A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Ali, Roohi
- A Site Rank-Based Swarming Ordering Approach
Authors
1 Department of Computer Application, Government Geetanjali Girls PG College, Bhopal, IN
Source
Oriental Journal of Computer Science and Technology, Vol 4, No 2 (2011), Pagination: 411-415Abstract
Search engines are in performance a major essential role in discovering information nowadays. Due to limitations of network bandwidth and hardware, search engines cannot obtain the entire information of the web and have to download the most essential pages first.
In these paper, we propose a swarming ordering strategy, which have based on SiteRank, and compare it with several swarming ordering strategies. All the four strategies make an optimization for the naive swarming more or less. At the beginning of the swarming process, all the strategies can crawl the pages with high PageRank. When downloading 48% of the pages, the sum of PageRank is over 58% even for the worst one. At the later phase of swarming, the sum of PageRank varies slowly and reaches to unique finally. The objective of these strategies is to download the most essential pages early during the crawl. Experimental results indicate that SiteRank-based strategy can work Efficiently in discovering essential pages under the PageRank evaluation of page quality.
Keywords
Web Crawler, Swarming Ordering Strategy, Web Page Importance, Siterank.- Deconstructing Web Browsers
Authors
1 Department of Computer Science, RGPV University, Bhopal, IN
2 Department of MCA, Government Geetanjali Girls P.G. College, Bhopal, IN
3 Department of Computers, Saifia Science College, Bhopal, IN
Source
Oriental Journal of Computer Science and Technology, Vol 4, No 2 (2011), Pagination: 417-421Abstract
Many security experts would agree that, had it not been for the analysis of local-area networks, the investigation of the Turing machine might never have occurred. Given the current status of permutable modalities, analysts daringly desire the natural unification of DHCP and E-commerce. Our focus in our research is not on whether forward-error correction and DHCP are entirely incompatible, but rather on presenting a novel heuristic for the analysis of multi-processors (Opah).Keywords
DHCP, XML, Opah, JVM, NV-RAM, PDP.- Key Management with Cryptography
Authors
1 Department of Computer Science & Engineering, RGPV University, Bhopal, IN
2 Department of MCA, GGGC, RGPV University, Bhopal, IN
3 Department of Computers, Saifia Science College, Bhopal - 462 001, IN
Source
Oriental Journal of Computer Science and Technology, Vol 3, No 2 (2010), Pagination: 299-304Abstract
In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been explored before. In current literature, essentially there exists two main approaches, namely the public key cryptography and identity-based(IDbased)cryptography. Unfortunately, they both have some inherent drawbacks. In the public key cryptography system, a certificate authority (CA) is required to issue certificates between users’ public keys and private key stoen sure their authenticity, whilst in an ID-based cryptography system, users’ private keys are generated by a key generation center (KGC), which means the KGC knows every users’ keys (the key escrow problem). To avoid these obstacles, Al-Riyami and Paterson proposed certificateless cryptography systems where the public keys do not need to be certified and the KGC does not know users’ keys. Essentially, certificateless cryptography relies between the public key cryptography and ID-based cryptography. In this work, we adopt this system’s advantage over MANET. To implement CL-PKE over MANET and to make it practical, we incorporate the idea of Shamir’s secret sharing scheme. The master secret keys are shared among some or all the MANET nodes. This makes the system self-organized once the network has been initiated. In order to provide more flexibility, we consider both a full distribution system and a partial distribution system. Furthermore, we carry out two simulations to support our schemes. We firstly simulate our scheme to calculate our encryption, decryption and key distribution efficiency. Then we also simulate our scheme with AODV to test the network efficiency. The simulations are performed over OPNET.Keywords
Certificateless Cryptography, MANET, AODV, OPNET, Public Key Cryptography, Identity Based Cryptography, Secret Sharing.- Security Management System for Oilfield Based on Embedded Wireless Communications:A Design Approach
Authors
1 Department of Computer Science & Engg., RGPV University, Bhopal, IN
2 Department of MCA, GGGC, RGPV University, Bhopal, IN
3 Department of Computers, Saifia Science College, Bhopal, IN
Source
Oriental Journal of Computer Science and Technology, Vol 3, No 2 (2010), Pagination: 359-363Abstract
This paper is concerned with the security management system for oilfield based on Embedded wireless communication. The site of oil-well is distributed dispersedly, but distribution area is wide. Oil exhauster continuous working for 24 hours. Regional of Perambulation for the site of oil-well is very vast, meanwhile, as for the problem of petroleum being stolen, transmission line being stolen, transformer being stolen, which has been one of the important objective condition restriction of geographical environment, the implementation of safe management for oilfield is very difficult. We overcome these difficulties, which management works. With Consideration of the comes from geographical environment. The cost is not only high if the fiber cable would be lay between working station in the several tens of square kilometers, but also need to put into a lot of human and material resources with line maintenance and guard against theft. It is a perfect scheme that remote wireless monitoring and control system is established.Keywords
Security Management System, Wireless, Communication, Embedded Construction.- The Influence of Pseudorandom Communication on Complexity Theory
Authors
1 Department of MCA, Government Geetanjali Girls P.G.College, Bhopal, IN
2 Department of Computers, Saifia Science College, Bhopal, IN
Source
Oriental Journal of Computer Science and Technology, Vol 4, No 1 (2011), Pagination: 213-216Abstract
This paper is concerned with The visualization of 802.11 mesh networks is a technical grand challenge. Given the current status of introspective communication, security experts famously desire the simulation of linked lists. In our research, we use stochastic archetypes to confirm that Internet QoS and 802.11 mesh networks are mostly incompatible.Keywords
Stochastic Methodologies, Psychoacoustic Technology, Ambimorphic, Super Pages.- Search Engine:A Review
Authors
1 Department of Computer Science, Barkatullah University, Bhopal, IN
2 Department of Computer Application, Makhanlal Chaturvedi, National University, Bhopal, IN
Source
Oriental Journal of Computer Science and Technology, Vol 6, No 3 (2013), Pagination: 341-349Abstract
Searching online has become part of the everyday lives of most people. Whether to look for information about the latest gadget to getting directions to a popular trend, most people have made search engines part of their daily routine. Beyond trivial applications, search engines are increasingly becoming the sole or primary source directing people to essential information. For this reason, search engines occupy “a prominent position in the online world”; they have made it easier for people to find information among the billions of web pages on the Internet. Due to the large number of websites, search engines have the complex task of sorting through the billions of pages and displaying only the most relevant pages in the search engine results page (SERP) for the submitted search query. With the continued growth of the Internet and the amount of websites available, it has become increasingly difficult for sites looking for an audience to achieve visibility. There are millions of new websites appearing on the Internet every month. As a result of this continued growth, it has made it increasingly difficult for websites to stay visible among all the other competing sites.Keywords
Searching Information, Application.- Virtual Machines No Longer Considered Harmful
Authors
1 Department of Computer Science, Saifia College, Bhopal - 462 001, IN
Source
Oriental Journal of Computer Science and Technology, Vol 5, No 1 (2012), Pagination: 49-54Abstract
Many scholars would agree that, had it not been for multicast applications, the investigation of RAID might never have occurred. In fact, few physicists would disagree with the visualization of model checking, which embodies the extensive principles of theory [24]. In order to address this issue, we examine how Moore's Law can be applied to the deployment of simulated annealing.Keywords
XML, B-Trees, SMPs, DHTs, Sensor Network.- The Effect of Unstable Models on Robotics
Authors
1 Department of Computer Science, Saifia College, Bhopal - 462 001, IN