A Survey on Security in Cloud Using Homographic and Disk Encryption Methods
Survey Paper | Journal Paper
Vol.2 , Issue.4 , pp.107-112, Apr-2014
Abstract
Offering strong data protection to cloud users while enabling rich applications is a challenging task. The cryptographic security solutions existing and applied over internet cannot directly be applied to the cloud environment. This paper presents a couple of security solutions. Several homogaphic and disk encryption methods and their limitations are discussed. The efforts to combine the benefits of both the techniques give rise to further more possibilities. The author hopes that all the possibilities are researched and a single platform layer security suit will be made for cloud data protection.
Key-Words / Index Term
Cloud Security; Homographic Encryption; Disk Encryption; Combine Benefits; Security Suit
References
[1] C. Wang, Q. Wang, K. Ren, and W. Lou, �Privacy- Preserving public auditing for storage security in cloud computing,� in Proc.of IEEE INFOCOM�10, March 2010.
[2] Maha TEBAA, Sa�d EL HAJJI, Abdellatif EL GHAZI, �Homomorphic Encryption Applied to the Cloud Computing Security.� In proc. Of the World Congress on Engineering 2012 Vol I WCE 2012, July 4 - 6, 2012, London, U.K.
[3] Dr Keith Martin, �Cryptographic Key Management,� in 2006 Information Security conference, Royal Holloway, University of London, United Kingdom.
[4] Tilo M�ller, Tobias Latzo, and Felix C. Freiling, �Self-Encrypting Disks pose Self-Decrypting Risks.� In Annual Computer Security Applications Conference (ACSAC), Orlando, Florida USA, Dec. 2011. University of Illinois at Urbana-Champaign, ACM.
[5] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Volume-01, Issue-01, Page No (31-37), Jan -Feb 2013
[6] C. Gentry, �Fully Homomorphic Encryption Using Ideal Lattices,� Proc. 41st Ann. ACM Symp. Theory Computing (STOC 09), ACM, 2009, pp. 169-178.
[7] B. Bosen. �FDE Performance Comparison: Hardware Versus Software Full Drive Encryption. �In Trusted Strategies LLC, Jan. 2010.
[8] Dawn Song, Elaine Shi, and Ian Fischer, �Cloud Data Protection for the Masses.� Published by the IEEE Computer Society, 0018-9162/12/$31.00 � 2012 IEEE.
[9] Shaheen Ayyub1, Devshree Roy, �Cloud Computing Characteristics and Security Issues.� In International Journal of Computer Sciences and Engineering, Vol.-1(4), pp (18-22) Dec 2013.
Citation
V. K. Reddy, J.E. Rao, "A Survey on Security in Cloud Using Homographic and Disk Encryption Methods," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.107-112, 2014.
SEO Techniques for a Website and its Effectiveness in Context of Google Search Engine
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.113-118, Apr-2014
Abstract
Due to the exponential growth of the Internet, search engines have the complex task of sorting through billions of pages and displaying only the relevant pages for the submitted search data. Google has become an essential link to search the information online. Due to this reason, Search Engine Optimizers should actively learn the techniques that drive visitors to their site. Searching online has become a part of everyday lives of most people. Whether to look for information related to their daily lives, most people have made search engines part of their daily routine. Because of this reason, search engines occupy �a prominent position in the online world�; they have made it easier for the people to find the information among the millions of web pages on the Internet. Due to the large number of websites, search engines have the complex task of sorting through the millions of pages and displaying only the most relevant pages. This Research Paper provides the analysis of Search Engine Optimization techniques that can help to improve the ranking of a website or to get more number of viewers or to increase visibility of a website.
Key-Words / Index Term
SEO, Search Engine, Search Engine Result Page, Google, Ranking, Keyword
References
[1] Edgar Damian Ochoa: An Analysis of the Application of selected SEO techniques and their effectiveness on Google�s search ranking algorithm, California state university, Northridge, May�2012 - csun-dspace.calstate.edu.
