Amritsar is the largest and most important city in northern Punjab. Amritsar serves as a major commercial, cultural, and transportation hub with Golden Temple & Raja Sansi international airport. It lies about 25 km east of the border with Pakistan and gateway for travelers coming to India on the overland route from central Asia. The present study attempts to understand, detect and quantify the spatial pattern of Amritsar urban sprawl using Shannon’s entropy and multitemporal satellite images acquired for the period from 1972 to 2015. Shannon’s entropy has been used to model the city’s urban sprawl, trend and spatial change. The entropy values for the different grids were modeled and the interpolation function in ArcGIS is used to obtain an entropy surface for each acquired temporal image. The entropy surface index indicates the spatial pattern of the urban sprawl and facilitates to visual assess the entropy phenomenon in all the grids. The value of Shannon’s entropy index increased from (0.40) in year 1972 to (0.97) in year 2015, indicating more dispersed urban growth, an indication of urban sprawl. Results obtained from entropy indices help in understanding the sprawl patterns and dynamics among different grids and provide a visual comparison which facilitates the decision makers and city planners for measuring the urban sprawl required for mega cities.
{"title":"Geospatial Analysis of Urban Sprawl Patterns in Amritsar City, Punjab, India","authors":"M. Minakshi, Shivani Singh, B. Pateriya","doi":"10.5120/IJAIS2017451636","DOIUrl":"https://doi.org/10.5120/IJAIS2017451636","url":null,"abstract":"Amritsar is the largest and most important city in northern Punjab. Amritsar serves as a major commercial, cultural, and transportation hub with Golden Temple & Raja Sansi international airport. It lies about 25 km east of the border with Pakistan and gateway for travelers coming to India on the overland route from central Asia. The present study attempts to understand, detect and quantify the spatial pattern of Amritsar urban sprawl using Shannon’s entropy and multitemporal satellite images acquired for the period from 1972 to 2015. Shannon’s entropy has been used to model the city’s urban sprawl, trend and spatial change. The entropy values for the different grids were modeled and the interpolation function in ArcGIS is used to obtain an entropy surface for each acquired temporal image. The entropy surface index indicates the spatial pattern of the urban sprawl and facilitates to visual assess the entropy phenomenon in all the grids. The value of Shannon’s entropy index increased from (0.40) in year 1972 to (0.97) in year 2015, indicating more dispersed urban growth, an indication of urban sprawl. Results obtained from entropy indices help in understanding the sprawl patterns and dynamics among different grids and provide a visual comparison which facilitates the decision makers and city planners for measuring the urban sprawl required for mega cities.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"306 1","pages":"8-14"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73469593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Altuncu, F. K. Gülagiz, Fatma Selin Hangisi, S. Sahin
Image enhancement and image restoration methods are widely used in most of the recent image processing studies. The main purpose of image enhancement is to remove noise from the image albeit different kinds. Therefore, in every field where image processing methods are used, image enhancement methods are more or less needed. And dermatological images, in which mostly image quality is inadequate most of the time, are one of the primary fields where these techniques are needed. Dermatologists that work in this field carry out the recording of wound images via a digital dermoscopy device. Later they realize the decision-making process using the image processing techniques through software. And in this study, the comparison of different image preprocessing methods is carried out in order to remove the effects of lighting and to make the software used give more accurate decisions.
