Defend Clandestine Rated Multi-keyword Search for Multi-Proprietors in Cloud Computing
Research Paper | Journal Paper
Vol.3 , Issue.9 , pp.248-255, Sep-2015
Abstract
Due to the escalating popularity of cloud computing, more and more data owners are encouraged to outsource their data to cloud servers for great convenience and scaled-down the cost in data management. For privacy concerns, secure searches over encrypted cloud data have motivated numerous research works under the solitary owner model. However, most cloud servers in practice do not just serve single owner; instead, they support multiple owners to share their profits fetched by cloud computing. In our proposed scheme which is deals with Defend Clandestine rated Multi-keyword Search in a Multi-proprietor model (DCMSM). To activate cloud servers to perform secure search without knowing the actual data of both keywords and trapdoors, we methodically build a newfangled secure search protocol. We propose another technique as distinct Additive Order and Privacy Preserving Function family for the purpose of rank the search results and preserve the privacy of appositeness scores between keywords and files. By introducing a modish dynamic secret key generation protocol and a novel data user authentication protocol to prevent the attackers from intruding secret keys and concealing the legal data users submitting searches. Additionally, DCMSM supports efficient data user invocation. Comprehensive experiments on real-world datasets confirm the efficaciousness and efficiency of DCMSM.
Key-Words / Index Term
Cloud Computing, Rated Keyword Search, Multiple Owners, Privacy Preserving, Dynamic Secret Key.
References
[1] C. Wang, S. S. Chow, Q. Wang, K. Ren, and W. Lou, Privacy-preserving public auditing for secure cloud storage,” Computers, IEEE Transactions on, vol. 62, no. 2, pp. 362-375, 2013.
[2] D.Song, D.Wagner, and A.Perrig, “Practical techniques for searches on encrypted data,” in Proc. IEEE International Symposium on Security and Privacy (S&P’00), Nagoya, Japan, Jan.2000, pp. 44-55.
[3] R.Curtmola, J.Garay, S.Kamara, and R.Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proc. ACM CS’06, VA, USA, Oct. 2006, pp.79-88.
[4] N.Cao,C. Wang, M. Li, K. Ren, and W. Lou, “Privacy- preserving multi-keyword ranked search over encrypted clouddata,”inProc.IEEEINFOCOM’11,Shanghai,China,Apr.2011,pp. 829-837.
[5] N.Cao, C.Wang, M. Li, K. Ren, and W. Lou,“Privacy- preserving multi-keyword ranked search over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on,vol. 25, no. 1, pp. 222-233, 2014.
[6] T. Jung, X. Y. Li, Z. Wan, and M. Wan, “Privacy preserving cloud data access with multi-authorities,” in Proc. IEEE INFOCOM’13, Turin, Italy, Apr. 2013, pp. 2625-2633.
Citation
Vanishree K.A., Santhiya. C and M.K. Chandrasekaran PhD, "Defend Clandestine Rated Multi-keyword Search for Multi-Proprietors in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.248-255, 2015.
Data Hiding In Encrypted Video Stream By Code-Word Substitution
Survey Paper | Journal Paper
Vol.3 , Issue.9 , pp.256-260, Sep-2015
Abstract
Inspired by the SMVQ technique, this dissertation proposes a reversible data hiding based on VQ-compressed images.This scheme can completely recover the original VQ cover image from an embedded image after the embedded message is extracted. Compared to the SMVQ technique that is very time consuming to set up a state codebook and then search the nearest codeword, the proposed scheme employs block match coding (BMC) to reduce the complexity and preserve a satisfactory embedding capacity. The main problems in the former works are low embedding capacities, low embedding rates, high complexities, or high bit rates. To improve these problems, the proposed scheme applies the BMC prediction to encode indices, and thus can obtain a higher embedding capacity, higher embedding rate, higher processing efficiency, and lower bit rate simultaneously. This chapter describes the method used for data hiding that is vector quantization and its type side match vector quantization in detail.
Key-Words / Index Term
Data hiding, encrypted domain, H.264/AVC, codeword substituting
References
[1] DawenXu, Rangding Wang, and Yun Q. Shi, Fellow,“Data Hiding in Encrypted H.264/AVC Video Streams by CodewordSubstitution”IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 4, APRIL 2014.
[2] D. W. Xu and R. D. Wang, “Watermarking in H.264/AVC compressed domain using Exp-Golomb code words mapping,” Opt. Eng., vol. 50, no. 9, p. 097402, 2011.
[3] D. K. Zou and J. A. Bloom, “H.264 stream replacement watermarking with CABAC encoding,” in Proc. IEEE ICME, Singapore, Jul. 2010, pp. 117–121.
[4] C. C. Chang, W. C. Wu, and Y. C. Hu, “Lossless recovery of a VQ index table with embedded secret data,” J. Visual Commun. Image Representation, vol. 18, no. 3, pp. 207–216, 2007.
[5] C. C. Chang, Y. P. Hsieh, and C. Y. Lin, “Lossless data embedding with high embedding capacity based on de-clustering for VQ-compresse dcodes,” IEEE Trans. Informat. Forensics Security, vol. 2, no. 3,pp. 341–349, Sep. 2007.
[6] S. C. Shie, S. D. Lin, and C. M. Fang, “Adaptive data hiding based on SMVQprediction,”IEICE Trans. Informat. Syst., vol. E89-D, no. 1, pp.358–362, 2006.
[7] C. C. Chang and C. Y. Lin, “Reversible steganography for VQ compressed images using side matching and relocation,” IEEE Trans. Inform. Forensics Security, vol. 1, no. 4, pp. 493–501, Dec. 2006.
[8] S. G. Lian, Z. X. Liu, Z. Ren, and H. L. Wang, “Secure advanced video coding based on selective encryption algorithms,” IEEE Trans.Consumer Electron., vol. 52, no. 2, pp. 621–629, May 2006.
[9] C. C. Chang, G. M. Chen, and M. H. Lin, “Information hiding basedon search-order coding for VQ indices,” Pattern Recognnit. Lett., vol.25, no. 11, pp. 1253–1261, 2004.
[10] J. Tian, “Reversible data embedding using a difference expansion,” IEEETrans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug.2003.
[11] I. E. G. Richardson, H.264 and MPEG-4 Video Compression: VideoCoding for Next Generation Multimedia. Hoboken, NJ, USA: Wiley,2003.
Citation
Sagar Hajare, Sujata Nikam, Kavita Vispute, Ravindra Bodke, "Data Hiding In Encrypted Video Stream By Code-Word Substitution," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.256-260, 2015.
