AIRCC

Displaying 1-40 of 273 results

  • White Papers // Apr 2014

    Genetic-Fuzzy Process Metric Measurement System for an Operating System

    Operating System (OS) is the most essential software of the computer system, deprived of it; the computer system is totally useless. It is the frontier for assessing relevant computer resources. It performance greatly enhances user overall objective across the system. Related literatures have try in different methods and techniques to...

    Provided By AIRCC

  • White Papers // Apr 2014

    Performance Evaluation of Transaction Processing in Mobile Data Base Systems

    Specific characteristics of mobile environments make traditional transaction management techniques no longer appropriate. This is due the fact that the ACID properties of transactions are not simply followed, in particular the consistency property. Thus, transaction management models adopting weaker form of consistency are needed and these models can now tolerate...

    Provided By AIRCC

  • White Papers // Apr 2014

    Design an Efficient Big Data Analytic Architecture for Retrieval of Data Based on Web Server in Cloud Environment

    Cloud has been a computational and storage solution for many data centric organizations. The problem today those organizations are facing from the cloud is in data searching in an efficient manner. A framework is required to distribute the work of searching and fetching from thousands of computers. The data in...

    Provided By AIRCC

  • White Papers // Apr 2014

    Query Optimization in OODBMS: Identifying Subquery for Query Management

    In this paper the authors approach for query optimization in object databases, which uses query decomposition and cached query results to improve execution a query. Issues that are focused here is fast retrieval and high reuse of cached queries, decompose query into sub query, decomposition of complex queries into smaller...

    Provided By AIRCC

  • White Papers // Apr 2014

    Modeling a Geo-Spatial Database for Managing Travelers' Demand

    The geo-spatial database is a new technology in database systems which allow storing, retrieving and maintaining the spatial data. In this paper, the authors seek to design and implement a geo-spatial database for managing the traveler's demand with the aid of open-source tools and object-relational database package. The building of...

    Provided By AIRCC

  • White Papers // Mar 2014

    Enhancing the Impregnability of Linux Servers

    Worldwide IT industry is experiencing a rapid shift towards Service Oriented Architecture (SOA). As a response to the current trend, all the IT firms are adopting business models such as cloud based services which rely on reliable and highly available server platforms. Linux servers are known to be highly secure....

    Provided By AIRCC

  • White Papers // Mar 2014

    Prediction of Quality Features in Iberian Ham by Applying Data Mining on Data From MRI and Computer Vision Techniques

    In this paper the authors aim to predict quality features of Iberian hams by using non-destructive methods of analysis and data mining. Iberian hams were analyzed by Magnetic Resonance Imaging (MRI) and Computer Vision Techniques (CVT) throughout their ripening process and physico-chemical parameters from them were also measured. The obtained...

    Provided By AIRCC

  • White Papers // Mar 2014

    Accurate Time Series Classification Using Shapelets

    Time series data are sequences of values measured over time. One of the most recent approaches to classification of time series data is to find shapelets within a data set. Time series shapelets are time series subsequences which represent a class. In order to compare two time series sequences, existing...

    Provided By AIRCC

  • White Papers // Feb 2014

    Comparison of Document Management Systems by Meta Modeling and Workforce Centric Tuning Measures

    Document management software are used widely for office paper management and related workflows. However, they have some differences from a flexibility perspective for the needs of workers. Moreover, they also differentiate in their underlying conceptual design. In this paper, a set (eight) of widely used document management systems are chosen...

    Provided By AIRCC

  • White Papers // Feb 2014

    Survey of Network Anomaly Detection Using Markov Chain

    Recently an internet threat has been increased. The authors' motive is detect the intrusion in the network in concise. The real time issue such as DoS attack in banking, companies, industries and organization have been increased significantly IDS has been used in both server and host side. The major challenge...

    Provided By AIRCC

  • White Papers // Feb 2014

    Different Applications of Programmable Logic Controller (PLC)

    Early Programming Logic Control (PLC) was designed to replace relay logic systems. These PLCs were programmed in \"Ladder Logic\", which strongly resembles a schematic diagram of relay logic. Programming logic control has several features like protection from the open area conditions such dust, heat and cold. PLC also has the...

