intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

International Journal of Computer Science and Communication Networks

Xem 1-20 trên 235 kết quả International Journal of Computer Science and Communication Networks
  • Though there is no technical definition by any statutory body for Cybercrime, it is broadly defined by the Computer Crime Research Centre as - “Crimes committed on the internet using the computer either as a tool or a targeted victim. Cybercrime could also include non-monetary offenses, such as creating and distributing small or large programs written by programmers called viruses on other computers or posting confidential business information on the Internet.

    pdf5p hongnhan878 12-04-2019 36 2   Download

  • To set our current mechanism as scalable, we suggest a partition based approach that outplays the baseline algorithm by up to an offer the magnitude. The appropriateness of the current framework and the achievement of the algorithms are check out real locations data.

    pdf5p hongnhan878 12-04-2019 34 1   Download

  • Our system of CDA document creation and integration is based on cloud computing and the service is offered through Open API. Developers using different platforms thus can use our system to enhance interoperability. Cloud infrastructure with mapping software “health care information”

    pdf6p hongnhan878 12-04-2019 29 0   Download

  • In this paper, we leverage multi-cloud storage systems to provide data confidentiality against an adversary which has access to the encryption key, and can compromise a large fraction of the storage servers. For this purpose, we first introduce a novel security definition that captures data confidentiality in the new adversarial model.

    pdf7p hongnhan878 12-04-2019 32 3   Download

  • In this project, we propose a novel heterogeneous framework to remove the problem of single-point performance bottleneck and provide a more efficient access control scheme with an auditing mechanism.

    pdf7p hongnhan878 12-04-2019 31 2   Download

  • In this paper, the offset-shift Scheme is applied to motion reimbursement frameworks and a scheme is provided for conniving the motion-based adaptive threshold T connected with the motion sequence.

    pdf6p hongnhan878 12-04-2019 14 1   Download

  • The greatest test for enormous information from a security perspective is the assurance of client's protection. Be that as it may, encoded information present new difficulties for cloud information de-duplication, which gets to be significant for huge information stockpiling and preparing in cloud.

    pdf7p hongnhan878 12-04-2019 25 1   Download

  • This model identifies underlying semantic structure of a document collection from word to topic and topic to document quickly, effectively without human intervention. Initially, this model creates the topics based on Dirichlet Distribution using vector space model.

    pdf4p hongnhan878 12-04-2019 34 1   Download

  • This paper also proposes a Facet Classification Algorithm to evaluate the faceted interface. In order to demonstrate these ideas and better understand personalized faceted search, several faceted search algorithms are proposed and evaluated using the novel evaluation methodology.

    pdf6p hongnhan878 12-04-2019 18 0   Download

  • The vehicular nodes under NLOS situation should be figured effectively, so that the emergency vehicle can communicate to the NLOS node at accurate time period with decreased overhead were the time period depend upon the high degree of channel utilization. In this paper we are going to discuss many such methods proposed by researches by considering the advantages and drawbacks.

    pdf9p hongnhan878 12-04-2019 21 0   Download

  • In this paper we propose a new method to manage secure group using binomial key tree approach. We show that number of encryptions performed and rekey messages constructed during membership change are less compared to the scheme proposed by Wong and others. In our scheme, it is not required to balance the tree after membership change.

    pdf10p hongnhan878 12-04-2019 17 1   Download

  • In order to narrow down the scope of target nodes sometimes using it, multiple keywords can be efficiently executed. In order to confirm the effectiveness of the proposed method, we conducted an experiment by simulation and we will also describe the results.

    pdf11p hongnhan878 12-04-2019 19 1   Download

  • The SVM suffers from the complex computational processes. Therefore, this paper presents a new space vector modulation controller based soft computing-high accuracy implementation of artificial neural network. An artificial neural network (ANN) structure is proposed to identify and estimated the conventional SVM for avoiding the complex computational problem and hence improve the performance of the photovoltaic inverter generation. The ANN model receives the αβ voltages information at the input side and generates the duty ratios (Ta, Tb, and Tc) as an output.

    pdf16p hongnhan878 12-04-2019 45 2   Download

  • The query language will be in English and documents will be retrieved from Marathi documents collection. English query translation will be done dictionary based approach. To improve performance of the proposed system, query expansion using WordNet and pre-processing techniques will be employed to get good precision and recall.

    pdf5p hongnhan878 12-04-2019 16 0   Download

  • In this scheme the format of plaintext and ciphertext are same. The three main Format Preserving Encryption modes such as FF1, FF2 and FF3 approved by National Institute of Science and Technology(NIST) are analysed and highlights the differences in performance.

    pdf4p hongnhan878 12-04-2019 23 0   Download

  • The software platform consists of interrelated components that control hardware pools of processing, storage, and networking resources throughout a data center. Users either manage it through a web-based dashboard. But the implementation of openstack is very complex. So, we can use configuration management tools that is also known as DevOps.

    pdf5p hongnhan878 12-04-2019 30 3   Download

  • Communication through wireless links among mobile hosts in their Antennas. Manet if often susceptible to security attacks due to its features of Physical security, Mobility modules, Lack of centralized monitoring and organization points.

    pdf6p hongnhan878 12-04-2019 40 3   Download

  • To ensure communication between the banking server and the client, they will use security algorithms such as the Brute Force algorithm, the MD5 Hashing algorithm and the Base64 algorithm. There proposed technique will ensure the flow of payment of the card.

    pdf4p hongnhan878 12-04-2019 30 2   Download

  • The RSA algorithm is used to secure data packets are transmit from source node to sink node by powerful clone attack, which can be eliminated by the malicious nodes. The proposed protocol can achieve high clone detection probability using randomly selected trustful witnesses and with larger network lifetime, by effectively distributing the traffic load across the network.

    pdf6p hongnhan878 12-04-2019 28 2   Download

  • In this scenario, the service cost is higher than that of utilizing individual cloud but the efficiency and reliability is far more superior as compared to single cloud service. The experimentation was performed in local environment.

    pdf6p hongnhan878 12-04-2019 28 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
4=>1