{"title":"Performance Analysis of Image Restoration Techniques for Dermoscopy Images","authors":"M. A. Altuncu, F. K. Gülagiz, Fatma Selin Hangisi, S. Sahin","doi":"10.5120/IJAIS2017451637","DOIUrl":"https://doi.org/10.5120/IJAIS2017451637","url":null,"abstract":"Image enhancement and image restoration methods are widely used in most of the recent image processing studies. The main purpose of image enhancement is to remove noise from the image albeit different kinds. Therefore, in every field where image processing methods are used, image enhancement methods are more or less needed. And dermatological images, in which mostly image quality is inadequate most of the time, are one of the primary fields where these techniques are needed. Dermatologists that work in this field carry out the recording of wound images via a digital dermoscopy device. Later they realize the decision-making process using the image processing techniques through software. And in this study, the comparison of different image preprocessing methods is carried out in order to remove the effects of lighting and to make the software used give more accurate decisions.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"7 1","pages":"15-19"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82092218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Facial Action Coding (FAC) is expected to apply the whole world. The solicitations are not controlled to media communications. FAC is a testing difficulty in computer vision and remains alarm security case, and a novel strategy for program FAC is guided to bargain nearby the issue. The principle trial here, head-case and non-unbending outward appearance conformities because of alterations invited by the brutal face decoupling to present as they are coupled to the non-direct pictures. One more trial is the way to proficiently request to empower affiliation to contemplate expression (or different facial components) is to misuse the data. Facial Expression(FE) picture succession is fleeting territory spatial region information directly rise, however moreover the advance is not known. Information considering the increase of appearance together nearby the photo participation information can more improve the presentation of acknowledgment. However, the active information supplied is practical, there how to capture this information dependably and powerfully concerning facing challenges. For instance, an FE arrangement typically, one or additional of the principle times of development and counterbalance beat. Temporary information and preparing with a specific end goal to capture and question transient groupings of identical information, to make the correspondence in the midst of different worldly periods request to be built up. Press can be encoded. In this work, another dynamic FE, hereditary and neural organize based way utilizing the half, and half method are made.
{"title":"Comprehensive Study of Facial Action Coding","authors":"A. Alomari","doi":"10.5120/IJAIS2017451643","DOIUrl":"https://doi.org/10.5120/IJAIS2017451643","url":null,"abstract":"Facial Action Coding (FAC) is expected to apply the whole world. The solicitations are not controlled to media communications. FAC is a testing difficulty in computer vision and remains alarm security case, and a novel strategy for program FAC is guided to bargain nearby the issue. The principle trial here, head-case and non-unbending outward appearance conformities because of alterations invited by the brutal face decoupling to present as they are coupled to the non-direct pictures. One more trial is the way to proficiently request to empower affiliation to contemplate expression (or different facial components) is to misuse the data. Facial Expression(FE) picture succession is fleeting territory spatial region information directly rise, however moreover the advance is not known. Information considering the increase of appearance together nearby the photo participation information can more improve the presentation of acknowledgment. However, the active information supplied is practical, there how to capture this information dependably and powerfully concerning facing challenges. For instance, an FE arrangement typically, one or additional of the principle times of development and counterbalance beat. Temporary information and preparing with a specific end goal to capture and question transient groupings of identical information, to make the correspondence in the midst of different worldly periods request to be built up. Press can be encoded. In this work, another dynamic FE, hereditary and neural organize based way utilizing the half, and half method are made.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"41 1","pages":"18-21"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87503473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. Vasanthakumar G. U., K. Sunithamma, P. D. Shenoy, K. Venugopal
Advances in Online Social Networks is creating huge data day in and out providing lot of opportunities to its users to express their interest and opinion. Due to the popularity and exposure of social networks, many intruders are using this platform for illegal purposes. Identifying such users is challenging and requires digging huge knowledge out of the data being flown in the social media. This work gives an insight to profile users in online social networks. User Profiles are established based on the behavioral patterns, correlations and activities of the user analyzed from the aggregated data using techniques like clustering, behavioral analysis, content analysis and face detection. Depending on application and purpose, the mechanism used in profiling users varies. Further study on other mechanisms used in profiling users is under the scope of future endeavors.
