Journal of Global Research in Computer Science (JGRCS)

Displaying 1-40 of 167 results

  • White Papers // Oct 2014

    DSA Security Enhancement Through Efficient Nonce Generation

    The Digital Signature Algorithm (DSA) has become the de facto standard for authentication of transacting entities since its inception as a standard by NIST. An integral part of the signing process in DSA is the generation of a random number called a nonce or an ephemeral key. If sufficient caution...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2014

    Cloud Computing Issues for Real Time OS

    Cloud computing is important field in the area of pervasive computing. Pervasive computing deal with use of various machines all around the human centric environment. In this paper, the authors try to analyze how real time operating systems can put on cloud computing environment. In this paper, they place pointers...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2014

    Save and Secure Data on Clouds

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. In the cloud environment, resources are shared among all of the servers, users and individuals. So it is difficult for the cloud provider to ensure...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2014

    Detection and Prevention of Leaks in Anonymized Datasets

    With a wide spread of modern technology, person specific data dissemination has been increasing rapidly, leading to a global concern for preserving privacy of an individual. Several principles like k-anonymity, i-diversity etc., have been proposed to protect the person specific information during data publishing. However, the presence of dependencies in...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2014

    Software Security Testing a Pertinent Framework

    Different surveys point toward that over the past several years' software security has raised its precedence for many software organizations. Software security testing is upgraded with the help of security attributes, security models, testing tools and most importantly test case used in testing. Software security testing was once considered a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2014

    An Overview and Survey of Various Cloud Simulation Tools

    Cloud computing is a distributed kind of internet based computing in which the resources like infrastructure, platform, software etc are provided by the cloud service providers to the customers on their request on a pay per usage basis. Today, everybody is moving towards traditional computing towards cloud computing as it...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Approach to Build a Web Crawler Using Clustering Based K-Means Algorithm

    Central to any data mining project is having sufficient amounts of data that can be processed to provide meaningful and statistically relevant information. But getting the unstructured data is only the initial stage and that data must be transformed into a structured format which is suitable for further processing. In...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Algebraic Operation in Fuzzy Object-Oriented Databases (FOODBS)

    In this paper, some algebraic operations are investigated based on a kind of fuzzy object-oriented database model. When extraction of data from conventional database is being performed with the algebraic operations. Such as projection, selection, join, union, intersection, cross/product, division, difference etc. To retrieve and manipulate data/information from fuzzy object...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    A Survey on Cloud Model-Based Resource Sharing Security Issues From Multi Cloud Environment

    Cloud computing has emerged as a major trend in information and communication technology and has been proven as a key technology for the development and market analysis for multiple domain users. The practice of computing in two or more data centers separated by the Internet in popularity due to an...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2013

    Privacy Preserving Ranked Keyword Search Over Encrypted Cloud Data

    The authors present a scheme that discusses secure rank based keyword search over an encrypted cloud data. The data that has to be outsourced is encrypted using symmetric encryption algorithm for data confidentiality. The index file of the keyword set that has to be searched is outsourced to the local...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Data Reduction Algorithm Based on Planar Surface Fitting

    Data reduction tools are developed and evaluated using a data analysis framework. Simple and intelligent thinning algorithms are applied to both synthetic and real data and the thinned datasets are ingested into an analysis system. A major problem of data reduction is that certain types of camera or scanner produce...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Cloud Computing Testing Backgrounds and Challenges Based on Its Environment

    Cloud computing is a rising platform of service computing designed for speedy and dynamic delivery of assured computing resources. Cloud computing has a solution which helps organizations to focus on their core business rather than concerning about the investment and maintenance of their IT infrastructure. Testing cloud applications has its...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2013

    Study and Performance Estimation of Routing Protocols MANET

    A Mobile Ad-hoc NETwork (MANET) consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. In mobile communications, effective internetworking is mandatory in order to...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Maintaining Client Connectivity and Zero Failover Using Oracle Dataguard Grid Computing

