AIRCC

Displaying 1-40 of 272 results

  • White Papers // Apr 2014

    Modeling a Geo-Spatial Database for Managing Travelers' Demand

    The geo-spatial database is a new technology in database systems which allow storing, retrieving and maintaining the spatial data. In this paper, the authors seek to design and implement a geo-spatial database for managing the traveler's demand with the aid of open-source tools and object-relational database package. The building of...

    Provided By AIRCC

  • White Papers // Apr 2014

    Query Optimization in OODBMS: Identifying Subquery for Query Management

    In this paper the authors approach for query optimization in object databases, which uses query decomposition and cached query results to improve execution a query. Issues that are focused here is fast retrieval and high reuse of cached queries, decompose query into sub query, decomposition of complex queries into smaller...

    Provided By AIRCC

  • White Papers // Apr 2014

    Performance Evaluation of Transaction Processing in Mobile Data Base Systems

    Specific characteristics of mobile environments make traditional transaction management techniques no longer appropriate. This is due the fact that the ACID properties of transactions are not simply followed, in particular the consistency property. Thus, transaction management models adopting weaker form of consistency are needed and these models can now tolerate...

    Provided By AIRCC

  • White Papers // Apr 2014

    Design an Efficient Big Data Analytic Architecture for Retrieval of Data Based on Web Server in Cloud Environment

    Cloud has been a computational and storage solution for many data centric organizations. The problem today those organizations are facing from the cloud is in data searching in an efficient manner. A framework is required to distribute the work of searching and fetching from thousands of computers. The data in...

    Provided By AIRCC

  • White Papers // Apr 2014

    Genetic-Fuzzy Process Metric Measurement System for an Operating System

    Operating System (OS) is the most essential software of the computer system, deprived of it; the computer system is totally useless. It is the frontier for assessing relevant computer resources. It performance greatly enhances user overall objective across the system. Related literatures have try in different methods and techniques to...

    Provided By AIRCC

  • White Papers // Mar 2014

    Enhancing the Impregnability of Linux Servers

    Worldwide IT industry is experiencing a rapid shift towards Service Oriented Architecture (SOA). As a response to the current trend, all the IT firms are adopting business models such as cloud based services which rely on reliable and highly available server platforms. Linux servers are known to be highly secure....

    Provided By AIRCC

  • White Papers // Mar 2014

    Prediction of Quality Features in Iberian Ham by Applying Data Mining on Data From MRI and Computer Vision Techniques

    In this paper the authors aim to predict quality features of Iberian hams by using non-destructive methods of analysis and data mining. Iberian hams were analyzed by Magnetic Resonance Imaging (MRI) and Computer Vision Techniques (CVT) throughout their ripening process and physico-chemical parameters from them were also measured. The obtained...

    Provided By AIRCC

  • White Papers // Mar 2014

    Accurate Time Series Classification Using Shapelets

    Time series data are sequences of values measured over time. One of the most recent approaches to classification of time series data is to find shapelets within a data set. Time series shapelets are time series subsequences which represent a class. In order to compare two time series sequences, existing...

    Provided By AIRCC

  • White Papers // Feb 2014

    A Comparative Survey Based on Processing Network Traffic Data Using Hadoop Pig and Typical Mapreduce

    Big data analysis has now become an integral part of many computational and statistical departments. Analysis of peta-byte scale of data is having an enhanced importance in the present day scenario. Big data manipulation is now considered as a key area of research in the field of data analytics and...

    Provided By AIRCC

  • White Papers // Feb 2014

    Comparison of Document Management Systems by Meta Modeling and Workforce Centric Tuning Measures

    Document management software are used widely for office paper management and related workflows. However, they have some differences from a flexibility perspective for the needs of workers. Moreover, they also differentiate in their underlying conceptual design. In this paper, a set (eight) of widely used document management systems are chosen...

    Provided By AIRCC

  • White Papers // Feb 2014

    A Spatial Data Model for Moving Object Databases

    Moving object databases will have significant role in geospatial information systems as they allow users to model continuous movements of entities in the databases and perform spatio-temporal analysis. For representing and querying moving objects, algebra with a comprehensive framework of user defined types together with a set of functions on...

    Provided By AIRCC

  • White Papers // Feb 2014

    Developing a New Architecture to Improve ITSM on Cloud Computing Environment

    Cloud computing is the fundamental change in technology at the moment. According to its many advantages such as on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, and measured service. Most organization are moved toward the cloud computing, since this environment is conceived service-oriented and many IT services...

    Provided By AIRCC

  • White Papers // Feb 2014

    Security & Privacy Issues of Cloud & Grid Computing Networks

    Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking technologies. Cloud computing has become a significant technology in field of information technology. Security of confidential data is a very important area of concern as it can make way for very big problems if unauthorized...

