Journal of Global Research in Computer Science (JGRCS)

Displaying 1-40 of 167 results

  • White Papers // Oct 2014

    DSA Security Enhancement Through Efficient Nonce Generation

    The Digital Signature Algorithm (DSA) has become the de facto standard for authentication of transacting entities since its inception as a standard by NIST. An integral part of the signing process in DSA is the generation of a random number called a nonce or an ephemeral key. If sufficient caution...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2014

    Cloud Computing Issues for Real Time OS

    Cloud computing is important field in the area of pervasive computing. Pervasive computing deal with use of various machines all around the human centric environment. In this paper, the authors try to analyze how real time operating systems can put on cloud computing environment. In this paper, they place pointers...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2014

    Save and Secure Data on Clouds

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. In the cloud environment, resources are shared among all of the servers, users and individuals. So it is difficult for the cloud provider to ensure...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2014

    Detection and Prevention of Leaks in Anonymized Datasets

    With a wide spread of modern technology, person specific data dissemination has been increasing rapidly, leading to a global concern for preserving privacy of an individual. Several principles like k-anonymity, i-diversity etc., have been proposed to protect the person specific information during data publishing. However, the presence of dependencies in...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2014

    Software Security Testing a Pertinent Framework

    Different surveys point toward that over the past several years' software security has raised its precedence for many software organizations. Software security testing is upgraded with the help of security attributes, security models, testing tools and most importantly test case used in testing. Software security testing was once considered a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2014

    An Overview and Survey of Various Cloud Simulation Tools

    Cloud computing is a distributed kind of internet based computing in which the resources like infrastructure, platform, software etc are provided by the cloud service providers to the customers on their request on a pay per usage basis. Today, everybody is moving towards traditional computing towards cloud computing as it...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Approach to Build a Web Crawler Using Clustering Based K-Means Algorithm

    Central to any data mining project is having sufficient amounts of data that can be processed to provide meaningful and statistically relevant information. But getting the unstructured data is only the initial stage and that data must be transformed into a structured format which is suitable for further processing. In...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Algebraic Operation in Fuzzy Object-Oriented Databases (FOODBS)

    In this paper, some algebraic operations are investigated based on a kind of fuzzy object-oriented database model. When extraction of data from conventional database is being performed with the algebraic operations. Such as projection, selection, join, union, intersection, cross/product, division, difference etc. To retrieve and manipulate data/information from fuzzy object...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    A Survey on Cloud Model-Based Resource Sharing Security Issues From Multi Cloud Environment

    Cloud computing has emerged as a major trend in information and communication technology and has been proven as a key technology for the development and market analysis for multiple domain users. The practice of computing in two or more data centers separated by the Internet in popularity due to an...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2013

    Privacy Preserving Ranked Keyword Search Over Encrypted Cloud Data

    The authors present a scheme that discusses secure rank based keyword search over an encrypted cloud data. The data that has to be outsourced is encrypted using symmetric encryption algorithm for data confidentiality. The index file of the keyword set that has to be searched is outsourced to the local...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Data Reduction Algorithm Based on Planar Surface Fitting

    Data reduction tools are developed and evaluated using a data analysis framework. Simple and intelligent thinning algorithms are applied to both synthetic and real data and the thinned datasets are ingested into an analysis system. A major problem of data reduction is that certain types of camera or scanner produce...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Cloud Computing Testing Backgrounds and Challenges Based on Its Environment

    Cloud computing is a rising platform of service computing designed for speedy and dynamic delivery of assured computing resources. Cloud computing has a solution which helps organizations to focus on their core business rather than concerning about the investment and maintenance of their IT infrastructure. Testing cloud applications has its...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2013

    Study and Performance Estimation of Routing Protocols MANET

    A Mobile Ad-hoc NETwork (MANET) consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. In mobile communications, effective internetworking is mandatory in order to...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Maintaining Client Connectivity and Zero Failover Using Oracle Dataguard Grid Computing

    The data guard is best management monitoring tool provided by oracle to reduce the failover time when primary system goes down. Data guard helps in transferring the redo data files to the Standby site. Data guard maintains standby databases as transactional consistent copies of production database. When the primary system...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Cloud Coverage Identification Using Satellite Data and K-Mean Clustering Algorithm

