Survey on Detection and Prevention of Intrusion IJTSRD
Intrusion Detection and Prevention System using GSM modem is proposed, which is designed to detect unwanted attempts of accessing, manipulating and/or disabling computer system. If intruder cracks or guess the password then proposed system will deny access of system resources with the help of security question known to owner of the system. Proposed system will […]
An Efficient HIM Technique for Tumour Detection from MRI Images IJTSRD
Data mining techniques are widely used for data processing from large data set such as data center and data warehouse. An Image mining technique is a new form of data mining technique in the processing of image data. In the medical field, day by day size of medical images data is increasing. MRI images are […]
Secure Data Deduplication with Dynamic Ownership Management in Cloud Storage IJTSRD
In this paper, we propose a novel server-side deduplication scheme for encrypted data. It allows the cloud server to control access to outsourced data even when the ownership changes dynamically by exploiting randomized convergent encryption and secure ownership group key distribution. This prevents data leakage not only to revoked users even though they previously owned […]
Big Data Analytics: A Brief Survey IJTSRD
In recent days, the size of the informations generated from modern information systems and digital technologies like IoT and Cloud computing is huge (ie. In TB). With this huge sized data, it is quite difficult to analysis and it is in the need of more effects at multiple levels to extract data. Big data analysis […]
Design Energy Efficient SMAC Protocol for Wireless Sensor Networks using Neighbour Discovery Scheduling Algorithm IJTSRD
Wireless sensor networks have recently attracted much attention from research. This project reviews the medium access control (MAC), which is a capable technology in wireless sensor networks called SMAC (Sensor-MAC). MAC protocols control how sensors reach a shared communication channel to communicate with neighbors in small area coverage. SMAC sets the protocol nodes to sleep […]