Journal of Global Research in Computer Science (JGRCS)

Displaying 1-40 of 167 results

  • White Papers // Oct 2014

    DSA Security Enhancement Through Efficient Nonce Generation

    The Digital Signature Algorithm (DSA) has become the de facto standard for authentication of transacting entities since its inception as a standard by NIST. An integral part of the signing process in DSA is the generation of a random number called a nonce or an ephemeral key. If sufficient caution...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2014

    Cloud Computing Issues for Real Time OS

    Cloud computing is important field in the area of pervasive computing. Pervasive computing deal with use of various machines all around the human centric environment. In this paper, the authors try to analyze how real time operating systems can put on cloud computing environment. In this paper, they place pointers...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2014

    Save and Secure Data on Clouds

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. In the cloud environment, resources are shared among all of the servers, users and individuals. So it is difficult for the cloud provider to ensure...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2014

    Software Security Testing a Pertinent Framework

    Different surveys point toward that over the past several years' software security has raised its precedence for many software organizations. Software security testing is upgraded with the help of security attributes, security models, testing tools and most importantly test case used in testing. Software security testing was once considered a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2014

    Detection and Prevention of Leaks in Anonymized Datasets

    With a wide spread of modern technology, person specific data dissemination has been increasing rapidly, leading to a global concern for preserving privacy of an individual. Several principles like k-anonymity, i-diversity etc., have been proposed to protect the person specific information during data publishing. However, the presence of dependencies in...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2014

    An Overview and Survey of Various Cloud Simulation Tools

    Cloud computing is a distributed kind of internet based computing in which the resources like infrastructure, platform, software etc are provided by the cloud service providers to the customers on their request on a pay per usage basis. Today, everybody is moving towards traditional computing towards cloud computing as it...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Approach to Build a Web Crawler Using Clustering Based K-Means Algorithm

    Central to any data mining project is having sufficient amounts of data that can be processed to provide meaningful and statistically relevant information. But getting the unstructured data is only the initial stage and that data must be transformed into a structured format which is suitable for further processing. In...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Algebraic Operation in Fuzzy Object-Oriented Databases (FOODBS)

    In this paper, some algebraic operations are investigated based on a kind of fuzzy object-oriented database model. When extraction of data from conventional database is being performed with the algebraic operations. Such as projection, selection, join, union, intersection, cross/product, division, difference etc. To retrieve and manipulate data/information from fuzzy object...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    A Survey on Cloud Model-Based Resource Sharing Security Issues From Multi Cloud Environment

    Cloud computing has emerged as a major trend in information and communication technology and has been proven as a key technology for the development and market analysis for multiple domain users. The practice of computing in two or more data centers separated by the Internet in popularity due to an...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2013

    Privacy Preserving Ranked Keyword Search Over Encrypted Cloud Data

    The authors present a scheme that discusses secure rank based keyword search over an encrypted cloud data. The data that has to be outsourced is encrypted using symmetric encryption algorithm for data confidentiality. The index file of the keyword set that has to be searched is outsourced to the local...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Data Reduction Algorithm Based on Planar Surface Fitting

    Data reduction tools are developed and evaluated using a data analysis framework. Simple and intelligent thinning algorithms are applied to both synthetic and real data and the thinned datasets are ingested into an analysis system. A major problem of data reduction is that certain types of camera or scanner produce...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Cloud Computing Testing Backgrounds and Challenges Based on Its Environment

    Cloud computing is a rising platform of service computing designed for speedy and dynamic delivery of assured computing resources. Cloud computing has a solution which helps organizations to focus on their core business rather than concerning about the investment and maintenance of their IT infrastructure. Testing cloud applications has its...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2013

    Study and Performance Estimation of Routing Protocols MANET

    A Mobile Ad-hoc NETwork (MANET) consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. In mobile communications, effective internetworking is mandatory in order to...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    An Efficient Model for Providing Security in Cloud Computing Environment

    In this paper, the authors present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. They also explain the fundamentals of sequential rule mining. They describe today's approaches for cloud security. From the broad...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Maintaining Client Connectivity and Zero Failover Using Oracle Dataguard Grid Computing

