International Journal on Information Sciences and Computing最新文献

筛选
英文 中文
DEPLOYMENT OF FAIR SHARE AND SMART START TECHNIQUE FOR OPTIMAL USE OF AVAILABLE CAPACITY IN TCP CONGESTION CONTROL 在TCP拥塞控制中部署公平共享和智能启动技术,以优化可用容量的利用
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50038
P. Ganeshkumar, K. Thyagarajah
{"title":"DEPLOYMENT OF FAIR SHARE AND SMART START TECHNIQUE FOR OPTIMAL USE OF AVAILABLE CAPACITY IN TCP CONGESTION CONTROL","authors":"P. Ganeshkumar, K. Thyagarajah","doi":"10.18000/IJISAC.50038","DOIUrl":"https://doi.org/10.18000/IJISAC.50038","url":null,"abstract":"The traditional TCP congestion control mechanism encounters a number of new problems and suffers in poor performance. In traditional TCP congestion control, slow start results in poor performance. During slow start the number of TCP segments transmitted per unit time is considerably small compared to the capacity of the Network. It increases gradually according to the RTT. In this paper, an attempt is made to increase the performance of the TCP by introducing a two new technique called Adaptive Fair Share of Congestion window size (AFSCOW) and Smart Start (SS). AFSCOW can be used for the new TCP connections emerging in the end systems having same sender and receiver. For an emerging new application in the sender the window size can be determined as the total of the current window sizes of the existing application divided by the total number of application including the new emerging application. In Fast Start the number of TCP segments transmitted is not doubled but it is increased three times the older window size which shows the optimum use network resources within minimum RTT.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114921711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HIGH SPEED PIPELINED ASIP PROCESSOR FOR ECC USING FPGA TECHNOLOGY 采用fpga技术的ecc高速流水线asip处理器
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/ijisac.50066
B. Muthukumar, S. Jeevananthan
{"title":"HIGH SPEED PIPELINED ASIP PROCESSOR FOR ECC USING FPGA TECHNOLOGY","authors":"B. Muthukumar, S. Jeevananthan","doi":"10.18000/ijisac.50066","DOIUrl":"https://doi.org/10.18000/ijisac.50066","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130570999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FAST SVMS FOR POWER QUALITY DATA MINING 电能质量数据挖掘的快速支持向量机
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50033
K. Manimala, K. Selvi, R. Ahila
{"title":"FAST SVMS FOR POWER QUALITY DATA MINING","authors":"K. Manimala, K. Selvi, R. Ahila","doi":"10.18000/IJISAC.50033","DOIUrl":"https://doi.org/10.18000/IJISAC.50033","url":null,"abstract":"Recognition of the presence of any disturbance and classifying any existing disturbance into a particular type is the first step in combating the power quality problem. Support Vector Machines (SVMs) have gained wide acceptance because of the high generalization ability for a wide range of classification applications. Although SVMs have shown potential and promising performance in power disturbances classification, they have been limited by speed particularly when the training data set is large. The hyper plane constructed by SVM is dependent on only a portion of the training samples called support vectors that lie close to the decision boundary (hyper plane). Thus, removing any training samples that are not relevant to support vectors might have no effect on building the proper decision function. We propose the use of clustering techniques such as K-mean to find initial clusters that are further altered to identify non-relevant samples in deciding the decision boundary for SVM. This will help to reduce the number of training samples for SVM without degrading the classification result and classification time can be significantly reduced.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132582012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automated Water Tank Overflow Control Unit Integrated with Mobile Application 自动水箱溢流控制单元集成移动应用程序
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50155
S. Gowri, P. Pranathi, K. Sravya
{"title":"Automated Water Tank Overflow Control Unit Integrated with Mobile Application","authors":"S. Gowri, P. Pranathi, K. Sravya","doi":"10.18000/IJISAC.50155","DOIUrl":"https://doi.org/10.18000/IJISAC.50155","url":null,"abstract":"Basically automation in systems would help reduce wastage of resources in various ways, one such way for the prevention of wastage of water resource to control the water tanks from overflow. In this automated world, the handling of any kind of devices with comfort is made to be the easiest factor everywhere. Considering this aspect of comfort zones and the prevention of wastage of resources, a design of an automated overflow control circuit unit was proposed in this paper. The proposal was designed on the perspective of controlling the flow of water into the tanks automatically, by setting the requirements as per the user needs using a Mobile Application in android. The connectivity of the circuit and the application is accomplished using Bluetooth device for handling the communication between the mobile and the overflow circuit. The entire system was tested in its operation and was scrutinized on the whole. I.INTRODUCTION As days passed by the growth of technology would seem to be a major aspect bound to humans and machines. The growth of this technology reflects in all the aspects of the day to day life of a human being. Technology plays a vital role in every moment in their entire life span of a human, from a just born baby to a very old man. Technology has almost scatted over all the sectors, from small scale home usage to a large scale satellite. If a closer view was taken upon the technology, every step we make or every move we do deals with the technology.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116151960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Alleviating Malicious Insider in Cloud Through Offensive Decoy Technology 利用攻击诱饵技术缓解云中的恶意内部人
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50145
B. Ankayarkanni
{"title":"Alleviating Malicious Insider in Cloud Through Offensive Decoy Technology","authors":"B. Ankayarkanni","doi":"10.18000/IJISAC.50145","DOIUrl":"https://doi.org/10.18000/IJISAC.50145","url":null,"abstract":"The eternal way for using computer in the way of cloud computing used to store our personal and private organization information. In this new technology for communication computing there exist many challenges for securing data. There are many data protection techniques existing which uses encryption technique that prevents data attacks from the insider in provider of cloud. To secure data from an offensive decoy attack that access data from cloud storage. To monitor data access which suspects and verify attacks send large amounts of decoy information. They also can misuse real user data which evidences the level of data security provided in cloud security. In this model we propose approach for securing data using fog computing. This technique used for launching disinformation attacks against malicious insiders which prevents them from differentiating the sensitive data provided from the fake useless data. This process alleviates the malicious insider from the cloud storage area who uses offensive technique for attacking. Keywords—Cloud Computing, decoy technology, disinformation attack, data protection.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121706785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PERFORMANCE EVALUATION OF MESH AND POSITION BASED HYBIRD ROWTING IN MANETS 基于网格和位置的混合划网性能评价
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50105
Chethan, S. Chandra, basavaraddi, Geetha N.B.
