{"title":"DEPLOYMENT OF FAIR SHARE AND SMART START TECHNIQUE FOR OPTIMAL USE OF AVAILABLE CAPACITY IN TCP CONGESTION CONTROL","authors":"P. Ganeshkumar, K. Thyagarajah","doi":"10.18000/IJISAC.50038","DOIUrl":"https://doi.org/10.18000/IJISAC.50038","url":null,"abstract":"The traditional TCP congestion control mechanism encounters a number of new problems and suffers in poor performance. In traditional TCP congestion control, slow start results in poor performance. During slow start the number of TCP segments transmitted per unit time is considerably small compared to the capacity of the Network. It increases gradually according to the RTT. In this paper, an attempt is made to increase the performance of the TCP by introducing a two new technique called Adaptive Fair Share of Congestion window size (AFSCOW) and Smart Start (SS). AFSCOW can be used for the new TCP connections emerging in the end systems having same sender and receiver. For an emerging new application in the sender the window size can be determined as the total of the current window sizes of the existing application divided by the total number of application including the new emerging application. In Fast Start the number of TCP segments transmitted is not doubled but it is increased three times the older window size which shows the optimum use network resources within minimum RTT.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114921711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HIGH SPEED PIPELINED ASIP PROCESSOR FOR ECC USING FPGA TECHNOLOGY","authors":"B. Muthukumar, S. Jeevananthan","doi":"10.18000/ijisac.50066","DOIUrl":"https://doi.org/10.18000/ijisac.50066","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130570999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FAST SVMS FOR POWER QUALITY DATA MINING","authors":"K. Manimala, K. Selvi, R. Ahila","doi":"10.18000/IJISAC.50033","DOIUrl":"https://doi.org/10.18000/IJISAC.50033","url":null,"abstract":"Recognition of the presence of any disturbance and classifying any existing disturbance into a particular type is the first step in combating the power quality problem. Support Vector Machines (SVMs) have gained wide acceptance because of the high generalization ability for a wide range of classification applications. Although SVMs have shown potential and promising performance in power disturbances classification, they have been limited by speed particularly when the training data set is large. The hyper plane constructed by SVM is dependent on only a portion of the training samples called support vectors that lie close to the decision boundary (hyper plane). Thus, removing any training samples that are not relevant to support vectors might have no effect on building the proper decision function. We propose the use of clustering techniques such as K-mean to find initial clusters that are further altered to identify non-relevant samples in deciding the decision boundary for SVM. This will help to reduce the number of training samples for SVM without degrading the classification result and classification time can be significantly reduced.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Water Tank Overflow Control Unit Integrated with Mobile Application","authors":"S. Gowri, P. Pranathi, K. Sravya","doi":"10.18000/IJISAC.50155","DOIUrl":"https://doi.org/10.18000/IJISAC.50155","url":null,"abstract":"Basically automation in systems would help reduce wastage of resources in various ways, one such way for the prevention of wastage of water resource to control the water tanks from overflow. In this automated world, the handling of any kind of devices with comfort is made to be the easiest factor everywhere. Considering this aspect of comfort zones and the prevention of wastage of resources, a design of an automated overflow control circuit unit was proposed in this paper. The proposal was designed on the perspective of controlling the flow of water into the tanks automatically, by setting the requirements as per the user needs using a Mobile Application in android. The connectivity of the circuit and the application is accomplished using Bluetooth device for handling the communication between the mobile and the overflow circuit. The entire system was tested in its operation and was scrutinized on the whole. I.INTRODUCTION As days passed by the growth of technology would seem to be a major aspect bound to humans and machines. The growth of this technology reflects in all the aspects of the day to day life of a human being. Technology plays a vital role in every moment in their entire life span of a human, from a just born baby to a very old man. Technology has almost scatted over all the sectors, from small scale home usage to a large scale satellite. If a closer view was taken upon the technology, every step we make or every move we do deals with the technology.