{"title":"An Overview on User Profiling in Online Social Networks","authors":"Dr. Vasanthakumar G. U., K. Sunithamma, P. D. Shenoy, K. Venugopal","doi":"10.5120/IJAIS2017451639","DOIUrl":"https://doi.org/10.5120/IJAIS2017451639","url":null,"abstract":"Advances in Online Social Networks is creating huge data day in and out providing lot of opportunities to its users to express their interest and opinion. Due to the popularity and exposure of social networks, many intruders are using this platform for illegal purposes. Identifying such users is challenging and requires digging huge knowledge out of the data being flown in the social media. This work gives an insight to profile users in online social networks. User Profiles are established based on the behavioral patterns, correlations and activities of the user analyzed from the aggregated data using techniques like clustering, behavioral analysis, content analysis and face detection. Depending on application and purpose, the mechanism used in profiling users varies. Further study on other mechanisms used in profiling users is under the scope of future endeavors.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"23 1","pages":"25-42"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84951439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Automatic Brain Tumor Detection and Segmentation using Hybrid Method","authors":"S. Sreedhanya, C. Pawar","doi":"10.5120/IJAIS2017451641","DOIUrl":"https://doi.org/10.5120/IJAIS2017451641","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"91 1","pages":"6-11"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77506502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Sakib, Raihan Ahmed, Tanvir Ahmed, F. Islam, Bijoy Das
Cloud computing is a broadly used technology which serves users with resources on specific demand enhancing manageability, minimizing the data management and operational cost. Basically, cloud allows users to store their valuable data on the cloud storage so the security of the data center and easy access are considered as focusable parts in cloud computing. In the study we spot light to a new approach of cloud computing where mobile storage is used to build the data center of cloud and easy access having a preferable security. We deliberate that it is possible to lower the cost if the data center is built using user's mobile storage so a 3-tier technology is proposed. Firstly, a layer is user's mobile devices, second layer is server with different virtual machines and last layer is again the user's mobile device which is used to build the data center of cloud (mobile-server-mobile). A mobile app implements the initial security and management issues. Users can oscillate data between first layer and third layer with the help of virtual machines that ensure secure transaction of data, reduction of power consumption, maintenance cost, bandwidth consumption and fast data sharing.
{"title":"A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization","authors":"N. Sakib, Raihan Ahmed, Tanvir Ahmed, F. Islam, Bijoy Das","doi":"10.5120/IJAIS2017451635","DOIUrl":"https://doi.org/10.5120/IJAIS2017451635","url":null,"abstract":"Cloud computing is a broadly used technology which serves users with resources on specific demand enhancing manageability, minimizing the data management and operational cost. Basically, cloud allows users to store their valuable data on the cloud storage so the security of the data center and easy access are considered as focusable parts in cloud computing. In the study we spot light to a new approach of cloud computing where mobile storage is used to build the data center of cloud and easy access having a preferable security. We deliberate that it is possible to lower the cost if the data center is built using user's mobile storage so a 3-tier technology is proposed. Firstly, a layer is user's mobile devices, second layer is server with different virtual machines and last layer is again the user's mobile device which is used to build the data center of cloud (mobile-server-mobile). A mobile app implements the initial security and management issues. Users can oscillate data between first layer and third layer with the help of virtual machines that ensure secure transaction of data, reduction of power consumption, maintenance cost, bandwidth consumption and fast data sharing.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"21 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81953650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The process of extracting fuzzy patterns from temporal datasets is a well known data mining problem. Weekly pattern is one such example where it reflects a pattern with some fuzzy time interval every week. This process involves two steps. Firstly, it finds frequent sets and secondly, it finds the association rules that occur in certain time intervals weekly. Most of the fuzzy patterns are concentrated as user defined. However, the probability of user not having prior knowledge of datasets being used in some applications is more. Thus, resulting in the loss of fuzziness related to the problem. The limitation of the natural language also bounds the user in specifying the same. This paper, proposes a method of extracting patterns that occur weekly in a particular fuzzy time frame and the fuzzy time frame is generated by the method itself. The efficacy of the method is backed by the experimental results