    In this paper, the authors study is to identify cloud coverage over the Thailand region by using satellite data and the k-mean clustering algorithm. The successful development software tools for k-mean unsupervised classification were based software ERDAS imagine using the ERDAS macro language and spatial modeling language. The clear rate...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    A Short Survey of Data Compression Techniques for Column Oriented Databases

    Column oriented data-stores has all values of a single column are stored as a row followed by all values of the next column. Such way of storing records helps in data compression since values of the same column are of the similar type and may repeat. This Paper surveys the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    An Efficient Model for Providing Security in Cloud Computing Environment

    In this paper, the authors present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. They also explain the fundamentals of sequential rule mining. They describe today's approaches for cloud security. From the broad...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2013

    Efficiently Boosting in Wireless Sensor Network Using Adaptive Split and Merge Clustering Algorithm

    In this paper, the authors deal with a novel forwarding scheme for wireless sensor networks aimed at combining low computational complexity and high performance in terms of energy efficiency and reliability. This paper analyses the disadvantages of excessive clustering time because of the possible uneven cluster density. As a result,...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Secured and Dependable Storage in Cloud Computing Using Homomorphic

    Cloud storage allows users to remotely store their knowledge and revel in the on-demand top quality cloud applications while not the burden of native hardware and software system management. Although the advantages area unit clears, such a service is additionally relinquishing users' physical possession of their outsourced knowledge that inevitably...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Multi Device Control With Vibration Detection in Cloud Computing Using Android

    Today, the authors are entering post-PC era where mobile devices are handling daily tasks. Several data shows that the uses of mobile devices are quickly taking over the Personal Computer (PC). Already existing local home automation allows users complete use of their automation system from within their home via a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    A Survey on Periodicity Detection in Time Series Database

    Research on periodic pattern mining has attained a great focus on nowadays. It is the problem that regards temporal regularity. There are many emerging applications in periodic pattern mining, including weather predictions, computer networks and biological data. The discovery of patterns with periodicity is of great importance and has been...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    A Systematic Review of Cost Estimation Models

    Software estimation models should support managerial decision making in software projects. Software cost estimation is the process of predicting the cost and effort required to develop a software system. Many estimation models have been proposed over the last twenty to thirty years. Many software companies track and analyze project performance...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Consistency Management Strategies in Data Replication Using Ant Colony Optimization Method Over Mobile Peer to Peer Network

    A mobile peer-to-peer computer network is the one in which each computer in the network can act as a client or server for the other computers in the network. The communication process among the nodes in the mobile peer to peer network requires more no of messages. Due to this...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Image Segemntation Using Cluatering Technique Ans Swarm Intelliange

    Clustering analysis is an unsupervised learning technique which groups the similar items into one cluster and dissimilar items into another cluster. The clustering techniques are used to efficiently segment the MRI images. The clustering technique used is Fuzzy C Means (FCM). To improve the accuracy, Ant Colony Optimization (ACO) and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones

    As good mobile phones, as referred to as sensible phones, are becoming plenty of difficult and plenty of powerful to efficiently provide additional functionalities problems unit increasing concerning security threats against the sensible phone users. Since sensible phones use constant package style as in PCs, they are liable to similar...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Performance Optimization Under a Virtualized Environment

    Virtualization technology has found a renewed interest owing to the need for cost-efficient operations, better manageability and increased availability of systems. The increased use of physical resources introduces new bottlenecks in performance. This paper proposes methods trying to eliminate these bottlenecks and achieve close to native performance for various guest...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Study on Improving Challenges of Network With Cloudlets for Mobile Cloud Computing

    In this paper, the authors define the concept of combination of two technologies cloud computing and mobile computing that is Mobile Cloud Computing (MCC). Mobile Cloud Computing (MCC) can provide the benefit of both technologies. Cloud provides not only the storage capacity but also the power of computing, processing and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Some Variants of K-Means Clustering With Emphasis on Image Segmentation