    Provided By AIRCC

  • White Papers // Feb 2014

    Security & Privacy Issues of Cloud & Grid Computing Networks

    Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking technologies. Cloud computing has become a significant technology in field of information technology. Security of confidential data is a very important area of concern as it can make way for very big problems if unauthorized...

    Provided By AIRCC

  • White Papers // Feb 2014

    A Spatial Data Model for Moving Object Databases

    Moving object databases will have significant role in geospatial information systems as they allow users to model continuous movements of entities in the databases and perform spatio-temporal analysis. For representing and querying moving objects, algebra with a comprehensive framework of user defined types together with a set of functions on...

    Provided By AIRCC

  • White Papers // Feb 2014

    Developing a New Architecture to Improve ITSM on Cloud Computing Environment

    Cloud computing is the fundamental change in technology at the moment. According to its many advantages such as on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, and measured service. Most organization are moved toward the cloud computing, since this environment is conceived service-oriented and many IT services...

    Provided By AIRCC

  • White Papers // Feb 2014

    Methodological Study of Opinion Mining and Sentiment Analysis Techniques

    Decision making both on individual and organizational level is always accompanied by the search of other's opinion on the same. With tremendous establishment of opinion rich resources like, reviews, forum discussions, blogs, micro-blogs, Twitter etc. provide a rich anthology of sentiments. This user generated content can serve as a benefaction...

    Provided By AIRCC

  • White Papers // Feb 2014

    A Comparative Survey Based on Processing Network Traffic Data Using Hadoop Pig and Typical Mapreduce

    Big data analysis has now become an integral part of many computational and statistical departments. Analysis of peta-byte scale of data is having an enhanced importance in the present day scenario. Big data manipulation is now considered as a key area of research in the field of data analytics and...

    Provided By AIRCC

  • White Papers // Jan 2014

    A Novel Steganographic Scheme Based on Hash Function Coupled With AES Encryption

    In the present scenario, the use of images increased extremely in the cyber world so that the authors can easily transfer data with the help of these images in a secured way. Image steganography becomes important in this manner. Steganography and cryptography are the two techniques that are often confused...

    Provided By AIRCC

  • White Papers // Jan 2014

    Cloud Computing and Security Issues in the Cloud

    Cloud computing has formed the conceptual and infrastructural basis for tomorrow's computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing...

    Provided By AIRCC

  • White Papers // Jan 2014

    Building a Collective-Experience Engine for Experience-Transfer Amongst Web Users

    The Web has had several evolutions of knowledge-expertise expression on the Web. In this paper the authors describe the Collective Experience Engine (CEE), a system for indexing experiential-knowledge about Web knowledge-sources (websites), and performing relative-experience calculations between participants of the CEE. The CEE provides an in-browser interface to query the...

    Provided By AIRCC

  • White Papers // Jan 2014

    Generating Data Warehouse Schema

    A data warehouse is an integrated set of data, derived basically from operational data to use in decision making strategy and business intelligence using OnLine Analytical Processing (OLAP) techniques. Most of the creation of data multidimensional data warehouses is done manually, but it is a very complex and takes a...

    Provided By AIRCC

  • White Papers // Dec 2013

    New Approaches With Chord in Efficient P2P Grid Resource Discovery

    Grid computing is a type of distributed computing which allows sharing of computer resources through Internet. It not only allows the users' to share files but also most of the software and hardware resources. An efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it supports...

    Provided By AIRCC

  • White Papers // Dec 2013

    Front End Data Cleaning And Transformation In Standard Printed Form Using Neural Models

    Front end of data collection and loading into database manually may cause potential errors in data sets and a very time consuming process. Scanning of a data document in the form of an image and recognition of corresponding information in that image can be considered as a possible solution of...

    Provided By AIRCC

  • White Papers // Dec 2013

    Score Based Deadline Constrained Workflow Scheduling Algorithm for Cloud Systems

    Cloud computing is the latest and emerging trend in information technology domain. It offers utility-based IT services to user over the Internet. Workflow scheduling is one of the major problems in cloud systems. A good scheduling algorithm must minimize the execution time and cost of workflow application along with QoS...

