Blockchain Scalability Analysis and Improvement of Bitcoin Network through Enhanced Transaction Adjournment Techniques
Data Lake System for Essay-Based Questions: A Scenario for the Computer Science Curriculum
Creating Secure Passwords through Personalized User Inputs
Optimizing B-Cell Epitope Prediction: A Novel Approach using Support Vector Machine Enhanced with Genetic Algorithm
Gesture Language Translator using Morse Code
Efficient Agent Based Priority Scheduling and LoadBalancing Using Fuzzy Logic in Grid Computing
A Survey of Various Task Scheduling Algorithms In Cloud Computing
Integrated Atlas Based Localisation Features in Lungs Images
A Computational Intelligence Technique for Effective Medical Diagnosis Using Decision Tree Algorithm
A Viable Solution to Prevent SQL Injection Attack Using SQL Injection
The authors are in search of a reliable, congestion control, real-time media traffic supportable protocol which is not yet available. Previously, for this purpose the authors were taking help of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is a reliable, congestion control protocol which works fine for low bandwidth scenarios and UDP is an unreliable protocol but works fine in high bandwidth scenarios. A protocol that opts in both situations high and low bandwidth scenarios is required. One such a protocol TCP Friendly Rate Control (TFRC) is designed by Internet Engineering Task Force People (IETF) and it is a reliable, congestion control protocol. TFRC is a rate based approach and well suitable for real-time video traffic because of smooth sending rate and friendliness with TCP flows achieved in it. This paper shows the complete study of TFRC, and performance of TFRC is compared with TCP flows such as TCP SACK, TCP Vegas, TCP Reno, and TCP Tahoe and also with UDP in wired environment.
While technology keeps growing, the world keeps shrinking, and this transformation is possible through compression. Earlier, computers occupied a room, now people are conveniently carrying in their hand. These massive developments are possible through compression in internet and other real time applications. Many English text compression algorithms fail to compress genetic sequences due to “the specialty of encoded text in genetic sequences”. In addition to that in text compression very rare code word repetitions occur, where as, in DNA (Deoxyribo Nucleic Acid) the repetitions of codewords are more and more. So there may be a possibility that the compression ratio and gain will be more in DNA (Genomic) sequences. This assumption makes true when the Human genome project is deciphered. Many State-of-theart compression algorithms are existing in connection with DNA sequences. Existing techniques are focused on compression rate, compress gain, time and space as metrics, and questions arise such that whether encoded and decoded sequence is valid or not?. The resultant answer is validation. Validation is highly required for resultant sequence. In this paper, the proposed novel methodology SDV (Shift Distance Validation) an algorithmic approach is employed, to test the validity of decompressed sequences which is more important in security applications.
Transmission Control Protocol (TCP) is the transport layer protocol which is reliable and connection oriented. The beauty of TCP is its congestion control feature. TCP delights the packet losses as an indication of the congestion. TCP is widely used on the internet. There are various congestion control mechanisms that are available based on four basic approaches, such as slow-start, congestion avoidance, fast retransmit and fast recovery. Several TCP variants are used to control and avoid the congestion; these are TCP Tahoe, TCP Reno, TCP Vegas, and TCP New Reno. In this paper, the authors have evaluated the performance of various TCP congestion control algorithms with different Constant Bit Rate (CBR) traffic from the following aspects, based on the number of packets sent, number of packets lost and number of packets dropped. To calculate Packet Delivery Ratio (PDR), average end-end delay and average packet loss are calculated. In order to evaluate the performance of various TCP variants, the authors have used NS-2 simulator and the graphs have been generated using Xgraph.
In recent years, Online Social Network (OSN's) have a great growth and a fabulous usage for thousands of millions of users on the Internet. These OSNs have become a main forum for digital social interactions and sharing of Information among users, but they does not have a proper facility of providing security and privacy apprehensions. Users manage these OSN’s access to share data, and presently there is no method to provide proper privacy concerns over the usage of data by multiple users. In this paper, the authors have suggested an approach in how to allow and protect the shared data of multiple users associated in OSN’s. The authors have designed a method to declaim these sense of multiple use conditions, including a method of policy specification of multiple users, and how to use this method of security of user's data. In this paper, the authors have included a logical representation of users access control model, which allows many users to work or extend this model. Proof of concept of approach of safety for an application on face book has been discussed and usability study and evaluation of the method, has been provided.
This paper proposed an alternative for the use of computers by physically challenged and paralyzed people. It explains the basic idea of a Human machine interface which can be used to control the mouse using head-tilt [4], [5] and eyeblink [9]. The use of this mouse which is a emulating device does not required much energy since, it uses simple head movement and eye blink [1]. This device or Goggle uses three axes sensor for detecting the movement of the head according to which, the movement of the cursor can been done [8]. A photo sensor detects eye blinking [6]. The Infra Red (IR) transceiver consists of a 935nm IR transmitter and a phototransistor mounted on the same unit. This detects a strong increase in the reflected signal upon intentional long blink as compared to normal eye blink. This also uses palm vein pattern recognition as a biometric authentication for secured use of the computer. Palm vein authentication has a high level of accuracy since, it is located within our body and does not change over time. Hence, it cannot indulge in any kind of forgeries.
This paper proposes a fine-grain-mode prediction for variable stage pipeline processor. Fine-grain controller adjusts the pipeline depth at every several tens of cycles and also predicts the suitable pipeline depth using a processor counter like as a cache hit counter or an each instruction counter. This method is used for variable stage pipeline (VSP) processor. A VSP processor varies in the pipeline depth dynamically according to workload. Based upon the workload the fine grain mode prediction unifies the pipeline stages. So, the power consumption reduces and increases its performance. A similar approach was proposed by Yao et al [3]. After 1 year the fine-grain control was proposed but their approach does not consider for the detailed mechanism to change pipeline depth with small penalty. To take advantage of fine-grain controlling of pipeline unification, it is essential to change pipeline depth without incurring a large penalty. This mode predictor is used for 7-stage pipeline processor. So that unification of the processor has been done and analyzing operation performed in the processor. This method is essential to change pipeline depth without incurring a large penalty.