Data Base Management System is one of the growing fields in computing world. Grid computing, internet sharing, distributed computing, parallel processing and cloud are the areas store their huge amount of data in a DBMS to maintain the structure of the data. Memory management is one of the major portions in DBMS due to edit, delete, recover and commit operations used on the records. To improve the memory utilization efficiently, the redundant data should be eliminated accurately. In this paper, the redundant data is fetched by the Quick Search Bad Character (QSBC) function and intimate to the DB admin to remove the redundancy. QSBC function compares the entire data with patterns taken from index table created for all the data persisted in the DBMS to easy comparison of redundant (duplicate) data in the database. This experiment in examined in SQL server software on a university student database and performance is evaluated in terms of time and accuracy. The database is having 15000 students data involved in various activities.
Wireless spoofing attack is mainly masquerades the IP address and degrade the performance of the network. In Existing an approach to address the potential spoofing attacks employ cryptographic schemes and requires key dissemination, Protection, and maintenance mechanisms. Although the cryptographic authentication approaches are not always desirable because of their overhead requirements. In this paper, Discover the presence of spoofing attack based on network adapter. Based on support vector machine (SVM) to control and prevent the malicious attacks such as an access point (AP) and denial-of-service (DOS) attack quickly. In addition, we developed the cluster-based mechanisms to improve the accuracy of determining the position of multiple attacks using localization system. The techniques can test through two test beds using both an 802.11 (WiFi) network and an 802.15.4 (ZigBee) network in two real office buildings. Experimental results show that the proposed methods can achieve over 95 percent Hit Rate of discovering the number of attackers.
Keywords--Supportvector machine (SVM), Access point (AP), Denial of service (DOS).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.