Volume 1 Issue 1

1. An Efficient Cancer Classification Using Mid value K-means and Naïve Bayes
Author's Name: Dr. Uma Maheswari

Abstract—Cancer classification is very important in the field of bioinformatics for diagnosis of cancer cells. Accurate prediction of cancer is very important for providing better treatment and to avoid the additional cost associated with wrong therapy. In recent years for classifying the cancer numbers of methods have been exist. The main objective is to find the smallest set of genes by using machine learning algorithms. The proposed method initially uses Naive Bayes classifier with great flexibility. However, the Naive Bayes is not suitable for the classification of large datasets because of significant computational problems. The Naive Bayes combined with the mid k-means clustering (Km-Naive Bayes) is a fast algorithm developed to accelerate both the training and the prediction of Naive Bayes classifiers by using the cluster centers obtained from the k-means clustering. The new techniques namely weighted Mid K-means-Naive Bayes is implemented to improve accuracy and to reduce misclassification and noise arising from irrelevant genes. The proposed algorithm was evaluated with different classifier algorithms which were applied on the same database. The experimental results achieved the proposed Mid K-means - Naive Bayes classification accuracy has 88.8%.

2. Enhanced Dynamic Authorized Secured Protocol (EDASP) for Wireless Sensor Networks
Author's Name: Dr.J.R.Arunkumar

Abstract— In Wireless Sensor Networks arrange is the technique for transferring new code or modifying the reasonableness of existing code. For security reasons, each code update ought to be authenticated to ignore unauthenticated from mounting malignant code with in the Wireless Sensor Networks. Totally existing reinventing conventions depend on the incorporated technique wherein single the base station has the position to inductee rewrite the programming. On the other hand, it is required and some of the time required for different approved system clients to simultaneously and straightforwardly reinvent sensor nodes while excluding the base station, which is referenced to as disseminated reconstructing of program. The system vender can even allot distinctive reinventing benefits to various clients Very as of late, a novel ensured and appropriated reconstructing program convention named Enhanced Secure Dynamic Authorized Secured protocol (EDASP) has been proposed, which is the principal exertion of its sort. Alternately, right now, distinguish a trademark configuration deficiency in the client preprocessing period of EDASP and approve that it is defenseless to a pantomime assault by which an enemy can basically imitate any approved client to finish reinventing. Thusly, we propose a straightforward adjustment to fix the perceived security issue without losing any highlights of. The Node c Enhanced Dynamic Authorized Secured protocol order calculation is utilized to sort the sensor hub before transmitting the code picture. Every single client need to confirm the sensor in its benefit list before sending the code picture.

3. Authentication Scheme Based On Blow Fish Cryptography In Categorized Sensor Networks
Author's Name: Dr.M.Sundarrajan

Abstract—In categorized sensor network deployment, many applications uses different sensor nodes and communicate with sensor nodes. In WSN peer-to-peer sensor network consists of hundreds to several thousand sensor nodes connect locally with neighboring nodes and send data over the network. However, sensor networks meet challenges to provide security using Symmetric public key cryptosystem. Sensor networks are also vulnerable to several node attacks by an adversary. For this reason, message authentication schemes are required to prevent such node attacks from an attacker. This paper focuses on scalable Message authentication scheme, it is proposed based on Blue Fish Cryptography (BFC). The message authentication scheme proposed also provides source assurance of security.

4. Develope An Certificate Authority Based Encryption Cryptography Model For Mobile Applications In Cloud Computing
Author's Name: Dr.Mahalakshmi and Mr. S.Kalyanasundaran

Abstract—The backbone of this research is to design and developed an effective cloud environment for pretending and protection of portable client device information put away in the cloud. Portable gadgets, for example, advanced mobile phones or tablets that are fundamentally more restricted than PCs as far as memory, processors, secured operating system, and accessible system data transmission bandwidth because of that all information migrate in to cloud environment. A portable client may go about as an information owner will demand key from the cloud administrator, scrambles the information and afterward it transfers the information in the cloud. In the cloud secured encryption is finished. Certificate Authority Based Encryption (CABE) approach is utilized for security and adaptability. Frequent monitoring is accomplished for Privacy, Security, trustworthiness and accessibility.

5. Effective Reengineering Computing Model For Ethiopian Health Care Center
Author's Name: Dr.Rajasekar Sundaram

Abstract—The ordinary information get to control framework is to keep up the specific sharing composite Personal Health Information Records (PHIRs)in health center, operations from different health centers in cloud major research looks into in the present IT. A PHIR administration license a patient to making, overseeing, and controlling the individual wellbeing information in one spot through the web, which has made the extra room, recovery, and appropriation of the clinical data progressively effective. Uncommonly, every patient is secure the full control of clinical records and can impart the wellbeing information to an enormous scope of clients with social insurance donors and relatives. Because of the significant expense of building and keep up secured and specific server, numerous PHIR administrations are redistributed to make accessible by client from specialist organizations. Decentralized server farms the emission of CO2 is high and nature get spoiled and polluted by making reusable datacenters the data's or information's can shared through the PHIR's. By this we can keep away from the high emission of CO2, the adaptability; accessibility and similarity are increments according to Moore's law. To share the cutting edge data's from other server farm information with reusable asset and e-Health Care Service in ethiopian health center.

Open chat
How can we help you?
Powered by