Java File Security System JFSS
Published In: GJCST Part: E: Network, Web & Security Volume: 12 Issue: 10
Nowadays, storage systems are increasingly subject to attacks. So the security system is quickly becoming mendatory feature of the data storage systems. For the security purpose we are always dependent on the cryptography techniques. These techniques take the performance costs for the complete system. So we have proposed the Java File Security System(JFSS). It is based on the on-demand c...
Paper Information
Authors Mr. Brijender Kahanwal, Kanishak Dua, Dr. Girish Pal Singh
Read Journal Click Here
Read Paper Click Here
Page No. 45 to 48

It is investigated to verify the scalability aspects of the distributed engineering computation on the cloud computing. In the study, a parallel virtual machine program distributed over a network of cloud computers is used in solving a finite difference version of a typical complicated engineering differential equation. It is found that there exist a pseudo-optimal number of virtual mach...
Paper Information
Authors Dr. Han Gyoo Kim
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 25

Mobile Adhoc Network (MANET) is characterized by mobile hosts, dynamic topology, multi-hop wireless connectivity and infrastructureless ad hoc environment. The adhoc environment is accessible to both legitimate network users and malicious attackers. Moreover, as the wireless links are highly error prone and can go down frequently due to mobility of nodes, therefore, energy efficient, sec...
Paper Information
Authors Dr. Sunil Taneja, Ashwani Kush
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 43

Image Processing applications have grown vastly in real world. Commonly due to limited depth of optical field lenses, it becomes inconceivable to obtain an image where all the objects are in focus. Image fusion deals with creating an image where all the objects are in focus. After image fusion, it plays an important role to perform other tasks of image processing such as image enhancemen...
Paper Information
Authors Dr. G. Mamatha, Shaik Abdul Rahim, Cyril Prasanna Raj
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 23

The biological databases generate huge volume of genomics and proteomics data. The sequence information is used by researches to find similarity of genes, proteins and to find other related information. The genomic sequence database consists of large number of attributes as annotations, represented for defining the sequences in Xml format. It is necessary to have proper mechanism to grou...
Paper Information
Authors Dr. B.L.Shivakumar, V.Bhuvaneswari
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 19

In this paper a new classification of range image segmentation method is proposed according to the criterion of homogeneity which obeys the segmentation, then, a deformable model-type active contour “Snake” is applied to segment range images. ...
Paper Information
Authors Dr. Khaldi Amine, Merouani Hayet Farida
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 15

Business plays a pivotal role for the development of human civilization as well as change of the status of the country in this whole universe. To compare and compute the export trend for any organization or a country is an indispensable for numerous intelligent systems to measure the national and international gain or loss for developing countries as well as for developed countries. The ...
Paper Information
Authors Md.Sarwar kamal, Sonia Farhana Nimmy, Mohd. Kamal Uddin
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 33

The problem of mining association rules in a database are introduced. Most of association rule mining approaches aim to mine association rules considering exact matches between items in transactions. A new algorithm called “Improved Data Mining Based on Semantic Similarity to mine new Association Rules” which considers not only exact matches between items, bu...
Paper Information
Authors Dr. Sandeep Jain, Aakanksha Mahajan
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 17

Cloud computing, a rapidly developing information technology has brought new change & opportunities to IT industry and in the field of education. E-learning platform brings a brand new concept & is a kind of network information learning mode & also known as online learning to guide education. E-learning emphasizes on the technology to transform & guide education. E-learning system will u...
Paper Information
Authors Mr. D.kasi Viswanath, S.Kusuma, Saroj Kumar Gupta
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 19

Adhoc wireless networks have emerged as one of the key growth areas for wireless3 networking and computing technology. Adhoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, adhoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The nodes in ad-hoc networks are ...
Paper Information
Authors Dr.M.V.Subramanyam, P.V.Gopikrishna rao
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 30