    The data guard is best management monitoring tool provided by oracle to reduce the failover time when primary system goes down. Data guard helps in transferring the redo data files to the Standby site. Data guard maintains standby databases as transactional consistent copies of production database. When the primary system...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Cloud Coverage Identification Using Satellite Data and K-Mean Clustering Algorithm

    In this paper, the authors study is to identify cloud coverage over the Thailand region by using satellite data and the k-mean clustering algorithm. The successful development software tools for k-mean unsupervised classification were based software ERDAS imagine using the ERDAS macro language and spatial modeling language. The clear rate...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    A Short Survey of Data Compression Techniques for Column Oriented Databases

    Column oriented data-stores has all values of a single column are stored as a row followed by all values of the next column. Such way of storing records helps in data compression since values of the same column are of the similar type and may repeat. This Paper surveys the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    An Efficient Model for Providing Security in Cloud Computing Environment

    In this paper, the authors present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. They also explain the fundamentals of sequential rule mining. They describe today's approaches for cloud security. From the broad...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2013

    Efficiently Boosting in Wireless Sensor Network Using Adaptive Split and Merge Clustering Algorithm

    In this paper, the authors deal with a novel forwarding scheme for wireless sensor networks aimed at combining low computational complexity and high performance in terms of energy efficiency and reliability. This paper analyses the disadvantages of excessive clustering time because of the possible uneven cluster density. As a result,...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Secured and Dependable Storage in Cloud Computing Using Homomorphic

    Cloud storage allows users to remotely store their knowledge and revel in the on-demand top quality cloud applications while not the burden of native hardware and software system management. Although the advantages area unit clears, such a service is additionally relinquishing users' physical possession of their outsourced knowledge that inevitably...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Multi Device Control With Vibration Detection in Cloud Computing Using Android

    Today, the authors are entering post-PC era where mobile devices are handling daily tasks. Several data shows that the uses of mobile devices are quickly taking over the Personal Computer (PC). Already existing local home automation allows users complete use of their automation system from within their home via a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    A Survey on Periodicity Detection in Time Series Database

    Research on periodic pattern mining has attained a great focus on nowadays. It is the problem that regards temporal regularity. There are many emerging applications in periodic pattern mining, including weather predictions, computer networks and biological data. The discovery of patterns with periodicity is of great importance and has been...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    A Systematic Review of Cost Estimation Models

    Software estimation models should support managerial decision making in software projects. Software cost estimation is the process of predicting the cost and effort required to develop a software system. Many estimation models have been proposed over the last twenty to thirty years. Many software companies track and analyze project performance...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Performance Optimization Under a Virtualized Environment

    Virtualization technology has found a renewed interest owing to the need for cost-efficient operations, better manageability and increased availability of systems. The increased use of physical resources introduces new bottlenecks in performance. This paper proposes methods trying to eliminate these bottlenecks and achieve close to native performance for various guest...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Study on Improving Challenges of Network With Cloudlets for Mobile Cloud Computing

    In this paper, the authors define the concept of combination of two technologies cloud computing and mobile computing that is Mobile Cloud Computing (MCC). Mobile Cloud Computing (MCC) can provide the benefit of both technologies. Cloud provides not only the storage capacity but also the power of computing, processing and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Some Variants of K-Means Clustering With Emphasis on Image Segmentation

    Clustering is the computational task to partition a given input into subsets of equal characteristics. These subsets are usually called clusters and ideally consist of similar objects that are dissimilar to objects in other clusters. This way one can use clusters as a coarse representation of the data. The authors...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Consistency Management Strategies in Data Replication Using Ant Colony Optimization Method Over Mobile Peer to Peer Network

    A mobile peer-to-peer computer network is the one in which each computer in the network can act as a client or server for the other computers in the network. The communication process among the nodes in the mobile peer to peer network requires more no of messages. Due to this...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Image Segemntation Using Cluatering Technique Ans Swarm Intelliange

    Clustering analysis is an unsupervised learning technique which groups the similar items into one cluster and dissimilar items into another cluster. The clustering techniques are used to efficiently segment the MRI images. The clustering technique used is Fuzzy C Means (FCM). To improve the accuracy, Ant Colony Optimization (ACO) and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones

    As good mobile phones, as referred to as sensible phones, are becoming plenty of difficult and plenty of powerful to efficiently provide additional functionalities problems unit increasing concerning security threats against the sensible phone users. Since sensible phones use constant package style as in PCs, they are liable to similar...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Fast and Secure Handover in IEEE 802.16e Networks

    Wireless communication systems aim at supporting multimedia services with different Quality of Service (QoS) and bandwidth requirements. Effective management of limited resources is vital to enhance the network performance. Moreover, Mobile WiMAX should meet the expectations of mobile users to provide secured and seamless services. Lengthy delay due to the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    An Efficient Ranked Keyword Search for Effective Utilization of Outsourced Cloud Data

    Cloud computing becomes more widely prevailed storage for outsourced data which may contain more sensitive information such as credit card numbers, passwords, e-mails, personal health records etc. As the data owners cannot risk their unencrypted outsourced data so as the cloud servers. The cloud server may fail to keep up...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Bring Your Own Device (BYOD): Security Risks and Mitigating Strategies

    The growth of mobile technology, with regard to availability of 3G/4G services and devices like Smartphone's has created new phenomenon for communication and data processing ability to do business. One such phenomenon that has emerged in the business environment is BYOD (Bring Your Own Device), which means that employees use...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Concept of Data Transfer Via Bluetooth in Pen Drive

    With diversification of systems and their operating environment, sometimes it becomes impossible at the 11th hour to transfer data from one system to another. Due to this limitation often need is felt of transferring data wireless between the two systems not having proper channel for communications. This can be done...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Wireless Home and Industrial Automation Security System Using GSM

    Security and automation is a prime concern in the people day-to-day life. The approach to home and industrial automation and security system design is almost standardized nowadays. In this paper, the authors have tried to increase these standards by combining new design techniques and developed a low cost home and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2013

    Text Mining: Concepts, Process and Applications

    With the advancement of technology, more and more data is available in digital form. Among which, most of the data is in unstructured textual form. Text, so it has become essential to develop better techniques and algorithms to extract useful and interesting information from this large amount of textual data....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Detection and Prevention Routing Misbehaviour in OLSR Routing

    Mobile ad-hoc network are temporally network that form self controlled system with each node contain routing table but measure issue of that topology management of network because each node freely moves, the authors use OLSR (Optimal Link State Routing) that provide MANET route request flood and maintenance of routing but...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Analysis of MITM Attack in Secure Simple Pairing

    In this paper, the authors explain on different types of MITM attacks, their consequences, techniques and solutions under different circumstances giving users options to choose one from various solutions. Man-In-The-Middle (MITM) attack is one of the primary techniques in computer based hacking. MITM attack can successfully invoke attacks such as...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Cognitive Radio Network: Security Enhancements

    Reference to the latest developments the spectrum shortage problems are because of the wireless communication. For the future networks the most practical, scientific and systematic challenges is the use of licensed or unlicensed wireless networks with opportunistic use of the spectrum with, without and limited rules. Since different wireless networks...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2013

    Empowering Cloud Security Through SLA

    Cloud computing is a cumulative collection of technologies. It shares on-demand computing resources that are positioned and disposed efficiently. In spite of several benefits, numerous challenges are there such as data security, performance, data locking, access control, bandwidth costs, internet dependency, data confidentiality, auditability, application and availability. SLA (Service Level...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2013

    Multimodal Biometric Authentication and Intrusion Detection in Mobile Ad Hoc Network

    Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security mobile ad hoc networks. Continuous user authentication is an important prevention-based approach to protect high security Mobile Ad-hoc NETworks (MANETs). Intrusion Detection Systems (IDSs) are also important in MANETs to effectively identify malicious activities. This paper presents...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2012

    Study and Analysis of Automation Testing Techniques

    Testing is a very important activity in software development process. It is to examine & modify source code. Effective testing produces high quality software. This paper deals with a significant and vital issue of software testing. Testing can be conducted manually as well as automated. These techniques have their own...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2012

    An Improved Association Rule Mining With Fp Tree Using Positive and Negative Integration