    Provided By AIRCC

  • White Papers // Feb 2014

    Different Applications of Programmable Logic Controller (PLC)

    Early Programming Logic Control (PLC) was designed to replace relay logic systems. These PLCs were programmed in \"Ladder Logic\", which strongly resembles a schematic diagram of relay logic. Programming logic control has several features like protection from the open area conditions such dust, heat and cold. PLC also has the...

    Provided By AIRCC

  • White Papers // Feb 2014

    Survey of Network Anomaly Detection Using Markov Chain

    Recently an internet threat has been increased. The authors' motive is detect the intrusion in the network in concise. The real time issue such as DoS attack in banking, companies, industries and organization have been increased significantly IDS has been used in both server and host side. The major challenge...

    Provided By AIRCC

  • White Papers // Feb 2014

    Methodological Study of Opinion Mining and Sentiment Analysis Techniques

    Decision making both on individual and organizational level is always accompanied by the search of other's opinion on the same. With tremendous establishment of opinion rich resources like, reviews, forum discussions, blogs, micro-blogs, Twitter etc. provide a rich anthology of sentiments. This user generated content can serve as a benefaction...

    Provided By AIRCC

  • White Papers // Jan 2014

    A Novel Steganographic Scheme Based on Hash Function Coupled With AES Encryption

    In the present scenario, the use of images increased extremely in the cyber world so that the authors can easily transfer data with the help of these images in a secured way. Image steganography becomes important in this manner. Steganography and cryptography are the two techniques that are often confused...

    Provided By AIRCC

  • White Papers // Jan 2014

    Cloud Computing and Security Issues in the Cloud

    Cloud computing has formed the conceptual and infrastructural basis for tomorrow's computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing...

    Provided By AIRCC

  • White Papers // Jan 2014

    Building a Collective-Experience Engine for Experience-Transfer Amongst Web Users

    The Web has had several evolutions of knowledge-expertise expression on the Web. In this paper the authors describe the Collective Experience Engine (CEE), a system for indexing experiential-knowledge about Web knowledge-sources (websites), and performing relative-experience calculations between participants of the CEE. The CEE provides an in-browser interface to query the...

    Provided By AIRCC

  • White Papers // Jan 2014

    Generating Data Warehouse Schema

    A data warehouse is an integrated set of data, derived basically from operational data to use in decision making strategy and business intelligence using OnLine Analytical Processing (OLAP) techniques. Most of the creation of data multidimensional data warehouses is done manually, but it is a very complex and takes a...

    Provided By AIRCC

  • White Papers // Dec 2013

    New Approaches With Chord in Efficient P2P Grid Resource Discovery

    Grid computing is a type of distributed computing which allows sharing of computer resources through Internet. It not only allows the users' to share files but also most of the software and hardware resources. An efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it supports...

    Provided By AIRCC

  • White Papers // Dec 2013

    A Proficient 5C Approach to Boost The Security in the SaaS Model's Technical Architectural Components

    For anything that involves delivering hosted services over the internet is cloud computing. These services are classified as: IaaS, SaaS and PaaS. This paper focuses on SaaS security measures. SaaS is a cloud based productivity suite that helps the business people to connect and work from anywhere on any device....

    Provided By AIRCC

  • White Papers // Dec 2013

    Score Based Deadline Constrained Workflow Scheduling Algorithm for Cloud Systems

    Cloud computing is the latest and emerging trend in information technology domain. It offers utility-based IT services to user over the Internet. Workflow scheduling is one of the major problems in cloud systems. A good scheduling algorithm must minimize the execution time and cost of workflow application along with QoS...

    Provided By AIRCC

  • White Papers // Dec 2013

    Ontology Driven Knowledge Map for Enhancing Business Process Reengineering

    It has been a constant human desire to be dissatisfied with the status quo as there is always need to improve upon the way business is being done. As a result, business process reengineering is introduced into organization in order to overcome these challenges of inefficiencies and high running cost....

    Provided By AIRCC

  • White Papers // Dec 2013

    Front End Data Cleaning And Transformation In Standard Printed Form Using Neural Models

    Front end of data collection and loading into database manually may cause potential errors in data sets and a very time consuming process. Scanning of a data document in the form of an image and recognition of corresponding information in that image can be considered as a possible solution of...

    Provided By AIRCC

  • White Papers // Nov 2013

    Behavioural Biometrics and Cognitive Security Authentication Comparison Study

    Behavioral biometrics is a scientific study with the primary purpose of identifying the authenticity of a user based on the way they interact with an authentication mechanism. While association based password authentication is a cognitive model of authentication system. The work done shows the implementation of keyboard latency technique for...

    Provided By AIRCC

  • White Papers // Nov 2013

    Cloud Computing Technology for Egovernment Architecture

    The evolution of cloud computing has had a significant effect on the people lives and it has brought many benefits. Cloud computing is a style of computing which is formed from the aggregation and development of technologies such as grid computing distributed computing, parallel computing and service-oriented architecture and its...