    The data guard is best management monitoring tool provided by oracle to reduce the failover time when primary system goes down. Data guard helps in transferring the redo data files to the Standby site. Data guard maintains standby databases as transactional consistent copies of production database. When the primary system...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Cloud Coverage Identification Using Satellite Data and K-Mean Clustering Algorithm

    In this paper, the authors study is to identify cloud coverage over the Thailand region by using satellite data and the k-mean clustering algorithm. The successful development software tools for k-mean unsupervised classification were based software ERDAS imagine using the ERDAS macro language and spatial modeling language. The clear rate...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    A Short Survey of Data Compression Techniques for Column Oriented Databases

    Column oriented data-stores has all values of a single column are stored as a row followed by all values of the next column. Such way of storing records helps in data compression since values of the same column are of the similar type and may repeat. This Paper surveys the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2013

    Efficiently Boosting in Wireless Sensor Network Using Adaptive Split and Merge Clustering Algorithm

    In this paper, the authors deal with a novel forwarding scheme for wireless sensor networks aimed at combining low computational complexity and high performance in terms of energy efficiency and reliability. This paper analyses the disadvantages of excessive clustering time because of the possible uneven cluster density. As a result,...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Secured and Dependable Storage in Cloud Computing Using Homomorphic

    Cloud storage allows users to remotely store their knowledge and revel in the on-demand top quality cloud applications while not the burden of native hardware and software system management. Although the advantages area unit clears, such a service is additionally relinquishing users' physical possession of their outsourced knowledge that inevitably...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    A Systematic Review of Cost Estimation Models

    Software estimation models should support managerial decision making in software projects. Software cost estimation is the process of predicting the cost and effort required to develop a software system. Many estimation models have been proposed over the last twenty to thirty years. Many software companies track and analyze project performance...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Multi Device Control With Vibration Detection in Cloud Computing Using Android

    Today, the authors are entering post-PC era where mobile devices are handling daily tasks. Several data shows that the uses of mobile devices are quickly taking over the Personal Computer (PC). Already existing local home automation allows users complete use of their automation system from within their home via a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    A Survey on Periodicity Detection in Time Series Database

    Research on periodic pattern mining has attained a great focus on nowadays. It is the problem that regards temporal regularity. There are many emerging applications in periodic pattern mining, including weather predictions, computer networks and biological data. The discovery of patterns with periodicity is of great importance and has been...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Concept of Data Transfer Via Bluetooth in Pen Drive

    With diversification of systems and their operating environment, sometimes it becomes impossible at the 11th hour to transfer data from one system to another. Due to this limitation often need is felt of transferring data wireless between the two systems not having proper channel for communications. This can be done...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Wireless Home and Industrial Automation Security System Using GSM

    Security and automation is a prime concern in the people day-to-day life. The approach to home and industrial automation and security system design is almost standardized nowadays. In this paper, the authors have tried to increase these standards by combining new design techniques and developed a low cost home and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Bring Your Own Device (BYOD): Security Risks and Mitigating Strategies

    The growth of mobile technology, with regard to availability of 3G/4G services and devices like Smartphone's has created new phenomenon for communication and data processing ability to do business. One such phenomenon that has emerged in the business environment is BYOD (Bring Your Own Device), which means that employees use...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Fast and Secure Handover in IEEE 802.16e Networks

    Wireless communication systems aim at supporting multimedia services with different Quality of Service (QoS) and bandwidth requirements. Effective management of limited resources is vital to enhance the network performance. Moreover, Mobile WiMAX should meet the expectations of mobile users to provide secured and seamless services. Lengthy delay due to the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    An Efficient Ranked Keyword Search for Effective Utilization of Outsourced Cloud Data

    Cloud computing becomes more widely prevailed storage for outsourced data which may contain more sensitive information such as credit card numbers, passwords, e-mails, personal health records etc. As the data owners cannot risk their unencrypted outsourced data so as the cloud servers. The cloud server may fail to keep up...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Consistency Management Strategies in Data Replication Using Ant Colony Optimization Method Over Mobile Peer to Peer Network