    Provided By AIRCC

  • White Papers // Dec 2013

    A Proficient 5C Approach to Boost The Security in the SaaS Model's Technical Architectural Components

    For anything that involves delivering hosted services over the internet is cloud computing. These services are classified as: IaaS, SaaS and PaaS. This paper focuses on SaaS security measures. SaaS is a cloud based productivity suite that helps the business people to connect and work from anywhere on any device....

    Provided By AIRCC

  • White Papers // Dec 2013

    Ontology Driven Knowledge Map for Enhancing Business Process Reengineering

    It has been a constant human desire to be dissatisfied with the status quo as there is always need to improve upon the way business is being done. As a result, business process reengineering is introduced into organization in order to overcome these challenges of inefficiencies and high running cost....

    Provided By AIRCC

  • White Papers // Nov 2013

    Behavioural Biometrics and Cognitive Security Authentication Comparison Study

    Behavioral biometrics is a scientific study with the primary purpose of identifying the authenticity of a user based on the way they interact with an authentication mechanism. While association based password authentication is a cognitive model of authentication system. The work done shows the implementation of keyboard latency technique for...

    Provided By AIRCC

  • White Papers // Nov 2013

    Novel Text Categorization by Amalgamation of Augmented K-Nearest Neighbourhoodclassification and K-Medoids Clustering

    Machine learning for text classification is the underpinning of document cataloging, news filtering, document steering and exemplification. In text mining realm, effective feature selection is significant to make the learning task more accurate and competent. One of the traditional lazy text classifier k-Nearest Neighborhood (kNN) has a major pitfall in...

    Provided By AIRCC

  • White Papers // Nov 2013

    Analysis & Prediction of Sales Data in Sap-ERP System Using Clustering Algorithms

    Clustering is an important data mining technique where the authors will be interested in maximizing intra-cluster distance and also minimizing inter-cluster distance. They have utilized clustering techniques for detecting deviation in product sales and also to identify and compare sales over a particular period of time. Clustering is suited to...

    Provided By AIRCC

  • White Papers // Nov 2013

    Improving Data Transmission in the Vanet Using Multi-Criteria Decision Making Method Based on Fuzzy Logic

    In vehicular ad-hoc networks the packets are sent using multi-hop methods and the receiving limit of a message is gradually extended, but the exponential increment of the number of nodes re-broadcasting a message results in broadcast storm problem in data broadcasting in this case. Some characteristics like high speed of...

    Provided By AIRCC

  • White Papers // Nov 2013

    Cloud Computing Technology for Egovernment Architecture

    The evolution of cloud computing has had a significant effect on the people lives and it has brought many benefits. Cloud computing is a style of computing which is formed from the aggregation and development of technologies such as grid computing distributed computing, parallel computing and service-oriented architecture and its...

    Provided By AIRCC

  • White Papers // Oct 2013

    Survey on Caching and Replication Algorithm for Content Distribution in Peer to Peer Networks

    In this paper, the authors focus on caching and replication algorithm for content distribution in peer to peer networks. Caching and replication is a key strategy for improve the reliability, availability, and performance in peer to peer networks. This paper gives a brief introduction to caching, replication and various algorithms...

    Provided By AIRCC

  • White Papers // Oct 2013

    A Security Model for Cloud Computing Based on Autonomous Biological Agents

    Besides many advantages which cloud computing create, there are different concerns such as security. In this paper, the conceptual model based on Biological Immune System (BIS) will be proposed in order to create security in cloud computing. BIS have several features such as distributed computing, self organizing, self-learning that are...

    Provided By AIRCC

  • White Papers // Oct 2013

    Cloud Computing Performance Evaluation: Issues and Challenges

    Cloud computing makes the dream of computing real as a tool and in the form of service. This internet - based on-going technology which has brought flexibility, capacity and power of processing has realized service-oriented idea and has created a new ecosystem in the computing world with its great power...

    Provided By AIRCC

  • White Papers // Oct 2013

    Network Traffic Adaptation for Cloud Games

    With the arrival of cloud technology, game accessibility and ubiquity have a bright future; games can be hosted in a centralize server and accessed through the Internet by a thin client on a wide variety of devices with modest capabilities: cloud gaming. However, current cloud gaming systems have very strong...

