Статьи журнала - International Journal of Computer Network and Information Security
Все статьи: 1121
![Performance evaluation of AODV, DSDV, OLSR routing protocols using NS-3 simulator Performance evaluation of AODV, DSDV, OLSR routing protocols using NS-3 simulator](/file/thumb/15015619/performance-evaluation-of-aodv-dsdv-olsr-routing-protocols-using-ns-3-simulator.png)
Performance evaluation of AODV, DSDV, OLSR routing protocols using NS-3 simulator
Статья научная
Today, Due to mobility wireless network have a heavy demand especially for wireless Ad-Hoc network. In Ad-Hoc network a group of wireless mobile nodes cooperate with each other by routing of packets. So it is necessary to design a wireless network which gives the best performance by suitable protocol selection and path routing. The selection of protocol should be suitable in terms of data integrity as well as data delivery. Hence performance evaluation of protocol is a major issue before selection of a routing protocol. In this paper our aim is to analyse the performance matrices including end to end delay, jitter, packet loss and packet delivery fraction of multi hop network by simulation. Performance evaluation of wireless ad hoc network routing protocols specially Ad-hoc On Demand Distance Vector (AODV), Optimized Link State Routing (OLSR), Destination Sequenced Distance Vector (DSDV) have been completed using NS-3 Simulator. After simulation we have found that OLSR routing protocol gives the best result comparison to AODV and DSDV in large and dense network.
Бесплатно
![Performance evaluation of MAC protocols with multi-sink for mobile UWSNs Performance evaluation of MAC protocols with multi-sink for mobile UWSNs](/file/thumb/15015697/performance-evaluation-of-mac-protocols-with-multi-sink-for-mobile-uwsns.png)
Performance evaluation of MAC protocols with multi-sink for mobile UWSNs
Статья научная
Currently, Underwater Wireless Sensor Network (UWSN) is one of modern science and have attached many researchers especially how interesting with Wireless Sensor Network (WSN). A mobile node in UWSN is one of the powerful mechanisms, it can be used for many aquatic applications such as Surveillance for wildlife, Pollution control, Military applications, etc. UWSN is different from the terrestrial network in terms of using acoustic waves as a communication medium. Due limitation of bandwidth, high latency, and long propagation delay of acoustic waves, many proper MAC protocols that work efficiently in Static UWSN are not suitable for the mobile network. In this article two MAC protocols appropriate for mobile underwater network Broadcast as Direct access and geo-routing aware MAC protocol (GOAL) as Handshaking are evaluated, in both static and mobile nodes with respect to throughput, energy consumption, and delay. Then the effect of using Multi-Sink on the performance is shown, the evaluation is done based on AquaSim simulator, Aqua3D Animator, and AWK programming language have been used to extract the results. As a result, the performance has been improved by using multi-Sink with two types of MAC address, and for all the metrics.
Бесплатно
![Performance of TCP Vegas, Bic and Reno Congestion Control Algorithms on Iridium Satellite Constellations Performance of TCP Vegas, Bic and Reno Congestion Control Algorithms on Iridium Satellite Constellations](/file/thumb/15011144/performance-of-tcp-vegas-bic-and-reno-congestion-control-algorithms-on-iridium.png)
Статья научная
Satellite networking is different from wired or wireless networks. The behavior and the performance of TCP/IP in normal wireless network as well as in wired network are different from one another. The TCP/IP protocol was not designed to perform well over high-latency or noisy channels so its performance over satellite networks are totally different. Each satellite networks/constellations have different properties. The deployment height, motion, direction, link capacity – all differ from one satellite constellations to another. So, certainly the behavior of TCP/IP will considerably differ from one satellite constellations than another. The Performance of three different TCP Congestion algorithms, Vegas, Reno and Bic are taken for evaluation on the simulated satellite network Iridium and the performance of the three algorithms under the satellites constellation is measured using suitable metrics. It is observed that, irrespective of the high end to end delay, the behavior of TCP/IP under Satellite network is somewhat resembling a high latency wired network. TCP under satellite network is not like that of a mobile ADHOC network. The observation resulted that the overall performance of Vegas was good in Iridium constellations. These reasons should be explored for designing a better congestion control algorithm exclusively for Satellite Networks.