{"title":"The Weekly Mining of Fuzzy Patterns from Temporal Datasets","authors":"Husamuddin","doi":"10.5120/IJAIS2017451638","DOIUrl":"https://doi.org/10.5120/IJAIS2017451638","url":null,"abstract":"The process of extracting fuzzy patterns from temporal datasets is a well known data mining problem. Weekly pattern is one such example where it reflects a pattern with some fuzzy time interval every week. This process involves two steps. Firstly, it finds frequent sets and secondly, it finds the association rules that occur in certain time intervals weekly. Most of the fuzzy patterns are concentrated as user defined. However, the probability of user not having prior knowledge of datasets being used in some applications is more. Thus, resulting in the loss of fuzziness related to the problem. The limitation of the natural language also bounds the user in specifying the same. This paper, proposes a method of extracting patterns that occur weekly in a particular fuzzy time frame and the fuzzy time frame is generated by the method itself. The efficacy of the method is backed by the experimental results","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"15 1","pages":"22-24"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84016477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing is fast gaining significant ground as a solution to offer institutions with competitive advantage compared to the old traditional IT. Nevertheless, many institutions are still clenched to the traditional IT where legacy IT systems or applications are hosted in-house and hence administration of the systems or services is local or on premise. This has resulted in high IT expenditures on both hardware and software due to increased storage demands as well as investing on high skilled resources to administer the existing systems or applications which might not be viable in the long run. Despite the potential benefits that is associated with cloud computing which includes reduction of total costs of acquisition or ownership (TCO) of hardware, software and skilled resources, adoption level of cloud services is still very low in higher institutions of learning due to matters security especially trust issue which remains a major concern over cloud solutions. A case study was carried out in selected public and private universities to determine the reason for the low cloud uptake by the key stakeholders in higher institution of learning. An adoption strategy was recommended with reference to the resources, confidentiality, integrity and availability. The focus was on how key stakeholders view cloud services in the context of unique operational efficiency. General Terms Cloud Computing, Trust, Higher Education
{"title":"Using cloud computing in higher education: a strategy to address trust issues in adoption of cloud services in Kenyan Public and Private Universities","authors":"D. Onyango","doi":"10.5120/IJAIS2016451630","DOIUrl":"https://doi.org/10.5120/IJAIS2016451630","url":null,"abstract":"Cloud computing is fast gaining significant ground as a solution to offer institutions with competitive advantage compared to the old traditional IT. Nevertheless, many institutions are still clenched to the traditional IT where legacy IT systems or applications are hosted in-house and hence administration of the systems or services is local or on premise. This has resulted in high IT expenditures on both hardware and software due to increased storage demands as well as investing on high skilled resources to administer the existing systems or applications which might not be viable in the long run. Despite the potential benefits that is associated with cloud computing which includes reduction of total costs of acquisition or ownership (TCO) of hardware, software and skilled resources, adoption level of cloud services is still very low in higher institutions of learning due to matters security especially trust issue which remains a major concern over cloud solutions. A case study was carried out in selected public and private universities to determine the reason for the low cloud uptake by the key stakeholders in higher institution of learning. An adoption strategy was recommended with reference to the resources, confidentiality, integrity and availability. The focus was on how key stakeholders view cloud services in the context of unique operational efficiency. General Terms Cloud Computing, Trust, Higher Education","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"37 1","pages":"46-53"},"PeriodicalIF":0.0,"publicationDate":"2016-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88823149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A social network is a network of relationships and interactions among social entities such as individuals, organizations, and groups. Social simulations are capable of representing social systems and coupled socio-techno-natural systems in ways that other methodological approaches are not. Computer code in a well-chosen programming language or simulation system. The pivotal role that agent interaction plays in determining social patterns has been investigated by two leading sociologists, James S. Coleman and Raymond Bourdon. In the 1960s, Coleman significantly contributed to developing mathematical sociology, but also worked to extend equationbased models through computer simulation could motivate and agent-based turn in sociology. This approach would contribute to shifting away from social systems tradition and their large-scale problems of social speculation to problems which can be studied by systematic research. The purpose of this paper is to discuss the challenges facing social entities, and how social objects can be incorporated into computations as the basis for solving difficulties.