Reduced Overhead Based Approach on the other hand Secure Communication in Versatile Ad Hoc Network
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.261-266, Sep-2015
Abstract
Versatile ad Hoc network (MANET) is an infrastructure Versatile net meets expectations where nodes can openly move and join. MANET has attracted much attention in recent years owing To the increased focus on wireless communication. It is a highly adaptable network, vulnerit to various types of security Assaults By malignant nodes. Ensuring network security is a major the other hand concern in the case of MANET. Authentication revocation play and critical role in securing the network by isolating attackers from further participating in network activities. Confirmation Power (CA) is depend it on the other hand revoking the endorsements of aggress on the other hand nodes. CA keeps up two lists, caution list and dark list to keep denouncing and accused nodes respectively in request to perform revocation process by considering the first arrived allegation packet. In This paper we focus on the issues of Authentication revocation based on first accusation. A limit based Approach is proposed on the other hand Authentication revocation with better performance, but there is some sort of Overhead exist. In request to make the communication in MANET more secure we propose a reduced Overhead based Approach that upgrades limit based Approach which introduce an additional list, middle of the road list in the CA. The scheme is evaluated and results demonstrate that the proposed scheme is effective and productive to give secure communication in versatile ad Hoc network.
Key-Words / Index Term
MANET, Secure Communication, Enforcing Secure, Ad Hoc Network
References
[1] Ismail, Z. ; Kuliyyah of Inf. Sci. & Technol., Kolej Univ. Insaniah, Alor Setar, Malaysia ; Hassan, R., “Effects of Packet Size on AODV Routing Protocol Implementation in Homogeneous and Heterogeneous MANET”, Published in: Computational Intelligence, Modelling and Simulation (CIMSiM), 2011 Third International Conference on Date of Conference: 20-22 Sept. 2011 Page(s): 351 – 356.
[2] Ismail, Z. ; Kuliyyah of Inf. Sci. & Technol., Kolej Univ. Insaniah, Alor Setar, Malaysia ; Hassan, R., “A performance study of various mobility speed on AODV routing protocol in homogeneous and heterogeneous MANET”, Published in: Communications (APCC), 2011 17th Asia-Pacific Conference on Date of Conference: 2-5 Oct. 2011 Page(s): 637 – 642.
[3] Thorat, S.A. ; Walchand Coll. of Eng., Sangli, India ; Kulkarni, P.J., “Design issues in trust based routing for MANET”, Published in: Computing, Communication and Networking Technologies (ICCCNT), 2014 International Conference on Date of Conference: 11-13 July 2014 Page(s): 1 – 7.
[4] Dilli, O. ; Dept. of Tech. Programs, Air Force Vocational Training Sch., Izmir, Turkey ; Akcam, N. ; Koyuncu, M. ; Oguslu, E., “Secure communication tests carried out with next generation narrow band terminal in satellite and local area networks”, Published in: Recent Advances in Space Technologies (RAST), 2013 6th International Conference on Date of Conference: 12-14 June 2013 Page(s): 493 – 498.
[5] Tien-Sheng Lin ; Electr. Eng. Nat. Taiwan Univ. Taipei, Taipei ; Tien-Sheng Lin ; Sy-Yen Kuo, “Quantum Wireless Secure Communication Protocol”, Published in: Security Technology, 2007 41st Annual IEEE International Carnahan Conference on Date of Conference: 8-11 Oct. 2007 Page(s): 146 – 155.
[6] Takizawa, M.; Dept. of Comput. & Syst. Eng., Tokyo Denki Univ., Saitama, Japan; Mita, H., “Secure group communication protocol for distributed systems”, Published in: Computer Software and Applications Conference, 1993. COMPSAC 93. Proceedings. Seventeenth Annual International Date of Conference: 1-5 Nov 1993 Page(s): 159 – 165.
[7] Khan, S.M.; Dept. of Comput. Sci., Univ. of Texas at Dallas, Richardson, TX, USA; Hamlen, K.W.; Kantarcioglu, M., “Silver Lining: Enforcing Secure Information Flow at the Cloud Edge”, Published in: Cloud Engineering (IC2E), 2014 IEEE International Conference on Date of Conference: 11-14 March 2014 Page(s): 37 – 46.
[8] Bartoletti, M. ; Dipt. di Informatica, Univ. di Pisa, Italy ; Degano, P. ; Ferrari, G.L., “Enforcing secure service composition”, Published in: Computer Security Foundations, 2005. CSFW-18 2005. 18th IEEE Workshop Date of Conference: 20-22 June 2005 Page(s): 211 – 223.
[9] Fengjun Li ; Dept. of EECS, Univ. of Kansas, Lawrence, KS, USA ; Bo Luo ; Peng Liu ; Dongwon Lee, “Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing”, Published in: Information Forensics and Security, IEEE Transactions on (Volume:8 , Issue: 6 ) Page(s): 888 – 900.
[10] Fujiwara, S. ; Grad. Sch. of Inf. Sci., Hiroshima City Univ., Hiroshima, Japan ; Ohta, T. ; Kakuda, Y., “An Inter-domain Routing for Heterogeneous Mobile Ad Hoc Networks Using Packet Conversion and Address Sharing”, Published in: Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on Date of Conference: 18-21 June 2012 Page(s): 349 – 355.
[11] Chaturvedi, A. ; Dept. of CSE, BIST, Bhopal, India ; Tiwari, D. ; Bhadoria, R.S. ; Dixit, M., “Route Discovery Protocol for Optimizing the Power Consumption in Wireless Ad-hoc Network”, Published in: Communication Systems and Network Technologies (CSNT), 2013 International Conference on Date of Conference: 6-8 April 2013 Page(s): 290 – 294.
Citation
G.Abirami and R.Mala, "Reduced Overhead Based Approach on the other hand Secure Communication in Versatile Ad Hoc Network," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.261-266, 2015.
User Review Based Content Image Retrieval Using Voronoi Algorithm
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.267-271, Sep-2015
Abstract
Relevance input is a fit inquiry change technique in the field of substance based picture retrieval. The key issue in relevance input is how to enough use the input information to improve the retrieval performance. This paper presents a relevance input scheme using Voronoi network model on the other hand input information adoption. Critical images during previous cycles are sensibly incorporated into the current cycle and the chosen critical images can better capture user’s information need.
Key-Words / Index Term
Relevance Feedback, Substance Based Picture Retrieval, Critical Picture Adoption, Voronoi Network
References
Jun-yi Wang ; Coll. of Comput. Sci., Inner Mongolia Univ., Huhhot, China ; Xin-ming Ye, “The study of methods for language model based positive and negative relevance feedback in information retrieval”, Published in: Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on (Volume:3) Date of Conference: 29-31 Oct. 2010 Page(s):870 – 873.