[2] Najam Nazar: Exploring SEO Techniques for Web 2.0Websites, Department of Computer Science and Engineering Chalmers University of Technology G�teborg, Sweden, June 2009, Publikationen registrerades 2009-08-25. Den �ndrades senast 2013-04-04, Examiner: C. Carlsson.
[3]http://www.brightworkweb.com/images/search_engine_marketing.jpg
[4] http://www.webconfs.com/SEO-tutorial/introduction-to-SEO.php
[5] http://searchengineland.com/21-essential-SEO-tips-techniques-11580
[6] http://mashable.com/2012/01/09/increase-Google-rank/
[7] Khalil ur Rehman and Muhammad Naeem Ahmed Khan: The Foremost Guidelines for Achieving Higher Ranking in Search Results through Search Engine Optimization, International Journal of Advanced Science and Technology, Vol. 52, March, 2013.
[8] K.Chiranjeevi , K.Archana and J.Pradeep Kumar, "Design and Implementation of a Cost Effective Ranking Adaptation Algorithm", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Volume-01, Issue-05, Page No (24-24), Sep -Oct 2013.
[9] http://www.beginnersbloggingcoach.com/let-me-explain-blogging-and-why-you-should-have-a-blog/878
[10] http://webdesign.about.com/od/seo/a/why_use_h1_for_seo.ht m
[11] http://blog.woorank.com/2013/01/image-alt-text-relevant-for-seo-and-usability/
[12] http://www.webconfs.com/importance-of-sitemaps-article-17.php
[13] Vinit Kumar Gunjan, Pooja, Monika and Amit: Search engine optimization with Google, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012, ISSN (Online): 1694-0814.
[14] P. T. Chung, S. H. Chung and C. K. Hui, �A web server design using search engine optimization techniques for web intelligence for small organizations�, LISAT IEEE Long Island University Brooklyn NY USA, (2012), pp.1-6.
[15] Li-Hsing, et al: The Application of Search Engine Optimization Techniques for Internet Marketing: An Example of the Motel Websites. (IEEE), 2010, page- 2767 � 2770, INSPEC Accession Number: 12219467.
Citation
L. Kumar, N. Kumar, "SEO Techniques for a Website and its Effectiveness in Context of Google Search Engine," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.113-118, 2014.
Developing New Software Metric Pattern Discovery for Text Mining
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.119-125, Apr-2014
Abstract
In this paper data mining technique available which useful in mining the pattern of text document. However efficiently Research of new pattern which is useful and update the discover patterns is still an open research issue, especially in text mining field. Existing text mining methods have term based approaches and they have problems of polysemy and synonymy. To reduce these problems people develop the phrase (pattern) based approach. The phrase based approach is better than the term based approach but many experiments are not done in phrase based approach. In this we present the new innovative and effective pattern discovery method which has a process of pattern deploying and pattern evolving, which improve the efficiency and updating new pattern for finding appropriate and interacting information.
Key-Words / Index Term
Text Mining, Pattern Mining, Pattern Evolving, Pattern Extraction
References
References
[1]. T. Rose, M. Stevenson, and M. Whitehead, �The Reuters Corpus Volume1�From Yesterday�s News to Today�s Language Resources,� Proc. Third Int�l Conf. Language Resources and Evaluation, pp. 29-31, 2002.
[2]. M.F. Porter, �An Algorithm for Suffix Stripping,� Program, vol. 14, no. 3, pp. 130-137, 1980.
[3]. S.-T. Wu, Y. Li, and Y. Xu, �Deploying Approaches for Pattern Refinement in Text Mining� Proc. IEEE Sixth Int�l Conf. Data Mining (ICDM �06), pp. 1157-1161, 2006.
[4]. Y. Li and N. Zhong, �Mining Ontology for Automatically Acquiring Web User Information Needs,� IEEE Trans. Knowledge and Data Eng., vol. 18, no. 4, pp. 554-568,Apr. 2006.
