Volume-3-Issue-1 (January 2015)

Energy Efficient Cloud Computing Network [Download]

With the rapid increase of computer use in education, there is an increasing concern about computer-related health problems. The lack of knowledge about healthy computer use and ergonomics cause computer-related health problems. Thus, it is important to train the computer users on healthy computer use. In this paper we discuss health and safety issues related to computer users. Extended work with computers can lead to muscular fatigue and discomfort, usually in the back, arms, shoulders and neck. As well, if the computer is used for prolonged periods in awkward postures, there is a risk of musculoskeletal injury (MSI). This risk increases as the intensity of computer work increases. Frequently, the source of muscular fatigue and discomfort is the operator's posture while working at the terminal, and this posture is due in turn to the layout of the computer workstation and the furniture provided. The specific tasks and the intensity of the work are also factors. Computer operators may experience visual as well as muscular fatigue and discomfort. Symptoms include eyestrain, burning eyes, blurred vision and headaches. The layout of the computer workstation can increase the visual demands on operators, as can lighting levels and glare. The guidelines in this paper discuss the factors affecting both the physical and the visual demands on people who work with computers. It addresses the layout of workstations, covering the relevant parts of the computer (keyboard, monitor, etc.) and related furniture and aids (chairs, desks, etc.). It also addresses lighting in the work environment and task design for computer work. Key Words: Computer, Ergonomics, RSI

Security Algorithms to tackle Security in Cloud Computing [Download]

Cloud computing is the buzzword today. It is a highly scalable and cost effective technology suitable for HPC, enterprise and Web applications. Cloud computing involves the delivery of computing services from a remote location through internet, similar to the way electricity, water, and other utilities are provided to most customers. However, just like a coin has two sides, cloud computing also has its cons. The increasing demand for this new technology has lead to high energy consumption which in turn resulted in high carbon emissions. This paper aims to highlight certain techniques which can enable cloud to be eco-friendly. Keywords: energy usage, virtualization, eco-friendly, datacenters.

Boosting Methods on Rarity Mininge [Download]

Boosting Methods on Rarity Mininge

An Overview of Software Reliability Models- A Scenario [Download]

Cloud computing provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications. This paper shows successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats and possible countermeasures. This paper show how to secure the cloud security, privacy and reliability when a third party is processing sensitive data. This paper discusses security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. This paper also tackles the important aspect of security concerned challenges which the researchers and authors are facing in the security of cloud computing. Keywords: Cloud Computing, Attacks, IaaS, PaaS, SaaS, Security, Threats.

Analyzing Intrusion Detection Using Neural Network [Download]

Charging mobile phones is becoming important task in our daily life. In hectic schedule sometimes we forget to do so. But without cell phones or we can say cell phones with no battery is unacceptable thing these days as we and our work depends a lot on mobile phones. It is difficult to carry battery chargers or any electronic gadget that can charge our mobile phone battery every time with us. As we know that the world is leading with the developments in technology. Today’s world requires the complete technology and for this purpose we are proposing ‘Wireless Charging of Mobile Phones ’. Keywords: Wireless charging, Inductive charging, Radio charging, Resonance charging, Microwave charging.

Load Balancing on Web-Server Systems- An Analysis [Download]

Internet traffic explosion has triggered great interest in distributed web server systems. Among various distributed web server architectures, the DNS-based distributed webserver system is a significant solution in terms of performance, scalability and availability. DNS(Domain Name Server) page caching, Random Early Detection Method and Load Buffer Range Method have significant effects on the load balance of distributed web server systems, due to the traffic skewness it causes. This paper examines the DNS based load balancing technique for web servers and also focuses on resolvance of addresses as well as DNS architecture. Keywords: DNS, Load balancing, Load buffer, Caching.

Data mining techniques to identify Credit Card Fraud [Download]

Data mining is the process of discovering interesting patterns and knowledge from large amounts of data and also known as knowledge discovery from data. Crime is defined as illegal and immoral activity. It is a sin against the society that is often prosecuted and punishable by the law. Crime is the behavior disorder that is an incorporated result of community, cost-effective and environment factors. Young people's development occurs within larger Family members, the school, the community, and cultural and sociological forces all influence students as they learn appropriate coping skills and behavior for dealing with their environment. The growing volume of crime data is the reason of concern about the future of national security. Children are the future of nation. The children who had deviant behavior are now in the correction centers will become the main destructors of nation. The main focus is to analyze the inconsistent and incomplete crime data by using data extraction and data preprocessing to make it efficient and accurate. Keywords: Data Mining, Crime pattern, Clustering, K-Means

Publication Fee

No Paper Processing & Publication Charges for Accepted Papers Presently.

Paper Submission

There is no deadline for paper submission. Authors are requested to send their unpublished manuscripts to: IJSSTeditor@gmail.com