[2] Chen Chen ; Coll. of Inf. Tech., Sci. Nankai Univ., Tianjin, China ; Hou Chunyan ; Yuan Xiaojie, “Relevance Feedback Fusion via Query Expansion”, Published in: Web Intelligence and Intelligent Agent Technology (WI-IAT), 2012 IEEE/WIC/ACM International Conferences on (Volume:3) Date of Conference: 4-7 Dec. 2012 Page(s): 122 – 126.
[3] Zhang, Wen-jing ; Wang, Jun-yi, “The Study of Methods for Language Model Based Positive and Negative Relevance Feedback in Information Retrieval”, Published in: Information Science and Engineering (ISISE), 2012 International Symposium on Date of Conference: 14-16 Dec. 2012 Page(s): 39 – 43.
[4] Hoi, S.C.H. ; Dept. of Comput. Sci. & Eng., Chinese Univ. of Hong Kong, China ; Lyu, M.R. ; Rong Jin, “A unified log-based relevance feedback scheme for image retrieval”, Published in: Knowledge and Data Engineering, IEEE Transactions on (Volume:18 , Issue: 4 ) Page(s): 509 – 524 ISSN : 1041-4347.
[5] Araujo, M.R.B. ; Comput. Sci. Dept., Univ. of Sao Paulo, Sao Carlos, Brazil ; Traina, A.J.M. ; Traina, A. ; Bueno, J.M., “Extending relational databases to support content-based retrieval of medical images”, Published in: Computer-Based Medical Systems, 2002. (CBMS 2002). Proceedings of the 15th IEEE Symposium on Date of Conference: 2002 Page(s): 303 – 308.
[6] Chhasatia, N.J. ; Dept. of EC, G.H. Patel Coll. of Eng. & Technol., Anand, India ; Trivedi, C.U. ; Shah, K.A., “Performance evaluation of localized person based scene detection and retrieval in video”, Published in: Image Information Processing (ICIIP), 2013 IEEE Second International Conference on Date of Conference: 9-11 Dec. 2013 Page(s): 78 – 83.
[7] Juan Cheng ; Univ. of Inf. Eng., Henan, China ; Xijian Ping, “Text image retrieval based on generalized normalized picture information measure”, Published in: Natural Language Processing and Knowledge Engineering, 2005. IEEE NLP-KE '05. Proceedings of 2005 IEEE International Conference on Date of Conference: 30 Oct.-1 Nov. 2005 Page(s): 503 – 505.
[8] Chhasatia, N.J. ; G.H. Patel Coll. of Eng. & Technol., Anand, India ; Trivedi, C.U. ; Shah, K.A. ; Mankodi, P.R., “Genre based video retrieval using similarity function between feature vectors”, Published in: Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on Date of Conference: 26-28 Dec. 2013 Page(s): 1 – 7.
[9] Bueno, J.M. ; Comput. Sci. Dept., Sao Paulo Univ., Brazil ; Chino, F. ; Traina, A.J.M. ; Traina, A.J.M., “How to add content-based image retrieval capability in a PACS”, Published in: Computer-Based Medical Systems, 2002. (CBMS 2002). Proceedings of the 15th IEEE Symposium on Date of Conference: 2002 Page(s): 321 – 326.
[10] Doyle, R. ; NMRC, Cork, Ireland ; Hentzell, H., “EUROPRACTICE-MCM: a European initiative to create an MCM infrastructure and to stimulate commercial MCM take-up”, Published in: Multichip Modules, 1997., International Conference on Date of Conference: 2-4 Apr 1997 Page(s): 14 – 18.
[12] Rondovic, B. ; Fac. of Econ., Univ. of Montenegro, Podgorica, Montenegro ; Lazovic, V. ; Popovic, Z. ; Durickovic, T., “Determinants of electronic commerce - the factors of acceptance in Montenegro”, Published in: Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015 38th International Convention on Date of Conference: 25-29 May 2015 Page(s): 1475 – 1480.
[14] Rey, J.C. ; Mentor Graphics Corp., San Jose, CA ; Nagaraj, N.S. ; Kahng, A. ; Aitken, R., “DFM in practice: Hit or hype?”, Published in: Design Automation Conference, 2008. DAC 2008. 45th ACM/IEEE Date of Conference: 8-13 June 2008 Page(s): 898 – 899.
[15] Di Giacomo, T. ; MIRALab, Univ. of Geneva, Switzerland ; Joslin, C. ; Garchery, S. ; Magnenat-Thalmann, N., “Adaptation of facial and body animation for MPEG-based architectures”, Published in: Cyberworlds, 2003. Proceedings. 2003 International Conference on Date of Conference: 3-5 Dec. 2003 Page(s): 221 – 228.
Citation
A.Kalaiyarasi and R.Mala, "User Review Based Content Image Retrieval Using Voronoi Algorithm," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.267-271, 2015.
Determining Evolving of Rising Issues in Social Network
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.272-276, Sep-2015
Abstract
This paper presents an intelligent news stream representation that reveals rising subjects in dynamic advanced content archives. The exhibited approach consolidates a few visual analogies and can be effortlessly adjusted to present multi-source social media datasets. In the connection of this work, we talk about different routines on the other hand improving visual interfaces on the other hand getting to amassed media representations. We consolidate falling squares with bar diagrams and arcs, in any case keep these parts unmistakably separated in diverse zones of the display. The circular segment metaphor the other hand is adjusted and improved with interactive controls to help clients understand the dataset’s underlining meaning. The paper portrays the execution of the model and talks about plan issues with a particular accentuation on visual analogies to highlight covered up relations in advanced content. We finish up with a summary of the lessons learnt and the incorporation of the representation part into the Media Observe on Atmosphere Change (www.ecoresearch.net/climate), a open Web entry that totals ecological information from a variety of online sources counting news media, web journals and other social media such as Twitter, YouTube and Facebook.
Key-Words / Index Term
Data Visualization, News Flow, String Arc, Related Term, Rising Topic, Interface Metaphor
References
[1] Liang Zhu ; Inst. of Remote Sensing Applic., Chinese Acad. of Sci., Beijing, China ; Bing-fang Wu ; Yue-min Zhou ; Xin-hui Ma, “Research on Eco-environmental Data Visualization for Three Gorges Project”, Published in: Information Engineering and Electronic Commerce, 2009. IEEC '09. International Symposium on Date of Conference: 16-17 May 2009 Page(s): 590 – 593.
[2] Donalek, C. ; California Inst. of Technol., Pasadena, CA, USA ; Djorgovski, S.G. ; Cioc, A. ; Wang, A., “Immersive and collaborative data visualization using virtual reality platforms”, Published in: Big Data (Big Data), 2014 IEEE International Conference on Date of Conference:27-30 Oct. 2014 Page(s): 609 – 614.