{"title":"PERFORMANCE EVALUATION OF MESH AND POSITION BASED HYBIRD ROWTING IN MANETS","authors":"Chethan, S. Chandra, basavaraddi, Geetha N.B.","doi":"10.18000/IJISAC.50105","DOIUrl":"https://doi.org/10.18000/IJISAC.50105","url":null,"abstract":"A new routing algorithm called position based hybrid routing algorithm (PBHRA) was developed to optimize bandwidth usage of ad hoc networks. The main goal of PBHRA is effective use of bandwidth by reducing the routing overload. Additionally, the other goals of the algorithm are to extend battery life and signal strength or power level of the mobile devices by reducing the required number of operations for route determination and to reduce the amount of memory used. Although in the PBHRA, some features of both table driven and on-demand algorithms were used to achieve these goals at some stages, PBHRA algorithm is a completely different approach in terms of position information usage and global positioning system (GPS).","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124834269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A BIOMETRIC WITH CRYPTOGRAPHY FOR REMOTE VOTING SYSTEM 远程投票系统的生物识别密码
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50091
Shameem Sulthana .E.S, S. Kanmani
{"title":"A BIOMETRIC WITH CRYPTOGRAPHY FOR REMOTE VOTING SYSTEM","authors":"Shameem Sulthana .E.S, S. Kanmani","doi":"10.18000/IJISAC.50091","DOIUrl":"https://doi.org/10.18000/IJISAC.50091","url":null,"abstract":"Abstract - In this modern world everything is possible and fast. In this paper we propose a multifaceted online e-voting system. The proposed system is capable to manage through internet with multiple scopes and focus on using evidence for making access control decisions in present computing environments. To protect the election accuracy, it is necessary to have an accurate electoral roll of eligible voters. The main goal of this work is it supports a remote voter registration scheme that increases the accuracy of the current systems. In this scheme the voter identification is carried out by means of combining cryptographic and biometrics techniques. This work implements the evidence-based approach on web service and it creates an ecosystem in which evidence providers can flourish.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125936545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AN INSIGHT IN TO THE NATURE OF FIRST GENERATION WOMEN ENTREPRENEURS 对第一代女性企业家本质的洞察
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50114
S. Ambiga, M. Ramasamy
{"title":"AN INSIGHT IN TO THE NATURE OF FIRST GENERATION WOMEN ENTREPRENEURS","authors":"S. Ambiga, M. Ramasamy","doi":"10.18000/IJISAC.50114","DOIUrl":"https://doi.org/10.18000/IJISAC.50114","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125997645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TRAFFIC CONTROL BY BLUE TOOTH ENABLED MOBILE PHONE 通过启用蓝牙的移动电话进行流量控制
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/ijisac.50109
G. Manikandan, S. Srinivasan
{"title":"TRAFFIC CONTROL BY BLUE TOOTH ENABLED MOBILE PHONE","authors":"G. Manikandan, S. Srinivasan","doi":"10.18000/ijisac.50109","DOIUrl":"https://doi.org/10.18000/ijisac.50109","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127402784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Envisioning A Wireless Future 展望无线的未来
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50004
R. Gunasundari
{"title":"Envisioning A Wireless Future","authors":"R. Gunasundari","doi":"10.18000/IJISAC.50004","DOIUrl":"https://doi.org/10.18000/IJISAC.50004","url":null,"abstract":"It still takes time to access some audio and visual information or entertainment. But future wireless technology will ensure everything is accessible immediately upon payment for service or transmission of identity. It will speed your way into work, VIP parking areas or any other areas restricted on the basis of identity. Hopefully, it will also do something to improve long lines at government offices and the airport.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129998740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信