    Provided By AIRCC

  • White Papers // Sep 2013

    Text Classification for Authorship Attribution Analysis

    Authorship attribution mainly deals with undecided authorship of literary texts. Authorship attribution is useful in resolving issues like uncertain authorship, recognize authorship of unknown texts, spot plagiarism so on. Statistical methods can be used to set apart the approach of an author numerically. The basic methodologies that are made use...

    Provided By AIRCC

  • White Papers // Sep 2013

    Visualize Network Anomaly Detection by Using K-Means Clustering Algorithm

    Network Intrusion Detection System (NIDS) is one that scans the network activities in a computer environment, and detects the intrusions or attacks. Then, the system administrator may be alerted to the take the corrective actions. With the ever increasing amount of new attacks in today's world the amount of data...

    Provided By AIRCC

  • White Papers // Sep 2013

    A Comparative Study in Dynamic Job Scheduling Approaches in Grid Computing Environment

    Grid computing is one of the most interesting research areas for present and future computing strategy and methodology. The dramatic changes in the complexity of scientific applications and part of nonscientific applications increase the need for distributed systems in general and grid computing specifically. One of the main challenges in...

    Provided By AIRCC

  • White Papers // Sep 2013

    Column-Store Databases: Approaches and Optimization Techniques

    Database system storage technology is mainly composed by Column-Stores (CS) and Row-Stores (RS). Currently, the majority of popular database products use RS, i.e. to store each record's attributes together, such as Microsoft SQL Server, Oracle and so on. Column-Stores database stores data column-by-column. The need for Column-Stores database arose for...

    Provided By AIRCC

  • White Papers // Sep 2013

    Predicting Students' Performance Using ID3 and C4.5 Classification Algorithms

    An educational institution needs to have an approximate prior knowledge of enrolled students to predict their performance in future academics. This helps them to identify promising students and also provides them an opportunity to pay attention to and improve those who would probably get lower grades. As a solution, the...

    Provided By AIRCC

  • White Papers // Sep 2013

    Cloud Computing Challenges and Solutions

    Cloud computing is an emerging area of computer technology that benefits from the processing power and the computing resources of many connected, geographically distanced computers connected via Internet. Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet users requirements and applications. It can...

    Provided By AIRCC

  • White Papers // Aug 2013

    Securewall-A Framework for Finegrained Privacy Control in Online Social Networks

    Enormous popularity of Social Networking Sites has introduced a great number of privacy risks. Even the most popular of all the social networking sites have characterized access control policies in terms of explicit tracking of the interpersonal relationships between the subjects, objects and their inter relation. In this paper, the...

    Provided By AIRCC

  • White Papers // Jan 2014

    A Novel Steganographic Scheme Based on Hash Function Coupled With AES Encryption

    In the present scenario, the use of images increased extremely in the cyber world so that the authors can easily transfer data with the help of these images in a secured way. Image steganography becomes important in this manner. Steganography and cryptography are the two techniques that are often confused...

    Provided By AIRCC

  • White Papers // Nov 2013

    Behavioural Biometrics and Cognitive Security Authentication Comparison Study

    Behavioral biometrics is a scientific study with the primary purpose of identifying the authenticity of a user based on the way they interact with an authentication mechanism. While association based password authentication is a cognitive model of authentication system. The work done shows the implementation of keyboard latency technique for...

    Provided By AIRCC

  • White Papers // Jul 2013

    Effective Ways Cloud Computing Can Contribute to Education Success

    Cloud computing and education sounds ambiguous on the face of it. Naturally, it's because, very few individuals, publishers and users alike come from the education sector. In most cases, cloud computing is only associated with businesses and how they can leverage their efficiencies. Just to introduce how the cloud deserves...

    Provided By AIRCC

  • White Papers // Mar 2013

    RSA Signature: Behind the Scenes

    The idea of RSA is based on the belief that it is difficult to factor the number that is the product of two large prime numbers. Because of that it is necessary to develop the arithmetic of large numbers operations, as well as to encode the algorithm for number primality...

    Provided By AIRCC

  • White Papers // Sep 2013

    Text Classification for Authorship Attribution Analysis

    Authorship attribution mainly deals with undecided authorship of literary texts. Authorship attribution is useful in resolving issues like uncertain authorship, recognize authorship of unknown texts, spot plagiarism so on. Statistical methods can be used to set apart the approach of an author numerically. The basic methodologies that are made use...