    Clustering is the computational task to partition a given input into subsets of equal characteristics. These subsets are usually called clusters and ideally consist of similar objects that are dissimilar to objects in other clusters. This way one can use clusters as a coarse representation of the data. The authors...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Fast and Secure Handover in IEEE 802.16e Networks

    Wireless communication systems aim at supporting multimedia services with different Quality of Service (QoS) and bandwidth requirements. Effective management of limited resources is vital to enhance the network performance. Moreover, Mobile WiMAX should meet the expectations of mobile users to provide secured and seamless services. Lengthy delay due to the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    An Efficient Ranked Keyword Search for Effective Utilization of Outsourced Cloud Data

    Cloud computing becomes more widely prevailed storage for outsourced data which may contain more sensitive information such as credit card numbers, passwords, e-mails, personal health records etc. As the data owners cannot risk their unencrypted outsourced data so as the cloud servers. The cloud server may fail to keep up...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Bring Your Own Device (BYOD): Security Risks and Mitigating Strategies

    The growth of mobile technology, with regard to availability of 3G/4G services and devices like Smartphone's has created new phenomenon for communication and data processing ability to do business. One such phenomenon that has emerged in the business environment is BYOD (Bring Your Own Device), which means that employees use...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Concept of Data Transfer Via Bluetooth in Pen Drive

    With diversification of systems and their operating environment, sometimes it becomes impossible at the 11th hour to transfer data from one system to another. Due to this limitation often need is felt of transferring data wireless between the two systems not having proper channel for communications. This can be done...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Wireless Home and Industrial Automation Security System Using GSM

    Security and automation is a prime concern in the people day-to-day life. The approach to home and industrial automation and security system design is almost standardized nowadays. In this paper, the authors have tried to increase these standards by combining new design techniques and developed a low cost home and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2013

    Text Mining: Concepts, Process and Applications

    With the advancement of technology, more and more data is available in digital form. Among which, most of the data is in unstructured textual form. Text, so it has become essential to develop better techniques and algorithms to extract useful and interesting information from this large amount of textual data....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Detection and Prevention Routing Misbehaviour in OLSR Routing

    Mobile ad-hoc network are temporally network that form self controlled system with each node contain routing table but measure issue of that topology management of network because each node freely moves, the authors use OLSR (Optimal Link State Routing) that provide MANET route request flood and maintenance of routing but...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Analysis of MITM Attack in Secure Simple Pairing

    In this paper, the authors explain on different types of MITM attacks, their consequences, techniques and solutions under different circumstances giving users options to choose one from various solutions. Man-In-The-Middle (MITM) attack is one of the primary techniques in computer based hacking. MITM attack can successfully invoke attacks such as...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Cognitive Radio Network: Security Enhancements

    Reference to the latest developments the spectrum shortage problems are because of the wireless communication. For the future networks the most practical, scientific and systematic challenges is the use of licensed or unlicensed wireless networks with opportunistic use of the spectrum with, without and limited rules. Since different wireless networks...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2013

    Empowering Cloud Security Through SLA

    Cloud computing is a cumulative collection of technologies. It shares on-demand computing resources that are positioned and disposed efficiently. In spite of several benefits, numerous challenges are there such as data security, performance, data locking, access control, bandwidth costs, internet dependency, data confidentiality, auditability, application and availability. SLA (Service Level...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2013

    Multimodal Biometric Authentication and Intrusion Detection in Mobile Ad Hoc Network

    Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security mobile ad hoc networks. Continuous user authentication is an important prevention-based approach to protect high security Mobile Ad-hoc NETworks (MANETs). Intrusion Detection Systems (IDSs) are also important in MANETs to effectively identify malicious activities. This paper presents...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2012

    Design of Wireless Network Based on NS2

    In this paper, the authors are to present how to use NS2 simulation for designing wireless networks and using cryptography algorithm as to security information. It briefly describes the basic wireless networks categories, analyzes wireless LAN networks, briefly describes their components and technologies, explains the Wi-Fi technology and analyzes property...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2012

    An Approach for User Authentication One Time Password (Numeric and Graphical) Scheme

    Day by day number of Internet users increasing. Now people are using different online services provided by Banks, College/Schools, Hospitals, online utility bill payment and online shopping sites. To access online services Text-based authentication system is in use. The text-based authentication scheme faces some drawbacks with usability and security issues...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2012