    Construction and development of classifier that works with more accuracy and performs efficiently for large database is one of the key tasks of data mining techniques. Training dataset repeatedly produces massive amount of rules. It's very tough to store, retrieve, prune, and sort a huge number of rules proficiently before...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2012

    Efficient Searching for Geographical Data Gathering Using Knowledge Mining

    The people live in a mutual world. Perhaps, the most productive way of data collection is to recruit a large number of people for data entry. Internet provides a very powerful and adaptable medium to bring together such a large number of people. With this in mind, they have developed...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2012

    Comparative Study of Various Existing Security Scenarios in Cloud Computing Environment

    The advantage of cloud computing is ever lasting but it brings more issues including security, such as virtualization security, application security, identity management, access control and authentication. This paper focus on recent research pertaining to cloud security. This paper envisage on diverse security sphere parameters in cloud computing such as...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2013

    Efficiently Boosting in Wireless Sensor Network Using Adaptive Split and Merge Clustering Algorithm

    In this paper, the authors deal with a novel forwarding scheme for wireless sensor networks aimed at combining low computational complexity and high performance in terms of energy efficiency and reliability. This paper analyses the disadvantages of excessive clustering time because of the possible uneven cluster density. As a result,...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Multi Device Control With Vibration Detection in Cloud Computing Using Android

    Today, the authors are entering post-PC era where mobile devices are handling daily tasks. Several data shows that the uses of mobile devices are quickly taking over the Personal Computer (PC). Already existing local home automation allows users complete use of their automation system from within their home via a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    A Survey on Periodicity Detection in Time Series Database

    Research on periodic pattern mining has attained a great focus on nowadays. It is the problem that regards temporal regularity. There are many emerging applications in periodic pattern mining, including weather predictions, computer networks and biological data. The discovery of patterns with periodicity is of great importance and has been...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Performance Optimization Under a Virtualized Environment

    Virtualization technology has found a renewed interest owing to the need for cost-efficient operations, better manageability and increased availability of systems. The increased use of physical resources introduces new bottlenecks in performance. This paper proposes methods trying to eliminate these bottlenecks and achieve close to native performance for various guest...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Secured and Dependable Storage in Cloud Computing Using Homomorphic

    Cloud storage allows users to remotely store their knowledge and revel in the on-demand top quality cloud applications while not the burden of native hardware and software system management. Although the advantages area unit clears, such a service is additionally relinquishing users' physical possession of their outsourced knowledge that inevitably...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Study on Improving Challenges of Network With Cloudlets for Mobile Cloud Computing

    In this paper, the authors define the concept of combination of two technologies cloud computing and mobile computing that is Mobile Cloud Computing (MCC). Mobile Cloud Computing (MCC) can provide the benefit of both technologies. Cloud provides not only the storage capacity but also the power of computing, processing and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Some Variants of K-Means Clustering With Emphasis on Image Segmentation

    Clustering is the computational task to partition a given input into subsets of equal characteristics. These subsets are usually called clusters and ideally consist of similar objects that are dissimilar to objects in other clusters. This way one can use clusters as a coarse representation of the data. The authors...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Consistency Management Strategies in Data Replication Using Ant Colony Optimization Method Over Mobile Peer to Peer Network

    A mobile peer-to-peer computer network is the one in which each computer in the network can act as a client or server for the other computers in the network. The communication process among the nodes in the mobile peer to peer network requires more no of messages. Due to this...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Image Segemntation Using Cluatering Technique Ans Swarm Intelliange

    Clustering analysis is an unsupervised learning technique which groups the similar items into one cluster and dissimilar items into another cluster. The clustering techniques are used to efficiently segment the MRI images. The clustering technique used is Fuzzy C Means (FCM). To improve the accuracy, Ant Colony Optimization (ACO) and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones

    As good mobile phones, as referred to as sensible phones, are becoming plenty of difficult and plenty of powerful to efficiently provide additional functionalities problems unit increasing concerning security threats against the sensible phone users. Since sensible phones use constant package style as in PCs, they are liable to similar...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2013

