Planetary Scale

Displaying 1-7 of 7 results

  • White Papers // Jul 2012

    An Intrusion Detection Model Based on Immunity for Wireless Sensor Network Dynamically

    The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    A Critical Review of Recommender Systems in Web Usage Mining Based on User Ratings

    Recommender systems analyze user's profile and the relationship between user and target item to help user purchase or rent the item based on user's interest. With the help of computer, recommender systems can analyze huge collection of data based on users' preferences to give good recommended items. Recommender system can...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    Ambiguous Free Transmission Scheduling in Wireless Sensor Networks for Dynamic Queries

    Recent years have seen the emergence of wireless sensor network systems that must support high data rate and real-time queries of physical environments. With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    Wireless Sensor Networks for Energy Efficient MAC to Provide Delay Guarantee

    This paper presents a real-time MAC protocol for wireless sensor network that can provide delay guarantee. RTMAC is based on TDMA protocol, but it is carefully designed to overcome the high latency of traditional TDMA protocols. It also conserves energy when a node may not be transmitting or receiving packets....

    Provided By Planetary Scale

  • White Papers // Jul 2012

    Evaluation of Security and Performance of Dependable Data Storage in Cloud Computing

    Cloud computing has evolved from virtualization, utility computing and client-server architectures and is an extension of service oriented architectures. It has been referred to as a disruptive technology which has implications on a host of issues such as licensing, scalability, cost and performance measures, privacy and security. The authors propose...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    Efficient and Enhanced Data Mining Approach for Recommender System

    In this paper, the authors present an explanation of how recommender systems are related to some traditional database analysis techniques. They examine how recommender systems help E-commerce sites increase sales and analyze the recommender systems at six market-leading sites. Based on these examples, they create taxonomy of recommender systems, including...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    Detecting Black Hole Attacks in Wireless Sensor Networks Using Mobile Agent

    Wireless Sensor Network (WSN) have diverse field of application, but it is very much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against black attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, intermittent connectivity, and resource...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    An Intrusion Detection Model Based on Immunity for Wireless Sensor Network Dynamically

    The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of protection from invading pathogens, in a robust, self-organised and distributed manner. Secondly, current techniques used in computer security are not...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    A Critical Review of Recommender Systems in Web Usage Mining Based on User Ratings

    Recommender systems analyze user's profile and the relationship between user and target item to help user purchase or rent the item based on user's interest. With the help of computer, recommender systems can analyze huge collection of data based on users' preferences to give good recommended items. Recommender system can...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    Ambiguous Free Transmission Scheduling in Wireless Sensor Networks for Dynamic Queries

    Recent years have seen the emergence of wireless sensor network systems that must support high data rate and real-time queries of physical environments. With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    Wireless Sensor Networks for Energy Efficient MAC to Provide Delay Guarantee

    This paper presents a real-time MAC protocol for wireless sensor network that can provide delay guarantee. RTMAC is based on TDMA protocol, but it is carefully designed to overcome the high latency of traditional TDMA protocols. It also conserves energy when a node may not be transmitting or receiving packets....

    Provided By Planetary Scale

  • White Papers // Jul 2012

    Evaluation of Security and Performance of Dependable Data Storage in Cloud Computing

    Cloud computing has evolved from virtualization, utility computing and client-server architectures and is an extension of service oriented architectures. It has been referred to as a disruptive technology which has implications on a host of issues such as licensing, scalability, cost and performance measures, privacy and security. The authors propose...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    Efficient and Enhanced Data Mining Approach for Recommender System

    In this paper, the authors present an explanation of how recommender systems are related to some traditional database analysis techniques. They examine how recommender systems help E-commerce sites increase sales and analyze the recommender systems at six market-leading sites. Based on these examples, they create taxonomy of recommender systems, including...

    Provided By Planetary Scale

  • White Papers // Jul 2012

    Detecting Black Hole Attacks in Wireless Sensor Networks Using Mobile Agent

    Wireless Sensor Network (WSN) have diverse field of application, but it is very much prone to the security threats. This paper proposes a lightweight, fast, efficient and mobile agent technology based security solution against black attack for Wireless Sensor Networks (WSNs). WSN has a dynamic topology, intermittent connectivity, and resource...

    Provided By Planetary Scale