    Performance Based Secure Optimized Routing Protocol for Mobile Ad-Hoc Network

    In Mobile Ad hoc NETworks (MANETs), accurate throughput-constrained Quality of Service (QoS) routing and admission control have proven difficult to achieve, mainly due to node mobility and contention for channel access. QoS related with band width utilization is very interesting because band width is the most critical resource in mobile...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2012

    A New Data Hiding Algorithm With Encrypted Secret Message Using TTJSA Symmetric Key Crypto System

    In this paper, the authors are proposing a new steganogarphy method to hide any encrypted secret message inside a cover file by substituting in the LSB. For encrypting secret message they have used new algorithm namely TTJSA developed by Nath et al.. For hiding secret message they have used a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2012

    Public-Key Steganography Based on Modified LSB Method

    Steganography is the art and science of invisible communication. It is a technique which keeps the existence of the message secret. This paper proposed a technique to implement steganogaraphy and cryptography together to hide the data into an image. This technique describes as: Find the shared stego-key between the two...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2012

    Enhanced Reliable TCP for Congestion Control With Corruption Control in Mobile Ad Hoc Networks

    Ad hoc networks are mobile networks that can be formed spontaneously without the requirement of a centralized access point or an existing infrastructure. There are several unique characteristics of an Ad hoc network that differentiates it from other classes of networks. Most of the TCP variants have been designed in...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    A Review on Visual Cryptography Schemes

    Visual cryptography scheme is a cryptographic technique which allows visual information (e.g., printed text, handwritten notes, and picture) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. There are various measures on which performance of visual...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    Trust Based Secure AODV in Manet

    The nature of self-organization and the limitation of individual resources, MANET always confront security and selfishness issues. In this paper, the authors design trusted routing protocols using trusted frame works and intrusion detection system (secure protocol) for MANET. Trust combination algorithms and trust mapping functions are provided in this model,...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2011

    Energy Conservation of WSNS Through Different Clustering Algorithms

    Wireless Sensor Network (WSN) needs an energy conservation communication protocols to reduce the energy consumption as much as possible. But the lifetime of sensor network greatly affected due to the battery of a node. Radio irregularity and fading in multi-hop WSN also affect lifetime of a sensor. Various cluster-based schemes...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    SoA Based Multi Party Web Services Using Dynamic Authentication

    Distributed applications has been a big boon for the development of several applications ranging from on-time supply chain management, virtual collaborations and several kinds of service integration across organizations. Often this leads to new challenges in security and dependability. Collaborating services in a system with a Service-Oriented-Architecture (SOA) may belong...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    Advanced Secure Remote User Authentication Scheme Preserving User Anonymity

    To ensure secure transmission of data and to authenticate remote user while accessing server resources, smart card based remote user authentication schemes have been widely adopted. In 2004, Das et al proposed first of its kind of protocol for remote user authentication with smart cards using Dynamic Id to protect...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    An Efficient Framework for Network Based Query Processing in Road Networks

    Advances in sensing and tracking technology enable location-based applications but they also create significant privacy risks. Anonymity can provide a high degree of privacy, save service users from dealing with service providers' privacy policies, and reduce the service providers' requirements for safeguarding private information. However, guaranteeing anonymous usage of location-based...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    Advanced Secure Dynamic-ID Based Remote User Authentication Scheme

    Remote user authentication is a mechanism in which a remote user is validated to access remote server resources or services over an insecure communication channel. Smart card based password authentication scheme is one of the most widely used technique for various kinds of authentication applications such as online banking, online...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    Performance Evaluation of AQM Algorithms for PGM Based Group Communication in DVMRP Multicasting Network

    Queue management schemes at the routers and congestion avoidance schemes at the end points cooperate to provide good congestion solutions in computer networks. While queue management schemes are still being developed, research on congestion avoidance has come a long way to serve the bandwidth requirement of the networks. Because of...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    Simulated Annealing Based Placement Algorithms and Research Challenges: A Survey

