Volume 4 Issue 6- June 2014


Page Title Full Text
190-193 Virtualization, Resource Allocation and Security Measures in Cloud Computing
Bhaavan M , K C Gouda, Ananda Kumar K R

Cloud Computing mainly aims for the next generation data centers and it also enables the application service providers to lease data center capabilities for deploying applications depending on user QOS requirements and different composition configuration as well as deployment requirements, these are related cloud applications. Cloud Computing also provides virtualization, which is a computing technology that enables single user to access various multiple physical devices i.e. resources. Cloud Computing deals with various resource allocation model, task allocation model, dynamic allocation in which the resources are efficiently allocated to the end users dynamically. Various security aspects of cloud are also delt in this paper with measures which should be taken in cloud for proper security.

Keywords— Cloud Computing, Virtualization, Resource Allocation, Security Measures.

Full Text PDF
194-199 Documenting Agile Project Knowledge: A Review of Knowledge Capture for Agile Practices
Adam VanAlbrecht, Dr. Rao Nemani

In the current agile project management environment of fast-paced, iterative changes, capturing appropriate project knowledge without affecting the light, iterative method is critical. The goal is matching light, streamlined documentation approaches to agile practice while avoiding excessive documentation. This intent includes knowledge capture specifically designed for a specific audience. This research addresses these audience requirements with modern project documentation tools. Organizations considering documentation practice changes should also consider change management and implementation planning. While there is no generic toolkit that meets the needs of every organization, the intent is to provide best practice methodologies and an approach to determine organizational needs.

Keywords - Knowledge Capture, Knowledge Management, Agile Project Management, Project Documentation.

Full Text PDF
200-207 An Efficient Approach for Image Compression using Segmented Probabilistic Encoding with Shanon Fano[SPES].
Dr. T. Bhaskara Reddy, Hema Suresh Yaragunti, T. Sri Harish Reddy , Dr. S. Kiran

Store-and-generate techniques compress a given test image and regenerate the original test image during test with the help of a decompression. Recent technological breakthroughs in high speed processing units and communication devices have enabled the development of high image compression schemes. This paper presents Segmented Probabilistic encoding with Shanon Fano compression. Is a technique for constructing a prefix code based on a set of symbols and their probabilities. It does guarantee that all codeword lengths are within one bit of their theoretical ideal  I(x) = − log P(x). The SPES technique is based on spatial domain of the image and is suitable for compression of medical images. The main objective of this technique is to show the better compression than other compression technique. An efficient compressing technique, SPES with Shanon Fano has been suggested in this paper.

Keywords - SPES, compression, Shanon Fano coding.

Full Text PDF
208-213 Enhance the Data Security Using PGP & DES in MANET
Vikas Gupta, Harprabhdeep Singh

The goal of security solutions is to provide security services, such as authentication, confidentiality, integrity, and availability to mobile users. In order to enhance the security various algorithms were proposed, such as International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES) & Pretty Good Privacy (PGP) etc. Individually each algorithm has one deficiency or the other. The research work is based on the objectives such as establishing the confidentiality of data to prevent reading of data in plain text except of the intended addressee, guarantying the reliability of the source of information (authenticity), preventing someone masked as the author of a message which was actually created by somebody else (protection of intellectual property), to maintain the integrity of a message such that composed message cannot be changed. To achieve these objectives, both the PGP Encryption scheme and DES Algorithm have been combined to enhance the security. The proposed hybrid system using PGP& DES encryption algorithm improves the security of a network by securing the data and preserving the confidentiality.

Keywords: PGP, DES, Data Security, MANET

Full Text PDF