    Provided By AIRCC

  • White Papers // May 2013

    A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systems

    Peer clustering is a key operation for fully distributed systems such as wireless ad hoc networks and unstructured Peer-to-Peer (P2P) systems. The objective of peer clustering is to reconfigure the structure of an overlay network in such a way that the specific peers becomes closer without increasing the total number...

    Provided By AIRCC

  • White Papers // Sep 2013

    Visualize Network Anomaly Detection by Using K-Means Clustering Algorithm

    Network Intrusion Detection System (NIDS) is one that scans the network activities in a computer environment, and detects the intrusions or attacks. Then, the system administrator may be alerted to the take the corrective actions. With the ever increasing amount of new attacks in today's world the amount of data...

    Provided By AIRCC

  • White Papers // Nov 2010

    Fine Grain Parallel Construction of Neighbour-Joining Phylogenetic Trees With Reduced Redundancy Using Multithreading

    In biological research, scientists often need to use the information of the species to infer the evolutionary relationship among them. The evolutionary relationships are generally represented by a labeled binary tree, called the evolutionary tree (or phylogenetic tree). The phylogeny problem is computationally intensive, and thus it is suitable for...

    Provided By AIRCC

  • White Papers // Jan 2012

    Encryption of Data Using Elliptic Curve Over Finite Fields

    Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. Public-key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of Elliptic Curve Cryptographic (ECC) schemes including key exchange, encryption and...

    Provided By AIRCC

  • White Papers // Sep 2012

    On Fault Tolerance of Resources in Computational Grids

    Grid computing or computational grid is always a vast research field in academic, as well as in industry also. Computational grid provides resource sharing through multi-institutional virtual organizations for dynamic problem solving. Various heterogeneous resources of different administrative domain are virtually distributed through different network in computational grids. Thus any...

    Provided By AIRCC

  • White Papers // Dec 2012

    Grouping Based Job Scheduling Algorithm Using Priority Queue and Hybrid Algorithm in Grid Computing

    Grid computing enlarge with computing platform which is collection of heterogeneous computing resources connected by a network across dynamic and geographically dispersed organization to form a distributed high performance computing infrastructure. Grid computing solves the complex computing problems amongst multiple machines. Grid computing solves the large scale computational demands in...

    Provided By AIRCC

  • White Papers // Sep 2012

    Service Composition Design Pattern for Autonomic Computing Systems Using Association Rule Based Learning and Service-Oriented Architecture

    In this paper, the authors will compose the design patterns which will satisfy the properties of autonomic computing system: for the decision-making phase they will introduce case-based reasoning design pattern, and for reconfiguration phase they will introduce reactor design pattern. The most important proposal in their composite design pattern is...

    Provided By AIRCC

  • White Papers // Jun 2012

    A Novel Process Mapping Strategy in Clustered Environments

    Now-a-days, the numbers of available processing cores within computing nodes which are used in recent clustered environments are growing up with a rapid rate. Despite this trend, the number of available network interfaces in such computing nodes has almost been remained unchanged. This issue can lead to high usage of...

    Provided By AIRCC

  • White Papers // Sep 2012

    Memory Constrained Ant Colony System for Task Scheduling in Grid Computing

    Grid computing solves the increasing need of scientific, engineering and research problems. It combines the geographically distributed resources to solve a computation intensive problem which cannot be solved using a single resource. Resource sharing requires more optimized algorithmic structure, otherwise the response time is increased and the resource utilization is...

    Provided By AIRCC

  • White Papers // Dec 2013

    New Approaches With Chord in Efficient P2P Grid Resource Discovery

    Grid computing is a type of distributed computing which allows sharing of computer resources through Internet. It not only allows the users' to share files but also most of the software and hardware resources. An efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it supports...

    Provided By AIRCC

  • White Papers // Sep 2013

    A Comparative Study in Dynamic Job Scheduling Approaches in Grid Computing Environment

    Grid computing is one of the most interesting research areas for present and future computing strategy and methodology. The dramatic changes in the complexity of scientific applications and part of nonscientific applications increase the need for distributed systems in general and grid computing specifically. One of the main challenges in...