[5]. Efficient Pattern Discovery for Text Mining, Ning Zhong, Yuefeng Li, Sheng-Tang Wu. IEEE Transactions on Knowledge and Data Engineering, VOL. 24, NO. 1, JANUARY 2012
[6]. Text Mining Approaches to Extract Interesting Association Rules from Text Documents Authors: Vishwadeepak Singh Baghela, Dr.S.Tripathi.
[7]. Evaluating Preprocessing Techniques in Text Categorization. Authors: V. Srividhya, R.
Citation
S.S. Patil, V.M. Gaikwad , "Developing New Software Metric Pattern Discovery for Text Mining," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.119-125, 2014.
Power Efficient High Speed Domino Circuit Using Adiabatic Logic
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.126-130, Apr-2014
Abstract
In this paper, a new domino circuit is proposed, inorder to have lower power consumption.For this proposed technique which is implemented based on adiabatic logic.The proposed circuit technique decreases the parasitic capatance in the dynamic node,to have fast and robust circuits.Thus the leakage current and consecuently power consumption and delay are reduced.Simulation results shown the effeciency and effectiveness of the domino circuit.The domino circuit designed using adiabatic logic will reduce the power consumption.
Key-Words / Index Term
Domino Logic, Adiabatic Logic,Leakage Current
References
[1]. J. M. Rabaey, A. Chandrakasan, and B. Nicolic, Digital Integrated Circuits: A Design Perspective, 2nd ed. Upper Saddle River, NJ: Prentice-Hall, 2003.
[2]. L. Wang, R. Krishnamurthy, K. Soumyanath, and N. Shanbhag, �An Energy-efficient leakage-tolerant dynamic circuit technique,� in Proc. Int.ASIC/SoC Conf., 2000, pp. 221�225.
[3]. Predictive Technology Model (PTM). 16 nm High Performance V2.1Technology of PTM Model. (2012, Feb. 19) [Online]. Available: http://www.eas.asu.edu/∼ptm/
[4]. H. Mahmoodi and K. Roy, �Diode-footed domino: A leakage-tolerant high fan-in dynamic circuit design style,� IEEE Trans. Circuits Syst. I, Reg. Papers, Mar. 2004.
[5]. A. Alvandpour, R. Krishnamurthy, K. Sourrty, and S. Y. Borkar, �A sub-130-nm conditional-keeper technique,� IEEE J. Solid-State Circuits, May 2002.
[6]. M. H. Anis, M. W. Allam, and M. I. Elmasry, �Energy-efficient noise-tolerant dynamic styles for scaled-down CMOS and MTCMOS echnologies,� IEEE Trans. Very Large Scale (VLSI) Syst.,Apr. t2002.
[7]. Y. Lih, N. Tzartzanis, and W. W. Walker, �A leakage current replica Keeper for dynamic circuits,� IEEE J. Solid-State Circuits, Jan. 2007.
[8]. A. Peiravi and M. Asyaei, �Robust low leakage controlled keeper by current-comparison domino for wide fan-in gates, integration VLSI , 2012.
[9]. H. Suzuki, C. H. Kim, and K. Roy, �Fast tag comparator using diode partitioned domino for 64-bit microprocessors,� IEEE Trans. Circuits Syst., Feb. 2007.
[10]. K. Bowman, S. G. Duval, and J. D. Meindl, �Impact of die-to-die and within-die parameter fluctuations on the maximum clock frequency distribution for gigascale integration,� IEEE J. Solid-State Circuits, Feb. 2002.
Citation
Jeeja Jaculine Let R.B., Bharath P., Varatharaj M. , "Power Efficient High Speed Domino Circuit Using Adiabatic Logic," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.126-130, 2014.
Power Efficient for DPA Resistat Flip Flop Using TDPL Inverter in Reverse Logic
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.131-135, Apr-2014
Abstract
To design a data flip-flop consistent with the three-phase dual-rail pre-charge logic (TDPL) family. TDPL is a differential power analysis (DPA) resistant dual-rail logic style whose power consumption is insensitive to unbalanced load conditions, based on a three phase operation where, in order to obtain a constant energy consumption and also reduce the power dissipation replacing the discharge and evaluation phase by pull up and pull down networks using Reverse Logic. A part of an encryption algorithm is used as case a study to prove the effectiveness of the proposed circuit. Simulation results in a 65 nm CMOS process show an improvement in the energy consumption and power consumption.
