BSSS Journal of Computer最新文献

筛选
英文 中文
AN ANALYTICAL STUDY ON CLOUD COMPUTING 云计算分析研究
BSSS Journal of Computer Pub Date : 2021-06-30 DOI: 10.51767/jc1204
Anamika Ahirwar, Nikita Prajapat, Simran Raj
{"title":"AN ANALYTICAL STUDY ON CLOUD COMPUTING","authors":"Anamika Ahirwar, Nikita Prajapat, Simran Raj","doi":"10.51767/jc1204","DOIUrl":"https://doi.org/10.51767/jc1204","url":null,"abstract":"This paper is about the An Analytical Study on Cloud Computing. Cloud computing is the development of parallel computing, grid computing, distributed computing, and virtualization technologies which define the shape of a new area. In contrast to a variety of benefits related with cloud computing, there are certain challenges as well. These challenges include security, privacy and reliability of data, high costs of data transfers, and regularity in the availability of services, and bugs in large-scale distributed systems. Cloud computing is a method of computing in a place that provides users with the ability of information technology as a service and allows them to have access to these services on the Internet without having limited information. Cloud computing can help businesses transform their closing server infrastructures into dynamic environments, expanding and reducing server capacity depending on their demand. Cloud is a image to describe web as a space where computing has been pre-installed and close as a service; data, operating systems, applications, storage and processing power close on the web ready to be shared. In cloud computing data owners expand their complex data management systems from community sites to the public cloud for great pliability and cost-effective. The searching of this study that highlight there are five main issues related with cloud computing execution which are Mobility and Cloud Government Application security issues, Cloud Security data, cloud security platform, Cloud Security Services and Application, cloud network security issues and infrastructure issues.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125554549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERFORMANCE ANALYSIS OF NOISE REMOVAL TECHNIQUES FOR FACIAL IMAGES- A COMPARATIVE STUDY 人脸图像去噪技术性能分析——比较研究
BSSS Journal of Computer Pub Date : 2021-06-30 DOI: 10.51767/jc1201
Anshika Jain, Indore Davv, M. Ingle
{"title":"PERFORMANCE ANALYSIS OF NOISE REMOVAL TECHNIQUES FOR FACIAL IMAGES- A COMPARATIVE STUDY","authors":"Anshika Jain, Indore Davv, M. Ingle","doi":"10.51767/jc1201","DOIUrl":"https://doi.org/10.51767/jc1201","url":null,"abstract":"Image de-noising has been a challenging issue in the field of digital image processing. It involves the manipulation of image data to produce a visually high quality image. While maintaining the desired information in the quality of an image, elimination of noise is an essential task. Various domain applications such as medical science, forensic science, text extraction, optical character recognition, face recognition, face detection etc. deal with noise removal techniques. There exist a variety of noises that may corrupt the images in different ways. Here, we explore filtering techniques viz. Mean filter, Median filter and Wiener filter to remove noises existing in facial images. The noises of our interest are namely; Gaussian noise, Salt & Pepper noise, Poisson noise and Speckle noise in our study. Further, we perform a comparative study based on the parameters such as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Structure Similarity Index Method (SSIM). For this research work, MATLAB R2013a on Labeled faces in Wild (lfw) database containing 120 facial images is used. Based upon the aforementioned parameters, we have attempted to analyze the performance of noise removal techniques with different types of noises. It has been observed that MSE, PSNR and SSIM for Mean filter are 44.19 with Poisson noise, 35.88 with Poisson noise and 0.197 with Gaussian noise respectively whereas for that of Median filter, these are 44.12 with Poisson noise, 46.56 with Salt & Pepper noise and 0.132 with Gaussian noise respectively. Wiener filter when contaminated with Poisson, Salt & Pepper and Gaussian noise, these parametric values are 44.52, 44.33 and 0.245 respectively. Based on these observations, we claim that the Median filtering technique works the best when contaminated with Poisson noise while the error strategy is dominant. On the other hand, Median filter also works the best with Salt & Pepper noise when Peak Signal to Noise Ratio is important. It is interesting to note that Median filter performs effectively with Gaussian noise using SSIM.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129872119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GOVT_EXAM ONTOLOGY IN SEMANTIC WEB FOR QUERY RETRIEVAL 语义web中用于查询检索的Govt_exam本体
BSSS Journal of Computer Pub Date : 2021-06-30 DOI: 10.51767/jc1203
Dhiraj Khurana, Cheshta Diwan