[3] Jinson Zhang ; Sch. of Software, Univ. of Technol., Sydney, Sydney, NSW, Australia ; Mao Lin Huang ; Wen Bo Wang ; Liang Fu Lu, “Big Data Density Analytics Using Parallel Coordinate Visualization”, Published in: Computational Science and Engineering (CSE), 2014 IEEE 17th International Conference on Date of Conference: 19-21 Dec. 2014 Page(s): 1115 – 1120.
[4] Franke, E. ; Autom. & Data Syst. Div., Southwest Res. Inst., San Antonio, TX, USA ; Magee, M., “Reducing data distribution bottlenecks by employing data visualization filters”, Published in: High Performance Distributed Computing, 1999. Proceedings. The Eighth International Symposium on Date of Conference: 1999 Page(s): 255 – 262.
[5] Bo Zhang ; Grad. Sch. at Shenzhen, Tsinghua Univ., Shenzhen, China ; Jinchuan Wang ; Lei Zhang, “A Tweet-Centric Algorithm for News Ranking”, Published in: Distributed Computing Systems Workshops (ICDCSW), 2013 IEEE 33rd International Conference on Date of Conference: 8-11 July 2013 Page(s): 190 – 195.
[6] Hongxiang Diao ; Inf. Sci. & Technol. Inst., Hunan Agric. Univ., Changsha, China ; Zhansheng Bai ; Xilin Yu, “Notice of Retraction The application of improved K-Nearest Neighbor classification in topic tracking”, Published in: Educational and Information Technology (ICEIT), 2010 International Conference on (Volume:2 ) Date of Conference: 17-19 Sept. 2010 Page(s): V2-64 - V2-68.
[7] Sano, M. ; NHK Sci. & Technol. Res. Labs., Tokyo, Japan ; Shibata, M. ; Yagi, N. ; Katayama, N., “Visually Guided Summary Based on Roles of Shots for Understanding News Topics”, Published in: Signal-Image Technology & Internet-Based Systems (SITIS), 2009 Fifth International Conference on Date of Conference: Nov. 29 2009-Dec. 4 2009 Page(s): 279 – 286.
[8] Wells, J.D. ; Oregon State Univ., Corvallis, OR, USA ; Fuerst, W.L., “Domain-oriented interface metaphors: designing Web interfaces for effective customer interaction”, Published in: System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on Date of Conference: 4-7 Jan. 2000 Print ISBN: 0-7695-0493-0.
[9] Toms, E.G. ; Sch. of Libr. & Inf. Studies, Dalhousie Univ., Halifax, NS, Canada ; Campbell, D.G., “Genre as interface metaphor: exploiting form and function in digital environments”, Published in: Systems Sciences, 1999. HICSS-32. Proceedings of the 32nd Annual Hawaii International Conference on (Volume: Track2) Date of Conference: 5-8 Jan. 1999.
[10] Johnson, K.T. ; Grado Dept. of Ind. & Syst. Eng., Virginia Tech., USA, “Effects of socio-economic status on interface metaphor use and computer performance”, Published in: Human Centric Computing Languages and Environments, 2003. Proceedings. 2003 IEEE Symposium on Date of Conference: 28-31 Oct. 2003 Page(s): 275 – 276.
[11] Bryan, D. ; Centre for Strategic Technol. Res., Andersen Consulting, Northbrook, IL, USA ; Gershman, A., “The aquarium: a novel user interface metaphor for large, online stores”, Published in: Database and Expert Systems Applications, 2000. Proceedings. 11th International Workshop on Date of Conference: 2000 Page(s): 601 – 607.
Citation
R. Kausalya and R. Mala, "Determining Evolving of Rising Issues in Social Network," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.272-276, 2015.
Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.277-281, Sep-2015
Abstract
Cloud handling has emerged as a prominent paradigm that offers handling resources (e.g. CPU, storage, bandwidth, software) as scale capable also, on-demo, organizations over the Internet. As more players enter this rising market, a heterogeneous cloud handling market is anticipated to evolve, where individual players will have specific volumes of resources, also, will give specialized services, also, with specific levels of quality of services. It is anticipated that association suppliers will thus, besides competing, too collaborate to complement their resources in request to move forward asset use also, combine individual organizations to offer more complex esteem chains also, end-to-end arrangements required by the customers. In this paper we investigate the capacity of joint effort structure in cloud handling environments. This joint effort will be driven by the developing need to offer assorted organizations without having to spend heavily on infrastructure. Coordinated effort can be a boon to all cloud association suppliers in a way that the customers would have on offer a consolidated catalogue of all partnering CSPs.
Key-Words / Index Term
Cloud Computing, Cloud association provider(CSP), Proxy,SaaS, IaaS, PaaS
References
[1] Sang Jun Park ; Dept. of Comput. Sci., Indiana Univ.-Purdue Univ., Fort Wayne, IN, USA ; Jin Soung Yoo” Leveraging cloud computing for spatial association mining” Published in: Systems, Man and Cybernetics (SMC), 2014 IEEE International Conference on Date of Conference:5-8 Oct. 2014 Page(s):4152 – 4153.
[2] Wang Yong ; Dept. of Comput. Sci. & Eng., Guilin Univ. of Electron. Technol., Guilin, China ; Zhang Zhe ; Wang Fang” A parallel algorithm of association rules based on cloud computing” Published in:Communications and Networking in China (CHINACOM), 2013 8th International ICST Conference on Date of Conference:14-16 Aug. 2013 Page(s):415 – 419.
[3] Xueyan Huang ; Wireless Signal Process. & Network Lab., Beijing Univ. of Posts & Telecommun., Beijing, China ; Yong Li ; Gang Chuai ; Mugen Peng” Work in progress: Dynamic resource allocation and user association for heterogeneous cloud cellular networks” Published in:Communications and Networking in China (CHINACOM), 2014 9th International Conference on Date of Conference: 14-16 Aug. 2014Page(s):474 – 477.
[4] Zhao-hong Wang ; Dept. of Comput. Sci. & Technol., Weifang Univ., Weifang, China Quantitative Association Rules MiningMethod Based on Trapezium Cloud Model Published in: Database Technology and Applications (DBTA), 2010 2ndInternational Workshop on Date of Conference:27-28 Nov. 2010Page(s):1 – 4.
[5] Zhihui Zhou ; Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China ; Guixia Liu ; Lingtao Su ; Lun Yan” CChi: An efficient cloud epistasis test model in human genome wide association studies” Published in: Biomedical Engineering and Informatics (BMEI), 2013 6th International Conference on Date of Conference:16-18 Dec. 2013Page(s):787 – 791.
