to focus on their core business rather than concerning about the investment and maintenance of their IT infrastructure. Testing cloud applications has its...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Data Reduction Algorithm Based on Planar Surface Fitting

    Data reduction tools are developed and evaluated using a data analysis framework. Simple and intelligent thinning algorithms are applied to both synthetic and real data and the thinned datasets are ingested into an analysis system. A major problem of data reduction is that certain types of camera or scanner produce...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    An Efficient Model for Providing Security in Cloud Computing Environment

    In this paper, the authors present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. They also explain the fundamentals of sequential rule mining. They describe today's approaches for cloud security. From the broad...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Cloud Coverage Identification Using Satellite Data and K-Mean Clustering Algorithm

    In this paper, the authors study is to identify cloud coverage over the Thailand region by using satellite data and the k-mean clustering algorithm. The successful development software tools for k-mean unsupervised classification were based software ERDAS imagine using the ERDAS macro language and spatial modeling language. The clear rate...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    A Short Survey of Data Compression Techniques for Column Oriented Databases

    Column oriented data-stores has all values of a single column are stored as a row followed by all values of the next column. Such way of storing records helps in data compression since values of the same column are of the similar type and may repeat. This Paper surveys the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Maintaining Client Connectivity and Zero Failover Using Oracle Dataguard Grid Computing

    The data guard is best management monitoring tool provided by oracle to reduce the failover time when primary system goes down. Data guard helps in transferring the redo data files to the Standby site. Data guard maintains standby databases as transactional consistent copies of production database. When the primary system...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2013

    Efficiently Boosting in Wireless Sensor Network Using Adaptive Split and Merge Clustering Algorithm

    In this paper, the authors deal with a novel forwarding scheme for wireless sensor networks aimed at combining low computational complexity and high performance in terms of energy efficiency and reliability. This paper analyses the disadvantages of excessive clustering time because of the possible uneven cluster density. As a result,...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Secured and Dependable Storage in Cloud Computing Using Homomorphic

    Cloud storage allows users to remotely store their knowledge and revel in the on-demand top quality cloud applications while not the burden of native hardware and software system management. Although the advantages area unit clears, such a service is additionally relinquishing users' physical possession of their outsourced knowledge that inevitably...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    A Survey on Periodicity Detection in Time Series Database

    Research on periodic pattern mining has attained a great focus on nowadays. It is the problem that regards temporal regularity. There are many emerging applications in periodic pattern mining, including weather predictions, computer networks and biological data. The discovery of patterns with periodicity is of great importance and has been...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Multi Device Control With Vibration Detection in Cloud Computing Using Android

    Today, the authors are entering post-PC era where mobile devices are handling daily tasks. Several data shows that the uses of mobile devices are quickly taking over the Personal Computer (PC). Already existing local home automation allows users complete use of their automation system from within their home via a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Fast and Secure Handover in IEEE 802.16e Networks

    Wireless communication systems aim at supporting multimedia services with different Quality of Service (QoS) and bandwidth requirements. Effective management of limited resources is vital to enhance the network performance. Moreover, Mobile WiMAX should meet the expectations of mobile users to provide secured and seamless services. Lengthy delay due to the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    An Efficient Ranked Keyword Search for Effective Utilization of Outsourced Cloud Data

    Cloud computing becomes more widely prevailed storage for outsourced data which may contain more sensitive information such as credit card numbers, passwords, e-mails, personal health records etc. As the data owners cannot risk their unencrypted outsourced data so as the cloud servers. The cloud server may fail to keep up...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Bring Your Own Device (BYOD): Security Risks and Mitigating Strategies

    The growth of mobile technology, with regard to availability of 3G/4G services and devices like Smartphone's has created new phenomenon for communication and data processing ability to do business. One such phenomenon that has emerged in the business environment is BYOD (Bring Your Own Device), which means that employees use...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Image Segemntation Using Cluatering Technique Ans Swarm Intelliange

    Clustering analysis is an unsupervised learning technique which groups the similar items into one cluster and dissimilar items into another cluster. The clustering techniques are used to efficiently segment the MRI images. The clustering technique used is Fuzzy C Means (FCM). To improve the accuracy, Ant Colony Optimization (ACO) and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones

    As good mobile phones, as referred to as sensible phones, are becoming plenty of difficult and plenty of powerful to efficiently provide additional functionalities problems unit increasing concerning security threats against the sensible phone users. Since sensible phones use constant package style as in PCs, they are liable to similar...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Some Variants of K-Means Clustering With Emphasis on Image Segmentation

