The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Network (SDN), a very new idea in networking domain, promises to dramatically simplify network management and enable innovation through network programmability. In spite of significant benefits, this emerging architecture suffers from several security challenges which make it vulnerable to different attacks like denial of service attack, man-in-middle attack etc. In this paper, we...
Extraction of knowledge and predictive analysis are the new challenges for the rapidly growing large volume of data to make the right decision at right time. It is difficult to store, analyze and visualize such large data volume with its diversities with standard data mining tools. Hence, in this paper, we develop a MapReduce approach of a Parallel-Reduct algorithm based on the rough set theory for...
Social network can be viewed as a relationship between the set of connected entities, represented by a large graph consisting of vertices and edges. Dynamicity of the social network demands the isolation and/or incorporation of associated entities and represented by large graph. Depending on the application, some nodes of the graph play the influential roles accordingly and are classified as influential...
Distributed deadlock detection is a very complex task as no node has correct and complete information about the overall state of the system. An adaptive gossip based semi-centralized deadlock detection algorithm is proposed in this paper. Due to the basic inherent nature of the gossip protocol, our distributed deadlock detection algorithm using adaptive gossip can be said to be fault-tolerant, scalable...
Content management system (CMS) is an infrastructure for efficient distribution, organization, and delivery of digital content. It is desirable that the content must be successfully delivered regardless of the end users location or attachment network. For the end to end delivery of content, a virtual open content delivery infrastructure is formed by interconnecting several CDNs. In this paper, we...
The eight puzzle problem is the largest completely solvable problem of n∗n sliding puzzle problems. It is combinatorial in nature, but there is a large problem space of 9! /2. Objective of this work is to find the complete solution of eight puzzle problem i.e. examining all the permutations for solvability. Using Breadth First search (BFS) graph traversal we can reach the solution for a definite goal...
A distributed system consists of several autonomous nodes, where some of the nodes may be overloaded due to a large number of job arrivals while others nodes are idle without any processing. Load Balancing is used for effectively distributing the load among the nodes. Centralized load balancing schemes are not scalable as the load balancing decision depends on a central server. In contrast fully distributed...
Modern enterprises are facing more and more uncertainties and challenges from insecurity and context sensitivity. In view of information security, an enterprise is considered as a collection of assets and their interrelationships and how users use their rights to access the enterprise. These interrelationships may be built into the enterprise information infrastructure, as in the case of connection...
This paper presents a novel approach for optimizing the number of decision rules and select important features based on reduct. We compute the reduct using entropy value of conditional attribute then eradicates the redundant dataset, noisy features and uncertainty of dataset using coverage factor and generate optimized number of rules. Experimental results show that this approach achieves high data...
Content Management System (CMS) is one of the recent upcoming concepts due to its efficient and explicit use in the real world applications. The demand for growth in its diversity has been documented by many researchers. Due to the limitation of traditional database management system (DBMS), which enforces limits on the type of data items need to be stored, CMS becomes the cost-effective alternative...
Ubiquitous computing environment is a coalesced consequence of wireless and mobile computing, smart spaces along with invisibility, localized scalability and uneven conditioning. In Ubiquitous network, wireless communication between consumers and service stations are imperceptibly done in real space through a number of directory servers for getting user requested services. When consumers need a web...
Multiple Sequence Alignment is one of the important research topics in Bioinformatics. The objective is to maximize the similarities among sequences by adding and shuffling gaps in sequences. We here present a genetic algorithm based approach to solve the problem efficiently. We use steady state Genetic Algorithm with a new form of chromosome representation. PAM 350 is used as scoring matrix for calculating...
In order to configure a network in any organization, the user lays out certain specifications that need to be fulfilled. The prospective user defines the security and routing policies that need to be implemented without getting into any technical details. The objective of this work is to map the policies stated, to a set of technical parameters for a networking environment. In other words, a normal...
Mobile ad hoc network (MANET) has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to different types of attacks due to the open medium, node mobility, lack of centralized monitoring and lack of a clear line of defense. In this paper, we propose a design of a cooperative network intrusion detection system based on Dynamic...
Security is most essential for communication in ad-hoc network to secure data delivery between source node and destination node. A very well known harmful attack is Sybil attack where a node pretends multiple identities of several target nodes. In this paper, we have introduced an on-demand trusted approach to defend Sybil attack. We have chosen a on-demand routing protocol, AODV and proposed a trust...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.