Key-Words / Index Term
Differential Power Analysis (DPA), Dual-Rail Logic, Security, Reverse Logic, Three-Phase Dual-Rail Pre-Charge Logic (TDPL)
References
[1] Marco Bucci, Luca Giancane, Raimondo Luzzi, and Alessandro Trifiletti (2012) introduced, the �a flip-flop for the dpa resistant three-phase dual-rail pre-charge logic family�, in proc. ieee int. on very large scale integration system pp. 2128�2132.
[2] P.Kocher, J. Jaffe, And B. Jun, �Differential Power Analysis,� In Proc.Adv. Cryptol. (Crypto), 1999, Pp. 388�397.
[3] K. Tiri, M. Akmal, and I. Verbauwhede, �A dynamic and differentialCMOS logic with signal independent power consumption to withstand differential power analysis on smart in Proc. IEEE 28th Euro.Solid-State Circuit Conf. (ESSCIRC), 2002, pp. 403�406.
[4] D. Sokolov, J. Murphy, A. Bystrov, and A. Yakovlev, �Improving the security of dual-rail circuits,� in Proc. Workshop Cryptograph. Hardw.Embed cards,� in Proc. IEEE 28th Euro.Solid-State Circuit Conf. (ESSCIRC), 2002, pp. 403�406.
[5] K. Tiri and I. Verbauwhede, �A logic design methodology for a secure DPA resistant ASIC or FPGA implementation,� in Proc. Design,Autom., Test Euro. Conf. Expo. (DATE), 2004, pp. 246�251.. Syst. (CHES), 2004, pp. 282�297.
[6] K. Tiri and I. Verbauwhede, �Place and route for secure standard cell design,� in Proc. Smart Card Res. Adv. Appl. IFIP Conf. (CARDIS),2004, pp. 143�158.
[7] T. Popp and S. Mangard, �Masked dual-rail pre-charge logic: DPA-resistance without routing constraints,� in Proc. Workshop Cryptograph.Hardw. Embed. Syst. (CHES), 2005, pp. 172�186.
[8] T.PoppandS.Mangard,�ImplementationaspectsoftheDPA-resistantlogic style MDPL,� in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS),2006, pp. 2913�2916.
[9] T. Popp, M. Kirschbaum, T. Zefferer, and S. Mangard, �Evaluation of the masked logic style MDPL on a prototype chip,� in Proc. Workshop Cryptograph. Hardw. Embed. Syst. (CHES), 2007, pp. 81�94.
[10] M. Bucci, L. Giancane, R. Luzzi, and A. Trifiletti, �Three-phase dual-railpre chargelogic,�in Proc.Workshop Cryptograph.Hardw Embed.Syst. (CHES), 2006, pp. 232�241.
[11] E. Menendez and K. Mai, �Ahigh-performance, low-overhead,power-analysis-resistant, single-rail logic style,� in Proc. IEEE Int. Workshop Hardw.-Oriented Security Trust (HOST), 2008, pp. 33�36.
[12] R. Anderson, E. Biham, and L. Knudsen, �Serpent: A Proposal for theAdvanced Encryption Standard,� NIST AES proposal, 1998. [Online].Available:http://www.cl.cam.ac.uk/ftp/users/ria14/serpent.pdf
[13] F. Regazzoni, T. Eisenbarth, A. Poschmann, J. Gro�sch�dl, F.Gurkaynak, M. Macchetti, Z. Toprak, L. Pozzi, C. Paar, Y. Leblebici,and P. Ienne, �Evaluating resistance of MCML technology to poweranalysis attacks using a simulation-based methodology,� Trans. Computation. Sci. IV, vol. 5430, pp. 230�243, 2009.
[14] K. J. Kulikowski, M. Su, A. Smirnov, A. Taubin, M. G. Karpovsky,and D. MacDonald, �Delay insensitive encoding and power analysis:A balancing act,� in Proc. 11th IEEE Int. Symp. Asynch. Circuits Syst.(ASYNC), 2005, pp. 116�125.