Бесплатно
![Pre-Processing of University Webserver Log Files for Intrusion Detection Pre-Processing of University Webserver Log Files for Intrusion Detection](/file/thumb/15011738/pre-processing-of-university-webserver-log-files-for-intrusion-detection.png)
Pre-Processing of University Webserver Log Files for Intrusion Detection
Статья научная
Web Server log files can reveal lots of interesting patterns when analyzed. The results obtained can be used in various applications, one of which is detecting intrusions on the web. For good quality of data and usable results, there is the need for data preprocessing. In this research, different stages of data preprocessing were carried out on web server log files obtained over a period of five months. The stages are Data Conversion, Session Identification, Data Cleaning and Data Discretization. Data Discretization was carried out in two phases to take care of data with continuous attributes. Some comparisons were carried out on the discretized data. The paper shows that with each preprocessing step, the data becomes clearer and more usable. At the final stage, the data presented offers a wide range of opportunities for further research. Therefore, preprocessing web server log files provides a standard processing platform for adequate research using web server logs. This method is also useful in monitoring and studying web usage pattern in a particular domain. Though the research covers webserver log obtained from a University domain, and thus, reveals the pattern of web access within a university environment, it can also be applied in e-commerce and any other terrain.
Бесплатно
![Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks](/file/thumb/15011749/pre-quarantine-approach-for-defense-against-propagation-of-malicious-objects-in.png)
Pre-quarantine Approach for Defense against Propagation of Malicious Objects in Networks
Статья научная
This paper revisits malicious object propagation in networks using epidemic theory in such a manner that it proposes the (Pre-quarantining) of nodes in networks. This is a concept that is known by experience to be a standard disease control procedure that involves screening and quarantining of immigrants to a population. As preliminary investigation we propose the Q-SEIRS model and the more advanced Q-SEIRS-V model for malicious objects' spread in networks. This Pre-quarantine concept addresses and implements the "assume guilty till proven innocent" slogan of the cyber world by providing a mechanism for pre-screening, isolation and treatment for incoming infected nodes. The treated nodes from the pre-quarantine compartment are sent to the recovered compartment while the free nodes join the network population. The paper also derived the reproduction number, equilibria, as well as local stability of the proposed model. Numerical methods are employed to solve the system of equations and MATLAB is used to simulate the system so as to visualize the dynamical behavior of the models. It is seen that pre-screening/pre-quarantining improves the recovery rate in relative terms.
Бесплатно
![Predict Link Failure in AODV Protocol to provide Quality of Service in MANET Predict Link Failure in AODV Protocol to provide Quality of Service in MANET](/file/thumb/15011504/predict-link-failure-in-aodv-protocol-to-provide-quality-of-service-in-manet.png)
Predict Link Failure in AODV Protocol to provide Quality of Service in MANET
Статья научная
Quality of Service (QoS) in Ad hoc networks (MANETs) and more precisely in routing is the subject of several studies with the aim of providing better solutions for new applications requiring high throughput and very low delay. The objective of this work is to enhance the AODV (Ad hoc On Demand Distance Vector) routing strategy in maintenance phase, to improve QoS. It aims to add a mechanism able to predict link failure in use based on signal strength which is able to determine if the quality of link will be improved (i.e. stable) or more bad (i.e. probability of failure) in order to allow us not only to make the link management more robust but to anticipate on link breaking and improve QoS. When signal quality is declining due to neighbor node remoteness, a discovery of a part of road rescue with two hops will be established and it will be used when disconnection happens. Simulations under Network Simulator (Ns2) were conducted to measure traffic control, packets delivery and lost ratio in original protocol and modified version which are presented in this paper.
Бесплатно
![Predicting Intrusion in a Network Traffic Using Variance of Neighboring Object’s Distance Predicting Intrusion in a Network Traffic Using Variance of Neighboring Object’s Distance](/file/thumb/15018616/predicting-intrusion-in-a-network-traffic-using-variance-of-neighboring.png)
Predicting Intrusion in a Network Traffic Using Variance of Neighboring Object’s Distance
Статья научная
Activities in network traffic can be broadly classified into two categories: normal and malicious. Malicious activities are harmful and their detection is necessary for security reasons. The intrusion detection process monitors network traffic to identify malicious activities in the system. Any algorithm that divides objects into two categories, such as good or bad, is a binary class predictor or binary classifier. In this paper, we utilized the Nearest Neighbor Distance Variance (NNDV) classifier for the prediction of intrusion. NNDV is a binary class predictor and uses the concept of variance on the distance between objects. We used KDD CUP 99 dataset to evaluate the NNDV and compared the predictive accuracy of NNDV with that of the KNN or K Nearest Neighbor classifier. KNN is an efficient general purpose classifier, but we only considered its binary aspect. The results are quite satisfactory to show that NNDV is comparable to KNN. Many times, the performance of NNDV is better than KNN. We experimented with normalized and unnormalized data for NNDV and found that the accuracy results are generally better for normalized data. We also compared the accuracy results of different cross validation techniques such as 2 fold, 5 fold, 10 fold, and leave one out on the NNDV for the KDD CUP 99 dataset. Cross validation results can be helpful in determining the parameters of the algorithm.
