Performance Comparison of Different Sorting Algorithms

Performance Comparison of Different Sorting Algorithms Abstract— Sorting is the basic operation in most of the applications of computer science. Sorting means to arrange data in particular order inside computer. In this paper we have discussed performance of different sorting algorithms with their advantages and disadvantages. This paper also represents the application areas for different sorting algorithms. Main goal of this paper is to compare the […]

Read Me

Security Analysis of OpenStack Keystone

Security Analysis of OpenStack Keystone Abstract – OpenStack is one of the most used cloud management software today. OpenStack is a free and open-source software platform for cloud computing, mostly deployed as an infrastructure-as-a-service (IaaS). We have selected OpenStack as one of the underlying infrastructure service layer tool because OpenStack allows us to modify our cloud to fit into custom infrastructures that may be necessary […]

Read Me

Abnormality Detection of Sensors in IOT Controllers using Fuzzy Approach for Smart Home

Abnormality Detection of Sensors in IOT Controllers using Fuzzy Approach for Smart Home Abstract— Smart home innovation is developing quickly as an energizing new worldview. An extensive variety of perspectives that incorporates security, energy sparing, ventilation, shrewd kitchen is canvassed in this paper. The greater part of the above is executed with the assistance of keen gadgets, for example, remote control, security alerts, sensors and […]

Read Me

Improved Object Detection Algorithm using Ant Colony Optimization and Deep Belief Networks Based Image Segmentaion

Improved Object Detection Algorithm using Ant Colony Optimization and Deep Belief Networks Based Image Segmentaion. Abstract— Object detection is a very important application of image processing. It is of vital importance for object dynamic surveillance and other applications. So far, object detection has been widely researched. It shows an efficient coarse object locating method based on a saliency mechanism. The method could avoid an exhaustive […]

Read Me

Hybrid Technique to Prevent Multiplicative RFID Attacks using Hybrid Distance Bounding (DB) Protocols and Secure Positioning Protocols

Hybrid Technique to Prevent Multiplicative RFID Attacks using Hybrid Distance Bounding (DB) Protocols and Secure Positioning Protocols Abstract— Security concerns inhibit the fast adaption of RFID technology for many applications. the security and privacy in radio frequency identification (RFID) system are one of the main obstacles to be solved. therefore this thesis work has proposed the hybrid technique to prevent multiplicative RFID attacks using hybrid distance bounding […]

Read Me

Providing Banking Loan to Customers Based on J48 Classifier Algorithm Combined with Neural Networks

Providing Banking Loan to Customers Based on J48 Classifier Algorithm Combined with Neural  Networks Abstract: Data mining is the transformation of large sizes of information into expressive patterns and rules. It is approximately describing the former and calculating the near future by means of information analysis. Data mining is really a multi-disciplinary area which combines, equipment understanding, data, database engineering and synthetic intelligence. The full […]

Read Me

Security Estimation Model: Fault Perspective

Security Estimation Model: Fault Perspective Abstract- The issue of security is essential for secure software. Measuring security of software system at design phase may help software developers to improve the security of software system. A security estimation model for object oriented design fault perspective has been developed in this paper. The proposed model correlates the Object Oriented Design constructs with Fault and Security. The security […]

Read Me

Shadow Replication using Dynamic Core Allocation for Application Fault Tolerance in Virtual Environment

Shadow Replication using Dynamic Core Allocation for Application Fault Tolerance in virtual Environment Abstract— As the interest for cloud computing keeps on increasing, cloud specialist organizations are confronted with the overwhelming test to meet the targeted SLA agreements, as far as dependability and convenient execution is concerned, while accomplishing cost and energy efficiency. This paper proposes Shadow Replication, a novel fault-tolerance mechanism for cloud computing, which flawlessly […]

Read Me

Twitter Text Objectionable Content Detection using Domain Based Probability and Correlation Model

Twitter Text Objectionable Content Detection using Domain Based Probability and Correlation Model Abstract— Text mining technique is used to detect the required patterns from the text documents. The nature of text document is an unstructured format where the data is represented in an unstructured manner. The text mining can be used for information retrieval, information extraction, search, classification, and categorization. In this context, an application of […]

Read Me

Issues and Challenges in Social Networks for Recommender System in E-Learning: A Survey

Issues and Challenges in Social Networks for Recommender System in E-Learning: A Survey Abstract: With the rapid evolution of information and communication technologies (ICT), e-learning has become one of the major trends in web based learning. Nowadays, learners in an e-learning system are into virtual education environment in which they do not need others assistance in the process of learning. The role of social networks in […]

Read Me