A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Abroja, N. M.
- Data Dissemination in Mobile Computing
Authors
1 Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, IN
Source
Networking and Communication Engineering, Vol 8, No 10 (2016), Pagination: 331-335Abstract
The use of mobile computing has made reality in advance in wireless communication technology with the help of powerful and portable computers. The mobile computing has been used in many applications including data management also. The challenges that are faced in mobile computing are prototyping, bandwidth utilization, transactional properties, data visualization and optimization of location dependent query processing. In data consistency and data dissemination they data can be processed with mobile clients. For mobile computing environment, various components such as mobile and stationary can be used in it. The following issues used in mobile computing, such as mobility issues, portability issues and security issues. For the past few years, there will be a research in the area of data management in mobile computing. This research can develop in many areas such as data dissemination for bandwidth with limited channels, querying of data for location-dependent and new trendy interface with mobile computers.Keywords
Challenges, Data Consistency, Data Dissemination, Issues, Mobile Computing Environment.- Security for Image Processing Uses AES in MANET
Authors
1 Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, IN
Source
Networking and Communication Engineering, Vol 10, No 4 (2018), Pagination: 73-77Abstract
The Mobile adhoc network is self-configuring (a temporary network). MANET is becoming more popular due to their flexibility, low cost and ease of deployment. Advantages of MANET are easy to install, easy to transfer data from source to destination and also easy to hack the data by hacker through MANET, image splitting, data hiding is used in image splitting processing. Data Security is the main concern for each communication system. The unremitting development of the Internet and communication skills has made the wide use of images obligatory. There are many ways to provide refuge for data that is being interconnected. This paper defines an effective security for communication by AES algorithm for encryption and decryption. It is constructed on AES Key Extension in which the encryption process is a bit wise private or operation of a set of image pixels along with the a 128 bit key which vicissitudes for every set of pixels.
Keywords
Decryption, Encryption, Image Processing, Splitting, Steganography.- Uses of Grid Computing in Educational Infrastructure
Authors
1 Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, IN
Source
Networking and Communication Engineering, Vol 10, No 4 (2018), Pagination: 78-82Abstract
Education infrastructure using grid computing technology is used to enhance the quality of e-learning platform used for open universities. It allows the students, faculties, searching resources and distributed repository service among universities from anywhere, anytime can be accessed. Globus Tool Kit (GTK) is a grid middleware software that provides used to resource accessing, security, sharing of data, e-learning and this work uses to Open Grid Service Architecture-Data Access Integration (OSGA-DAI) that provides database access and operation like uploading, downloading, sorting and finding. These papers explain the grid topologies for use in various organizations and in grid environment, how the user can share their data resource. From the user grid application can be used by resources broker and grid resources. The main objectives of the paper to adopt the replica management in education field this can be increase the content retrieval and loading process and many operations are performed.
Keywords
Education-Learning, Globus Tool Kit, Grid Computing, OGSA-DAI, Replica Management.- Challenges for De-Identification Policies using MapReduce in Big Data
Authors
Source
Networking and Communication Engineering, Vol 10, No 6 (2018), Pagination: 125-129Abstract
Many data owners are obligatory to release the data in a variability of real world application, since it is of prominence to discovery valuable evidence stay behind the data. The motivation for this is the high scalability of the MapReduce prototype which allows for enormously parallel and distributed accomplishment over a huge number of computing nodes. This paper identifies MapReduce disputes and trials in handling Big Data with the separated of providing an suggestion of the field, simplifying better planning and management of big data developments and identifying occasions for future research in this field. Big data analytics (machine learning and interactive analytics) consists of online processing, security and privacy. Besides, current efforts aimed at refining and extending MapReduce to address recognized challenges are presented. Consequently, by detecting issues and challenges MapReduce faces when handling Big data, this study inspires upcoming Big data research.
Keywords
Big Data, De-Identification Policies, Mapreduce Overview, Policy Generation.- Multi Stage Secret Sharing Scheme uses Lattices based Cryptography System
Authors
Source
Networking and Communication Engineering, Vol 10, No 6 (2018), Pagination: 130-134Abstract
The Lattice Based Multi Stage Secret Sharing Scheme hypothesis a lattice based (t,n) threshold Multi-Stage Secret Sharing (MSSS) scheme conferring to Ajtai’s construction for one-way roles. In an MSSS scheme, the sanctioned subsections of participants can recover a subset of confidences at each stage while other secrets endure unrevealed. In this paper, each secret is a trajectory from a t-dimensional lattice and the beginning of each lattice is kept secluded. A t-subset of n contributors can recover the secret(s) using their allocated shares. Using a lattice based one-way purpose, even afterward certain mysteries are revealed, the computational haven of the unrecovered riddles is if against important computers. The structure is multi-use in the intellect that to share a new set of secrets, it is sufficient to renew selected public information such that an innovative share distribution is no longer obligatory. Furthermore, the scheme is verifiable meaning that the contestants can confirm the shares established from the dealer and the recovered riddles from the combiner, using public information. Secret Sharing Schemes (SSS) are used as a utensil in many cryptographic protocols with revocable electronic cash, electronic voting, cloud computing and key administration in sensor networks.