Бесплатно
![Prediction of Intermittent Failure by Presage Debacle Model in Network on Chip Prediction of Intermittent Failure by Presage Debacle Model in Network on Chip](/file/thumb/15018477/prediction-of-intermittent-failure-by-presage-debacle-model-in-network-on-chip.png)
Prediction of Intermittent Failure by Presage Debacle Model in Network on Chip
Статья научная
With the emergence of deep sub-micron technology, the reliability issues in on-chip interconnect has enormously increased. This includes single event upsets, like soft errors, and hard faults which are rapidly becoming important factors to be considered. Aggressive technology scaling renders these architectures vulnerable to system performance, intermittent failure, capacitive crosstalk, and power dissipation problem. To improve the performance of the area and power consumption along with bandwidth, throughput and latency, a Buffer Potency Power Gating Technique is carried out to predict the Intermittent Failure by Presage Debacle Model in Network on Chip. In the Presage Debacle Model, the links present in the application-specific topology are provided with real application traffic to assist in prediction of the intermittent failure. By predicting the failure, the output of the model provides the power dissipated over the connection of the application link. Then the crosstalk noise in the topology is reduced by the Adaption of Simulated Annealing (SA) based Particle Swarm Optimization (PSO) congruence algorithm. The optimization congruence algorithm assigns each task in the application software to each node in the topology to determine the network's optimal output. It continuously changes the task park position in the topology system and reduces the crosstalk of the NoC. Consecutively, the area and power consumption are minimized by Buffer Potency Power Gating Technique. Buffer efficiency is increased and the power-gating is a practical way to mitigate NoC power control schemes properly and effectively without any loss in performance. Thus the prediction of intermittent failure is obtained by utilizing NoC to improve the performance of area and power consumption.
Бесплатно
![Preventive Aspect of Black Hole Attack in Mobile AD HOC Network Preventive Aspect of Black Hole Attack in Mobile AD HOC Network](/file/thumb/15011094/preventive-aspect-of-black-hole-attack-in-mobile-ad-hoc-network.png)
Preventive Aspect of Black Hole Attack in Mobile AD HOC Network
Статья научная
Mobile ad hoc network is infrastructure less type of network. In this paper we present the prevention mechanism for black hole in mobile ad hoc network. The routing algorithms are analyzed and discrete properties of routing protocols are defined. The discrete properties support in distributed routing efficiently. The protocol is distributed and not dependent upon the centralized controlling node. Important features of Ad hoc on demand vector routing (AODV) are inherited and new mechanism is combined with it to get the multipath routing protocol for Mobile ad hoc network (MANET) to prevent the black hole attack. When the routing path is discovered and entered into the routing table, the next step is taken by combined protocol to search the new path with certain time interval. The old entered path is refreshed into the routing table. The simulation is taken on 50 moving nodes in the area of 1000 x 1000 square meter and the maximum speed of nodes are 5m/sec. The result is calculated for throughput verses number of black hole nodes with pause time of 0 sec. to 40 sec., 120 sec. and 160 sec. when the threshold value is 1.0.
