- Filter by:
-
Content Type
-
Topic
-
Preserving Data Privacy in Third Party Cloud Audit
Cloud technology provides many benefits in terms of computing and storage. Accessibility from anywhere and on-demand service provision maximizing the available resource utilization is the major features of cloud storage. However, one of the major problems in cloud storage is "Data integrity". In order to ensure data integrity, it is...
Download Now -
The CSMA/CA based random channel access mechanisms in Wireless Mesh Networks (WMNs), IEEE 802.11 DCF and EDCA, are inefficient to eliminate effectively hidden terminal and exposed terminal problems in multi-hop scenarios. In this paper, the authors propose efficient channel assignment and routing protocols for Multi-Radio Multi-Channel (MRMC) wireless mesh networks....
Download Now -
Composite web service is a combination of multiple abstract web services. To build a composite web service, the authors have to combine multiple abstract web services together may be in sequence or in parallel. On the fly to select the best web service from the multiple abstract web services available...
Download Now -
Optimization of Hello Messaging Scheme in MANET On-Demand Routing Protocol Using PSO
Mobile Ad hoc NETwork (MANET) is an autonomous, self-configuring and infrastructure-less system in which various mobile nodes are connected by wireless links. In MANETs hello messages are periodically exchanged to maintain the connectivity of neighbor nodes. While discovering neighbor nodes, an unnecessary hello message causes the problem of battery drainage...
Download Now -
A Survey Paper: Cloud Computing and Virtual Machine Migration
Cloud computing is one of the well developing fields in Computer Technology. Now-a-days, cloud computing is one of the fast growing technology because of online, cheap and pay as use scheme. Cloud computing involves the concepts of parallel processing and distributed computing in order to provide the shared resources by...
Download Now -
Proposal of Max-Min Algorithm for Scheduling of Workflows in Cloud Environment
Cloud computing gave a new direction for the betterment of IT industry. It provides services over Internet according to pay per services use the advent of cloud computing as a new model of service provisioning in distributed systems, encourages researchers to investigate its benefits and drawbacks in executing scientific applications...
Download Now -
Hybrid Cryptographic Framework for Multimedia Data Storage Over Cloud
Cloud computing environment gives various platforms, services and applications for better optimization of the data, scalability via storage and the cost reduction flexibility. It is the next era platform for acquiring the various services and platform without using them. The authors have worked on multimedia security with respect to multimedia....
Download Now -
Wireless Sensor Networks (WSNs) has different types of sensor nodes which are of low cost and scattered over a region to form the self-organized network. These sensor nodes sense that data and send the report to the base station which requires lot of energy. In WSN developing energy efficient routing...
Download Now -
B-LEACH: A Clustering Protocol for Wireless Sensor Networks Based on Bacterial Foraging Algorithm
Wireless Sensor Networks (WSNs) are popular as they are potentially low cost solution to various real world challenges. Environment is monitored by the autonomous nodes of the WSNs. Recent research in WSN has led to various new routing protocols. Routing protocols have proven to increase the network throughput, reduced delay...
Download Now -
The area of Wireless Sensor Network (WSN) is one of the emerging and fast growing fields in the world but a key issue in WSN is maximizing the network lifetime. Network lifetime is important in sensor node when the sensor node, distributed typically in remote area is powered by finite...
Download Now