    A mobile peer-to-peer computer network is the one in which each computer in the network can act as a client or server for the other computers in the network. The communication process among the nodes in the mobile peer to peer network requires more no of messages. Due to this...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Image Segemntation Using Cluatering Technique Ans Swarm Intelliange

    Clustering analysis is an unsupervised learning technique which groups the similar items into one cluster and dissimilar items into another cluster. The clustering techniques are used to efficiently segment the MRI images. The clustering technique used is Fuzzy C Means (FCM). To improve the accuracy, Ant Colony Optimization (ACO) and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones

    As good mobile phones, as referred to as sensible phones, are becoming plenty of difficult and plenty of powerful to efficiently provide additional functionalities problems unit increasing concerning security threats against the sensible phone users. Since sensible phones use constant package style as in PCs, they are liable to similar...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Performance Optimization Under a Virtualized Environment

    Virtualization technology has found a renewed interest owing to the need for cost-efficient operations, better manageability and increased availability of systems. The increased use of physical resources introduces new bottlenecks in performance. This paper proposes methods trying to eliminate these bottlenecks and achieve close to native performance for various guest...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Study on Improving Challenges of Network With Cloudlets for Mobile Cloud Computing

    In this paper, the authors define the concept of combination of two technologies cloud computing and mobile computing that is Mobile Cloud Computing (MCC). Mobile Cloud Computing (MCC) can provide the benefit of both technologies. Cloud provides not only the storage capacity but also the power of computing, processing and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Some Variants of K-Means Clustering With Emphasis on Image Segmentation

    Clustering is the computational task to partition a given input into subsets of equal characteristics. These subsets are usually called clusters and ideally consist of similar objects that are dissimilar to objects in other clusters. This way one can use clusters as a coarse representation of the data. The authors...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2013

    Text Mining: Concepts, Process and Applications

    With the advancement of technology, more and more data is available in digital form. Among which, most of the data is in unstructured textual form. Text, so it has become essential to develop better techniques and algorithms to extract useful and interesting information from this large amount of textual data....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Detection and Prevention Routing Misbehaviour in OLSR Routing

    Mobile ad-hoc network are temporally network that form self controlled system with each node contain routing table but measure issue of that topology management of network because each node freely moves, the authors use OLSR (Optimal Link State Routing) that provide MANET route request flood and maintenance of routing but...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Analysis of MITM Attack in Secure Simple Pairing

    In this paper, the authors explain on different types of MITM attacks, their consequences, techniques and solutions under different circumstances giving users options to choose one from various solutions. Man-In-The-Middle (MITM) attack is one of the primary techniques in computer based hacking. MITM attack can successfully invoke attacks such as...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Cognitive Radio Network: Security Enhancements

    Reference to the latest developments the spectrum shortage problems are because of the wireless communication. For the future networks the most practical, scientific and systematic challenges is the use of licensed or unlicensed wireless networks with opportunistic use of the spectrum with, without and limited rules. Since different wireless networks...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2013

    Empowering Cloud Security Through SLA

    Cloud computing is a cumulative collection of technologies. It shares on-demand computing resources that are positioned and disposed efficiently. In spite of several benefits, numerous challenges are there such as data security, performance, data locking, access control, bandwidth costs, internet dependency, data confidentiality, auditability, application and availability. SLA (Service Level...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2013

    Multimodal Biometric Authentication and Intrusion Detection in Mobile Ad Hoc Network

    Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security mobile ad hoc networks. Continuous user authentication is an important prevention-based approach to protect high security Mobile Ad-hoc NETworks (MANETs). Intrusion Detection Systems (IDSs) are also important in MANETs to effectively identify malicious activities. This paper presents...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2012

    Design of Wireless Network Based on NS2

    In this paper, the authors are to present how to use NS2 simulation for designing wireless networks and using cryptography algorithm as to security information. It briefly describes the basic wireless networks categories, analyzes wireless LAN networks, briefly describes their components and technologies, explains the Wi-Fi technology and analyzes property...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Consistency Management Strategies in Data Replication Using Ant Colony Optimization Method Over Mobile Peer to Peer Network