[6] Sunitha, N.R. ; Dept. of Comput. Sci. &Eng., Siddaganga Inst. of Technol., Tumkur ; Amberker, B.B.” Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers using DSA with Proxy Revocation” Published in:Advance Computing Conference, 2009. IACC 2009. IEEEInternational Date of Conference:6-7 March 2009Page(s):681 – 686.
[7] Jindan Zhang ; Dept. of Electron. Inf., Xianyang Vocational Tech. Coll., Xianyang ; Xu An Wang” Non-transitive Bidirectional Proxy Re-encryption Scheme” Published in: Networking and Digital Society, 2009. ICNDS '09. InternationalConference on (Volume:1 )Date of Conference: 30-31 May 2009 Page(s):213 – 216.
[8] Liu Wen-Yuan ; Yanshan Univ., Qinhuangdao ; Tong Feng ; Luo Yong-An ; Zhang Feng” A Proxy Blind Signature Scheme Based on Elliptic Curve with Proxy Revocation” Published in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on (Volume:1 )Date of Conference: July 30 2007-Aug.1 2007 Page(s):99 – 104.
[9] Iuon-Chang Lin ; Dept. of Manage. Inf. Syst., Nat. Chung Hsing Univ., Taichung ; Chin-Chen Chang ; Jen-Ho Yang” An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy” Published in: Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on Date of Conference:15-17 Aug. 2008 Page(s):1537 – 1540.
[10] Fengying Li ; Dept. of Educ. Inf. Technol., East China Normal Univ., Shanghai, China ; Qingshui Xue ; Jiping Zhang ; Zhenfu Cao” About the security for HW threshold proxy signature scheme with self-certified public key system” Published in:Communications and Networking in China, 2009. ChinaCOM 2009. Fourth International Conference onDate of Conference:26-28 Aug. 2009Page(s):1 – 5
[11] Songqing Chen ; Dept. of Comput. Sci., Coll. of William & Mary, Williamsburg, VA ; Bo Shen ; Wee, S. ; Xiaodong Zhang” Designs of high quality streaming proxy systems” Published in: INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies (Volume:3 ) Date of Conference:7-11 March 2004 Page(s):1512 - 1521 vol.3
[12] Bu Sung Lee ; HP Labs. Singapore, Singapore, Singapore ; Shixing Yan ; Ding Ma ; Guopeng Zhao” Aggregating IaaS Service” Published in:SRII Global Conference (SRII), 2011 Annual Date of Conference:March 29 2011-April 2 2011 Page(s):335 – 338.
Citation
G.Malini and A.Immaculate Mercy , "Evaluating Synchronized Determination Assembly in Multi-Cloud Atmosphere," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.277-281, 2015.
Scheme Reflections aimed at Positioning Submerged Radar Networks
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.282-288, Sep-2015
Abstract
The reliance of submerged network deployments on specialized hardware for acoustic communication and modulation has impeded wide scale deployments of submerged sensor networks. This paper examines a system that integrates software modems with generic speakers and microphones that are built-in to sensor modules for establishing submerged acoustic links. Building on our recent field experiment in a river, canal, pond, and swimming pool, this paper outlines the technical and logistical challenges for deploying software-driven submerged sensor network. The software modem design choices include methods for signal modulation at the sender, and symbol synchronization, signal filtering, and signal demodulation at the receiver. Higher layer communication protocol issues are also discussed, with a focus on cross-layer optimization. Practical solutions to logistical deployment challenges, such as waterproofing and casing, calibration, and fouling are proposed. The design guidelines in this paper lay the groundwork for further development of software-driven of submerged sensor networks.
Key-Words / Index Term
Submerged Sensor Network, Physical Layer, Synchronization
References
[1] Yu Yang; Coll. Of Marine, Northwestern Polytech. Univ., Xi''an; Zhang Xiaomin ; Peng Bo ; Fu Yujing, “Design of sensor nodes in submerged sensor networks”, Published in: Industrial Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference on Date of Conference: 25-27 May 2009 Page(s): 3978 – 3982.
[2] Dharan, K.T. ; SITE, VIT Univ., Vellore, India; Srimathi, C. ; Soo-Hyun Park, “A sweeper scheme for localization and mobility prediction in submerged acoustic sensor networks”, Published in: OCEANS 2010 IEEE – Sydney Date of Conference: 24-27 May 2010 Page(s): 1 – 7.
[3] Peng Jiang ; Syst. Eng. Res. Inst., CSSC, Beijing, China, “An submerged sensor network localization algorithm based on Time-of-Arrivals (TOAs)”, Published in: Natural Computation (ICNC), 2013 Ninth International Conference on Date of Conference: 23-25 July 2013 Page(s): 1552 – 1556.
[4] Donghoon Kim; Dept. of Comput. Sci., Florida State Univ., Tallahassee, FL ; Yong-Man Cho ; Changhwa Kim ; Sangkyung Kim, “E-ITRC Protocol with Long & Adjustable Range on Submerged Acoustic Sensor Network”, Published in: Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on (Volume:2) Date of Conference: 21-23 May 2007 Page(s): 665 – 672.
[5] Yuh-Shyan Chen; Dept. of Comput. Sci. & Inf. Engneering, Nat. Taipei Univ., Taipei, Taiwan ; Yun-Wei Lin; Sing-Ling Lee, “A mobicast routing protocol in submerged sensor networks”, Published in: Wireless Communications and Networking Conference (WCNC), 2011 IEEE Date of Conference: 28-31 March 2011 Page(s): 510 – 515.
[6] Blyskun, A. ; TrellisWare Technol., Inc., San Diego, CA, USA ; Johnson, M. ; Sungill Kim ; Speros, J., “Improving the SRW Waveform via a Physical Layer Retrofit”, Published in: Military Communications Conference, MILCOM 2013 - 2013 IEEE Date of Conference: 18-20 Nov. 2013 Page(s): 396 – 399.
[7] Vinodhini, C. ; M.E Commun. Syst., Anand Inst. of Higher Technol., Chennai, India ; Sivasankar, S., “Back to Results Improving wireless physical layer security via co-operative techniques” Published in: Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on Date of Conference: 19-20 March 2015 Page(s): 1 – 4.
[8] Sengezer, N. ; Dept. of Electr. & Electron. Eng., Bilkent Univ., Ankara, Turkey ; Karasan, E., “Multi-layer Virtual Topology Design in Optical Networks Under Physical Layer Impairments and Multi-hour Traffic Demand”, Published in: Optical Communications and Networking, IEEE/OSA Journal of (Volume:4 , Issue: 2 ) Page(s): 78 – 91.
[9] Lau, V.K.N. ; Dept. of Electr. & Eng., Univ. of Hong Kong, China ; Yu-Kwong Kwok, “On the synergy between adaptive physical layer and multiple-access control for integrated voice and data services in a cellular wireless network”, Published in: Vehicular Technology, IEEE Transactions on (Volume:51 , Issue: 6 ) Page(s): 1338 – 1351 ISSN : 0018-9545.
