Volume-9 ~ Issue-4
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Bridging Socially Enhanced Virtual Communities |
| Country | : | India |
| Authors | : | Venugopal Rao, R.V.Krishnaiah |
| : | 10.9790/0661-0940104 ![]() |
|
Abstract: As technologies required for collaborative computing grow, there are business collaborations among companies carrying out related business. The communication and interactions across the companies has become a common phenomenon. In order to create and sustain this kind of business collaborations, specialized methods or techniques are required. In this paper we propose concept of bridging socially enhanced virtual communities. It is achieved by discovering present relevant businesses and prospective business alliances by developing a semi-automated approach. The architecture of the proposed system is compromising of human activities and also automated activities and it is essentially a service oriented system. For the purpose of bringing the previously separated groups and also finding new relevant groups we introduced broker discovery concept that makes use of techniques and metrics pertaining to interactive mining. The empirical results revealed that the proposed system is effective when tested with test bed which is based on distributed technology such as web services.
Index Terms: Social interactions, interaction mining, broker discovery, business collaborations
[1] L. M. Camarinha-Matos and H. Afsarmanesh.Collaborative networks. In PROLAMAT, pages 26–40,2006.
[2] J. Kleinberg. The convergence of social and technological networks. Commun. ACM, 51(11):66–72,2008.
[3] M. Ford et al. Web Services Human Task (WS-HumanTask), Version 1.0., 2007.
[4] D. Schall, H.-L. Truong, and S. Dustdar. Unifying human and software services in web-scale collaborations. Internet Comp., 12(3):62–68, 2008.
[5] R. S. Burt. Structural holes and good ideas. American Journal of Sociology, 110(2):349–399, Sept. 2004.
[6] W. Tsai. Social capital, strategic relatedness, and the formation of intra-organizational strategic linkages. Strategic Management Journal, (21):925–939, 2000.
[7] J. Kleinberg, S. Suri, E. Tardos, and T. Wexler. Strategic network formation with structural holes.ACM Conference on Electronic Commerce, 7(3):1–4, 2008.
[8] D. Brabham. Crowd sourcing as a model for problem solving: an introduction and cases. Convergence, 14(1):75, 2008.
[9] D. Artz and Y. Gil. A survey of trust in computer science and the semantic web. J. Web Sem., 5(2):58–71, 2007.
[10] L. Mui, M. Mohtashemi, and A. Halberstadt. A computational model of trust and reputation for e-businesses. In HICSS, page 188, 2002.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Scrutinizing Unsolicited E-Mail And Revealing Zombies |
| Country | : | India |
| Authors | : | V.Annie, Mr. G. Sathishkumar. B.E, M.E, Ph.D.* |
| : | 10.9790/0661-0940509 ![]() |
|
Abstract: In this paper specialize in the detection of the compromised machines during a network that are concerned within the spamming activities. In this paper, considering the matter in unsought spam e-mail's wherever crucial information's are divided to assure data confidentiality and integrity. The replicas of divided shares are dynamically allotted to boost recital. Heuristic search minimizes the spam access in Zombies. During this paper, Network official examines unsought e-mail by mistreatment the heuristic search, and reportable to the tip user. Once checking the activities beside IP address, the unsought e-mail is blocked that are originated by Zombies. Index term-Zombies, spam, secure information, secret sharing, and heuristic.
[1] S. Areora, P. Raghavan, and S. Rao, "Approximation Schemes for Euclidean k-Medians and Related Problems," Proc. 30th ACM Symp. Theory of Computing (STOC), 1998.
[2] M. Baker, R. Buyya, and D. Laforenza, "Grids and Grid Technology for Wide-Area Distributed Computing," Software- Practice and Experience, 2002.
[3] A. Chervenak, E. Deelman, I. Foster, L. Guy, W. Hoschek, C. Kesselman, P. Kunszt, M. Ripeanu, B. Schwaretzkopf, H. Stockinger, and B. Tierney, "Giggle: A Framework for Constructing Scalable Replica Location.
