Volume 7- 2017
Articles Publishing inprocess
Page | Title | Full Text |
---|---|---|
February 2017 | ||
10-14 | Secured Data Storage in public Cloud
Environment through Crypto-Biometric System Prabu S,,Gopinath Ganapathy Abstract
Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. It is the delivery of computing as a service rather than a product whereby shared resources, software and information is provided to computers. In these days a single server handles the multiple requests from the user. Here the server has to process the both the request from the user simultaneously, so the processing time will the high. This may leads to loss of data and packets may be delayed and corrupted and also the Data Management and the Services are not Trust Worthy. Users start worrying about losing control of their own data. Also the data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. An efficient data placement algorithm is proposed and implemented in this paper. The data placement algorithm will tell us how to place the files efficiently to the containers in object storage. Besides, the files will merge when client needs it back. So some additional algorithms are also used for partitioning and merging of files. So the objective is to achieve good security for cloud storage system, through proposed algorithm by using multiple containers of object storage in cloud. To handle these issues, the paper proposed an approach to store the data through data placement algorithm, to provide authentication and secure access control for data using Crypto-Biometric System (CBS) in cloud computing and to Protect the data from unauthorized access.
|
Full Text PDF |
January 2017 | ||
05-09 | ZRP - An Analysis and Extension of MANET B.Manimekala Abstract
Secure communication, an important aspect of any networking environment, is an especially signicant challenge in ad ho. Ad-Hoc Networks consist of peer-to peer communicating nodes that are highly mobile. As such, an ad- hoc network lacks infrastructure and topology of the network changes dynamically. MANET is combination of wireless mobile nodes that communicate with each other without any kind of centralized control or any device or established infrastructure. Therefore MANET routing is a critical task to perform in dynamic network. Without any fixed infrastructure, wireless mobile nodes dynamically establish the network. Routing Protocols helps to communicate a mobile node with the other nodes in the network by sending or receiving the packets. This research paper provides the overview of ZRP by presenting its functionality. Keywords: Adhoc, Manet, ZRP
|
Full Text PDF |
01-04 | A Review on Data Mining Techniques for
Treatment of Cancer in Ayurveda Therapy Deepa Nyayadhish, Dr.Pramod Deo Abstract
The purpose of this literature review is to evaluate and analyse the literature relevant to the topic. This paper presents an overview of the applications of data mining in Health Informatics. The current or potential applications of various data mining techniques in Health Informatics are illustrated through some published literature. Data mining techniques such as clustering, Decision tree, ANN, CART (Classification and Regression Tree) is widely used in healthcare domain. Data mining algorithms, when appropriately used, are capable of improving the quality of prediction, diagnosis and disease classification [1]. The main focus of this paper is to analyse data mining techniques required for Ayurveda therapy data especially to discover effective treatment for cancer. Keywords-Data mining techniques, Ayurveda Therapy, Expert System, Data mining process
|
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net