[10] Qingyang Song ; Northeastern Univ., Shenyang, China ; Lei Guo ; Fanzhao Wang ; Shiqiang Wan, “MAC-centric cross-layer collaboration: a case study on physical-layer network coding”, Published in: Wireless Communications, IEEE (Volume:21 , Issue: 6 ) Page(s): 160 – 166 ISSN : 1536-1284 .
[11] Ivanchenko, M.V. ; Dept. of Radiophys., Nizhny Novgorod Univ., Russia ; Osipov, G.V. ; Shalfeev, V.D., “Synchronization of chaotic oscillators with type-I intermittency”, Published in: Physics and Control, 2003. Proceedings. 2003 International Conference (Volume:2 ) Date of Conference: 20-22 Aug. 2003 Page(s): 563 - 568 vol.2.
[12] Xin Qian ; Inst. of Comput. Applic. Technol., Hangzhou Dianzi Univ., Hangzhou, China ; Xinfa Shen ; Guojun Dai ; Jianhui Zhang, “Clapping and Broadcasting Synchronization in Wireless Sensor Network”, Published in: Mobile Ad-hoc and Sensor Networks (MSN), 2010 Sixth International Conference on Date of Conference: 20-22 Dec. 2010 Page(s): 140 – 145.
[13] PalChaudhuri, S.; Dept. of Comput. Sci., Rice Univ., Houston, TX, USA; Saha, A.K.; Johnsin, D.B., “Adaptive clock synchronization in sensor networks”, Published in: Information Processing in Sensor Networks, 2004. IPSN 2004. Third International Symposium on Date of Conference: 26-27 April 2004 Page(s): 340 – 348.
[14] Zhenping Chen ; Sch. of Electr. & Inf. Eng., Anhui Univ. of Sci. & Technol., Huainan, China ; Yourui Huang ; Dequan Li, “One feedback-based time synchronization method for wireless sensor networks”, Published in: Control and Decision Conference (CCDC), 2015 27th Chinese Date of Conference:23-25 May 2015 Page(s): 1459 – 1464.
[15] Xiujuan Dou ; Sci. & Technol. on Electron. Inf. Control Lab., Chengdu, China ; Yujun Kuang ; Liang Jiao ; Feng Yang, “A novel parallel state search based synchronization scheme for frequency hopping system”, Published in: Computational Problem-Solving (ICCP), 2012 International Conference on Date of Conference: 19-21 Oct. 2012 Page(s): 418-422.
Citation
N. Senthamizh Rajan and R.Mala, "Scheme Reflections aimed at Positioning Submerged Radar Networks," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.282-288, 2015.
A Carnal Map-Aware Chord Model Created on ANT Colony Optimization
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.289-297, Sep-2015
Abstract
On the basis of in-depth analysis of the mapping storage methods of the Identifier-Locator separation network, this paper proposed a physical topology awarded Chord model (Ant-Chord) which based on ant colony algorithm. The ideas of Ant-Chord is to regard the storage nodes in the whole Chord as a TSP problem and solve the TSP problem quickly by using the ant colony algorithm, then to build the Chord with the obtained TSP solution, and proposed a method which called "Luoyang shovel" to optimize the Ant-Chord’s routing hops. The model is simple and easy to implement, which has small changes within the original Chord model and little extra overhead cost in the routing table storage. Simulation results show that, AntChord has obvious advantages in average routing hops and delay in comparison with other Chord model.
Key-Words / Index Term
ACO, TSP, Physical Map Aware, Luoyang Shovel Method
References
[1] Hsien-Kai Hsin ; Grad. Inst. of Electron. Eng., Nat. Taiwan Univ., Taipei, Taiwan ; En-Jui Chang ; An-Yeu Wu, “Spatial-Temporal Enhancement of ACO-Based Selection Schemes for Adaptive Routing in Network-on-Chip Systems”, Published in: Parallel and Distributed Systems, IEEE Transactions on (Volume:25 , Issue: 6 ) Page(s): 1626 – 1637.
[2] Caldeira, J.L. ; Tech. Univ. of Lisbon, Lisbon; Azevedo, R.C. ; Silva, C.A. ; Sousa, J.M.C., “Supply-Chain Management Using ACO and Beam-ACO Algorithms”, Published in: Fuzzy Systems Conference, 2007. FUZZ-IEEE 2007. IEEE International Date of Conference: 23-26 July 2007 Page(s): 1 – 6.
[3] Huang Guangdong ; China Univ. of Geosciences, Beijing ; Ling Ping ; Wang Qun, “A Hybrid Metaheuristic ACO-GA with an Application in Sports Competition Scheduling”, Published in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on (Volume:3) Date of Conference: July 30 2007-Aug. 1 2007 Page(s): 611 – 616.
[4] Jialiang Kou ; Sch. of Comput. Sci. & Technol., Wuhan Univ. of Technol., Wuhan, China ; Shengwu Xiong ; Zhixiang Fang ; Xinlu Zong, “Positive point charge potential field based ACO algorithm for multi-objective evacuation routing optimization problem”, Published in: Evolutionary Computation (CEC), 2012 IEEE Congress on Date of Conference: 10-15 June 2012 Page(s): 1 – 8.
[5] Sun Xu ; Center for Earth Obs. & Digital Earth, Chinese Acad. of Sci., Beijing, China ; Zhang Bing ; Yang Lina ; Li Shanshan, “Hyperspectal image clustering using ant colony optimization(ACO) improved by K-means algorithm”, Published in: Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on (Volume:2 ) Date of Conference: 20-22 Aug. 2010 Page(s): V2-474 - V2-478.
[6] Yi Wang ; Dept. of Computer., Hong Kong Polytech. Univ., Kowloon, China ; Bathen, L.A.D. ; Zili Shao ; Dutt, N.D., “3D-FlashMap: A physical-location-aware block mapping strategy for 3D NAND flash memory”, Published in: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2012 Date of Conference: 12-16 March 2012 Page(s): 1307 – 1312.
[7] Chen Guojin ; Sch. of Mech. Eng., Hangzhou Dianzi Univ., Hangzhou, China ; Zhu Miaofen ; Su Shaohui ; Gong Youping, “Research on the Multi-domain Modeling and Optimizing Method for Loader Executing System”, Published in: Intelligent System Design and Engineering Application (ISDEA), 2010 International Conference on (Volume:2 ) Date of Conference: 13-14 Oct. 2010 Page(s): 854 – 857.