Бесплатно
![Priority Metric based Ad Hoc Routing for Underwater Sensor Network Priority Metric based Ad Hoc Routing for Underwater Sensor Network](/file/thumb/15011249/priority-metric-based-ad-hoc-routing-for-underwater-sensor-network.png)
Priority Metric based Ad Hoc Routing for Underwater Sensor Network
Статья научная
Underwater sensor network has been burgeoned as an interesting research area which has to face a couple of challenges to provide scalable and efficient routing services because of its unique characteristics. In many aspects, it differs from the ground based terrestrial sensor network, Firstly, In UWSNs, acoustic signal is used instead of radio-frequency that attenuates much in underwater environment in comparison with radio-frequency channels. Acoustic channels attribute much lower bandwidth and the propagation speed of acoustic signals in water is several of magnitudes longer. Secondly, nodes of underwater sensor networks move with water current which results dynamic topology. Thirdly, underwater sensor networks consume more power than terrestrial networks due to the underwater channel characteristics and it has high error probability because of acoustic underwater channels' sensibility in noise, multi-path and Doppler spread. Some routing protocols have been proposed to deal with these challenges. But most of these protocols espouse the greedy technique to forward packets to the neighboring node which consumes a lot of energy when network is dense. In this thesis, we propose a Priority Metric Based Ad hoc Routing Protocol for UWSNs. The leading advantages of the protocol are that it consumes less energy in dense network as only one neighboring node needs to capture the packet and process it and it guarantees less number of packet loss in high mobile node environment. Extensive simulation is executed to attest the competence of the proposed routing protocol. The result and analysis bear the indication of the proposed routing protocol's surpassing the existing routing protocol in terms of total energy consumption and average end to end delay.
Бесплатно
![Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks](/file/thumb/15011089/privacy-notions-and-review-of-privacy-preservation-mechanisms-in-wireless-sensor.png)
Privacy Notions and Review of Privacy Preservation Mechanisms in Wireless Sensor Networks
Статья научная
The current research work in wireless sensor networks has mostly focused on the resolving issues related to power consumption and computational resource constraints in the wireless sensor networks .To achieve the same various specific routing schemes ,MAC and cross layered protocols and techniques have been proposed and designed .But with recent advances the privacy issues related to the data collected and transmitted by the wireless sensor networks had taken the center stage .Privacy preservation in wireless sensor networks has become more challenging because of the wireless nature of communication in WSN as well as its self organizing architecture. The present paper provides a comparative review of various privacy preserving mechanisms proposed and implemented in wireless sensor networks with respect to the privacy notions of k-anonymity and L-diversity. Along with the discussion and analysis the present work is an effort for the pavement of a way towards the future research in the field of privacy preservation in WSN.
Бесплатно
![Privacy Protection in Smart Cities by a Personal Data Management Protocol in Blockchain Privacy Protection in Smart Cities by a Personal Data Management Protocol in Blockchain](/file/thumb/15017208/privacy-protection-in-smart-cities-by-a-personal-data-management-protocol-in.png)
Privacy Protection in Smart Cities by a Personal Data Management Protocol in Blockchain
Статья научная
Due to the increase of cybercrime and security risks in computer networks as well as violations of user privacy, it is essential to upgrade the existing protection models and provide practical solutions to meet these challenges. An example of these risks is the presence of a third party between users and various services, which leads to the collection and control of large amounts of users' personal information and the possibility of their databases being misused or hacked. Blockchain technology and encrypted currencies have so far shown that a decentralized network of peer-to-peer users, along with a general ledger, can do reliable computing. So, in this article, we are going to introduce a protocol that converts the blockchain network to an automated access control manager without the presence of a third party. To this end, we designed a mutual authentication protocol to create a secure channel between the user and the service and then demonstrate its accuracy and completeness using the Gong-Nidham-Yahalom belief logic [1]. The results of our evaluations show that our proposed protocol is secure enough to be used on the blockchain network and attackers are unable to penetrate, track, impersonate, inject, misrepresent or distort information using the common attacks.
Бесплатно
![Privacy and security concerns in electronic commerce websites in Ghana: a survey study Privacy and security concerns in electronic commerce websites in Ghana: a survey study](/file/thumb/15015718/privacy-and-security-concerns-in-electronic-commerce-websites-in-ghanaa-survey.png)
Privacy and security concerns in electronic commerce websites in Ghana: a survey study
Статья научная
This paper examines the privacy and security issues on electronic commerce websites in Ghana. Ghana is reported to have an Internet users’ rate of 27.8% and a mobile Internet subscription of 14% in 2017. The study assessed e-commerce websites for privacy policies that are meant to guide and inform website users on the collection of customer data, data use, protection and other related privacy issues on personal data. The study also analyzed e-commerce websites for encryption security tools that protect customer data and test e-commerce websites for the presence of security vulnerabilities that could threaten the sites and their users. The study used a combination of three methods; web content analysis, information security audit and testing of the websites using penetration testing tools for data collection and analysis. Nmap was used to test and identify possible vulnerabilities on the e-commerce websites that could be used by malicious users to steal customer data for fraudulent intent. The research revealed the presence or otherwise of privacy policies on e-commerce websites. The security weaknesses in these e-commerce websites have been highlighted as findings in the study. The findings of the study will inform policy direction on electronic data collection, protection and use in the e-commerce industry in Ghana is on areas that bother on privacy and security of the customer could be given attention. The findings will also inform industry players in the e-commerce sector on the need to strengthen security on their websites.