    Clustering is the computational task to partition a given input into subsets of equal characteristics. These subsets are usually called clusters and ideally consist of similar objects that are dissimilar to objects in other clusters. This way one can use clusters as a coarse representation of the data. The authors...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Consistency Management Strategies in Data Replication Using Ant Colony Optimization Method Over Mobile Peer to Peer Network

    A mobile peer-to-peer computer network is the one in which each computer in the network can act as a client or server for the other computers in the network. The communication process among the nodes in the mobile peer to peer network requires more no of messages. Due to this...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Study on Improving Challenges of Network With Cloudlets for Mobile Cloud Computing

    In this paper, the authors define the concept of combination of two technologies cloud computing and mobile computing that is Mobile Cloud Computing (MCC). Mobile Cloud Computing (MCC) can provide the benefit of both technologies. Cloud provides not only the storage capacity but also the power of computing, processing and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Performance Optimization Under a Virtualized Environment

    Virtualization technology has found a renewed interest owing to the need for cost-efficient operations, better manageability and increased availability of systems. The increased use of physical resources introduces new bottlenecks in performance. This paper proposes methods trying to eliminate these bottlenecks and achieve close to native performance for various guest...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2013

    Text Mining: Concepts, Process and Applications

    With the advancement of technology, more and more data is available in digital form. Among which, most of the data is in unstructured textual form. Text, so it has become essential to develop better techniques and algorithms to extract useful and interesting information from this large amount of textual data....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Detection and Prevention Routing Misbehaviour in OLSR Routing

    Mobile ad-hoc network are temporally network that form self controlled system with each node contain routing table but measure issue of that topology management of network because each node freely moves, the authors use OLSR (Optimal Link State Routing) that provide MANET route request flood and maintenance of routing but...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Cognitive Radio Network: Security Enhancements

    Reference to the latest developments the spectrum shortage problems are because of the wireless communication. For the future networks the most practical, scientific and systematic challenges is the use of licensed or unlicensed wireless networks with opportunistic use of the spectrum with, without and limited rules. Since different wireless networks...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Analysis of MITM Attack in Secure Simple Pairing

    In this paper, the authors explain on different types of MITM attacks, their consequences, techniques and solutions under different circumstances giving users options to choose one from various solutions. Man-In-The-Middle (MITM) attack is one of the primary techniques in computer based hacking. MITM attack can successfully invoke attacks such as...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2013

    Multimodal Biometric Authentication and Intrusion Detection in Mobile Ad Hoc Network

    Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security mobile ad hoc networks. Continuous user authentication is an important prevention-based approach to protect high security Mobile Ad-hoc NETworks (MANETs). Intrusion Detection Systems (IDSs) are also important in MANETs to effectively identify malicious activities. This paper presents...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2013

    Empowering Cloud Security Through SLA

    Cloud computing is a cumulative collection of technologies. It shares on-demand computing resources that are positioned and disposed efficiently. In spite of several benefits, numerous challenges are there such as data security, performance, data locking, access control, bandwidth costs, internet dependency, data confidentiality, auditability, application and availability. SLA (Service Level...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2012

    Trusted Cloud - A Solution for Cloud Cartography

    Cloud computing provides people a way to share large amount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. Cloud cartography could be used by...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2012

    An Approach for User Authentication One Time Password (Numeric and Graphical) Scheme

    Day by day number of Internet users increasing. Now people are using different online services provided by Banks, College/Schools, Hospitals, online utility bill payment and online shopping sites. To access online services Text-based authentication system is in use. The text-based authentication scheme faces some drawbacks with usability and security issues...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2012

    Web Mining and the Educational Domain

    The web now-a-days is a firmly established reality that offers unprecedented opportunities to education. Many modes of delivery of online learning exist, all providing accessibility to learning materials, facilitating communication among learners and tutors/peers, and possibly helping to improve the learning and teaching process. While using an online learning environment,...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2012

    Performance Evaluation of Multiviewpoint-Based Similarity Measure for Data Clustering

    Some cluster relationship has to be considered for all clustering methods surrounded by the data objects which will be applied on. There may be a similarity between a pair of objects which can be defined as a choice of explicitly or implicitly. In this paper, the authors introduce a novel...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2012

    An Overview on Physical Implementation of Secure ETL Workflow

    The preparation of data before their actual loading in the warehouse for further querying is necessary due to quality problems, incompatible schemata, and unnecessary parts of source data not relevant for the purposes of the warehouse. Extraction-Transformation-Loading (ETL) tools are pieces of software responsible for the extraction of data from...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2012

    An Improved Association Rule Mining With Fp Tree Using Positive and Negative Integration

