Book Details


IT Skills Show & International Conference on Advancements in Computing Resources, (SSICACR-2017) 15 and 16 February 2017, Alagappa University, Karaikudi, Tamil Nadu, India. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format


A cell phone is a sort of hand-held PC advanced everywhere throughout the world. Each unit will be exploited over the frequent range that varies from one cell to the next, to avoid collision in each node. There are massive amount of information and difficult handling way incorporates the new set of arrangement. The nature of transmission service will be upgraded in self mitigation by combining massive information with flow control techniques. Then again, rather than assessing system having information as a fatigue, we introduce techniques with stake, and also to better improve administration quality. This article audits the grouping of huge information as packets and their classification are taken as input to the processing system, the arrangement are viewed over time for different info.


[1]Z. O. Wilcox, “Convergent encryption reconsidered,”2011.[Online].Available:

[2]S. Chow, P. A. Eisen, and H. Johnson, White-Box Cryptography and an AES Implementation, Cloak wares Corporation, Ottawa, Canada, Scientific report, 2003.

[3] Advanced Encryption Standard, FIPS PUB 197, 2001.

[4] Computer Networks and Internets, Douglas E. Comer. Published by Prentice Hall. ISBN 0- 13-239070-1. This book gives an excellent high-level description of networks and their interfaces.

[5] TCP/IP Illustrated, Volume 1, Stevens.

[6] CSCI-4220: Network Programming, Dave Hollinger, Rensselaer Polytechnic Institute.

[7] J. Daemen and V. Rijmen, AES Proposal: Rijndael, AES Algorithm Submission, September 3, 1999..

[8] J. Nechvatal, et. al., Report on the Development of the Advanced Encryption Standard (AES), National Institute of Standards and Technology.

[9] Pitla, Santosh K., Joe D. Luck, Jared Werner, Nannan Lin, and Scott A. Shearer. "In-field Fuel Use and Load States of Agricultural Field Machinery." Computers and Electronics in Agriculture 121 (2016): 290-300. Web.

[10] L. Popa, M. Budiu, et al. DryadInc: Reusing Work in Large-scale Computations.

[11] Marx, Samuel E., Joe D. Luck, Roger M. Hoy, Santosh K. Pitla, Erin E. Blankenship, and Matthew J. Darr. "Validation of Machine CAN Bus J1939 Fuel Rate Accuracy Using Nebraska Tractor Test Laboratory Fuel Rate Data." Computers and Electronics in Agriculture 118 (2015): 179-85. Web

[12] N. Polyzotis, S. Skiadopoulos, et al. Supporting Streaming Updates in an Active Data Warehouse. In ICDE, 2007

[13] M. Zaharia, A. Konwinski, et al. Improving MapReduce Performance in Heterogeneous Environments. In OSDI, 2008.

[14] Villalpando, Bautista, April, and Abran. „Performance analysis model for Big Data applications in cloud computing.? Journal of Cloud Computing 3.1 (2014): 1–20.

[15] Apache Kafka

[16] J. Kreps. Questioning the lambda architecture., 7 2014.

[17] N. Marz and J. Warren. Big Data: Principles and Best Practices of Scalable Real time Data Systems. Manning Publications Co., Greenwich, CT, USA, 1st edition, 2015.

[18] R. Ananthanarayanan, V. Basker, S. Das, A. Gupta, et al. Photon: Fault-tolerant and scalable joining of continuous data streams. In SIGMOD ?13, 2013.

[19] Manish Parashar and Salim Hariri. Autonomic computing: An overview. Unconventional Programming Paradigms, pages 247–259, 2005.

[20] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proc. EUROCRYPT, vol. 1592, Prague, Czech Republic, 1999, pp. 223–238.


Lambda architecture, Strom system, AES key and TCP process

  • Format Volume 5, Issue 1, No 18, 2017
  • Copyright All Rights Reserved ©2017
  • Year of Publication 2017
  • Author Dr. V. Sai Shanmuga Raja, B. Devikiruba
  • Reference IJCS-245
  • Page No 1541-1548

Copyright 2022 SK Research Group of Companies. All Rights Reserved.