[15] K. J. Lin, S. C. Fang, S. H. Yang, and C. C. Lo, �Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware,� in Proc. Conf. Exhib. Design, Autom. Test Euro. (DATE),2007, pp. 1�6.
[16] K. J. Kulikowski, M. G. Karpovsky, and A. Taubin, �Power attacks on secure hardware based on early propagation of data,� in Proc. 12th IEEE Int. On-Line Test. Symp., 2006, pp. 131�138.
[17] K. Tiri and I. Verbauwhede, �Design method for constant power con-sumption of differential logic circuits,� in Proc. Conf. Exhib. Design,Autom., Test Euro. (DATE), 2005, pp. 628�633.
Citation
Nandhini M., Muralidharan V., Varatharaj M., "Power Efficient for DPA Resistat Flip Flop Using TDPL Inverter in Reverse Logic," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.131-135, 2014.
Performance Analysis of Wireless Sensor Network Using Cognitive Radio Concept
Review Paper | Journal Paper
Vol.2 , Issue.4 , pp.136-137, Apr-2014
Abstract
As the demand for wireless increases there is rapid development of various wireless technologies. The users want to use wireless communication services anytime and anywhere. Wireless Sensor Networks (WSNs) are expected to play an important role in future to provide reliable data transmission. But the traditional WSN works in unlicensed band and suffer from uncontrolled interferences from the networks sharing the same spectrum. As it resides in high Bit Error Rate there is increased delay in data transfer which results in less throughput. In this paper the WSN using cognitive concept is studied for reliable data transmission.
Key-Words / Index Term
Cognitive Radio Sensor Network; Delay Performance
References
[1] O. Akan, O. Karli, and O. Ergul, �Cognitive radio sensor networks,� IEEE Network, vol. 23, no. 4, pp. 34-40, July 2009
[2] Simon Haykin, �Cognitive Radio: Brain-Empowered Wireless Communications,� IEEE Journal On Selected Areas In Communications, Vol. 23, No. 2, February 2005
[3] Zhongliang Liang, Shan Feng, Dongmei Zhao, and Xuemin (Sherman) Shen, �Delay Performance Analysis for Supporting Real-Time Traffic in a Cognitive Radio Sensor Network� in IEEE Transactions On Wireless Communications, Vol. 10, No. 1, January 2011
[4] S. Feng and D.Zhao, �Supporting Real-Time CBR Traffic in a Cognitive Radio Sensor Network,� in IEEE Communications Society subject matter experts for publication in the WCNC 2010 proceedings.
[5] R.Nathiya and S.G.Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (36-43), Feb -2014
[6] www-sop.inria.fr/members/Eitan.Altman/COURS-
NS/n3.pdf‎s
Citation
R.V. Pawar, S.S. Mahajan, "Performance Analysis of Wireless Sensor Network Using Cognitive Radio Concept," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.136-137, 2014.
Automated Driving Vehicle Using Image Processing
Review Paper | Journal Paper
Vol.2 , Issue.4 , pp.138-140, Apr-2014
Abstract
This paper focuses on control and automation of intelligent road symbol detection system for vehicles in normal environment conditions. The objective is to look for matching information or some data in the input images that are taken by the overhead mounted camera. The whole setup then filters the noise and other requirements to obtain a steady flow of information for the vehicle to be guided automatically. Here we have used MATLAB for image processing and a microcontroller interfaced with it for actual real time processing and actuation of commands. The functions attributed in the whole setup are direction control mechanism, UART Communication and MATLAB. The results obtained are shown along with neatly explained algorithm and flowchart.
Key-Words / Index Term
Autonomous, Signal Processing, Image Processing, Computer Vision ,Data Structures, MATLAB
References
[1]. LalehMakarem, Denis GilletInformation sharing among autonomous vehicles crossing an Intersection, IEEE International Conference on Systems, Man, and Cybernetics, October 14-17, 2012.
