Volume 4 Issue 6- June 2014
Page | Title | Full Text |
---|---|---|
190-193 | Virtualization, Resource Allocation and Security
Measures in Cloud Computing Bhaavan M , K C Gouda, Ananda Kumar K R Abstract
Cloud Computing mainly aims for the next generation data centers and it also enables the application service providers to lease data center capabilities for deploying applications depending on user QOS requirements and different composition configuration as well as deployment requirements, these are related cloud applications. Cloud Computing also provides virtualization, which is a computing technology that enables single user to access various multiple physical devices i.e. resources. Cloud Computing deals with various resource allocation model, task allocation model, dynamic allocation in which the resources are efficiently allocated to the end users dynamically. Various security aspects of cloud are also delt in this paper with measures which should be taken in cloud for proper security. Keywords— Cloud Computing, Virtualization, Resource Allocation, Security Measures. |
Full Text PDF |
194-199 | Documenting Agile Project Knowledge: A Review
of Knowledge Capture for Agile Practices Adam VanAlbrecht, Dr. Rao Nemani Abstract
In the current agile project management environment of fast-paced, iterative changes, capturing appropriate project knowledge without affecting the light, iterative method is critical. The goal is matching light, streamlined documentation approaches to agile practice while avoiding excessive documentation. This intent includes knowledge capture specifically designed for a specific audience. This research addresses these audience requirements with modern project documentation tools. Organizations considering documentation practice changes should also consider change management and implementation planning. While there is no generic toolkit that meets the needs of every organization, the intent is to provide best practice methodologies and an approach to determine organizational needs. Keywords - Knowledge Capture, Knowledge Management, Agile Project Management, Project Documentation. |
Full Text PDF |
200-207 | An Efficient Approach for Image Compression
using Segmented Probabilistic Encoding with
Shanon Fano[SPES]. Dr. T. Bhaskara Reddy, Hema Suresh Yaragunti, T. Sri Harish Reddy , Dr. S. Kiran Abstract
Store-and-generate techniques compress a given test image and regenerate the original test image during test with the help of a decompression. Recent technological breakthroughs in high speed processing units and communication devices have enabled the development of high image compression schemes. This paper presents Segmented Probabilistic encoding with Shanon Fano compression. Is a technique for constructing a prefix code based on a set of symbols and their probabilities. It does guarantee that all codeword lengths are within one bit of their theoretical ideal I(x) = − log P(x). The SPES technique is based on spatial domain of the image and is suitable for compression of medical images. The main objective of this technique is to show the better compression than other compression technique. An efficient compressing technique, SPES with Shanon Fano has been suggested in this paper. Keywords - SPES, compression, Shanon Fano coding. |
Full Text PDF |
208-213 | Enhance the Data Security Using PGP & DES in MANET Vikas Gupta, Harprabhdeep Singh Abstract
The goal of security solutions is to provide security services, such as authentication, confidentiality, integrity, and availability to mobile users. In order to enhance the security various algorithms were proposed, such as International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES) & Pretty Good Privacy (PGP) etc. Individually each algorithm has one deficiency or the other. The research work is based on the objectives such as establishing the confidentiality of data to prevent reading of data in plain text except of the intended addressee, guarantying the reliability of the source of information (authenticity), preventing someone masked as the author of a message which was actually created by somebody else (protection of intellectual property), to maintain the integrity of a message such that composed message cannot be changed. To achieve these objectives, both the PGP Encryption scheme and DES Algorithm have been combined to enhance the security. The proposed hybrid system using PGP& DES encryption algorithm improves the security of a network by securing the data and preserving the confidentiality. Keywords: PGP, DES, Data Security, MANET |
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net