    In this paper, the authors have done a comprehensive study of VLSI placement algorithms in the literature and classified them from different perspectives. After an extensive review, they have performed a chronological analytical study of the simulated annealing based placement algorithm. They have explored the pros and cons of simulated...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    Novel Initialization Technique for K-Means Clustering Using Spectral Constraint Prototype

    Clustering is a general technique used to classify collection of data into groups of related objects. One of the most commonly used clustering techniques in practice is K-Means clustering. The major limitation in K-Means is its initialization technique. Several attempts have been made by many researchers to solve this particular...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2012

    Survey on Captcha Systems

    CAPTCHA stands for completely automated public Turing test to tell computer and human apart. Due to the enormous growth of Internet, security of web application has become a vital issue and many web applications facing a threat of Internet bot also known as Internet Robot is an automated script which...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Performance Improvment of TCP in Ad Hoc Network

    Transmission Control Protocol (TCP) is the dominating end-to-end transport layer protocol which provides secure and reliable data transfer together with some other protocols in the protocol stack. Its performance is good in wired networks where packet losses are due to congestion. Recent works in transport protocols for ad-hoc networks have...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Performance Analysis of Image Compression Using Discrete Cosine Transform With Various Discrete Wavelet Transforms

    Image compression is a widely discovered area of research & application. Many compression techniques have been developed including few mixed methods. The Discrete Cosine Transform (DCT) is one of the widely used compression method. Also the Discrete Wavelet Transform (DWT) provides substantial improvements in picture quality due to its multi...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Enhanced Version of Growth Model in Web Based Software Reliability Engineering

    The task of improving software reliability for large systems is becoming more difficult due to the highly-distributed nature of current products, and their deployment on dissimilar platforms with complex service functionalities. This coupled with increasing software complexities and large software size requires a very different approach in assessing software reliability....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Virtualization Techniques & Technologies: State-of-the-Art

    Today virtualization is not just a possibility but it is becoming mainstream in data centers across the business world. Virtualization technology is popular today for hosting Internet and cloud-based computer services. Technology is evolving at a rapid rate and virtualization is no longer just about consolidation and cost savings, It...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    QoS Oriented Reservation Based Routing Mechanism for Wireless Ad-Hoc Networks

    As wireless communication gains popularity, significant research has been devoted to supporting real - time transmission with stringent Quality of Service (QoS) requirements for wireless applications. At the same time, a wireless ad-hoc network that integrates a Mobile Ad-hoc NETwork (MANETs) has been proven to be a better alternative for...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Enhancing CPU Performance Using Subcontrary Mean Dynamic Round Robin (SMDRR) Scheduling Algorithm

    Round Robin (RR) Algorithm is considered as optimal in time shared environment because the static time is equally shared among the processes. If the time quantum taken is static then it undergoes degradation of the CPU performance and leads to so many context switches. In this paper, the authors have...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Operational and Security Requirements for RFID System

    In many fields such as wireless communication, circuit and electromagnetic areas, RFID (Radio Frequency IDentification) is one of the most challenging devices in recent year because of it's potential and ongoing applications of such as supply chains, livestock/inventory tracking, toll management, airline baggage management, access control and so on. This...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Security Perspective of Cloud Computing With Survey of Security Issues

    Cloud computing has elevated IT to newer limits by offering the market environment data storage and capacity with flexible scalable computing processing power to match elastic demand and supply, whilst reducing capital expenditure. It describes the advance of many existing IT technologies and separates application and information resources from the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Cloud Computing: Windows Azure Platform

    Cloud computing is the set of technologies and infrastructure capabilities being offered in a utility based consumption model. Windows Azure is Microsoft's Cloud Computing offering to help its customers realize the benefits of cloud computing. This paper is an introduction on Windows Azure and provides insights into different aspects of...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Application Based Selection Techniques for Web Services Mechanism

    It has become much more difficult to access relevant information from the Web With the explosive growth of information available on the World Wide Web. One of the promising approaches is web usage mining, which mines web logs for user models and recommendations. In the domain of Web Services, it...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    New and Fast Outlier Detection Scheme in WSN: NFODS-WSN

