- Filter by:
-
Content Type
-
Topic
-
A Survey on Locality Awareness Request Distribution in Cluster Based Network Servers
A World Wide Web (WWW) server is normally a single machine dedicated to process a HTTP request for a single WWW site. The number of people using the Internet has been growing at a very fast rate, while the services provided over the Internet are increasingly becoming mission critical. Hence,...
Download Now -
Smart Web Search Image with Profile Based User Personalized Privacy
The existing image retrieval which classifies based on the click through logs may play a vital role for effective search results. The user satisfaction can be obtained through the user click sequence. From the click sequence, the feedback sessions are calculated and produce effective search results. Thus the results show...
Download Now -
Present Trends of Data Protection Policies in Cloud Computing
Cloud computing is an emerging technology of sharing computational resources through a network may be LAN, MAN, WAN or the Internet. The resources which can share on cloud are software, platform, data storage & infrastructure. There are two parties involved in this technology Cloud Service Provider (CSP) and Cloud Consumer...
Download Now -
Web Page Change Detection Using Data Mining Techniques and Algorithms
In this paper, the authors describe web page detection for structural change detection which has to provide direct access to information on the web page. A new technique has been provided for detecting changes in Web page. The technique is a new method to measure the similarity of two pages...
Download Now -
Significance of Web Usage Mining in Machine Study
The web has been provided that a crucial and essential platform for receiving data and circularize data as well as interacting with society on the web. With its astronomical growth over the past decade, the web becomes vast, completely different and dynamic. The appliance of knowledge mining techniques to the...
Download Now -
Cloud Computing Challenges: A Survey
Cloud computing is a new and promising paradigm delivering IT services as computing utilities. Many big companies are throwing resources into it. It provides efficient computing by centralizing storage, memory processing and bandwidth. Adopting cloud computing can result in both positive and negative effects on data security. This paper presents...
Download Now -
Effect of Malicious Nodes in a Multi-Hop Mobile Ad Hoc Network
Providing proper secure communications is challenging in Mobile Ad hoc NETworks (MANETs) because of unreliable wireless media, mobility of the nodes and lack of infrastructure. Usually, wired and wireless networks use cryptographic techniques for secure communications. Symmetric and asymmetric cryptography have been extensively used in ad hoc networks and have...
Download Now -
Collision Avoidance Using WTRP-MAC Protocol for Clustered Wireless Sensor Network
In a clustered wireless sensor network, multiple accesses at a time lead to collision. This could cause retransmit of lost packets. It increases power consumption, decreases sensor lifetime and delay in packet transmission. Basically sensors are not always need to send data. Suppose if an event occurs, then every sensor...
Download Now -
Design and Implementation of Captcha with Click Point Authentication Based on Hard AI Problems
A fundamental task in security is to create cryptographic primitives based on hard mathematical problems that are computationally intractable using hard AI problems for security is emerging as an exciting new paradigm, but has been underexplored. Here, the authors present a new security primitive based on hard AI problems, which...
Download Now -
A Theoretical Analysis of Different Hacking Techniques in Wireless Networks
Over the course of past few decades to today's world, even though the usage of computers is increasing rapidly, the users hesitate to store their personal information in their computers because of the security issues of computing. The security issues are embossed because of the hackers. Hackers are also the...
Download Now