    Text Mining: Concepts, Process and Applications

    With the advancement of technology, more and more data is available in digital form. Among which, most of the data is in unstructured textual form. Text, so it has become essential to develop better techniques and algorithms to extract useful and interesting information from this large amount of textual data....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2012

    Performance Evaluation of Multiviewpoint-Based Similarity Measure for Data Clustering

    Some cluster relationship has to be considered for all clustering methods surrounded by the data objects which will be applied on. There may be a similarity between a pair of objects which can be defined as a choice of explicitly or implicitly. In this paper, the authors introduce a novel...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2012

    Web Mining and the Educational Domain

    The web now-a-days is a firmly established reality that offers unprecedented opportunities to education. Many modes of delivery of online learning exist, all providing accessibility to learning materials, facilitating communication among learners and tutors/peers, and possibly helping to improve the learning and teaching process. While using an online learning environment,...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2014

    Save and Secure Data on Clouds

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. In the cloud environment, resources are shared among all of the servers, users and individuals. So it is difficult for the cloud provider to ensure...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2014

    Detection and Prevention of Leaks in Anonymized Datasets

    With a wide spread of modern technology, person specific data dissemination has been increasing rapidly, leading to a global concern for preserving privacy of an individual. Several principles like k-anonymity, i-diversity etc., have been proposed to protect the person specific information during data publishing. However, the presence of dependencies in...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2014

    An Overview and Survey of Various Cloud Simulation Tools

    Cloud computing is a distributed kind of internet based computing in which the resources like infrastructure, platform, software etc are provided by the cloud service providers to the customers on their request on a pay per usage basis. Today, everybody is moving towards traditional computing towards cloud computing as it...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Approach to Build a Web Crawler Using Clustering Based K-Means Algorithm

    Central to any data mining project is having sufficient amounts of data that can be processed to provide meaningful and statistically relevant information. But getting the unstructured data is only the initial stage and that data must be transformed into a structured format which is suitable for further processing. In...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Algebraic Operation in Fuzzy Object-Oriented Databases (FOODBS)

    In this paper, some algebraic operations are investigated based on a kind of fuzzy object-oriented database model. When extraction of data from conventional database is being performed with the algebraic operations. Such as projection, selection, join, union, intersection, cross/product, division, difference etc. To retrieve and manipulate data/information from fuzzy object...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    A Survey on Cloud Model-Based Resource Sharing Security Issues From Multi Cloud Environment

    Cloud computing has emerged as a major trend in information and communication technology and has been proven as a key technology for the development and market analysis for multiple domain users. The practice of computing in two or more data centers separated by the Internet in popularity due to an...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Data Reduction Algorithm Based on Planar Surface Fitting

    Data reduction tools are developed and evaluated using a data analysis framework. Simple and intelligent thinning algorithms are applied to both synthetic and real data and the thinned datasets are ingested into an analysis system. A major problem of data reduction is that certain types of camera or scanner produce...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Cloud Computing Testing Backgrounds and Challenges Based on Its Environment

    Cloud computing is a rising platform of service computing designed for speedy and dynamic delivery of assured computing resources. Cloud computing has a solution which helps organizations to focus on their core business rather than concerning about the investment and maintenance of their IT infrastructure. Testing cloud applications has its...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Maintaining Client Connectivity and Zero Failover Using Oracle Dataguard Grid Computing

    The data guard is best management monitoring tool provided by oracle to reduce the failover time when primary system goes down. Data guard helps in transferring the redo data files to the Standby site. Data guard maintains standby databases as transactional consistent copies of production database. When the primary system...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Cloud Coverage Identification Using Satellite Data and K-Mean Clustering Algorithm

    In this paper, the authors study is to identify cloud coverage over the Thailand region by using satellite data and the k-mean clustering algorithm. The successful development software tools for k-mean unsupervised classification were based software ERDAS imagine using the ERDAS macro language and spatial modeling language. The clear rate...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    A Short Survey of Data Compression Techniques for Column Oriented Databases