    Construction and development of classifier that works with more accuracy and performs efficiently for large database is one of the key tasks of data mining techniques. Training dataset repeatedly produces massive amount of rules. It's very tough to store, retrieve, prune, and sort a huge number of rules proficiently before...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2012

    Comparative Study of Various Existing Security Scenarios in Cloud Computing Environment

    The advantage of cloud computing is ever lasting but it brings more issues including security, such as virtualization security, application security, identity management, access control and authentication. This paper focus on recent research pertaining to cloud security. This paper envisage on diverse security sphere parameters in cloud computing such as...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2012

    Efficient Searching for Geographical Data Gathering Using Knowledge Mining

    The people live in a mutual world. Perhaps, the most productive way of data collection is to recruit a large number of people for data entry. Internet provides a very powerful and adaptable medium to bring together such a large number of people. With this in mind, they have developed...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2012

    Cellular Automata Based Identification and Removal of Impulsive Noise From Corrupted Images

    Cellular Automata (CA) is a methodology that uses discrete space to represent the state of each element of a domain and this state can be changed according to a transition rule. Image noise is unwanted information of an image. Noise can occur during image capture, transmission or processing and it...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2012

    Fault Tolerance in Grid Computing Using Wade

    Grid computing is a coordinated resource sharing and solving the problems in organizations which are dynamic and virtual in nature. Apart from the dynamic nature of grids which means that resources may enter and leave the grid at any time, in many cases outside of the applications, control grid resources...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2012

    Enhancement of RC6 (RC6_EN) Block Cipher Algorithm and Comparison With RC5 & RC6

    In cryptography, the use of the symmetric key encryption is common to ensure data integrity. Symmetric key encryption code can be divided into the block cipher and stream one. RC6 is a symmetric key block cipher derived from RC5. It was designed by Ron Rivest, Matt Robshaw, Ray Sidney and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2012

    E-Learning Methodologies and Its Trends in Modern Information Technology

    E-learning is a technology that plays a major role in modern information technology. The e-learning content can be stored, searched, retrieved and assembled in order to provide learning just in time. E-learning is now an integral part in education and training as the learning materials are now available in internet...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2012

    Low Power Encrypted MIPS Processor Based on AES Algorithm

    The paper describes the Low power 32-bit encrypted MIPS processor based on AES algorithm and MIPS pipeline architecture. The pipeline stages of MIPS processor are arranged in such a way that pipeline can be clocked at high frequency and clock gating technique is used for reducing power consumption. Encryption blocks...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2012

    A UML Model for Measuring the Performance of Students Using Object Oriented Approach

    Now-a-days, most of the universities and schools are facing problems to check the performance of the student during or at end of the course. Because the universities and schools are time bounded and due to that there is a current need to get a model that helps to check the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2012

    Multi Agent Based Approach for Network Intrusion Detection Using Data Mining Concept

    Data mining refers to extracting or "Mining" useful data from large amounts of data. Due to the wide availability of huge amount of useful information and knowledge, data mining can be used for market analysis, fraud detection and customer retention. Network intrusion detection system is used to detect any intruder...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2012

    Image Steganography Using Least Significant Bit With Cryptography

    To increase the security of messages sent over the internet steganography is used. This paper discussed a technique based on the LSB(Least Significant Bit) and a new encryption algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2012

    A New Metrics for Predicting Network Security Level

    In this paper, the authors propose a new metrics for predicting network security level. The proposed metrics are based on the existence of vulnerabilities in the network. The proposed metrics are Non Exploited Vulnerability Percentage (NEVP) metric, Non Vulnerable Host Percentage (NVHP) metric and Coefficient of Network Security Level (CNSL)...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2012

    An Overview of Bluetooth Security: Issues and Challenges

    Bluetooth is a low cost, short range and low power radio technology, which is used to connect the devices such as mobile phone handsets, portable computers etc to each other without cables or any other physical medium. Bluetooth technology is used primarily to establish Wireless Personal Area Networks (WPAN). In...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2012

    Vehicular Ad Hoc Networks

    Vehicular ad hoc network is one of the most interesting research areas due to low cost, flexibility, fault tolerance, high sensing fidelity, creating many new and exciting application areas for remote sensing. So, it has emerged as a promising tool for monitoring the physical world with wireless sensor that can...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2012

    Optimized Approach for Provisioning VPN in the Hose Model With QoS

    Virtual private networks provide an encrypted connection between a user's distributed sites over a public network. Existing studies on quality of service deals with bandwidth in hose model. In this paper an Enhanced Hose model is used to specify the bandwidth and link utilization between the end points. The authors...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2012