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alleviating Malicious Insider in Cloud Through Offensive Decoy Technology","authors":"B. Ankayarkanni","doi":"10.18000/IJISAC.50145","DOIUrl":"https://doi.org/10.18000/IJISAC.50145","url":null,"abstract":"The eternal way for using computer in the way of cloud computing used to store our personal and private organization information. In this new technology for communication computing there exist many challenges for securing data. There are many data protection techniques existing which uses encryption technique that prevents data attacks from the insider in provider of cloud. To secure data from an offensive decoy attack that access data from cloud storage. To monitor data access which suspects and verify attacks send large amounts of decoy information. They also can misuse real user data which evidences the level of data security provided in cloud security. In this model we propose approach for securing data using fog computing. This technique used for launching disinformation attacks against malicious insiders which prevents them from differentiating the sensitive data provided from the fake useless data. This process alleviates the malicious insider from the cloud storage area who uses offensive technique for attacking. Keywords—Cloud Computing, decoy technology, disinformation attack, data protection.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121706785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PERFORMANCE EVALUATION OF MESH AND POSITION BASED HYBIRD ROWTING IN MANETS","authors":"Chethan, S. Chandra, basavaraddi, Geetha N.B.","doi":"10.18000/IJISAC.50105","DOIUrl":"https://doi.org/10.18000/IJISAC.50105","url":null,"abstract":"A new routing algorithm called position based hybrid routing algorithm (PBHRA) was developed to optimize bandwidth usage of ad hoc networks. The main goal of PBHRA is effective use of bandwidth by reducing the routing overload. Additionally, the other goals of the algorithm are to extend battery life and signal strength or power level of the mobile devices by reducing the required number of operations for route determination and to reduce the amount of memory used. Although in the PBHRA, some features of both table driven and on-demand algorithms were used to achieve these goals at some stages, PBHRA algorithm is a completely different approach in terms of position information usage and global positioning system (GPS).","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124834269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A BIOMETRIC WITH CRYPTOGRAPHY FOR REMOTE VOTING SYSTEM","authors":"Shameem Sulthana .E.S, S. Kanmani","doi":"10.18000/IJISAC.50091","DOIUrl":"https://doi.org/10.18000/IJISAC.50091","url":null,"abstract":"Abstract - In this modern world everything is possible and fast. In this paper we propose a multifaceted online e-voting system. The proposed system is capable to manage through internet with multiple scopes and focus on using evidence for making access control decisions in present computing environments. To protect the election accuracy, it is necessary to have an accurate electoral roll of eligible voters. The main goal of this work is it supports a remote voter registration scheme that increases the accuracy of the current systems. In this scheme the voter identification is carried out by means of combining cryptographic and biometrics techniques. This work implements the evidence-based approach on web service and it creates an ecosystem in which evidence providers can flourish.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125936545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AN INSIGHT IN TO THE NATURE OF FIRST GENERATION WOMEN ENTREPRENEURS","authors":"S. Ambiga, M. Ramasamy","doi":"10.18000/IJISAC.50114","DOIUrl":"https://doi.org/10.18000/IJISAC.50114","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TRAFFIC CONTROL BY BLUE TOOTH ENABLED MOBILE PHONE","authors":"G. Manikandan, S. Srinivasan","doi":"10.18000/ijisac.50109","DOIUrl":"https://doi.org/10.18000/ijisac.50109","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127402784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Envisioning A Wireless Future","authors":"R. Gunasundari","doi":"10.18000/IJISAC.50004","DOIUrl":"https://doi.org/10.18000/IJISAC.50004","url":null,"abstract":"It still takes time to access some audio and visual information or entertainment. But future wireless technology will ensure everything is accessible immediately upon payment for service or transmission of identity. It will speed your way into work, VIP parking areas or any other areas restricted on the basis of identity. Hopefully, it will also do something to improve long lines at government offices and the airport.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129998740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}