Volume-2-Issue-1 (January 2014)

Using data mining clustering technique to Predict Criminal Behavio [Download]

Data mining is the process of discovering interesting patterns and knowledge from large amounts of data and also known as knowledge discovery from data. Crime is defined as illegal and immoral activity. It is a sin against the society that is often prosecuted and punishable by the law. Crime is the behavior disorder that is an incorporated result of community, cost-effective and environment factors. Young people's development occurs within larger Family members, the school, the community, and cultural and sociological forces all influence students as they learn appropriate coping skills and behavior for dealing with their environment. The growing volume of crime data is the reason of concern about the future of national security. Children are the future of nation. The children who had deviant behavior are now in the correction centers will become the main destructors of nation. The main focus is to analyze the inconsistent and incomplete crime data by using data extraction and data preprocessing to make it efficient and accurate. Keywords: Data Mining, Crime pattern, Clustering, K-Means

Realization of Healthy Computer Use and Computer Ergonomics [Download]

With the rapid increase of computer use in education, there is an increasing concern about computer-related health problems. The lack of knowledge about healthy computer use and ergonomics cause computer-related health problems. Thus, it is important to train the computer users on healthy computer use. In this paper we discuss health and safety issues related to computer users. Extended work with computers can lead to muscular fatigue and discomfort, usually in the back, arms, shoulders and neck. As well, if the computer is used for prolonged periods in awkward postures, there is a risk of musculoskeletal injury (MSI). This risk increases as the intensity of computer work increases. Frequently, the source of muscular fatigue and discomfort is the operator's posture while working at the terminal, and this posture is due in turn to the layout of the computer workstation and the furniture provided. The specific tasks and the intensity of the work are also factors. Computer operators may experience visual as well as muscular fatigue and discomfort. Symptoms include eyestrain, burning eyes, blurred vision and headaches. The layout of the computer workstation can increase the visual demands on operators, as can lighting levels and glare. The guidelines in this paper discuss the factors affecting both the physical and the visual demands on people who work with computers. It addresses the layout of workstations, covering the relevant parts of the computer (keyboard, monitor, etc.) and related furniture and aids (chairs, desks, etc.). It also addresses lighting in the work environment and task design for computer work. Key Words: Computer, Ergonomics, RSI

Cloud Computing and Information Assurance [Download]

Cloud Computing and Information Assurance

Threats and Security issues in Cloud as a Service [Download]

Cloud computing provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. This paper shows successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats and possible countermeasures. This paper show how to secure the cloud security, privacy and reliability when a third party is processing sensitive data. This paper discusses security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. This paper also tackles the important aspect of security concerned challenges which the researchers and authors are facing in the security of cloud computing. Keywords: Cloud Computing, Attacks, IaaS, PaaS, SaaS, Security, Threats.

Weighted Bounce Threshold to Detect Slow DDOS Attacks in Cloud [Download]

Cloud computing services provided over the Internet are prone to various types of attacks and DDOS attack is most prevalent. Nature of attack may be slow or fast. Early detection of such attacks can lead to minimization of the unauthorized utilization of resources on the target machine. If the DDOS attack is of HTTP(S) request flooding type then its footprints can be recorded in the web analytics modules. Although cloud service providers have inbuilt load balancing and scalability to absorb DDOS attacks but at the same time they have to maintain QoS and utilization threshold based on which the cloud user has bought the package for cloud services. Just by observing website’s traffic by utilizing remote java script units like Google analytics, DDOS attacks can be detected with the help of weighted bounce calculations and golden section method. In this proposed approach, the Golden section search algorithm is specified to calculate the exact threshold values to be used to detect slow DDOS attacks in cloud environment. Keywords: DDOS attacks, HTTP(s), Cloud, Intrusion detection, Threshold

Comparative Study of Wireless Charging Mobile Phone Techniques [Download]

Charging mobile phones is becoming important task in our daily life. In hectic schedule sometimes we forget to do so. But without cell phones or we can say cell phones with no battery is unacceptable thing these days as we and our work depends a lot on mobile phones. It is difficult to carry battery chargers or any electronic gadget that can charge our mobile phone battery every time with us. As we know that the world is leading with the developments in technology. Today’s world requires the complete technology and for this purpose we are proposing ‘Wireless Charging of Mobile Phones ’. Keywords: Wireless charging, Inductive charging, Radio charging, Resonance charging, Microwave charging.

An Approach to Load Balancing on Web-Server Systems [Download]

Internet traffic explosion has triggered great interest in distributed web server systems. Among various distributed web server architectures, the DNS-based distributed webserver system is a significant solution in terms of performance, scalability and availability. DNS(Domain Name Server) page caching, Random Early Detection Method and Load Buffer Range Method have significant effects on the load balance of distributed web server systems, due to the traffic skewness it causes. This paper examines the DNS based load balancing technique for web servers and also focuses on resolvance of addresses as well as DNS architecture. Keywords: DNS, Load balancing, Load buffer, Caching.

NEOCOGNITRON: Pattern Recognition in Neural Networks [Download]

It is based on recognition as well as based on compression for any type of input pattern. The Cognitron network is a self organizing multiple input units, with its satisfied area. A large pattern which can be divided into multiple cells is called correctable area for recognition. The network can be used in Neuro psychology for similar characteristics of biological neuron. The major drawback of this network is distribution i.e. noise produce by electrical signals. To overcome this problem, the new concept of new Cognitron was introduced. It is hierarchical network for visual pattern recognition. It is an extensive of Cognitron network for hand written characters. It can recognize pattern that are position shifted and distribution of shape. There are two types of cells used in network i.e. S-cell (simple) and C-cell (complex). S-CELL, The cell that trained suitably to respond a certain picture in previous layer is called S-cell. It is called simple cell because it does not require any shape movement but only used for creating multiple modules which. C-CELL, It is called complex cell because it requires movement of actual image into compressed form displays the previous cell technology. Sharing the weights in this manner means that all S cells are combining in an identical feature for their respective fields. Keywords: Electrons, visual learning technique, photoelectron, Feature extracting.

Techniques for establishing Eco-Friendly Clouds- A Review [Download]

Cloud computing is the buzzword today. It is a highly scalable and cost effective technology suitable for HPC, enterprise and Web applications. Cloud computing involves the delivery of computing services from a remote location through internet, similar to the way electricity, water, and other utilities are provided to most customers. However, just like a coin has two sides, cloud computing also has its cons. The increasing demand for this new technology has lead to high energy consumption which in turn resulted in high carbon emissions. This paper aims to highlight certain techniques which can enable cloud to be eco-friendly. Keywords: energy usage, virtualization, eco-friendly, datacenters.



















Publication Fee

No Paper Processing & Publication Charges for Accepted Papers Presently.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: IJSSTeditor@gmail.com

Copyright

COPYRIGHT © LYALLPUR KHALSA COLLEGE