    Provided By AIRCC

  • White Papers // Dec 2012

    Dynamic Transparent General Purpose Process Migration for Linux

    Process migration refers to the act of transferring a process in the middle of its execution from one machine to another in a network. In this paper, the authors proposed a process migration framework for Linux OS. It is a multilayer architecture to confine every functionality independent section of the...

    Provided By AIRCC

  • White Papers // Dec 2012

    An Improved Constraint Based Resource Scheduling Approach Using Job Grouping Strategy in Grid Computing

    Grid computing is a collection of distributed resources interconnected by networks to provide a unified virtual computing resource view to the user. Grid computing has one important responsibility of resource management and techniques to allow the user to make optimal use of the job completion time and achieving good throughput....

    Provided By AIRCC

  • White Papers // Jan 2012

    A Study of BNP Parallel Task Scheduling Algorithms Metric's for Distributed Database System

    To solve number of complex scientific problems one must require elevated computation rate comparable to supercomputer. The modernization in latest technologies, communication and information lead to the development of distributed systems and parallel systems as an alternate to super computer for solving complex mathematical problems. Parallel processing is a method...

    Provided By AIRCC

  • White Papers // Mar 2012

    Heterogeneous Highly Parallel Implementation of Matrix Exponentiation Using GPU

    The vision of super computer at every desk can be realized by powerful and highly parallel CPUs or GPUs or APUs. Graphics processors once specialized for the graphics applications only, are now used for the highly computational intensive general purpose applications. Very expensive GFLOPs and TFLOP performance has become very...

    Provided By AIRCC

  • White Papers // Jan 2012

    Decentralized Load Balancing in Heterogeneous Systems Using Diffusion Approach

    The grid and cluster computing uses interconnected nodes to solve a problem in parallel in order to improve the response time of the system. Diffusive load balancing algorithms works well when the nodes in the system have the same processing capacity. But little attention was paid in diffusion load balancing...

    Provided By AIRCC

  • White Papers // Jan 2012

    Parallel Processing of Cluster by Map Reduce

    MapReduce is a parallel programming model and an associated implementation introduced by Google. In the programming model, a user specifies the computation by two functions, Map and Reduce. The underlying MapReduce library automatically parallelizes the computation, and handles complicated issues like data distribution, load balancing and fault tolerance. Massive input,...

    Provided By AIRCC

  • White Papers // May 2012

    Parallel String Matching Algorithm Using Grid

    Grid computing provides solutions for various complex problems. Implementing computing intensive applications such as string matching problem on grid is inevitable. In this paper, the authors present a new method for exact string matching based on grid computing. The function of the grid is to parallelize the string matching problem...

    Provided By AIRCC

  • White Papers // Sep 2012

    Familiarising Probabilistic Distance Clustering System of Evolving Awale Player

    In this paper, the authors developed a new technique based on Probabilistic Distance Clustering (PDC) for evolving Awale player and to compare its performance with that of a technique based on approximation of minimum and maximum operators with generalized mean-value operator. The basic theory of pd-clustering is based on the...

    Provided By AIRCC

  • White Papers // Dec 2012

    Optimal Task Partitioning Model in Distributed Heterogeneous Parallel Computing Environment

    Parallel computing systems compose task partitioning strategies in a true multiprocessing manner. Such systems share the algorithm and processing unit as computing resources which leads to highly inter process communications capabilities. The authors focus on real-time and non preemptive systems. A large variety of experiments have been conducted on the...

    Provided By AIRCC

  • White Papers // Jul 2013

    Pattern Generation for Complex Data Using Hybrid Mining

    Combined mining is a hybrid mining approach for mining informative patterns from single or multiple data-sources, multiple-features extraction and applying multiple-methods as per the requirements. Data mining applications often involve complex data like multiple heterogeneous data sources, different user preference and create decision-making actions. The complete useful information may not...

    Provided By AIRCC

  • White Papers // Sep 2013

    Column-Store Databases: Approaches and Optimization Techniques

    Database system storage technology is mainly composed by Column-Stores (CS) and Row-Stores (RS). Currently, the majority of popular database products use RS, i.e. to store each record's attributes together, such as Microsoft SQL Server, Oracle and so on. Column-Stores database stores data column-by-column. The need for Column-Stores database arose for...