{"title":"GOVT_EXAM ONTOLOGY IN SEMANTIC WEB FOR QUERY RETRIEVAL","authors":"Dhiraj Khurana, Cheshta Diwan","doi":"10.51767/jc1203","DOIUrl":"https://doi.org/10.51767/jc1203","url":null,"abstract":"The World wide web is growing day by day exponentially and it becomes difficult to find the relevant information even using efficient search engines. Search results always give lots of irrelevant data which often misled to actual needed information. One solution of this problem is semantic web which was proposed by Sir Tim Berner’s Lee. Semantic web is an extended version of World Wide Web that has opened the new doors for efficient information retrieval process. Ontology is one of the methodologies to implement the semantic web. In this paper govt exam ontology is created with the help of protégé ontology creation tool. In the given ontology various relationship between different govt exams of central and state level is provided and also the general information about these exams like exam type, subject level of exam and institutes for coaching is given. This domain specific ontology can help the potential information seeker to get the accurate information which can help to crack the exam.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115031099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Buffer Overflow Attack –Vulnerability in Heap 缓冲区溢出攻击-堆中的漏洞
BSSS Journal of Computer Pub Date : 2020-06-30 DOI: 10.51767/JC1101
S. Kurariya
{"title":"Buffer Overflow Attack –Vulnerability in Heap","authors":"S. Kurariya","doi":"10.51767/JC1101","DOIUrl":"https://doi.org/10.51767/JC1101","url":null,"abstract":"We advise a paper which indicates a heap attack due to buffer over .Buffer overflow attack is the oldest and maximum pervasive attack technique. A buffer overflow takes place while a method or program attempts to put in writing more statistics to a set buffer, or duration block of reminiscence than the buffer is allotted to hold. Since buffers are layout to incorporate a defined quantity of records, the extra information can revoke statistics values in memory deal with which is adjacent to the destination buffer till and unless this system include enough bounds checking to flag or discard information while an excessive amount of is despatched to a reminiscence buffer. Buffer overflow attacks are classify into two categories: Heap and stack based attack .The time period heap outline pool of memory utilized in dynamic allocation for run time environment and the heap based totally attack define the flooded reminiscence space reserved for a software, but the problem arrives when appearing such an assault it make the situation critical","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130971857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Recommendation System for Better Mining Rules Generation of User and Consumer Data
BSSS Journal of Computer Pub Date : 2020-05-25 DOI: 10.51767/JC1110
G. Gupta, Atul D. Newase
{"title":"Hybrid Recommendation System for Better Mining Rules Generation of User and Consumer Data","authors":"G. Gupta, Atul D. Newase","doi":"10.51767/JC1110","DOIUrl":"https://doi.org/10.51767/JC1110","url":null,"abstract":"In today's world, data and information play an essential role in each field, including online and software data. However, it is a challenging task to abstract & sorted consumer data for use. To solve this data overloading and sorting of useful data, a Hybrid Recommendation System (HRS) comes into existence. HRS's focus is to suggest the best applicable and useful items to the related customers or users. The recommendations can be applied to decision-making processes, like which types of things to get, which new videos to watch, which online latest games and software to search, or the best product. The benefits of the Hybrid Recommendation System persist on the quality efficiency of the system. The efficient things can be calculated in easy to use, reliable, accurate, and expandable. This proposed HRS's primary goal is to better mining rules based on user and consumer data to improve the Hybrid Recommendation System's accuracy.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127705695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structuring the Federation of Cloud Service for Big Data 构建大数据云服务联盟
BSSS Journal of Computer Pub Date : 2018-06-01 DOI: 10.51767/JC0901
Ishani Sood, Varsha Sharma
{"title":"Structuring the Federation of Cloud Service for Big Data","authors":"Ishani Sood, Varsha Sharma","doi":"10.51767/JC0901","DOIUrl":"https://doi.org/10.51767/JC0901","url":null,"abstract":"The demand for agile and flexible business application for big data has sparked\u0000interest in using cloud computing technology. Due to the limitation of provider’s\u0000capability and the magnanimity of task quantity for big data, a single cloud\u0000provider may not offer enough service resources. However, a service federation\u0000among multiple providers can effectively solve this problem. This paper proposes\u0000the framework of cloud federation and introduces the basic processes of building\u0000service federation among multiple cloud providers. Moreover, we propose a multiobjectives task assigning model in the federation. A genetic algorithm based\u0000heuristic approach is developed as the optimization method. Eventually, some\u0000simulation experiments are conducted to illustrate the effectiveness of the model.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信