    A mobile peer-to-peer computer network is the one in which each computer in the network can act as a client or server for the other computers in the network. The communication process among the nodes in the mobile peer to peer network requires more no of messages. Due to this...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Image Segemntation Using Cluatering Technique Ans Swarm Intelliange

    Clustering analysis is an unsupervised learning technique which groups the similar items into one cluster and dissimilar items into another cluster. The clustering techniques are used to efficiently segment the MRI images. The clustering technique used is Fuzzy C Means (FCM). To improve the accuracy, Ant Colony Optimization (ACO) and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Cloud-based Intrusion Detection Forensic Analysis on Smart Phones

    As good mobile phones, as referred to as sensible phones, are becoming plenty of difficult and plenty of powerful to efficiently provide additional functionalities problems unit increasing concerning security threats against the sensible phone users. Since sensible phones use constant package style as in PCs, they are liable to similar...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2013

    Text Mining: Concepts, Process and Applications

    With the advancement of technology, more and more data is available in digital form. Among which, most of the data is in unstructured textual form. Text, so it has become essential to develop better techniques and algorithms to extract useful and interesting information from this large amount of textual data....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2012

    Performance Evaluation of Multiviewpoint-Based Similarity Measure for Data Clustering

    Some cluster relationship has to be considered for all clustering methods surrounded by the data objects which will be applied on. There may be a similarity between a pair of objects which can be defined as a choice of explicitly or implicitly. In this paper, the authors introduce a novel...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2012

    Web Mining and the Educational Domain

    The web now-a-days is a firmly established reality that offers unprecedented opportunities to education. Many modes of delivery of online learning exist, all providing accessibility to learning materials, facilitating communication among learners and tutors/peers, and possibly helping to improve the learning and teaching process. While using an online learning environment,...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2012

    An Improved Association Rule Mining With Fp Tree Using Positive and Negative Integration

    Construction and development of classifier that works with more accuracy and performs efficiently for large database is one of the key tasks of data mining techniques. Training dataset repeatedly produces massive amount of rules. It's very tough to store, retrieve, prune, and sort a huge number of rules proficiently before...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2012

    Efficient Searching for Geographical Data Gathering Using Knowledge Mining

    The people live in a mutual world. Perhaps, the most productive way of data collection is to recruit a large number of people for data entry. Internet provides a very powerful and adaptable medium to bring together such a large number of people. With this in mind, they have developed...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2012

    Comparative Study of Various Existing Security Scenarios in Cloud Computing Environment

    The advantage of cloud computing is ever lasting but it brings more issues including security, such as virtualization security, application security, identity management, access control and authentication. This paper focus on recent research pertaining to cloud security. This paper envisage on diverse security sphere parameters in cloud computing such as...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Data Reduction Algorithm Based on Planar Surface Fitting

    Data reduction tools are developed and evaluated using a data analysis framework. Simple and intelligent thinning algorithms are applied to both synthetic and real data and the thinned datasets are ingested into an analysis system. A major problem of data reduction is that certain types of camera or scanner produce...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2013

    Cloud Computing Testing Backgrounds and Challenges Based on Its Environment

    Cloud computing is a rising platform of service computing designed for speedy and dynamic delivery of assured computing resources. Cloud computing has a solution which helps organizations to focus on their core business rather than concerning about the investment and maintenance of their IT infrastructure. Testing cloud applications has its...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Maintaining Client Connectivity and Zero Failover Using Oracle Dataguard Grid Computing

    The data guard is best management monitoring tool provided by oracle to reduce the failover time when primary system goes down. Data guard helps in transferring the redo data files to the Standby site. Data guard maintains standby databases as transactional consistent copies of production database. When the primary system...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    Cloud Coverage Identification Using Satellite Data and K-Mean Clustering Algorithm

    In this paper, the authors study is to identify cloud coverage over the Thailand region by using satellite data and the k-mean clustering algorithm. The successful development software tools for k-mean unsupervised classification were based software ERDAS imagine using the ERDAS macro language and spatial modeling language. The clear rate...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2013

    A Short Survey of Data Compression Techniques for Column Oriented Databases

    Column oriented data-stores has all values of a single column are stored as a row followed by all values of the next column. Such way of storing records helps in data compression since values of the same column are of the similar type and may repeat. This Paper surveys the...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2013