社会网络是个人、组织和群体等社会实体之间的关系和互动网络。社会模拟能够以其他方法方法无法做到的方式表示社会系统和耦合的社会-技术-自然系统。用精心选择的编程语言或模拟系统编写的计算机代码。两个主要的社会学家,James S. Coleman和Raymond Bourdon,已经研究了代理人相互作用在决定社会模式中所起的关键作用。在20世纪60年代,科尔曼对数学社会学的发展做出了重大贡献,但也致力于通过计算机模拟扩展基于方程的模型,从而推动社会学转向基于主体。这种方法将有助于从传统的社会系统及其大规模的社会投机问题转向可以通过系统研究来研究的问题。本文的目的是讨论社会实体面临的挑战,以及如何将社会对象纳入计算中,作为解决困难的基础。
{"title":"In what way Interactions Amongst Social Entities can be Integrated into Computations as Basis for Unravelling Complications","authors":"Khalid A. Fakeeh","doi":"10.5120/ijais2016451627","DOIUrl":"https://doi.org/10.5120/ijais2016451627","url":null,"abstract":"A social network is a network of relationships and interactions among social entities such as individuals, organizations, and groups. Social simulations are capable of representing social systems and coupled socio-techno-natural systems in ways that other methodological approaches are not. Computer code in a well-chosen programming language or simulation system. The pivotal role that agent interaction plays in determining social patterns has been investigated by two leading sociologists, James S. Coleman and Raymond Bourdon. In the 1960s, Coleman significantly contributed to developing mathematical sociology, but also worked to extend equationbased models through computer simulation could motivate and agent-based turn in sociology. This approach would contribute to shifting away from social systems tradition and their large-scale problems of social speculation to problems which can be studied by systematic research. The purpose of this paper is to discuss the challenges facing social entities, and how social objects can be incorporated into computations as the basis for solving difficulties.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"10 1","pages":"22-24"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76017507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security is an illusion unless you are hacked. Attacks in the Cloud have more catastrophic and destructive impact on the organizations than the user might expect. As attacks are constantly evolving and making it difficult to defend. Most of the organization will try to check their devices in the cloud to protect against viruses with traditional security measures like antiviruses, or firewall thinking it secures across different attacks, but with a wide range of change in attack pattern organizations have exposed to significant operational and business consequences, not to mention public embarrassment. In this paper, we conducted the survey on DDOS (Distributed Denial of Service) attacks research work and analyzed prevention and detection methods used for DDOS attacks in the cloud. We found that there is a good amount of research scope in detecting and preventing slow client application layer attacks in the cloud.
安全只是一种幻觉,除非你被黑客入侵。云中的攻击对组织的灾难性和破坏性影响比用户预期的要大。由于攻击不断演变,使其难以防御。大多数组织将尝试检查他们在云中的设备,以使用传统的安全措施(如反病毒或防火墙)来防止病毒,认为它可以保护不同的攻击,但随着攻击模式的广泛变化,组织已经暴露在重大的运营和业务后果中,更不用说公开尴尬了。本文对DDOS (Distributed Denial of Service,分布式拒绝服务)攻击的研究工作进行了调研,分析了云环境下DDOS攻击的防范和检测方法。我们发现在云中检测和防止缓慢的客户端应用层攻击有很大的研究范围。
{"title":"An Overview of DDOS Attacks Detection and Prevention in the Cloud","authors":"Khalid A. Fakeeh","doi":"10.5120/IJAIS2016451628","DOIUrl":"https://doi.org/10.5120/IJAIS2016451628","url":null,"abstract":"Security is an illusion unless you are hacked. Attacks in the Cloud have more catastrophic and destructive impact on the organizations than the user might expect. As attacks are constantly evolving and making it difficult to defend. Most of the organization will try to check their devices in the cloud to protect against viruses with traditional security measures like antiviruses, or firewall thinking it secures across different attacks, but with a wide range of change in attack pattern organizations have exposed to significant operational and business consequences, not to mention public embarrassment. In this paper, we conducted the survey on DDOS (Distributed Denial of Service) attacks research work and analyzed prevention and detection methods used for DDOS attacks in the cloud. We found that there is a good amount of research scope in detecting and preventing slow client application layer attacks in the cloud.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"30 1","pages":"25-34"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83349663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}