Distributed virtual machine allocation using DRR algorithm in cloud computing
In private cloud during FFCS registration large amount of students are trying to register their subject at same time from different places so heavy load is departing to server due to this heavy load to resources the server unable to give where response to students which lead to the problem student can’t register properly within given time or wait for long time until server recover from this problem. This problem can be solved by allocating the resources properly to server this comes under the infrastructure as a service (IaaS) we can use and allocate a various kind of resources. This paper proposed solved this problem efficiently according virtual machine is distributed in hierarchical architecture using dynamic round robin algorithm[DRR] , resources will be allocate efficiently so the load will be distributed to various virtual machine then student need not to wait for long time and they can register properly within a given time. Finally implemented on Simulator Cloudsim 3.0. Experiment result show DRR can achieved resource allocation efficiently in cloud computing.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Do the sentiments on the net really matter?
Our information-gathering behavior has always been to find out what other people think. Opinion-rich resources such as online review sites and personal blogs are growing rapidly which provide new opportunities and challenges, as people can actively use information technologies to seek out and understand the opinions of others. People share their experiences on-line, express their opinions, frustrations about anything. The huge amount of available data creates opportunities for automatic mining and analysis. It can be considered as a classification task: their feelings can be positive, negative or neutral. People don’t directly express sentiment, They can also use a diverse range of other methods to express their emotions. Authors may mix objective and subjective information about a topic, or write down psots about other topics than the one we are investigating. And also there is a lot of noise in the data gathered from the Web pages. Due to this the task of automatic recognition of the sentiment in on-line text becomes more difficult. The content we are interested in this paper is, what is sentiment analysis, how the sentiment analysis was useful for a bank, how can it be applied in market intelligence and what are the challenges that could be faced in Indian scenario.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Energy Saving Scheme for Wormhole Detection & Prevention in MANET & Sensor Networks
In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of security threats because of its open entrusted environment, with little security arrangement, security over MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of the prominent security threats wormhole attack is considered to be a very serious security threat over MANET. In wormhole two selfish node which is geographically very far away to each other makes tunnel between each other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count method.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Phishing URL Detecting Using ANN Classification In Online Social Network
Phishing is considered a form of web threats that is defined as the art of mimicking a website of an honest enterprise aiming to obtain user’s confidential credentials such as usernames, passwords and social security numbers. Social engineering and technical tricks are commonly combined together in order to start a phishing attack. The phishing attack starts by uploading the post on social network site which contain fraud URL that seems authentic to potential victims advising them to meet site and update or validate their information by following a URL link. The fraud user posts their comment on social network service that contains URL which are malicious. These malicious URL some time it contains malware or virus. When user clicks on these fraud URL Then viruses enter into user system and system gets affected. The proposed system Extraction of feature set for detecting fraud URL using ANN in social networking services effectively detect fraud URL with high accuracy.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Novel Nanometric Efficient Reversible Low Power Parity Preserving Full Adder/Subtractor
In this paper, a new 5×5 reversible parity preserving gate is proposed and employed to realize 1-bit reversible parity preserving full adder/subtractor. The proposed 1-bit full adder/subtractor is implemented using VHDL and compared to previously presented designs in the literature. The results show that the proposed design is more efficient in terms of number of DC inputs/outputs, delay and quantum cost. Also two reversible parity preserving four-bit parallel adder/subtractor and carry skip adder/subtractor are designed applying the proposed scheme and compared to the former designs.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An empirical study on secure and multiple web service collaborations
The objective of this study is to investigate the factors affecting secure and multiple web service collaborations. Online shopping is one such area where the need arises to perform secure communications with several other trading partners. In this study we have chosen a popular Chinese internet E-commerce company that offers online shopping and other internet related services. We have compared the current model which they have adopted to perform those collaborations and also proposed the benefits they would obtain if changes are made in their communication patterns.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A comparative survey of routing protocols in mobile ad hoc networks
A "Mobile Ad hoc Network" (MANET) is an independent system where mobile hosts are connected by wireless links without any of the preexisting administration. Each node acts as a host and sometimes as a router to forward packets to other nodes. So Routing protocol plays an important role in MANETs because it is designed with self-motivated topology, mobile host, distributed environment and limited battery power. In previous researches, a lot of routing protocols were developed for MANETs such as CGSR, DSR and ZRP. This paper evaluates these protocols by on their uniqueness, functionalities, pros and cons. This paper also emphasizes on enhancement of different protocol’s performance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A concept graph for rough set theory
Conceptual graphs (CGs) are a system of logic based on the existential graphs of Charles Sanders Peirce and the semantic networks of artificial intelligence. They express meaning in a form that is logically precise, humanly readable, and computationally tractable. With a direct mapping to language, conceptual graphs serve as an intermediate language for translating computer-oriented formalisms to and from natural languages. With their graphic representation, they serve as a readable, but formal design and specification language. CGs have been implemented in a variety of projects for information retrieval, database design, expert systems, and natural language processing. The rough set philosophy is founded on the assumption that with every object of the universe of discourse we associate some information (data, knowledge). For example if objects are patients suffering from a certain disease symptoms of the disease form information about patients- Objects characterized by the same information are indiscernible similar in view of the available information about them. The indiscernibility relation generated in this way is the mathematical basis of rough set theory.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An Overview on Different Techniques used in Intrusion Detection
In today’s modern and digital world countless milestones have been achieved by the human. Technology has completely enveloped us in some way or the other. Hence if there is not complete dependency but most it is on the use of technology. For example, communicating with someone using a device is technology. Today, there are endless organizations that are maneuvering in recent advancements in technology. Among these the one which concerns us is to secure information or data on the network. Network security is the most functional requirement of any system. So the question arises that how to secure the data on the network from the intruder. There are innumerable intrusion detection techniques to detect the intrusion in the system. This paper deals with some handful of the techniques with which we can secure our data on the network.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design of a frequent pattern mining based on systolic trees
Frequent pattern mining algorithms are designed to find commonly occurring sets in databases. This class of algorithms is typically very memory intensive, leading to prohibitive runtimes on large databases. A class of reconfigurable architectures has been recently developed that have shown promise in accelerating some data mining applications. In this paper, I propose a new architecture for frequent pattern mining based on a systolic tree structure. The goal of this architecture is to mimic the internal memory layout of the original pattern mining software algorithm while achieving a higher throughput. We provide a detailed analysis of the area and performance requirements of our systolic tree-based architecture, and show that our reconfigurable platform is faster than the original software algorithm for mining long frequent patterns.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]