19 research outputs found

    A threshold secure data sharing scheme for federated clouds

    Full text link
    Cloud computing allows users to view computing in a new direction, as it uses the existing technologies to provide better IT services at low-cost. To offer high QOS to customers according SLA, cloud services broker or cloud service provider uses individual cloud providers that work collaboratively to form a federation of clouds. It is required in applications like Real-time online interactive applications, weather research and forecasting etc., in which the data and applications are complex and distributed. In these applications secret data should be shared, so secure data sharing mechanism is required in Federated clouds to reduce the risk of data intrusion, the loss of service availability and to ensure data integrity. So In this paper we have proposed zero knowledge data sharing scheme where Trusted Cloud Authority (TCA) will control federated clouds for data sharing where the secret to be exchanged for computation is encrypted and retrieved by individual cloud at the end. Our scheme is based on the difficulty of solving the Discrete Logarithm problem (DLOG) in a finite abelian group of large prime order which is NP-Hard. So our proposed scheme provides data integrity in transit, data availability when one of host providers are not available during the computation.Comment: 8 pages, 3 Figures, International Journal of Research in Computer Science 2012. arXiv admin note: text overlap with arXiv:1003.3920 by other author

    MLO Mammogram Pectoral Masking with Ensemble of MSER and Slope Edge Detection and Extensive Pre-Processing

    Get PDF
    Breast Cancer is a fatal disease. Several people are losing their lives as a result of Breast Cancer. Mammography is the most often used Breast screening modality where we can see both mass and microcalcifications and both are the two major indicators of Breast Cancer. We can see Pectoral muscle also on MLO Mammograms. Digital Image Processing based computer aided diagnosis systems are being used widely to help the radiologist in detecting mass and microcalcifications in MLO Mammograms. However, because the intensity levels of the Pectoral muscle are similar to masses, in computer aided diagnosis system, Pectoral presence in the Mammogram has a detrimental effect on identifying mass. Therefore, in computer aided diagnosis system, Pectoral muscle masking substantially enhances lesion detection. This study suggests a novel ensemble computer aided diagnosis system strategy that combines the MSER based and SlopeEdgeDetection methods with extensive pre-processing to identify and cover Pectoral muscle from MLO Mammograms. The results demonstrate that the new procedure is straightforward and improves the precision of Pectoral region covering. Compared to the average accuracy of the state-of-the-art solutions which is 94%, the suggested technique achieves an accuracy of 99%. Performance analysis makes use of the Mini-MIAS database

    Performance Enhancement of TCP Friendly Rate Control Protocol over Wired networks

    Get PDF
    One of the main aims of transport layer protocol is achieving best throughput without any congestion or reduced congestion.聽 With rapid growing application needs and with increasing number of networks in Internet, there is a primary need to design new protocols to transport layer.聽 To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC).聽 It controls congestion based on its equation. However, every packet requires an acknowledgement in TFRC. It creates congestion in the network when the transmitted data is very large, which results in reduced throughput. This paper aims to increase the throughput when the transmitted data is large with minimal congestion by reducing the number of acknowledgements in the network.聽 We modified some fixed parameters in the TFRC equation. The results show the increased throughput with minimal congestion

    An Enhanced Queue Management Scheme for Eradicating Congestion of TFRC over Wired Environment

    Get PDF
    To accomplish increasing real time requirements, user applications have to send different kinds of data with different speeds over the internet.聽 To effectuate the aims of the computer networks, several protocols have been added to TCP/IP protocol suite.聽 Transport layer has to implement emerging techniques to transfer huge amount of data like multimedia streaming. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC).聽 It controls congestion based on its equation. To get more smoothed throughput, intermediate nodes (like Routers. etc.) have to use suitable procedures in all real time situations. To eradicate the level of congestion in the network, we introduce enhanced Holt-Winters equations to RED queue management algorithm and applied to TFRC. The simulation results have shown that this strategy reduces packet loss and increases throughput

    1974 conjecture of Andrews on partitions

    Get PDF
    The case k=a of the 1974 conjecture of Andrews on two partition functions A位,k,a(n) and B位,k,a(n) was proved by the first author and Sudha (1993) and the case k=a+1 was established by the authors (2000). In this paper, we prove that the conjecture is false and give a revised conjecture for a particular case when 位 is even
    corecore