    Efficiently Boosting in Wireless Sensor Network Using Adaptive Split and Merge Clustering Algorithm

    In this paper, the authors deal with a novel forwarding scheme for wireless sensor networks aimed at combining low computational complexity and high performance in terms of energy efficiency and reliability. This paper analyses the disadvantages of excessive clustering time because of the possible uneven cluster density. As a result,...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Multi Device Control With Vibration Detection in Cloud Computing Using Android

    Today, the authors are entering post-PC era where mobile devices are handling daily tasks. Several data shows that the uses of mobile devices are quickly taking over the Personal Computer (PC). Already existing local home automation allows users complete use of their automation system from within their home via a...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    A Survey on Periodicity Detection in Time Series Database

    Research on periodic pattern mining has attained a great focus on nowadays. It is the problem that regards temporal regularity. There are many emerging applications in periodic pattern mining, including weather predictions, computer networks and biological data. The discovery of patterns with periodicity is of great importance and has been...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Performance Optimization Under a Virtualized Environment

    Virtualization technology has found a renewed interest owing to the need for cost-efficient operations, better manageability and increased availability of systems. The increased use of physical resources introduces new bottlenecks in performance. This paper proposes methods trying to eliminate these bottlenecks and achieve close to native performance for various guest...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // May 2013

    Secured and Dependable Storage in Cloud Computing Using Homomorphic

    Cloud storage allows users to remotely store their knowledge and revel in the on-demand top quality cloud applications while not the burden of native hardware and software system management. Although the advantages area unit clears, such a service is additionally relinquishing users' physical possession of their outsourced knowledge that inevitably...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    A Study on Improving Challenges of Network With Cloudlets for Mobile Cloud Computing

    In this paper, the authors define the concept of combination of two technologies cloud computing and mobile computing that is Mobile Cloud Computing (MCC). Mobile Cloud Computing (MCC) can provide the benefit of both technologies. Cloud provides not only the storage capacity but also the power of computing, processing and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Some Variants of K-Means Clustering With Emphasis on Image Segmentation

    Clustering is the computational task to partition a given input into subsets of equal characteristics. These subsets are usually called clusters and ideally consist of similar objects that are dissimilar to objects in other clusters. This way one can use clusters as a coarse representation of the data. The authors...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2014

    Save and Secure Data on Clouds

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. In the cloud environment, resources are shared among all of the servers, users and individuals. So it is difficult for the cloud provider to ensure...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Mar 2014

    Detection and Prevention of Leaks in Anonymized Datasets

    With a wide spread of modern technology, person specific data dissemination has been increasing rapidly, leading to a global concern for preserving privacy of an individual. Several principles like k-anonymity, i-diversity etc., have been proposed to protect the person specific information during data publishing. However, the presence of dependencies in...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jan 2014

    An Overview and Survey of Various Cloud Simulation Tools

    Cloud computing is a distributed kind of internet based computing in which the resources like infrastructure, platform, software etc are provided by the cloud service providers to the customers on their request on a pay per usage basis. Today, everybody is moving towards traditional computing towards cloud computing as it...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Approach to Build a Web Crawler Using Clustering Based K-Means Algorithm

    Central to any data mining project is having sufficient amounts of data that can be processed to provide meaningful and statistically relevant information. But getting the unstructured data is only the initial stage and that data must be transformed into a structured format which is suitable for further processing. In...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    An Algebraic Operation in Fuzzy Object-Oriented Databases (FOODBS)

    In this paper, some algebraic operations are investigated based on a kind of fuzzy object-oriented database model. When extraction of data from conventional database is being performed with the algebraic operations. Such as projection, selection, join, union, intersection, cross/product, division, difference etc. To retrieve and manipulate data/information from fuzzy object...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Dec 2013

    A Survey on Cloud Model-Based Resource Sharing Security Issues From Multi Cloud Environment

    Cloud computing has emerged as a major trend in information and communication technology and has been proven as a key technology for the development and market analysis for multiple domain users. The practice of computing in two or more data centers separated by the Internet in popularity due to an...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2013