[2]. S. Yuan, H. Lau, D.K. Liu, S.D. Huang, G. Dissanayake, D. Pagac, T. Pratley, Simultaneous Dynamic Scheduling and Collision-Free Path Planning for Multiple Autonomous Vehicles, IEEEInternational Conference on Information and Automation June 22 -25, 2009.
[3]. Maurizio Porfiri, D. Gray Roberson, Daniel J. Stilwell,Environmental Tracking and Formation Controlof a Platoon of Autonomous VehiclesSubject to Limited Communication,IEEE International Conference on Robotics and AutomationOrlando, Florida - May, 2006.
[4]. Alessandro Gasparetto, RenatoVidoni, Daniele Pillan, EnnioSaccavini,Automatic Path and Trajectory Planning forRobotic Spray Painting
[5]. Wen He, Xiaodong Wang, Guisheng Chen, Mu Guo, Tianlei Zhang, Peng Han, RuijianZhang,Monocular based Lane-Change on Scaled-down Autonomous Vehicles, IEEE Intelligent Vehicles Symposium (IV) Baden-Baden, Germany, June 5-9, 2011.
[6]. Jaehyoung Yu, Youngjoon Han, HernsooHahn, An Efficient Extraction of On-Road Object and Lane InformationUsing Representation Method, IEEE International Conference on Signal Image Technology and Internet Based Systems, 2011.
[7]. E. Chou, Y. Sun, E.Salari, Automated Pavement Distress Detection Using Advanced Image Processing Techniques,IEEE Proceedings 2009.
[8]. Awais Adnan, SaleemGul, Muhammad Ali, Amir Hanif Dar, Content Based image Retrieval UsingGeometrical-Shape ofObjects in Image, IEEE 2007.
Citation
A. Jain, H. Reddy, S. Dubey, "Automated Driving Vehicle Using Image Processing," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.138-140, 2014.
Performance Analysis of Cluster Based Routing Protocol for Ad hoc Networks
Review Paper | Journal Paper
Vol.2 , Issue.4 , pp.141-143, Apr-2014
Abstract
A Mobile Ad hoc Network (MANET) is a collection of wireless devices that can exchange information dynamically. The nodes in the network exchange information using the topology of the network. The ad-hoc network suffers from excessive traffic and maximum control overheads during route discovery. In this paper we have describe the clustering approach in ad-hoc network. The cluster based routing protocol (CBRP) divide the network in to small groups. The cluster head is elected to manage a cluster. Cluster heads in the network are responsible for information exchange. Using clustering approach flooding and overhead problems within the network can be effectively minimized.
Key-Words / Index Term
Cluster Based Routing Protocol, Cluster Formation, Lowest ID Algorithum, Route Discovery
References
[1] Nader F. Mir. Published by Dorling Kindersley, Computer and Communication Networks, (India) Pvt. Ltd. Licensees of Pearson Education in South Asia, Tenth impression, 2014.
[2] Nand Kishore, Sukhvir Singh and Renu Dhir, "Energy Based Evaluation of Routing Protocol for MANETs", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (14-17), Mar -2014.
[3] Y. T. Mingliang Jiang, Jinyang Li, �Cluster based routing protocol,�IETF Internet Draft, draft-ietf-manet-cbrp-spec-01.txt, July 1999. http://www.comp.nus.edu.sg/ tayyc/cbrp/
[4] Mario Gerla and Jack Tzu-Chieh Tsai. Multicluster, mobile, multimedia radio network. ACM-Baltzer Journal of Wireless Networks, 1(3):255�265, 1995.
[5] Supeng Leng, Member, IEEE, Liren Zhang, Senior Member, IEEE, Huirong Fu, Member, IEEE, and Jianjun Yang, �A Novel Location-Service Protocol Based on k-Hop Clustering for Mobile Ad Hoc Networks�,IEEE TREANSACTIONS ON VECHICULAR TECHONOLOGY, Vol.56, No.2, March 2007.
