468 research outputs found

    Ideal Meeting Location According to User privacy

    Get PDF
    Outfitted with cutting edge Smartphone and cell phones, today's exceptionally interconnected urban populace is progressively reliant on these contraptions to sort out and arrangement their everyday lives. These applications frequently depend on current (or favored) areas of individual clients or a gathering of clients to give the sought administration, which imperils their security; clients would prefer essentially not to uncover their current (or preferred) locations to the administration supplier or to other, potentially untrusted, clients. In this paper, we propose protection saving calculations for deciding an ideal meeting area for a gathering of clients. We perform an intensive security assessment by formally measuring protection loss of the proposed methodologies. With a specific end goal to concentrate on the execution of our calculations in a genuine organization, we actualize and test their execution effectiveness. By method for a focused on client study, we endeavor to get an understanding into the protection familiarity with clients in area based administrations and the convenience of the proposed solutions.[1

    Exact-diagonalization method for soft-core bosons in optical lattices using hierarchical wavefunctions

    Full text link
    In this work, we describe a new technique for numerical exact-diagonalization. The method is particularly suitable for cold bosonic atoms in optical lattices, in which multiple atoms can occupy a lattice site. We describe the use of the method for Bose-Hubbard model as an example, however, the method is general and can be applied to other lattice models. The proposed numerical technique focuses in detail on how to construct the basis states as a hierarchy of wavefunctions. Starting from single-site Fock states we construct the basis set in terms of row-states and cluster-states. This simplifies the application of constraints and calculation of the Hamiltonian matrix. Each step of the method can be parallelized to accelerate the computation. In addition, we have illustrated the computation of the spatial bipartite entanglement entropy in the correlated ν=1/2\nu =1/2 fractional quantum Hall state.Comment: 11 pages, 6 figures, Comments are most welcom

    A Review-Botnet Detection and Suppression in Clouds

    Get PDF
    Internet security problems remain a major challenge with many security concerns such as Internet worms, spam, and phishing attacks. Botnets is well-organized distributed network attacks, consist of a large number of bots that generate huge volumes of spam or launch Distributed Denial of Service (DDoS) attacks on victim hosts. Botnet attacks degrade the status of Internet security. Clouds provide botmaster with an ideal environment of rich computing resources where it can easily deploy or remove C&C server and perform attacks.  It is of vital importance for cloud service providers to detect botnet,  prevent attack,  and trace back to the botmaster.  It also becomes necessary to detect and suppress these bots to protect the clouds. This paper provides the various botnet detection techniques and the comparison of various botnet detection techniques. It also provides the botnet suppression technique in cloud. Keywords: Cloud computing, network security, botnet, botmmaster, botnet detection, botnet suppressio

    Data management system study Final technical report, 15 May 1967 - 31 Mar. 1968

    Get PDF
    Systems design of prototype coherent system to meet data processing requirements of post-Apollo mission

    A Review of Cluster Heads Selection in WSN

    Get PDF
    In recent years there has been a growing interest in Wireless Sensor Networks (WSN). Recent advancements in the field of sensing, computing and communications have attracted research efforts and huge investments from various quarters in the field of WSN. Also sensing networks will reveal previously unobserved phenomena. Network’s lifetime depends on energy efficiency and load balancing of wireless sensor network. The main aim of clustering is to provide the scalability and reduce energy consumption. Cluster head consume more energy as compare to non cluster head nodes. Proper selection of cluster head increases the network lifetime and energy efficiency. This paper provides an overview of clustering, cluster head election mechanisms and LEACH protocol

    Fusion of Two Images using DWT and PCA Methodology

    Get PDF
    Image fusion is of extraordinary significance in safeguard and data from various images of same scene. The consequence of fusion is another image which is more reasonable for human and machine recognition. Pixel level image fusion utilizing wavelets and essential part investigation has been actualized and illustrated. diverse execution measurements with and without reference image are actualized to assess the execution of mage fusion calculations. It has been reasoned that image fusion utilizing wavelets with larger amount of disintegration indicated better execution in a few measurements and in different measurements PCA demonstrated better execution

    Cloud Computing Based-Collaborative Network Security Management System Using Botnet

    Get PDF
    Now-a-days due to increase in the users of internet the balancing of traffic in the network becomes most serious issue. Also the internet security is also the important factor in terms of internet worms, spam, phishing attacks and botnet too. Botnet is an internet connected program communicates with other similar program to perform malicious activities and to spread a Distributed Denial of service on the victim computer and also in network. And make that machine or network resource unavailable to its users. The botmaster which hides itself behind a server called Command & control(C & C) Server, and give commands to C & C to attack on the victim hosts and spread bot in the network. In this paper, we design a cloud computing- Based Collaborative Network Security Management System Using Botnet which balances the load in the network and check for each and every file transferring in the cloud for the bot. If that file contains the bot then the folder in which that file is save will be deleted from that client. In this way, we design a system to protect the cloud from botnet and prevent the cloud from botnet attack

    Comparative Analysis of Image Fusion using DWT, PCA and BBF

    Get PDF
    Now-a-days, medical image fusion is one of the upcoming fields which helps in easy diagnostics and helps to bring down the time gap between the diagnosis of the disease and the treatment. In Magnetic Resonance Image (MRI), anatomy and soft tissues are visible and it has high spatial resolution. In Computed Tomography (CT) images bony structures appears brighter. Analysis is done to determine the image fusion algorithm which is more suitable for clinical diagnosis. Analysis is also done on image quality assessment parameters of image fusion. Image fusion is of extraordinary significance in safeguard and data from various images of same scene. It has been reasoned that image fusion utilizing wavelets with larger amount of disintegration indicated better execution in a few measurements and in different measurements PCA demonstrated better execution. We also illustrate different results based on all three methodology and compare results based on time and quality of images using PSNR

    Multihead Node Selection Technique for Improving Lifetime and Energy Efficiency of WSN

    Get PDF
    In this paper, a three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer. The framework employs distributed load balanced clustering and dual data uploading, which is referred to as LBC-DDU. The objective is to achieve good scalability, long network lifetime and low data collection latency. At the sensor layer, a distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. In contrast to existing clustering methods, our scheme generates multiple cluster heads in each cluster to balance the work load and facilitate dual data uploading. At the cluster head layer, the inter-cluster transmission range is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy-saving inter-cluster communications. Through inter-cluster transmissions, cluster head information is forwarded to SenCar for its moving trajectory planning. At the mobile collector layer, SenCar is equipped with two antennas, which enables two cluster heads to simultaneously upload data to SenCar in each time by utilizing multi-user multiple-input and multiple-output (MU-MIMO) technique. The results show that when each cluster has at most two cluster heads, LBC-DDU achieves over 50 percent energy saving per node and 60 percent energy saving on cluster heads comparing with data collection through multi-hop relay to the static data sink, and 20 percent shorter data collection time compared to traditional mobile data gathering. This system provides much better efficiency as compared to SISO system
    • …
    corecore