[4] F. Li and M.-H. Hsieh. An Empirical Study of Clustering Behavior of Spammers and Group-based Anti-Spam Strategies. In Conference on Email and Anti-Spam, 2006.
[5] Daswani,N., Stoppelman, M., and the google click quality and security teams. The anatomy of clickbot.a. In HotBots'07.
[6] Postini Message Security and Management Update for October Reveals that Spam is Back with a Vengeance. http://postini.com/news events/pr/pr110606.php, 2006.
[7] A. Ramachandran, D. Dagon, and N. Feamster. Can DNSBased Blacklists Keep Up with Bots? In Conference on Email and Anti-Spam, 2006.
[8] A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proc. of Sigcomm, 2006.
[9] A. Ramachandran, N. Feamster, and D. Dagon. Revealing Botnet Membership Using DNSBL Counter-Intelligence. In 2nd Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), 2006.
[10] Route Views Project. http://www.routeviews.org.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The science and technology is developing day by day leading to expand and forcing to reshape our living standards. The main aspects leading to deployment of a wide array of wireless and mobile networks are advances in miniaturization, low power circuit design and development in radio access technologies and increase in user demand for high speed internet access. The varying wireless technologies are driving today's wireless networks to become heterogeneous, ie., the network comprised of two or more different access network technologies. Heterogeneous networks have created many challenges such as mobility management, handoff, resource management, location management, providing QoS, security and pricing. Switching between heterogeneous networks requires seamless vertical handoff. The selection of parameters plays an important role in the decision of vertical handoff. The parameters like bandwidth, signal strength, velocity, power consumption, throughput, cost, user preferences and network load are considered during vertical handoff. In this paper, the vertical handoff parameters of the existing work are critically ascertained and presented in a tabular format for identifying the important parameters. A dynamic, adaptive and efficient approach is required to implement the vertical handoff mechanism in next generation heterogeneous wireless networks to produce an effective service for the user by considering dynamic and non dynamic parameters.
Keywords: Heterogeneous networks, parameters, handoff
[1] E. Arun & R.S Moni, (June 2010) "A Novel Decision Scheme for Vertical Handoff in 4G Wireless Networks", GJCST Computing Classification, Page 28 Vol.10 Issue 5 Ver.1.0
[2] Ahmed H. Zahran and Ben Liang, (Feb 2010) "Performance Evaluation Framework for Vertical Handoff Algorithms in Heterogeneous Networks".
[3] Sung H. Kim and Yeong M. Jang, "Soft Qos-Based Vertical Handover Scheme for WLAN and WCDMA Networks using Dynamic Programming Approach".
[4] Dong Ma & Maode Ma,(April 2012) "A QoS Oriented Vertical Handoff Scheme for WiMAX/WLAN Overlay Networks", IEEE Transactions on Parallel and Distributed Systems, Vol 23, No 4.
[5] K. Radhika et al,( Oct 2011),"AHP and Group Decision Making for Access Network Selection in Multi-Homed Mobile Terminals", IJCSE , Vol. 3 No. 10.
[6] Manoj Sharma & Dr. R.K.Khola, "An Intelligent Approach for Handover Decision in Heterogeneous Wireless Environment", International Journal of Engineering (IJE), Volume (4): Issue (5).
[7] Mithun B Patil,( Oct 2011) "Vertical Handoff in Future Heterogenous 4G Network", IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10.
[8] Mohammad Rafiq, Seema Kumar, Nagaraj Kammar, Guru Prasad,Gopi Krishna S Garge, Anand SVR, Malati Hegde, "A Vertical Handoff Decision Scheme for End-to-End QoS in Heterogeneous Networks: An Implementation on a Mobile IP Testbed".
[9] Presila Israt, Namvi Chakma, and M. M. A. Hashem, (Dec 2009)" A Fuzzy Logic-Based Adaptive Handoff Management Protocol for Next-Generation Wireless Systems", Journal of Networks, Vol.4, No.10.
[10] Pramod Goyal, and S. K. Saxena, "A Dynamic Decision Model for Vertical Handoffs across Heterogeneous Wireless Networks". World Academy of Science, Engineering and Technology 41 2008.
