Articles

  1. SECURE DATA TRANSFER IN WIRELESS SENSOR NETWORKSDownload Article

    R.Mahendran1, C.Muthubharathi2

    Abstract

    close

    In wireless sensor networks (WSNs), an end-to-end approach of inferring Packet Delivery Analyzer in an externally managed overlay network, where overlay nodes are independently operated by various administrative domains. Our optimization goal is to minimize the expected cost of correcting (i.e., diagnosing and repairing) all faulty overlay nodes that cannot properly deliver data. Instead of first checking the most likely faulty nodes as in conventional fault localization problems, we prove that an optimal strategy should start with checking one of the candidate nodes, which are identified based on a potential function that we develop. We propose several efficient heuristics for inferring the best node to be checked in large-scale networks. By extensive simulation, we show that we can infer the best node in at least 95% of time, and that first checking the candidate nodes rather than the most likely faulty nodes can decrease the checking cost of correcting all faulty nodes. KEYWORDS: Wireless sensor network, Anomaly detection, distributed computing, spatial analysis, Differential compression

  2. AN ANALYSIS IMPLICIT SOCIAL NETWORK IN MULTIPLAYER ONLINE GAMESDownload Article

    M.Priya1, K.M.Padmapriya2

    Abstract

    close

    The growing role of communication using computers in people‟s everyday lives is reflected by the database about massive multiplayer online role playing games (MMOs) like game and the Internet as a whole. While people may be driven by the same psychological drives that have spur interaction between people in the past, this interaction is increasingly facilitated with the use of computer mediated communication (CMC).The configurative role of players makes any linear model of production in relation to an MMOG an inadequate one. An MMOG, unlike a more conventional medium such as a book, is not finished upon launch. It is in constant production after launch, with both players and development teams continuing to add content and create further complexity in the game. Keywords: MMO, SNG, BPEL, Middleware, DDS

  3. OPTIMIZES THE SLOT ALLOCATION FRAMEWORK FOR MAPREDUCE CLUSTERSDownload Article

    S.Sevi1, Dr.N.Chandrakala2

    Abstract

    close

    Data centres consume tremendous amounts of energy in terms of power distribution and cooling. Dynamic capacity provisioning is a promising approach for reducing energy consumption by dynamically adjusting the number of active machines to match resource demands. However, despite extensive studies of the problem, existing solutions have not fully considered the heterogeneity of both workload and machine hardware found in production environments. To address this limitation, this project presents Harmony, a Heterogeneity-Aware dynamic capacity provisioning scheme for cloud data centres. Specifically, it first uses the K-means clustering algorithm to divide workload into distinct task classes with similar characteristics in terms of resource and performance requirements. Then it presents a technique that dynamically adjusting the number of machines to minimize total energy consumption and scheduling delay. Keywords: Data centre, load balancing, Harmony cloud data centre, EASJSA, Energy Consumption

  4. ANALYSISOF CLOUD DATABASE SERVICE TO IMPROVE COST AND PERFORMANCE WITH ADAPTIVEENCRYPTION DATA CONFIDENTIALITYDownload Article

    R.Elango1, Dr.N.Chandrakala2

    Abstract

    close

    Database is a service paradigm poses several research challenges in terms of security and cost evaluation from a tenant‟s point of view. The cloud database as a service is a novel paradigm that can support several Internetbased applications, but its adoption requires the solution of information confidentiality problems. A novel architecture for adaptive encryption of public cloud databases that offers an interesting alternative to the tradeoff between the required data confidentiality level and the flexibility of the cloud database structures at design time. This paper proposes a novel architecture for adaptive encryption of public cloud databases that offers a proxy-free alternative to the system. The thesis demonstrates the feasibility and performance of the proposed solution through a software prototype. The proposed architecture manages five types of information: plain data represent the tenant information; encrypted data are the encrypted version of the plain data, and are stored in the cloud database; plain metadata represent the additional information that is necessary to execute SQL operations on encrypted data; encrypted metadata are the encrypted version of the plain metadata, and are stored in the cloud database; master key is the encryption key of the encrypted metadata, and is known by legitimate clients. Keywords: Cloud database, Adaptive Encryption, SQL operations, Metadata, Distributed SQL operation, Multi key Distribution

Sign in

Registered and Approved by National Science Library (NSL),National Institute of Science Communication And Information Resources(NISCAIR),
Council of Scientific and Industrial Research,New Delhi, India"