Improving efficiency with Cisco's private cloud offerings

Most of your company’s major technology and business problems can be resolved using private clouds. IT as a service (IaaS) can be delivered by a private cloud that will let you improve efficiency, cut down costs, and bring in novel business strategies to streamline operations and infrastructure by making your organization more alert and organized. … Read more

Using fuzzy logic to analyse blood pressure data

Admitting in expert system and fuzzy logic imprecision in truth. However, Aristotle’s said that is so significant today; the quote that follows uncertainty. It is an admonishment we should need that; we should make balance between with the certainty and uncertainty that exists. This thesis is mainly dedicated to the characterization and quantification of uncertainty … Read more

Analyze, evaluate and compare K-Means and Fuzzy C-Means clustering techniques

  The healthcare industry is the most important industries in the world and is the most complicated and challenging problem. The diagnosis of heart disease is a vital and tedious task in medicine. World Health Organization (WHO) report Global Atlas on cardiovascular disease (CVDs) prevention that CVDs are leading to death, disability and illness in … Read more

Computer forensics

There are few types of investigation methods using for computer forensics Digital forensics is investigation method used for investigating crimes which is related to digital devices such as computer, mobile phones and presenting it to the higher courts accordingly so that legal actions could be taken. Now a days mostly digital devices are using in … Read more

MapReduce for knowledge management

The explosive growth of knowledge is making important challenges for several firms. Challenges embrace physical storage, lack of knowledge quality, and also the escalating prices of managing, storing and process massive, growing information sets. Organizations would like the flexibility to investigate and gain insights from huge amounts of maintained information for a range of business … Read more

Direct methods and knowledge modelling

Direct methods are those that enhance the understanding about the domain obtain directly from the expert through interviews, case studies and prototyping, so the required information is obtained by asking direct questions or from direct observation. While in indirect approach the needed information is not requested directly example are Document analysis, Questionnaires. The benefit of … Read more

Hierarchical knowledge structure

‘Hierarchical knowledge structure’ should be build between AI decision system and physical device. The concept of a hierarchical knowledge structure is to decompose a complicated decision into series of smaller decisions of increasing level of details. In other words, many small separate decisions can contribute to solve a complex over all decision. The operation of … Read more

Simulation and Modeling of 512 bit Keccak Hash Function for Encryption in FPGA Devices

Abstract: This paper presents two implementation of keccak hash family algorithm that has selected as one of the SHA-3 competition finalist. Many cryptographic primitive those are used in crucial cryptographic schemes and commercial security protocols utilized function. In this paper 10-round unrolled architecture of the complete keccak algorithm is presented, implemented in Xilinx virtex-7 FPGA. … Read more

Dissertation: Attackers Detection Using Honeypots

Problem Description The mode of this study and this dissertation is to identification, detection and isolation of unknown worms, attacks by sundry attackers on existing work network at various or particular places. Abstract This thesis describes a project that utilizes honeypots to detect worms, attacks and attackers. A detailed description of existing worm, attacks and … Read more

Parameter estimation of induction motor using soft computing technique

Abstract: Parameter estimation of an induction motor was carried out in conventional methods in order to determine the steady state equivalent circuit parameters. In conventional method, we obtained the parameters of an induction motor by no-load and blocked rotor test. The results obtained from the tests may not give accurate values of the parameter and … Read more

Data privacy

5.1 Introduction Each of the techniques presented so far adds noise either to a numerical attribute or categorical attribute. We now present a Model that combines these techniques for adding noise to all the attributes of a data set. The Model adds noise in such a way that original data set are preserved. Additionally, our … Read more

Comparison of LEACH and PEGASIS Hierarchical Routing Protocols in Wireless Sensor Networks

Abstract’The efficiency of wireless sensor network largely depends on the routing protocol used. Routing is a major challenge for sensor networks as it presents a trade-off between responsiveness and efficiency. Hierarchical class of routing protocols introduces a structure on the network to achieve stability, energy efficiency and scalability. There are various protocols existing in this … Read more

Essay on service oriented computing and cloud computing

Service Oriented Computing’ Abstract’ Computers have become an unavoidable part of life. Any field you name be it research, banking enterprises, computers are needed everywhere. As the use of computers in our day-to-day life increases, so does the need of the computing resources. For companies like Google and Microsoft, tackling the resources as and when … Read more

A Survey on Security of Database

Abstract’ for the last few decades, security had become a real concern in all aspects of life. As the world is becoming more digitized, organizations had to maintain several databases for their routine work. The concept of database was not in count for past some years, but now multiplicity it is growing. Permitting users to … Read more

the digital signal processor

ABSTRACT There are several types of filters used world widely. The filters may be an analogue filters or a digital filters. The analogue filters will only deal with the analogue signals to remove the noise signals and to manage the bandwidth of the input analogue signals. The digital filters will sample the input signal(Analogue signal) … Read more

Essay on recommendation systems

Recommendation systems can be considered as a valuable extension of traditional informa??tion systems used in industries such as travel and hospitality. However, recommendation systems have mathematical roots and are more akin to artificial intelligence (AI) than any other IT discipline. A recommendation system learns from a customer’s behavior and recommends a product in which users … Read more

Essay on Network Mapping

Contents LAB 1 Network Mapping 4 Introductions 4 Evaluation on Networking Mapping 7 LAB 2 RPC and NFS Exercise 8 Introduction 8 UDP NFS Versions: 2-4 (RPC # 100003) 9 Analysis and Evaluation 11 LAB 3 RSH and Rlogin 12 Introduction 12 Evaluation of Rlogin 12 Lab 4 X Window System Exercise 14 INTRODUCTION 14 … Read more

Dissertation: Design of truncated multiple constant Multiplication/Accumulation unit

CHAPTER-1 Introduction FIR filters are digital filters with finite impulse response. They are also known as non-recursive digital filters as they do not have the feedback a recursive part of a filter, even though recursive algorithms can be used for FIR filter realization. FIR filters can be designed using different methods, but most of them … Read more

Dissertation: Performance characterization in Virtualization Based Environment

Abstract Many service provider today using virtualization because of its various benefits. Virtualization is useful for resources utilization, testing purposes and better server management. Several application are being consolidated to virtual environment using various virtualization techniques. One of the most popular use of virtualization is cloud computing where service providers can provide continuous service to … Read more

Dissertation: An integrated approach for visual cryptography schemes using compressed random shares

  ABSTRACT Visual cryptography is one of the most secure techniques that allows the user to encrypt the secret images by transforming them into printable transparent sheets and these sheets can be distributed to different intended person through various mediums (physically, internet). On receiving the intended person may regenerate the original image by stacking all … Read more

Essay on ethic, the Digital Signature Act, Digital Signature, Biometric System, Iris recognition, security

Ethic in information management context involved a standard or code of behavior expected by individual or group of people about a right and wrong behavior within a society. Everybody must aware about this matter as who are not alert about ethic can be charge under a legal law. This term paper has specifically focused about … Read more

Survey on Clustering Schemes in Vehicular Ad-Hoc

Survey on Clustering Schemes in Vehicular Ad-Hoc Networks(VANETs) Abstract’Vehicular Ad-hoc Networks(VANETs) are special kind of Mobile Ad-Hoc Network which has significant role in the applications related with traffic safety and traffic efficiency. The process of clustering of nodes in VANET improves the performance of VANET structure by performing data aggregation. There are several clustering schemes … Read more