    Column oriented data-stores has all values of a single column are stored as a row followed by all values of the next column. Such way of storing records helps in data compression since values of the same column are of the similar type and may repeat. This Paper surveys the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Management Language Specifications for Digital Ecosystems

    This paper defines the specifications of a management language intended to automate the control and administration of various service components connected to a digital ecosystem. It is called EML short for Ecosystem Management Language and it is based on proprietary syntax and notation and contains a set of managerial commands...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    A Case Study on Design and Evaluation of Modified Adaptive Fuzzy Pid Controller

    Most of process control systems are based on PID controllers, because of their remarkable effectiveness, simplicity and robustness, As PID controller design theory and practical procedures are well developed, it is necessary to pay attention on fuzzy logic controller design and its applications in combinations with PID controllers. There is...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Study and Provising of Network Traffic Based on Markov Model in Cloud Environment

    The Cloud Computing is latest new computing paradigm where applications are provided across dynamic and geographically dispersed organization. The accurate modelling and simulation of flow of processes in cloud environment is an essential part of service level architecture. In this paper, an analytical model has been developed for identifying the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    An Insight Overview of Issues and Challenges in Vehicular Adhoc Network

    Vehicular Ad hoc Networks is a kind of special wireless ad hoc network, which has the characteristics of high node mobility and fast topology changes. The Vehicular Networks can provide wide variety of services, range from safety-related warning systems to improved navigation mechanisms as well as information and entertainment applications....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Enhanced Version of Growth Model in Web Based Software Reliability Engineering

    The task of improving software reliability for large systems is becoming more difficult due to the highly-distributed nature of current products, and their deployment on dissimilar platforms with complex service functionalities. This coupled with increasing software complexities and large software size requires a very different approach in assessing software reliability....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Virtualization Techniques & Technologies: State-of-the-Art

    Today virtualization is not just a possibility but it is becoming mainstream in data centers across the business world. Virtualization technology is popular today for hosting Internet and cloud-based computer services. Technology is evolving at a rapid rate and virtualization is no longer just about consolidation and cost savings, It...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    QoS Oriented Reservation Based Routing Mechanism for Wireless Ad-Hoc Networks

    As wireless communication gains popularity, significant research has been devoted to supporting real - time transmission with stringent Quality of Service (QoS) requirements for wireless applications. At the same time, a wireless ad-hoc network that integrates a Mobile Ad-hoc NETwork (MANETs) has been proven to be a better alternative for...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Enhancing CPU Performance Using Subcontrary Mean Dynamic Round Robin (SMDRR) Scheduling Algorithm

    Round Robin (RR) Algorithm is considered as optimal in time shared environment because the static time is equally shared among the processes. If the time quantum taken is static then it undergoes degradation of the CPU performance and leads to so many context switches. In this paper, the authors have...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Operational and Security Requirements for RFID System

    In many fields such as wireless communication, circuit and electromagnetic areas, RFID (Radio Frequency IDentification) is one of the most challenging devices in recent year because of it's potential and ongoing applications of such as supply chains, livestock/inventory tracking, toll management, airline baggage management, access control and so on. This...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Security Perspective of Cloud Computing With Survey of Security Issues

    Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital expenditure. It describes the advance of many existing IT technologies and separates application and information resources from the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Cloud Computing: Windows Azure Platform

    Cloud computing is the set of technologies and infrastructure capabilities being offered in a utility based consumption model. Windows Azure is Microsoft's Cloud Computing offering to help its customers realize the benefits of cloud computing. This paper is an introduction on Windows Azure and provides insights into different aspects of...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Application Based Selection Techniques for Web Services Mechanism

    It has become much more difficult to access relevant information from the Web With the explosive growth of information available on the World Wide Web. One of the promising approaches is web usage mining, which mines web logs for user models and recommendations. In the domain of Web Services, it...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2012

    Windows and Linux Operating Systems From a Security Perspective

    Operating systems are vital system software that, without them, humans would not be able to manage and use computer systems. In essence, an operating system is a collection of software programs whose role is to manage computer resources and provide an interface for client applications to interact with the different...

    Provided By Journal of Global Research in Computer Science (JGRCS)