[8] Noguchi, H. ; Port & Airport Res. Inst., Yokosuka, Japan ; Fujita, Y. ; Fujita, I. ; Noda, I., “Development of simple sand bypass system using a self-sinking suction pipe with holes”, Published in: OCEANS '04. MTTS/IEEE TECHNO-OCEAN '04 (Volume:1 ) Date of Conference: 9-12 Nov. 2004 Page(s): 71 - 77 Vol.1.
[9] Saska, M. ; Julius-Maximilians Univ. of Wuerzburg, Wurzburg ; Hess, M. ; Schilling, K., “Route scheduling approach for airport snow shoveling using formations of autonomous ploughs”, Published in: Control, Automation, Robotics and Vision, 2008. ICARCV 2008. 10th International Conference on Date of Conference: 17-20 Dec. 2008 Page(s): 390 – 397.
[10] Canghui Zhu ; Minist. of Transp., Transp. Planning & Res. Inst., Beijing, China ; Jingdong Jin ; Gan Chai ; Chengwei Fang, “Coordinated ramp metering on expressway with congestion”, Published in: Transportation of China (AFTC 2010), 6th Advanced Forum on Date of Conference:16-16 Oct. 2010 Page(s): 118 – 122.
[11] Xuan Li ; State Key Lab. of Rail Traffic Control & Safety, Beijing Jiaotong Univ., Beijing, China ; Chao Shen ; Ai Bo ; Gang Zhu, “Finite-state Markov modeling of fading channels: A field measurement in high-speed railway”, Published in: Communications in China (ICCC), 2013 IEEE/CIC International Conference on Date of Conference: 12-14 Aug. 2013 Page(s): 577 – 582.
[12] Feng Dongqing ; Inst. of Inf. & Control, Zhengzhou Univ., Henan, China ; Yin Jinyan ; Chen Tiejun ; Lin Ming, “An intelligent method for high precision oil measurement control”, Published in: Intelligent Processing Systems, 1997. ICIPS '97. 1997 IEEE International Conference on (Volume:1 ) Date of Conference: 28-31 Oct 1997 Page(s): 666 - 669 vol.1.
[13] Zhuxin Zhang ; Jilin Univ., Changchun ; Dingxuan Zhao ; Tiehua Chen, “Design of the Master-Slave System and Research on Bilateral Servo Control System of Tele-Operated Manipulation Robots”, Published in: Automation and Logistics, 2007 IEEE International Conference on Date of Conference: 18-21 Aug. 2007 Page(s): 913 – 917.
Citation
N.Thamaraiselvan and A.Immaculate Mercy, "A Carnal Map-Aware Chord Model Created on ANT Colony Optimization," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.289-297, 2015.
Managing Connection Based Access Control Systems on the other hand Mobile Devices
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.298-301, Sep-2015
Abstract
An android is a name given to a versatile working structure made by Google. A working structure is programming that acts as an interface also, manages PC equipment also, programming resources. In any other working system, there is a issue of malevolent programming on the other hand noxious contents attempting to wreak havoc. A noxious programming is any programming that is utilized on the other hand on the other hand can disrupt PC operation also, gather access to private structures .Android applications will frequently have access to private also, grouped resources also, data in the client’s device. There is high degree of conceivable misuse of these resources. We can take an illustration of an application utilizing a feature camera to document the on-going exercises of an organization. Android customers do have a certain sum of control over the application limits also, limits after installing it based on client’s connection. In our paper, we propose another way where system managers can control what applications are granted access on the other hand revoked.
Key-Words / Index Term
Context-Based Access Control, Smartphone Devices, Security And Privacy, Policies, Mobile Applications
References
[1] Corradi, A. ; DEIS, Bologna Univ., Italy ; Montanari, R. ; Tibaldi, D., “Context-based access control for ubiquitous service provisioning”, Published in: Computer Software and Applications Conference, 2004. COMPSAC 2004. Proceedings of the 28th Annual International Date of Conference: 28-30 Sept. 2004 Page(s): 444 - 451 vol.1.
[2] Teslya, N. ; SPIIRAS, St. Petersburg, Russia ; Kashevnik, A. ; Pashkin, M., “Context-based access control for ridesharing service”, Published in: Open Innovations Association (FRUCT), 2013 14th Conference of Date of Conference: 11-15 Nov. 2013 Page(s): 156 – 163.
[3] Yao Han-bing ; Coll. of Comput., Huazhong Univ. of Sci. & Technol., Wuhan ; Hu He-ping ; Lu Zheng-ding ; Li Rui-xuan, “Dynamic Role and Context-Based Access Control for Grid Applications”, Published in: TENCON 2005 2005 IEEE Region 10 Date of Conference: 21-24 Nov. 2005 Page(s): 1 – 7.
[4] Smirnov, A. ; Lab. of Comput. Aided Integrated Syst., SPIIRAS, St. Petersburg, Russia ; Kashevnik, A. ; Shilov, N. ; Teslya, N., “Context-based access control model for smart space”, Published in: Cyber Conflict (CyCon), 2013 5th International Conference on Date of Conference: 4-7 June 2013 Page(s): 1 – 15.
[5] Jadliwala, M. ; Wichita State Univ., Wichita, KS, USA ; Maiti, A. ; Namboodiri, V., “Social Puzzles: Context-Based Access Control in Online Social Networks”, Published in:Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on Date of Conference: 23-26 June 2014 Page(s): 299 – 310.
[6] De Dominicis, C.M. ; Dept. of Inf. Eng., Univ. of Brescia, Brescia, Italy ; Depari, A. ; Flammini, A. ; Rinaldi, S., “Acquisition and elaboration of cardiac signal in android Smartphone devices”, Published in: Sensors Applications Symposium (SAS), 2014 IEEE Date of Conference: 18-20 Feb. 2014 Page(s): 83 – 88.
[7] Dhobale Dhanashri, D. ; Dept. of Inf. Tech., P.V.P.I.T. Budhgaon, Sangli, India ; Patil Babaso, S. ; Patil Shubhangi, H., “MMS steganography for Smartphone devices”, Published in: Computer Engineering and Technology (ICCET), 2010 2nd International Conference on (Volume:4 ) Date of Conference: 16-18 April 2010 Page(s): V4-513 - V4-516.
[8] Pournaghshband, V.; Comput. Sci. Dept., California State Univ., Northridge, CA, USA ; Meyer, D. ; Holyland, M. ; Sarrafzadeh, M., “Adrasteia: A Smartphone App for Securing Legacy Mobile Medical Devices”, Published in: Computational Science and Engineering (CSE), 2014 IEEE 17th International Conference on Date of Conference: 19-21 Dec. 2014 Page(s): 758 – 763.
