Alagappa University

Displaying 1-25 of 25 results

  • White Papers // Mar 2014

    A New Hybrid Algorithm for Business Intelligence Recommender System

    Business Intelligence is a set of methods, process and technologies that transform raw data into meaningful and useful information. Recommender system is one of business intelligence system that is used to obtain knowledge to the active user for better decision making. Recommender systems apply data mining techniques to the problem...

    Provided By Alagappa University

  • White Papers // Sep 2013

    Classification Algorithm in Data mining: An Overview

    Data Mining is a technique used in various domains to give meaning to the available data Classification is a data mining (machine learning) technique used to predict group membership for data instances. In this paper, the authors present the basic classification techniques. Several major kinds of classification method including decision...

    Provided By Alagappa University

  • White Papers // Aug 2013

    Diagnosis for Dengue Fever Using Spatial Data Mining

    The research of spatial data is in its infancy stage and there is a need for an accurate method for rule mining. Association rule mining searches for interesting relationships among items in a given data set. This enable to extract pattern from spatial database using k-means algorithm which refers to...

    Provided By Alagappa University

  • White Papers // Jun 2013

    A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk

    Sharing, transferring, mining and publishing data are fundamental operations in day to day life. Preserving the privacy of individuals is essential one. Sensitive personal information must be protected when data are published. There are two kinds of risks namely attributing disclosure and identity disclosure that affects privacy of individuals whose...

    Provided By Alagappa University

  • White Papers // Apr 2013

    Privacy and Integrity Preserving Range Queries in Wireless Sensor Networks

    A two tiered sensor network architecture, where storage nodes act as an intermediate tier between sensor nodes and sink which is act as a receiver for storing data items and calculating queries. The author proposes beneficial techniques to save power consumption and memory space consumption and buildup efficient query processing....

    Provided By Alagappa University

  • White Papers // Apr 2013

    Clustering Algorithm for Spatial Data Mining: An Overview

    Spatial data mining practice for the extraction of useful information and knowledge from massive and complex spatial database. Most research in this area has focused on efficient clustering algorithm for spatial database to analyze the complexity. This paper introduces an active spatial data mining approach that extends the current spatial...

    Provided By Alagappa University

  • White Papers // Mar 2013

    Enhanced Performance of Search Engine With Multitype Feature Co-Selection of Fuzzy K-Means Clustering Algorithm

    Information world meet many confronts nowadays and one such, is data retrieval from a multidimensional and heterogeneous data set. Han & et al carried out a trail for the mentioned challenge. A novel feature co-selection for Web document clustering is proposed by them, which is called Multitype Features Co-selection for...

    Provided By Alagappa University

  • White Papers // Mar 2013

    Cloud Computing: Security Challenges & Encryption Practices

    Cloud computing is a new era of the modern world. Reasons for development of cloud computing are different people and different purpose depends upon the demand. The improvement of the cloud technology also increases the security issues twice. So the authors need to solve the security issues in the cloud...

    Provided By Alagappa University

  • White Papers // Feb 2013

    An Overview of Routing Protocols in Mobile Ad-Hoc Network

    In recent years mobile ad hoc networks have become very popular and lots of research is being done on different aspects of MANET. Mobile Ad-hoc NETworks (MANET) a system of mobile nodes (laptops, sensors, etc.) interfacing without the assistance of centralized infrastructure (access points, bridges, etc.). There are different aspects...

    Provided By Alagappa University

  • White Papers // Jan 2013

    Efficient Patterns Using Hidden Web Trajectory Concept

    Previous existing concepts of pattern discovery focus on background knowledge and ranking. These kinds of patterns are not gives that any kind of benefits in business models. Background knowledge based patterns are contains some kinds of fake objects present it. That's why these patterns are not show the quality. Previous...

    Provided By Alagappa University

  • White Papers // Oct 2012

    Software Security Risk Mitigation With Historical Information

    Engineering of secure software is increasingly becoming a challenge confronted by many software engineers and managers owing to the permeation of software into many areas. Every software project is fraught with risks and the principles pertaining to the management of these risks are being studied by researchers. Security risk is...