    In this paper, the authors focused on the problem of outlier detection in wireless sensor networks. Outlier detection techniques generally focus the developer's or user's context into the interesting events, or unexpected results in the network which has very low probability of occurrence. In this paper, they have proposed a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    A Novel Scheme for Text Data Encryption

    Cryptography is used to make users convinced that their messages had not been tainted during transmission. However, it relied on mutual trust between the communicating parties. The application of cryptography is such as key agreement, data encryption, data decryption and digital signature. The authors' approach is quite different they have...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Hybrid of Ant Colony Optimization and Genetic Algorithm for Shortest Path in Wireless Mesh Networks

    Routing in dynamic network is a challenging one, because the topology of the network is not fixed. This issue is addressed in this paper using ant algorithm to explore the network using intelligent packets. The paths generated by ants are given as input to genetic algorithm. The genetic algorithm finds...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Security Assurance Through Efficient Event Log and Audit Trials

    In current digital era, business organizations are using Information and Communications Technologies (ICT) for better support of their goals. There is no doubt to say that every function of the business modules is either dependent or going to be reliant on IT related tools and techniques. This facilitates organizations on...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2012

    Windows and Linux Operating Systems From a Security Perspective

    Operating systems are vital system software that, without them, humans would not be able to manage and use computer systems. In essence, an operating system is a collection of software programs whose role is to manage computer resources and provide an interface for client applications to interact with the different...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2012

    A Survey-Classifier Fusion

    A number of classifier fusion methods have been recently developed opening an alternative approach leading to a potential improvement in the classification performance. As there is little theory of information fusion itself, currently the authors are faced with different methods designed for different problems and producing different results. This paper...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2012

    Management Language Specifications for Digital Ecosystems

    This paper defines the specifications of a management language intended to automate the control and administration of various service components connected to a digital ecosystem. It is called EML short for Ecosystem Management Language and it is based on proprietary syntax and notation and contains a set of managerial commands...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    A Case Study on Design and Evaluation of Modified Adaptive Fuzzy Pid Controller

    Most of process control systems are based on PID controllers, because of their remarkable effectiveness, simplicity and robustness, As PID controller design theory and practical procedures are well developed, it is necessary to pay attention on fuzzy logic controller design and its applications in combinations with PID controllers. There is...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    Study and Provising of Network Traffic Based on Markov Model in Cloud Environment

    The Cloud Computing is latest new computing paradigm where applications are provided across dynamic and geographically dispersed organization. The accurate modelling and simulation of flow of processes in cloud environment is an essential part of service level architecture. In this paper, an analytical model has been developed for identifying the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2011

    An Insight Overview of Issues and Challenges in Vehicular Adhoc Network

    Vehicular Ad hoc Networks is a kind of special wireless ad hoc network, which has the characteristics of high node mobility and fast topology changes. The Vehicular Networks can provide wide variety of services, range from safety-related warning systems to improved navigation mechanisms as well as information and entertainment applications....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Aug 2012

    Improvement of Clustering on High Dimensional Datasets Using PCA

    The last decade has seen an explosive growth in the generation and collection of data. In the field of data mining there are various techniques are used to extract useful information from the data set. There is various estimation techniques are used in clustering methods out of these Euclidean distance...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Aug 2012

    A Novel Approach for Cloud-Based Computing Using Replicate Data Detection

    Cloud-based computing is an emerging practice that offers significantly more infrastructure and financial flexibility than traditional computing models. When considering cloud-based infrastructure offerings, security is a common concern. Larger enterprises may have implemented very strong security approaches that may or may not be equaled by cloud providers, but don't just...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2012

    On Demand Efficient Frequent Itemset Method in Uncertain Data

    Frequent itemset mining, the task of finding sets of items that frequently occur together in a dataset, has been at the core of the field of data mining for the past sixteen years. In that time, the size of datasets has grown much faster than has the ability of existing...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2012

    Moving Towards SAN Storage: An Enterprise Perspective

    One of the major components of any enterprise IT infrastructure is data storage. There has been continuous effort to explore new storage technologies to improve performance with respect to input/output operations, data availability, consolidation of storage assets and data protection and archiving. Storage has moved from the traditional Direct Attached...

    Provided By Journal of Global Research in Computer Science (JGRCS)