Бесплатно
![Proof of Notoriety: A Promised Consensus Mechanism for the Blockchain-based Copyright System Proof of Notoriety: A Promised Consensus Mechanism for the Blockchain-based Copyright System](/file/thumb/15019540/proof-of-notorietya-promised-consensus-mechanism-for-the-blockchain-based.png)
Proof of Notoriety: A Promised Consensus Mechanism for the Blockchain-based Copyright System
Статья научная
In blockchain technology, copyright protection can be achieved through the use of smart contracts and decentralized platforms. These platforms can create a tamper-proof, timestamped record of the creation and ownership of a work, as well as any subsequent transactions involving that work. The choice of platform or type of blockchain is mainly dependent upon the type of consensus algorithm. This article presents a novel approach to copyright protection using blockchain technology. The proposed approach introduces a new consensus mechanism called Proof of Notoriety (PoN) to enhance the security and efficiency of copyright registration and verification processes. The Proof of Notoriety consensus mechanism leverages notoriety scores to determine the validity and credibility of the participants in the copyright registration process. Participants with higher notoriety scores are given more weightage in reaching a consensus on the validity of copyright claims. This ensures that only reputable entities are responsible for registering and verifying copyright, thereby reducing the risk of fraudulent claims and unauthorized use.
Бесплатно
![Proposing a method for enhancing the reliability of RPL routing protocol in the smart grid neighborhood area networks Proposing a method for enhancing the reliability of RPL routing protocol in the smart grid neighborhood area networks](/file/thumb/15015701/proposing-a-method-for-enhancing-the-reliability-of-rpl-routing-protocol-in-the.png)
Статья научная
The RPL routing protocol is one of the most prominent protocols for low-power wireless networks. It has many benefits, including high flexibility and compatibility with different topologies, quality assurance, automatic configuration, self-healing, avoiding the creation of tree loops, and independence and transparency. Since the RPL's capability to meet the reliability requirements has not been sufficiently investigated and there is not much research about the reliability of this protocol, the purpose of this study is to propose a method for enhancing the reliability of RPL routing protocol in the Smart Grid Neighborhood Area Networks (NAN). We propose three methods for increasing the reliability of the RPL protocol: addition of cache at each node, considering two parents for each node and finally the combination of the two mentioned methods. The type of research is descriptive-analytic. Simulations have been performed in OPNET simulator. The results of this study indicate that the proposed methods significantly increase the reliability of this routing protocol in Smart Grid NAN.
Бесплатно
![Prospect for Using Low-Element Adaptive Antenna Systems for Radio Monitoring Stations Prospect for Using Low-Element Adaptive Antenna Systems for Radio Monitoring Stations](/file/thumb/15017880/prospect-for-using-low-element-adaptive-antenna-systems-for-radio-monitoring.png)
Prospect for Using Low-Element Adaptive Antenna Systems for Radio Monitoring Stations
Статья научная
This article is devoted to the analysis of prospect to apply multifunctional adaptive antenna systems for radio monitoring stations. The review of publications done demonstrates that current antennas that are developed and used in radio monitoring systems to control and measure the parameters of electromagnetic radiation should be applicable to conduct accurate measurements in wide frequency range under the condition of interferences. The analysis shows that modern adaptive antenna systems are mostly developed for radar and telecommunications applications. In this context we consider possible ways to solve the problem of adapting radio monitoring devices to a complex electromagnetic environment using antenna systems with primary processing of received signals . It was found that the developers of the antennas, which are based on adaptive interference suppression methods, focus basically on the development and implementation of adaptation processes, limiting themselves only to solving electromagnetic compatibility problems. In such approach, the functions of direction finding and measurement of radiation field parameters important exactly for radio monitoring systems are mostly ignored. Therefore, this research area opens up a wide field for identifying new possibilities for constructing multifunctional antenna systems. Focusing on this direction of research, we consider as an example the constraction of a simple two-element adaptive antenna system, which can be used to measure the parameters of the electromagnetic field in radio monitoring systems. The main relations for the error of determining the direction of arrival of the interference signal with a simple two-element antenna are investigated. The influence of the stability of the antenna array parameters and functional units of signal processing onto the errors is estimated
Бесплатно
