- Filter by:
-
Content Type
-
Topic
-
Sample Network Topologies Using VLAN and Implemented with GNS3 for Educational Purposes
In this paper, the authors are dedicated to the implementation of VLAN topologies for educational purposes implemented with the GNS3 specialized simulation system. Sample problems and solutions are at the heart of this paper and are intended, but not limited to teaching and learning in the context of the laboratory...
Download Now -
Implementation of Agent Based System for Monitoring and Controlling SLA in Cloud Environment
Cloud computing is basically a utility based model where cloud user pays in per usage mode for services being hired. The services are provided on mutually agreed terms and conditions called Service Level Agreement (SLA). The various SLA parameters being agreed are to be monitored while cloud services are being...
Download Now -
A New Approach for Database "Column-oriented DBMS"
As the people all know that many different kind of organization need database for required information from different area like analytic, different types of reports and other many reasons. As the organization grows the database also grow into millions of records spared over many tables and business intelligent/science. And if...
Download Now -
Energy Optimization in Multimedia Wireless Devices
Energy conservation in battery powered mobile devices which perform wireless multimedia streaming has been a significant research problem. This is because these mobile devices consume a lot of power while receiving, decoding and ultimately, presenting the multimedia content. What makes things worse is the fact that battery technologies have not...
Download Now -
An Efficient and Scalable Approach for Building a Robust Network Using MANETs
Today, wireless networks are widely used in the people day-to-day operations. A few years back, wireless networks existed only in labs, as they were typically expensive. However recently, there has been mass proliferation of inexpensive wireless devices. This has made wireless networks immensely popular and attractive. One such wireless network,...
Download Now -
Secure Data Sharing in Dynamic Groups for Cloud Storage with Backup Manager
Cloud computing is associate degree rising, computing paradigm within which resources of the com-putting infrastructure area unit provided as services over the net. As promising because it is, this paper conjointly brings forth several new challenges for knowledge security and access management once users confidential against untrusted server existing solutions...
Download Now -
Integrating a Server for Remote Generation of Wake on LAN Packets to Network Management Systems
The technology Wake On Local area network (WOL) represents a communication standard that enables a remote device to be switched into or out of standby mode (stand by) by sending WOL packets in Ethernet (IEEE 802.3) network. This paper suggests the realization of a hardware device and its software provisioning,...
Download Now -
Security Challenges in Internet of Things (IoT)
With the mounting prominence of the internet, secure transmission of information is crucial. The paper primarily focuses on recent research trends in security and privacy of Internet of Things (IoTs). The benefits IoT has delivered is immense but at the cost of data security. Characteristics, architecture and limitations of IoT...
Download Now -
Social Networking Spam Detection Using R Package and K-Nearest Neighbor Classification
Spam is one of the problems which are faced on social networking websites. Everyone today uses the internet very much and hence, everyone is familiar with the spam too. Spam is nothing but the mails or more appropriately it is defined as junk mails which create hindrance in doing the...
Download Now -
Reusability and Test Case Prioritization Approach in Regression Testing
Software engineering deals with the development of software and different types of web applications. Due to changes in the customer requirements, product modifications have to be done in the web application so that an organization can interact with more customers. In order to validate the modifications, regression testing has to...
Download Now