Firewalls are critical in securing private networks of businesses, institutions, and home networks. A firewall is often placed at the entrance between a private network and the external network so that it can check each incoming or outgoing packet and decide whether to accept or discard the packet based on its policy. A firewall policy […]
A sufficient High obfuscation level
It is essential to detect inconsistencies or failures early. In manufacturing and logistic processes, items are tracked continuously to detect loss or to reroute them during transport. To answer this need complex event processing (CEP) systems have evolved as a key paradigm for business and industrial applications. CEP systems allow to detect situations by performing […]
Analyzing the Wisconsin Breast Cancer (WDBC) Data Set
In classification problems, the main goal is to derive an accurate representative data model that can correctly classify new test data instances. The accuracy of the classification model can be affected by the presence of outliers in a data set and the inability to correctly classify data records near the boundary. Considering the first case […]
Pricing model for cloud computing in waiting time distribution
Power dissipation and circuit delay in digital CMOS circuits can be accurately modeled by simple equations,even for complex microprocessor circuits. CMOS circuits have dynamic, static, and short-circuit power dissipation; however, the dominant component in a well-designed circuit is dynamic power consumption P. Cloud computing is quickly becoming an effective and efficient way of computing resources […]
Security Model in Data Storage Systems
Cloud Computing is related to identity based secure distributed data storage (IBSDDS) schemes. CLOUD computing provides users with a convenient mechanism to manage their personal files with the notion called database-as-a-service (DAS. In DAS schemes, a user can outsource his encrypted files to untrusted proxy servers. Proxy servers can perform some functions on the outsourced […]
Group key management (GKM) in mobile communication
The most important concerns is how to minimize the communication overhead when the shared GK is updated among the subscribers. Treebased KM, one class of GKM, has received considerable attention from many researchers since the amount of overhead for group rekeying is proportional to the logarithm of the group size. Many researchers have proposed new […]
Mobile users to collect the network-wide data
We consider the problem of ubiquitous data collection by the mobile user in a wireless sensor network. The mobile user uses a handheld device to communicate with sensor nodes in the network. The mobile user roams within the network and instantly accesses network-wide data on a need basis. For instance, in the aforementioned GreenOrbs project, […]
Analysis of a Naive Architecture of Mobile Presence Service
Social network applications are becoming increasingly popular on mobile devices. A mobile presence service is an essential component of a social network application because it maintains each mobile user’s presence information, such as the current status (online/offline), GPS location and network address, and also updates the user’s online friends with the information continually. the system […]
CLASSIFICATION OF ANALYSIS- CLUSTERING PATTERN DISCRIMINATIVE ALGORITHMS
A natural environment, the high dimensional measurement signals, lying in the F-dimensional measurement space, usually represent patterns residing in a much lower, D- dimensional subspace embedded in the ambient measurement space. Subclass discriminant analysis (MSDA) and restricted Gaussian model is first presented, and then two further discriminant analysis (DA) methods, fractional step MSDA (FSMSDA) and […]
Good rate of convergence with a guaranteed empirical risk minimization
The input data are not generated by an external source. The points at which the unknown function is observed need to be chosen by some specific algorithm. This last condition can be found in applications, among others, from neural networks, robotics, optimal control, and statistics. The case where kernel-based local models are employed for the […]