    Provided By AIRCC

  • White Papers // Sep 2013

    Predicting Students' Performance Using ID3 and C4.5 Classification Algorithms

    An educational institution needs to have an approximate prior knowledge of enrolled students to predict their performance in future academics. This helps them to identify promising students and also provides them an opportunity to pay attention to and improve those who would probably get lower grades. As a solution, the...

    Provided By AIRCC

  • White Papers // Jun 2013

    An Encryption Algorithm to Evaluate Performance of V2V Communication in Vanet

    Wireless Communications are gaining more importance because they have opened new research fields by extending data networks connectivity to environments where wired solutions are difficult to install. The networks which are deployed in the areas where the needed infrastructure is not feasible to install are adhoc networks. Mobile Adhoc NETworks...

    Provided By AIRCC

  • White Papers // Jun 2013

    Gibbs Ensemble and Socketon - Essential Components for Creating Cloud Computing in Internet System

    In this paper, the authors first give a brief review of Gibbs ensemble theory, then present a detail analysis and discuss for its essence, characteristics, applicable conditions, applicable scope and application domain. In the second section, after analysis of the scale of Internet system and the structure, composition and essence...

    Provided By AIRCC

  • White Papers // Jun 2013

    Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier CAPTCHA

    Cloud computing is simply a metaphor for the internet. User does not required knowledge, control, and ownership in the computer infrastructure. User simply access or rent the software and paying only for what they use. Advantage of cloud computing is huge like Broad network access, Cost effectiveness, Rapid elasticity, Measured...

    Provided By AIRCC

  • White Papers // May 2013

    A Conceptual Metadata Framework for Spatial Data Warehouse

    Metadata represents the information about data to be stored in Data Warehouses. It is a mandatory element of Data Warehouse to build an efficient Data Warehouse. Metadata helps in data integration, lineage, data quality and populating transformed data into data warehouse. Spatial data warehouses are based on spatial data mostly...

    Provided By AIRCC

  • White Papers // Jul 2013

    Comparison Analysis of Web Usage Mining Using Pattern Recognition Techniques

    Web usage mining is the application of data mining techniques to better serve the needs of web-based applications on the web site. In this paper, the authors analyze the web usage mining by applying the pattern recognition techniques on web log data. Pattern recognition is defined as the act of...

    Provided By AIRCC

  • White Papers // Sep 2013

    Cloud Computing Challenges and Solutions

    Cloud computing is an emerging area of computer technology that benefits from the processing power and the computing resources of many connected, geographically distanced computers connected via Internet. Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet users requirements and applications. It can...

    Provided By AIRCC

  • White Papers // Sep 2013

    Security Analysis of Generalized Confidentialmodulation for Quantum Communication

    The authors propose a new evaluation method for 'Generalized Confidential Modulation (GCM)' for quantum communication. Confidential modulation realizes a secret communication by using secret information for modulation and noise in a channel. Y-00 is one of the famous methods of GCM for quantum communication. The existing evaluation methods for GCM...

    Provided By AIRCC

  • White Papers // Dec 2012

    A Synchronized Distributed Denial of Service Prevention System

    DDoS attack is a distributed source but coordinated Internet security threat that attackers either degrade or disrupt a shared service to legitimate users. It uses various methods to inflict damages on limited resources. It can be broadly classified as: flood and semantic (logic) attacks. DDoS attacking mechanisms vary from time...

    Provided By AIRCC

  • White Papers // Jul 2012

    Attacks on Web Based Software and Modelling Defence Mechanisms

    The software life cycle was in use to develop the good software. Now a day's the software development life cycle should incorporate the security features. Input validation attacks are one of the most wide spread forms of vulnerability on the web application. The authors' main intention is to focuses on...

    Provided By AIRCC

  • White Papers // Mar 2014

    Enhancing the Impregnability of Linux Servers

    Worldwide IT industry is experiencing a rapid shift towards Service Oriented Architecture (SOA). As a response to the current trend, all the IT firms are adopting business models such as cloud based services which rely on reliable and highly available server platforms. Linux servers are known to be highly secure....

    Provided By AIRCC

  • White Papers // Jan 2014

    Cloud Computing and Security Issues in the Cloud

    Cloud computing has formed the conceptual and infrastructural basis for tomorrow's computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing...

    Provided By AIRCC