Volume 7- 2017

Articles Publishing inprocess


Page Title Full Text
February 2017
10-14 Secured Data Storage in public Cloud Environment through Crypto-Biometric System
Prabu S,,Gopinath Ganapathy

Cloud computing takes the technology, services, and applications that are similar to those on the Internet and turns them into a self-service utility. It is the delivery of computing as a service rather than a product whereby shared resources, software and information is provided to computers. In these days a single server handles the multiple requests from the user. Here the server has to process the both the request from the user simultaneously, so the processing time will the high. This may leads to loss of data and packets may be delayed and corrupted and also the Data Management and the Services are not Trust Worthy. Users start worrying about losing control of their own data. Also the data processed on clouds are often outsourced, leading to a number of issues related to accountability, including the handling of personally identifiable information. An efficient data placement algorithm is proposed and implemented in this paper. The data placement algorithm will tell us how to place the files efficiently to the containers in object storage. Besides, the files will merge when client needs it back. So some additional algorithms are also used for partitioning and merging of files. So the objective is to achieve good security for cloud storage system, through proposed algorithm by using multiple containers of object storage in cloud. To handle these issues, the paper proposed an approach to store the data through data placement algorithm, to provide authentication and secure access control for data using Crypto-Biometric System (CBS) in cloud computing and to Protect the data from unauthorized access.
Keywords— Cloud Computing, Crypto-Biometric System, Data Placement Algorithm.

Full Text PDF
January 2017
05-09 ZRP - An Analysis and Extension of MANET

Secure communication, an important aspect of any networking environment, is an especially signicant challenge in ad ho. Ad-Hoc Networks consist of peer-to peer communicating nodes that are highly mobile. As such, an ad- hoc network lacks infrastructure and topology of the network changes dynamically. MANET is combination of wireless mobile nodes that communicate with each other without any kind of centralized control or any device or established infrastructure. Therefore MANET routing is a critical task to perform in dynamic network. Without any fixed infrastructure, wireless mobile nodes dynamically establish the network. Routing Protocols helps to communicate a mobile node with the other nodes in the network by sending or receiving the packets. This research paper provides the overview of ZRP by presenting its functionality.

Keywords: Adhoc, Manet, ZRP

Full Text PDF
01-04 A Review on Data Mining Techniques for Treatment of Cancer in Ayurveda Therapy
Deepa Nyayadhish, Dr.Pramod Deo

The purpose of this literature review is to evaluate and analyse the literature relevant to the topic. This paper presents an overview of the applications of data mining in Health Informatics. The current or potential applications of various data mining techniques in Health Informatics are illustrated through some published literature. Data mining techniques such as clustering, Decision tree, ANN, CART (Classification and Regression Tree) is widely used in healthcare domain. Data mining algorithms, when appropriately used, are capable of improving the quality of prediction, diagnosis and disease classification [1]. The main focus of this paper is to analyse data mining techniques required for Ayurveda therapy data especially to discover effective treatment for cancer.

Keywords-Data mining techniques, Ayurveda Therapy, Expert System, Data mining process

Full Text PDF