    Provided By AIRCC

  • White Papers // Nov 2013

    Improving Data Transmission in the Vanet Using Multi-Criteria Decision Making Method Based on Fuzzy Logic

    In vehicular ad-hoc networks the packets are sent using multi-hop methods and the receiving limit of a message is gradually extended, but the exponential increment of the number of nodes re-broadcasting a message results in broadcast storm problem in data broadcasting in this case. Some characteristics like high speed of...

    Provided By AIRCC

  • White Papers // Nov 2013

    Novel Text Categorization by Amalgamation of Augmented K-Nearest Neighbourhoodclassification and K-Medoids Clustering

    Machine learning for text classification is the underpinning of document cataloging, news filtering, document steering and exemplification. In text mining realm, effective feature selection is significant to make the learning task more accurate and competent. One of the traditional lazy text classifier k-Nearest Neighborhood (kNN) has a major pitfall in...

    Provided By AIRCC

  • White Papers // Nov 2013

    Analysis & Prediction of Sales Data in Sap-ERP System Using Clustering Algorithms

    Clustering is an important data mining technique where the authors will be interested in maximizing intra-cluster distance and also minimizing inter-cluster distance. They have utilized clustering techniques for detecting deviation in product sales and also to identify and compare sales over a particular period of time. Clustering is suited to...

    Provided By AIRCC

  • White Papers // Oct 2013

    Survey on Caching and Replication Algorithm for Content Distribution in Peer to Peer Networks

    In this paper, the authors focus on caching and replication algorithm for content distribution in peer to peer networks. Caching and replication is a key strategy for improve the reliability, availability, and performance in peer to peer networks. This paper gives a brief introduction to caching, replication and various algorithms...

    Provided By AIRCC

  • White Papers // Oct 2013

    Network Traffic Adaptation for Cloud Games

    With the arrival of cloud technology, game accessibility and ubiquity have a bright future; games can be hosted in a centralize server and accessed through the Internet by a thin client on a wide variety of devices with modest capabilities: cloud gaming. However, current cloud gaming systems have very strong...

    Provided By AIRCC

  • White Papers // Oct 2013

    A Security Model for Cloud Computing Based on Autonomous Biological Agents

    Besides many advantages which cloud computing create, there are different concerns such as security. In this paper, the conceptual model based on Biological Immune System (BIS) will be proposed in order to create security in cloud computing. BIS have several features such as distributed computing, self organizing, self-learning that are...

    Provided By AIRCC

  • White Papers // Oct 2013

    Cloud Computing Performance Evaluation: Issues and Challenges

    Cloud computing makes the dream of computing real as a tool and in the form of service. This internet - based on-going technology which has brought flexibility, capacity and power of processing has realized service-oriented idea and has created a new ecosystem in the computing world with its great power...

    Provided By AIRCC

  • White Papers // Sep 2013

    Predicting Students' Performance Using ID3 and C4.5 Classification Algorithms

    An educational institution needs to have an approximate prior knowledge of enrolled students to predict their performance in future academics. This helps them to identify promising students and also provides them an opportunity to pay attention to and improve those who would probably get lower grades. As a solution, the...

    Provided By AIRCC

  • White Papers // Sep 2013

    Column-Store Databases: Approaches and Optimization Techniques

    Database system storage technology is mainly composed by Column-Stores (CS) and Row-Stores (RS). Currently, the majority of popular database products use RS, i.e. to store each record's attributes together, such as Microsoft SQL Server, Oracle and so on. Column-Stores database stores data column-by-column. The need for Column-Stores database arose for...

    Provided By AIRCC

  • White Papers // Sep 2013

    Cloud Computing Challenges and Solutions

    Cloud computing is an emerging area of computer technology that benefits from the processing power and the computing resources of many connected, geographically distanced computers connected via Internet. Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet users requirements and applications. It can...

    Provided By AIRCC

  • White Papers // Sep 2013

    Security Analysis of Generalized Confidentialmodulation for Quantum Communication

    The authors propose a new evaluation method for 'Generalized Confidential Modulation (GCM)' for quantum communication. Confidential modulation realizes a secret communication by using secret information for modulation and noise in a channel. Y-00 is one of the famous methods of GCM for quantum communication. The existing evaluation methods for GCM...

    Provided By AIRCC

  • White Papers // Sep 2013

    Text Classification for Authorship Attribution Analysis

    Authorship attribution mainly deals with undecided authorship of literary texts. Authorship attribution is useful in resolving issues like uncertain authorship, recognize authorship of unknown texts, spot plagiarism so on. Statistical methods can be used to set apart the approach of an author numerically. The basic methodologies that are made use...

    Provided By AIRCC

  • White Papers // Sep 2013

    A Comparative Study in Dynamic Job Scheduling Approaches in Grid Computing Environment

    Grid computing is one of the most interesting research areas for present and future computing strategy and methodology. The dramatic changes in the complexity of scientific applications and part of nonscientific applications increase the need for distributed systems in general and grid computing specifically. One of the main challenges in...

    Provided By AIRCC