[9] Gupta, M. ; Civil, Environ. & Geomatic Eng., Univ. Coll. London, London, UK ; Holloway, C. ; Heravi, B.M. ; Hailes, S., “A comparison between smartphone sensors and bespoke sensor devices for wheelchair accessibility studies”, Published in: Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2015 IEEE Tenth International Conference on Date of Conference: 7-9 April 2015 Page(s): 1 – 6.
Citation
S.Venkatesan and K.Renuka Devi, "Managing Connection Based Access Control Systems on the other hand Mobile Devices," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.298-301, 2015.
Cross Layer Outline Approach in Remote Versatile ADHOC System Architecture
Review Paper | Journal Paper
Vol.3 , Issue.9 , pp.302-309, Sep-2015
Abstract
Traditional Wired system employments convention architectures take after the rule of stack layered actualized by ISO/OSI model. ISO/OSI model was created to support all the institutionalization of the system building design utilizing layered model. Initially remote system too adopts the traditional stack layered building design from the wired networks. This Layered architectures are not efficiently cope up with the dynamically changing environment in the wireless-dominated next-generation correspondences with a wide range of Quality of Service (QoS) requirements. Remote system execution can be degraded due to the adjustment of the conventions from layered building design and Transmission control protocol/ Web Convention (TCP/IP), which was composed originally on the other hand wired network. However, need of coordination between layers limits the execution of such architectures due to the particular challenges postured by remote nature of the transmission links. In this paper a new cross layer plan is adopted in remote portable Adhoc system in request to succeed the system execution problems. Since nowadays remote frameworks are getting to be exceptionally prevalent technology. In the Versatile Adhoc network, cross-layer plan permits the convention that have a place to distinctive layers which participate in sharing system status information while still keeping up the layers partition at the plan level. Cross-layer plan has been propostured to keep up the functionalities related to the one of a kind layers in any case to permit coordination, affiliation and joint improvement of conventions crossing distinctive layers.
Key-Words / Index Term
Remote Portable ADHOC System Architecture, QoS, Cross Layer Design, TCP/IP, ISO/OSI
References
[1] Bharadi, V.A. ; Kaul, V.J. ; Amrutia, S.” End-to-End Encryption Based Biometric SaaS: Using Raspberry Pi as a Remote Authentication Node” Published in:Computing Communication Control and Automation (ICCUBEA), 2015 International Conference onDate of Conference:26-27 Feb. 2015 Page(s): 52 – 59.
[2] Elgabra, H. ; Ashour, R. ; Saleh, H.” Portable wireless biomedical temperature monitoring system: Architecture and implementation” Published in: Innovations in Information Technology (IIT), 2013 9th International Conference on Date of Conference: 17-19 March 2013 Page(s):95 – 100.
[3] Qiyu Peng ; Li-Qun Zhang” Causality-based portable control system design for tele-assessment of elbow joint spasticity” Published in:Rehabilitation Robotics, 2005. ICORR 2005. 9th International Conference on Date of Conference: 28 June-1 July 2005Page(s):303 – 306.
[4] Krishnan, M. ; Chavarria-Miranda, D.” Implementing High Performance Remote Method Invocation in CCA” Published in:Cluster Computing (CLUSTER), 2011 IEEE International Conference on Date of Conference: 26-30 Sept. 2011 Page(s):547 – 551
[5] Zhiwen Zhao ; Feng Wang ; Ke Xu” General automation test system based on the cooperation of software and hardware” Published in:Control and Automation, 2009. ICCA 2009. IEEE International Conference on Date of Conference: 9-11 Dec. 2009Page(s):797 – 800.
[6] Qiyu Peng ; Li-Qun Zhang” A Portable Telerehabilitation System for Remote Evaluations of Impaired Elbows in Neurological Disorders” Published in:Neural Systems and Rehabilitation Engineering, IEEE Transactions on (Volume:16 , Issue: 3 )Page(s):245 – 254.
[7] Jia-Ching Wang ; Jhing-Fa Wang” An ARM-Based System-on-a-Programmable-Chip Architecture for Spoken Language Translation” Published in:Circuits and Systems II: Express Briefs, IEEE Transactions on (Volume:54 , Issue: 9 )Page(s):765 – 769.
[8] Chiu-Kuo Chen ; Chua, E. ; Fu, C.” A low power biomedical signal processing system-on-chip design for portable brain-heart monitoring systems” Published in:Green Circuits and Systems (ICGCS), 2010 International Conference onDate of Conference:21-23 June 2010 Page(s):18 – 23.
[9] Gonzalez-Parada, E. ; Alarcon-Collantes, V. ; Casilari-Perez, E.” A PDA-based portable wireless ECG monitor for medical personal area networks” Published in:Electrotechnical Conference, 2006. MELECON 2006. IEEE Mediterranean Date of Conference: 16-19 May 2006 Page(s):713 – 716.
[10]Pan, T. ; Pan, J. ; Chu, S. more authors” Development of a Three-Dimensional Multimode Visual Immersive System With Applications in Telepresence” Published in:Systems Journal, IEEE (Volume:PP , Issue: 99Page(s):1 – 11
[11] Fischer, F. ; Farber, G.” NoWait-RPC: extending ONC RPC to a fully compatible message passing system” Published in:Parallel Processing Symposium, 1998. IPPS/SPDP 1998. Proceedings of the First Merged International ... and Symposium on Parallel and Distributed Processing 1998Date of Conference: 30 Mar-3 Apr 1998 Page(s):250 – 254.
[12] Vacroux, A.G.” A unified end-to-end control scheme for fast packet networks at ISO/OSI TSAP” Published in: Communications, 1991. ICC '91, Conference Record. IEEE International Conference on Date of Conference: 23-26 Jun 1991 Page(s): 397 - 402 vol.1.
[13] Vacroux, A.G. “Real-time packet network analysis for ISO/OSI performance management” Published in: Global Telecommunications Conference, 1990, and Exhibition. 'Communications: Connecting the Future', GLOBECOM '90., IEEE Date of Conference: 2-5 Dec 1990 Page(s):397 - 401 vol.1
[14] Ng, K.T. ; Chau, W.N.” Design and implementation of remote procedure call based on ISO/OSI reference modelPublished in: TENCON '93. Proceedings. Computer, Communication, Control and Power Engineering.1993 IEEE Region 10 Conference on (Volume:1 ) Date of Conference: 19-21 Oct. 1993 Page(s):544 - 548 vol.1
[15] Szczecin Univ. of Technol., Szczecin” Usering. Education self-tuning-recommendations in the 8th level of ISO/OSI model” Published in: Computer Science and Information Technology, 2008. IMCSIT 2008. International Multiconference on Date of Conference: 20-22 Oct. 2008 Page(s):79 - 82
Citation
K.Viji and R.Mala, "Cross Layer Outline Approach in Remote Versatile ADHOC System Architecture," International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.302-309, 2015.