    A Review on Hierarchical Cluster Based Routing in Wireless Sensor Networks

    The use of Wireless Sensor Networks (WSNs) is expected to bring enormous changes in data gathering, data processing and data dissemination for different applications and environments. The network life for wireless sensor network plays an important role in survivability. Energy efficiency is one of the critical concerns for wireless sensor...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2012

    Windows and Linux Operating Systems From a Security Perspective

    Operating systems are vital system software that, without them, humans would not be able to manage and use computer systems. In essence, an operating system is a collection of software programs whose role is to manage computer resources and provide an interface for client applications to interact with the different...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2012

    A Survey-Classifier Fusion

    A number of classifier fusion methods have been recently developed opening an alternative approach leading to a potential improvement in the classification performance. As there is little theory of information fusion itself, currently the authors are faced with different methods designed for different problems and producing different results. This paper...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Management Language Specifications for Digital Ecosystems

    This paper defines the specifications of a management language intended to automate the control and administration of various service components connected to a digital ecosystem. It is called EML short for Ecosystem Management Language and it is based on proprietary syntax and notation and contains a set of managerial commands...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    A Case Study on Design and Evaluation of Modified Adaptive Fuzzy Pid Controller

    Most of process control systems are based on PID controllers, because of their remarkable effectiveness, simplicity and robustness, As PID controller design theory and practical procedures are well developed, it is necessary to pay attention on fuzzy logic controller design and its applications in combinations with PID controllers. There is...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Study and Provising of Network Traffic Based on Markov Model in Cloud Environment

    The Cloud Computing is latest new computing paradigm where applications are provided across dynamic and geographically dispersed organization. The accurate modelling and simulation of flow of processes in cloud environment is an essential part of service level architecture. In this paper, an analytical model has been developed for identifying the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    An Insight Overview of Issues and Challenges in Vehicular Adhoc Network

    Vehicular Ad hoc Networks is a kind of special wireless ad hoc network, which has the characteristics of high node mobility and fast topology changes. The Vehicular Networks can provide wide variety of services, range from safety-related warning systems to improved navigation mechanisms as well as information and entertainment applications....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Enhanced Version of Growth Model in Web Based Software Reliability Engineering

    The task of improving software reliability for large systems is becoming more difficult due to the highly-distributed nature of current products, and their deployment on dissimilar platforms with complex service functionalities. This coupled with increasing software complexities and large software size requires a very different approach in assessing software reliability....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Virtualization Techniques & Technologies: State-of-the-Art

    Today virtualization is not just a possibility but it is becoming mainstream in data centers across the business world. Virtualization technology is popular today for hosting Internet and cloud-based computer services. Technology is evolving at a rapid rate and virtualization is no longer just about consolidation and cost savings, It...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2012

    Moving Towards SAN Storage: An Enterprise Perspective

    One of the major components of any enterprise IT infrastructure is data storage. There has been continuous effort to explore new storage technologies to improve performance with respect to input/output operations, data availability, consolidation of storage assets and data protection and archiving. Storage has moved from the traditional Direct Attached...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2012

    Maintainability Assessment of Web Based Application

    Many World Wide Web (WWW) application incorporate important business assets and after a convenient way for business to promote their services through internet. Many web applications have evolved from simple HTML page to complex application, some are evolved from different web technologies that have a high maintenances cost. As during...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    An Improved Round Robin CPU Scheduling Algorithm

    One of the most important components of the computer resource is the CPU. CPU scheduling involves a careful examination of pending processes to determine the most efficient way to service the requests. CPU scheduling is the basis of multi-programmed operating systems. Most CPU scheduling algorithms concentrate on maximizing CPU utilization...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    An Efficient and Effective Ranking on Spatial Data by Quality Preferences

    A spatial preference query ranks objects based on the qualities of features in their spatial neighborhood. For example, consider a road network database with available paths for two points. A customer may want to rank the paths with respect to their distance defined after aggregating the qualities of other features...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    Enhancing Security by Broadening Nymble System in Anonymizing Networks

    This paper presents Nymble, a system in which servers can blacklist misbehaving users, thereby blocking users without compromising their anonymity. The authors' system is thus agnostic to different servers' definitions of misbehavior servers can blacklist users for whatever reason, and the privacy of blacklisted users is maintained. In pseudonymous credential...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    Information Retrieval Using Indexing Scheme for Tree Pattern Framework