[6] Muneer Bani Yasseinl , Neveen Hijazil, �Improvement on Cluster Based Routing Protocol By Using Vice Cluster Head�, Fourth International Conference on Next Generation Mobile Applications, Services and Techonologies. 2010.
[7] Deepesh Tamrakar, Sreshtha Bhattacharya and Shitanshu Jain, "A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks", ISROSET-International Journal of Scientific Research in Network Security and Communication, Volume-02, Issue-02, Page No (1-5), Mar -Apr 2014.
Citation
G.A. Khiratkar, S.S. Mahajan, "Performance Analysis of Cluster Based Routing Protocol for Ad hoc Networks," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.141-143, 2014.
Continuous Availability in Replicated Program
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.144-149, Apr-2014
Abstract
One of the main reasons for income loss in enterprises that is usually addressed by providing redundant software and hardware is Service downtime. A way to provide software redundancy is to create a replica of the state of a program in execution to a set of replicas such as, when the primary fails. The place of the formerly running application occurrence is presumed by one of the replicas. A prototype of continuously available replica programs is provided, in case of failure of primary a replica takes over the functionality without any service downtime. Thus, the costly task of starting a new application occurrence on the other machine is avoided. When the mail server get disconnected, design offline email gears service. Or email gears are being developed To encounter the network failure . All email operations can be performed even if the network fails.
Key-Words / Index Term
IP Switching, IP Pooling, Replication, POP3, SMTP, ICMP, ARP
References
[1] Lanyue Luy, Prasenjit Sarkar, Dinesh Subhraveti and Ahmed Bashir Rice �CARP: Handling silent data errors and site failures in an integrated program and storage replication mechanism�, IEEE International Conference on Distributed Computing Systems,2011
[2] Arvind Kumar, Rama Shankar Yadav, Ranvijay, Anjali Jain ,�Fault Tolerance in Real Time Distributed System�, International Journal on Computer Science and Engineering (IJCSE),ISSN : 0975-3397 Volume- 03,Issue -02,Page No- (933-939), Feb 2011.
[3] J. L. Hafner, V. Deenadhayalan, W. Belluomini, and K. Rao,�Undetected Disk Errors in RAID Arrays,� in IBM Journal of Research and Development. VOL.52, 2010.
[4] L. N. Bairavasundaram, G. R. Goodson, B. Schroeder, A. C. Arpaci-Dusseau, and R. H. Arpaci-Dussea, �An Analysis of Data Corruption in the Storage Stack,� in FAST, 2009.
[5] B. Cully, G. Lefebvre, D. Meyer, M. Feeley, N. Hutchinson, and A. Warï¬eld, �Remus: High availability via Asynchronous Virtual Machine Replication,� in NSDI, 2008.
[6] Andrew S. Tanenbaum �Computers Networks� (4th edition), Prentice Hall PTR 2003.
[7] Roger S �Software Engineering- A Practitioner�s Approach� 5th Edition McGraw-Hill, 2005.
Citation
T. Hatkar, B. Dhikale, A. Shaikh, S. Durugkar , "Continuous Availability in Replicated Program," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.144-149, 2014.
Enhancing the Productivity of Digital Data Retrieval
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.150-156, Apr-2014
Abstract
The escalate of crime rate around the global manifests the lag in the ongoing methodology in extraction or inspection of information retrieved and stored in cache from divers communication channels of the digital investigation system. The Principle objective for the development of this strategy, is to revamp the existing methodology and develop a crime relates information mining framework for extracting and examine pertinent information from stored data which incorporates emails, chat threads and any text messages to discover the criminal activity and solve the enigma with the help of the certainty concealed within the data. This strategy is achieved by the prominence of the three aspects initiated to the input data of textual evidences such as mails, text messages, chat threads, etc. the three aspects are, the separation of the body and header part of a textual corpuses consisting of all kinds of textual evidences of diverse communication channels and preprocessing of text , which is achieved using regular expressions of PHP script and stemming process respectively, in order to make the mining process of text more reliable for the forensic department of crime investigation. Further the searching technique used in this methodology which is constructed for the most highly effective and efficient retrieval of data. Although the technique followed in this methodology is an ancient technique of separation of body and header in a mail, the main aspect of this methodology is to focus over the efficiency in searching technique built for the purpose of effectiveness. A Clustering algorithm is used in this methodology to improvise the system. This algorithm has mainly three feature, it is the alternative form of the Reverse Factor algorithm, it uses bit-parallelism simulation of the suffix automaton of xR and it is efficiency is high if the pattern length is not longer than the memory-word size of the machine. Using this kind of technique to improvise the existing system would bring about a methodical procedure, which would initiate in a highly efficacious searching system, evidenced by the time complexity, precision and recall value. The preprocessing of text, that is stemming is done for easier understanding and convince of the user to suspect over threads and text document. Integrating all the factors specified would assist in easier reviewing of the text messages.