![Protecting Hybrid Information Transmission Network from Natural and Anthropogenic Hazards Protecting Hybrid Information Transmission Network from Natural and Anthropogenic Hazards](/file/thumb/15018542/protecting-hybrid-information-transmission-network-from-natural-and-anthropogenic.png)
Protecting Hybrid Information Transmission Network from Natural and Anthropogenic Hazards
Статья научная
A hybrid network, which consists of the sections of communication lines with the transmission of signals of different physical nature on different transmission media, has been considered. Communication lines respond differently to threats, which allows to choose the line with the best performance for the transmission of information. The causal diagram of events that determine the state of the information transmission network, such as changes in emergency/accident-free time intervals, has been presented. The application scheme of the protection measures against dangerous events has been shown. To verify the measures, a matrix of their compliance with typical natural disasters has been developed and relevant examples have been given. It is suggested to evaluate the flexibility of the telecommunication network by its connectivity, characterized by the numbers of vertex and edge connectivity, the probability of connectivity. The presented scheme of the device for multi-channel information transmission in a hybrid network allows the choice for the transmission of information to the channel with the best performance. Using this device is the essence of the suggestion about increasing the flexibility of the network.
Бесплатно
![Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment](/file/thumb/15011098/protection-against-ddos-and-data-modification-attack-in-computational-grid.png)
Protection Against DDoS and Data Modification Attack in Computational Grid Cluster Environment
Статья научная
In the past decades, focus of computation has shifted to high performance computing like Grid Computing and Cloud Computing. In Grid computing, grid server is responsible for managing the all resources like processor, memory and CPU cycles. Grids are basically networks that pool resources, CPU cycles, storage or data from many different nodes used to solve the complex or scientific problem. However in this case, security is a major concern. Even most grid security researches focus on user authentication, authorization and secure communication. This paper presents DDoS and Data Modification attack scenario and also provides the solution to prevent it. In case of data modification attack, it shows how easy to read/forward/modify the data exchanged between a cluster head node and computing nodes. Therefore this paper provides the solution to protect the grid computing environment against Data Modification and DDOS attack.
Бесплатно
![Pseudo Random Ternary Sequence and Its Autocorrelation Property Over Finite Field Pseudo Random Ternary Sequence and Its Autocorrelation Property Over Finite Field](/file/thumb/15011897/pseudo-random-ternary-sequence-and-its-autocorrelation-property-over-finite-field.png)
Pseudo Random Ternary Sequence and Its Autocorrelation Property Over Finite Field
Статья научная
In this paper, the authors have proposed an innovative approach for generating a pseudo random ternary sequence by using a primitive polynomial, trace function, and Legendre symbol over odd characteristics field. Let p be an odd prime number, FP be an odd characteristic prime field, and m be the degree of the primitive polynomial f(x) Let w be its zero and a primitive element in Fpm* In the beginning, a primitive polynomial f(x) generates maximum length vector sequence, then the trace function Tr(.) is used to map an element of the extension field (Fpm) to an element of the prime field Fp then non-zero scalar A∈Fp is added to the trace value, and finally the Legendre symbol (a/p) is utilized to map the scalars into ternary sequence having the values, {0,1,and -1} By applying the new parameter A the period of the sequence is extended to its maximum value that is n=pm-1 Hence, our proposed sequence has some parameters such as p,m,and A This paper mathematically explains the properties of the proposed ternary sequence such as period and autocorrelation. Additionally, these properties are also justified based on some experimental results.
Бесплатно
![Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review](/file/thumb/15011282/public-vs-private-vs-hybrid-vs-communitycloud-computing-a-critical-review.png)
Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review
Статья научная
These days cloud computing is booming like no other technology. Every organization whether it's small, mid-sized or big, wants to adapt this cutting edge technology for its business. As cloud technology becomes immensely popular among these businesses, the question arises: Which cloud model to consider for your business? There are four types of cloud models available in the market: Public, Private, Hybrid and Community. This review paper answers the question, which model would be most beneficial for your business. All the four models are defined, discussed and compared with the benefits and pitfalls, thus giving you a clear idea, which model to adopt for your organization.
Бесплатно