    Indexing an XML database in data warehouse is a complex problem. The major rationale for indexing XML database in data warehouse is owing to the heterogeneous and structural environment of XML data that can construct query pattern tedious. Existing techniques focused on clustering methods based on integrating the data warehouse...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    An Effective Analysis of Spatial Data Mining Methods Using Range Queries

    This paper reviews the data mining methods that are combined with Geographic Information Systems (GIS) for carrying out spatial analysis of geographic data. The authors will first look at data mining functions as applied to such data and then highlight their specificity compared with their application to classical data. They...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    A Detail Review on Energy Efficient Fault-Tolerance-Techniques and Related Issues in WSNs

    In this paper, the authors give a survey on various fault tolerance techniques and related issues in distributed systems and WSNs. More specially speaking, they explain about two most important issues; multiple fault handling capability and performance. This survey provides the related research results and also explored the future directions...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    Cluster Detection Using GA-KNN Conjunction Approach

    This paper provides insights into data mining solution for mining customer's information from customer opt-in database of mCRM. The basis of approach is to use a K nearest neighbor algorithm to learn how to classify samples within different clusters of interest. Therefore a new approach using Genetic Algorithm is followed...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    Design of Rectangular Patch Antenna Using MLP Artificial Neural Network

    This paper presents the designing of a rectangular microstrip antenna using Multi Layer Preceptron (MLP) neural network model. The model was trained for 40 set of input-output (length of patch-resonant frequency) parameters. The output error and time delay (no. of epochs) were optimized by changing the learning rate and momentum...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    OPTIMIZED GENETIC ALGORITHM FOR SPATIAL DATA EVENTS IN ACTIVE DATA WAREHOUSE

    A fast changing in dynamic heterogeneous environment makes the data to be maintained up-to-date. Due to enormous amount and composite formation of spatial data, the optimization of spatial query is a complex process and significant from research viewpoints. Numerous programming techniques and methods are being presented to optimize the solutions...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    Defence Against Man in Middle Attack in Secure Simple Pairing

    Secure simple pairing has been adopted by Bluetooth version "Bluetooth 2.1+EDR (Enhanced Data Rate). It should be noted that for establishing Bluetooth connection that uses Diffie hellman public cryptography in its communication, SSP is a secure method. But it is still prone to attack regardless of the high security mechanism...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    Some Observation on Maintainability Metrics and Models for Web Based Software System

    Many web applications have evolved from simple HTML pages to complex applications that have a high maintenance cost. This high maintenance cost is due to the heterogeneity of web applications, to fast Internet evolution and the fast-moving market which imposes short development cycles and frequent modifications. In order to control...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    Classification and Comparative Study of Data Mining Classifiers With Feature Selection on Binomial Data Set

    This paper describes about the performance analysis of different data mining classifiers before and after feature selection on binomial data set. Three data mining classifiers Logistic Regression, SVM and Neural Network classifiers are considered in this paper for classification. The Congressional Voting Records data set is a binomial data set...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    A Review of Energy Efficient Routing Protocols for Mobile Ad-Hoc Network

    This paper presents a thorough survey of recent work addressing energy efficient routing protocols in Mobile Ad hoc NETworks (MANETs). There are so many issues and solutions which witness the need of energy management in ad hoc wireless networks. The objective of a routing protocol for MANETs is to support...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    A Java Based Tool for Basic Image Processing and Edge Detection

    Edge detection is of fundamental importance of image processing. It is the foundation of image comparison, forgery detection, image detection etc. In this paper, a tool has been developed for basic image processing viz. scaling, histogram analysis and edge detection. The tool is developed in Java language. To reduce the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    Defending Against Web Vulnerabilities and Cross-Site Scripting

    Researchers have devised multiple solutions to cross-site scripting, but vulnerabilities persists in many Web applications due to developer's lack of expertise in the problem identification and their unfamiliarity with the current mechanisms. As proclaimed by the experts, cross-site scripting is among the serious and widespread threats in Web applications these...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    Autonomic Computing: A Long Term Vision in Computing

    Autonomic computing is generally considered to be a term first used by IBM in 2001 to describe computing systems that are said to be self-managing. IBM has defined four basic properties for autonomic systems. These properties are Self-CHOP (Self-Configuration, Self-Healing, Self-Optimization and Self-Protection). However the concept of self-management and adaptation...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2012

    Initial Concept How to Design a Software Requirement Identification Model

    Standard does not purport to address all safety problems associated with its use or all applicable regulatory requirements. It is the responsibility of the user of this standard to establish appropriate safety and health practices and determine the applicability of regulatory limitation before use. The authors design pre and post...

    Provided By Journal of Global Research in Computer Science (JGRCS)