Key-Words / Index Term
Textual Evidences, Stemming, Information Retrieval, Preprocessing
References
[1] S.Gowri; G.S.Anandha Mala; �Improving Intelligent IR Effectiveness in Forensic Analysis� Institution of Computer Science Informatics and Telecommunication Engineering 2012, Page(s): 451.
[2] Ms. Vandana Dhingra; Dr. Komal Kumar Bhatia; �Towards Intelligent Information Retrieval on Web� International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397Vol. 3 No. 4 Apr 2011
[3] Gabarro, S. "String Manipulations Revisited" Web Application Design and Implementation:Apache 2, PHP5, MySQL, JavaScript, and Linux/UNIX Digital Object Identifier: 10.1109/9780470083963.ch17 Page(s): 209- 216 Copyright Year: 2007.
[4] Minamide,Y. ; Sakuma,Y. ; Voronkov, A."Translating Regular Expression Matching into Transducers" Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2010 12th International Symposium on Digital Object Identifier: 10.1109/SYNASC.2010.50 Publication Year: 2010 , Page(s): 107- 115 Cited by: Papers (2).
[5] Bartoli, A. ; Davanzo, G. ; De Lorenzo, A. ; Medvet, E. ; Sorio, E. "Automatic Synthesis of Regular Expressions from Examples" Computer Volume:PP , Issue: 99 Digital Object Identifier: 10.1109/MC.2013.403 Publication Year: 2013 , Page(s): 1.
[6] Jesse Davis; Mark Goadrich; �The Relationship Between Precision-Recall and ROC Curves� Appearing in Proceedings of the 23rd international conference on Machine Learning, Pittsburg, PA, 2006.
[7] Suzumura, T. ; Trent, S. ; Tatsubori, M. ; Tozawa, A. ; Onodera, T. "Performance Comparison of Web Service Engines in PHP, Java and C" Web Services, 2008. ICWS `08. IEEE International Conference on Digital Object Identifier: 10.1109/ICWS.2008.71 Publication Year: 2008 , Page(s): 385- 392 Cited by: Papers (1).
[8] NAVARRO G., RAFFINOT M., 1998. �A Bit-Parallel Approach to Suffix Automata: Fast Extended String Matching�, In Proceedings of the 9th Annual Symposium on Combinatorial Pattern Matching, Lecture Notes in Computer Science 1448, Springer-Verlag, Berlin, 14-31.
[9] Nascimento, M.A. ; Da Cunha, A.C.R.,"An experiment stemming non-traditional text" String Processing and Information Retrieval: A South American Symposium, 1998. Proceedings Digital Object Identifier: 10.1109/SPIRE.1998.712985 Publication Year: 1998.
[10] Inikpi O. Ademu, Dr Chris O. Imafidon, Dr David S. Preston, �A New Approach of Digital Forensic Model for Digital Forensic Investigation� (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No.12, 2011.
[11] S.Gowri; G.S.Anandha Mala; G.Divya; �Suspicious Data Mining from Chat and Email Data� International Journal of Advances in Science Engineering and Technology, ISSN: 2321-9009 Volume- 2, Issue-2, April-2014.
Citation
S. Gowri , G.S. Anandhamala, G. Divya , "Enhancing the Productivity of Digital Data Retrieval," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.150-156, 2014.