    Bring Your Own Device (BYOD): Security Risks and Mitigating Strategies

    The growth of mobile technology, with regard to availability of 3G/4G services and devices like Smartphone's has created new phenomenon for communication and data processing ability to do business. One such phenomenon that has emerged in the business environment is BYOD (Bring Your Own Device), which means that employees use...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Nov 2012

    Trusted Cloud - A Solution for Cloud Cartography

    Cloud computing provides people a way to share large amount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. Cloud cartography could be used by...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Sep 2011

    Improved Bootstrap Security with Consistent Cache in Mobile Ad Hoc Network Routing

    Dynamic node mobility of Mobile Ad-hoc NETwork (MANETs) causes security concern over routing and data communication. Recent research works focused on trust worthiness, routing protocol security, denial of service attacks, etc., More focus is made on bootstrap security which for authenticated and secured neighbor relationships between mobile nodes. The authors'...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Oct 2010

    A New Algorithm for End to End Security of Data in a Secure Self Organized Wireless Sensor Network

    The authors consider a self-organized wireless sensor network where sensor nodes are multi-hop away from base station. This means data communication happens through several intermediate nodes before it reaches the base station from source. End to end security of data ensures data sent from the source to destination through several...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2011

    Towards the Application of Security Metrics at Different Stages of Information Systems

    A formal approach to the measurement of security in Information Systems is essential. However little thought has been given to this aspect of Information system life cycle. The attention towards the security aspect of the system has got least attention during the development process and much focus has been given...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2011

    Defending Against Attacks by Enhancing Security Using Biometrics in Semantic Web

    Semantic web is maturing day-by-day and data and information integration is growing and becoming crucial. Security is one of the key features of the future Internet's security. So it is necessary harnessing the synergy in biometrics and in semantic web. It can leverage the lack of widely accepted biometrics security...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Apr 2011

    Object Oriented Design Security Quantification

    Quantification of security at early phase produces a significant improvement to understand the management of security artifacts for best possible results. The proposed study discusses a systematic approach to quantify security based on complexity factors which having impact on security attributes. This paper provides a roadmap to researchers and software...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jun 2011

    Assessment of Security in Mobile Ad-Hoc Networks (MANET)

    With the proliferation of cheaper, smaller, and more powerful mobile devices, Mobile Ad-hoc NETworks (MANETs) have become one of the fastest growing areas of research. This new type of self-organizing network combines wireless communication with a high degree node mobility. Unlike conventional wired networks they have no fixed infrastructure (base...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Aug 2011

    Cluster Based Security Architecture in Wireless Ad-Hoc Networks: An Overview

    Mobile ad hoc networks are growing in popularity due to the explosive growth of modern devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more challenging. The mobile nodes are vulnerable to security attacks. Providing security and anonymity to users are critical in wireless ad...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Aug 2011

    Wireless Sensor Network Based Traffic Monitoring; Overview and Threats to Its Security

    The increased number of vehicles has caused a series of economic and social problems across the world. The economic viability of using wireless sensor networks to gather roads traffic monitoring data for Intelligent Transportation Systems (ITS) becomes increasingly attractive. ITS systems are subject to security threats like any other information...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2011

    Security Issues in Computer Network Architecture

    The architecture of a computer network has evolved with advances in technology. The design of secure computer network architecture to protect the integrity of information exchange is pursued by the commercial and financial sectors and at all levels of government agencies. Active networks represent a new approach to network architecture....

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Jul 2011

    Network Security: An Approach Towards Secure Computing

    The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against malicious attack, a number of software tools have been currently developed. Intrusion Detection System (IDS) has recently become a heated research topic due to its capability of detecting and...

    Provided By Journal of Global Research in Computer Science (JGRCS)

  • White Papers // Feb 2013

    Detection and Prevention Routing Misbehaviour in OLSR Routing

    Mobile ad-hoc network are temporally network that form self controlled system with each node contain routing table but measure issue of that topology management of network because each node freely moves, the authors use OLSR (Optimal Link State Routing) that provide MANET route request flood and maintenance of routing but...

    Provided By Journal of Global Research in Computer Science (JGRCS)