    Provided By Alagappa University

  • White Papers // Sep 2012

    Enhanced Performance of Search Engine with Multi-Type Feature Co-Selection for Clustering Algorithm

    Information retrieval is a science of gathering information from unstructured data, the online information source i.e., www. WWW contains data of heterogeneous types and of high dimension. Retrieving information from such database is a tedious work. Many researches are going on, to find a best optimal solution. A search engine...

    Provided By Alagappa University

  • White Papers // Jun 2012

    Extension of Playfair Cipher Using 16X16 Matrix

    The role of Cryptography in today's digital world is significant. It secures information mathematically by mangling message with key. The privacy of intended sender and receiver information is protected from eavesdropper. The objective of the paper is playfair cipher. The existing methods of playfair cipher are studied. The restrictions of...

    Provided By Alagappa University

  • White Papers // Apr 2012

    A Novel Adaptive Channel Allocation Scheme to Handle Handoffs

    Wireless networking is becoming an increasingly important and popular way of providing global information access to users on the move. One of the main challenges for seamless mobility is the availability of simple and robust handoff algorithms, which allow a mobile node to roam among heterogeneous wireless networks. In this...

    Provided By Alagappa University

  • White Papers // Mar 2012

    Efficient Utilization of Channels Using Dynamic Guard Channel Allocation With Channel Borrowing Strategy in Handoffs

    User mobility in wireless data networks is increasing because of technological advances and the desire for voice and multimedia applications. These applications, however, require fast handoffs between base stations to maintain the quality of the connections. In this paper, the authors describe the use of novel and efficient data structure...

    Provided By Alagappa University

  • White Papers // Jan 2012

    A Novel Encryption Approach in Database Security

    Database servers are the most important thing in company environment. They store client details, financial information, human resource details and all the data are should be kept as very secret. Database security concerns the use of a broad range of information security controls to protect databases potentially including the data,...

    Provided By Alagappa University

  • White Papers // Dec 2011

    Fault Detection and Test Minimization Methods for Combinational Circuits - A Survey

    Rapid increase in population increased the usage of digital components dramatically and their production. For profitable income, the cost of the finished product and time taken for marketing the product needs to be reduced. In this paper, the authors conducted extensive survey of methods developed earlier to detect faults and...

    Provided By Alagappa University

  • White Papers // Nov 2011

    An Effective Prevention of Attacks Using GI Time Frequency Algorithm Under DDOS

    With the tremendous growth of internet services, websites are becoming indispensable. When the number of users gets increased accessing the websites, the performance of the server gets down. Due to much burden on the server, the response time gets delayed. When the process becomes slow, the ratio of the users...

    Provided By Alagappa University

  • White Papers // Oct 2011

    Analysis of Algorithms for Handling Handoff in Wireless Mobile Network

    Personal Communication Network (PCN) is an emerging wireless network that promises many new services for the telecommunication industry. The proliferation of demands for extending wireless services to integrated services, which supports the transmission of data and multimedia information, has resulted in the need for broadband wireless systems that are able...

    Provided By Alagappa University

  • White Papers // Jul 2011

    Linear Network Fractional Routing

    A network is a finite directed acyclic graph with source messages from a fixed alphabet and message demands at sink nodes. Linear programming is an algorithm design method. It can be used when the solution to a problem can be viewed as the result of a sequence of decisions. The...

    Provided By Alagappa University

  • White Papers // Mar 2011

    Employing Reverse Polish Notation in Encryption

    Cryptosystem is one of the effective principles helpful to internet aspirants to send message safely to the respondents. This principle ensures reliability for the message to be sent over internet. The basic requisite of the method is transforming the original message into some other stream to hide the syntax and...

    Provided By Alagappa University

  • White Papers // Feb 2011

    FP-Growth Based New Normalization Technique for Subgraph Ranking

    The various problems in large volume of data area have been solved using frequent itemset discovery algorithms. As data mining techniques are being introduced and widely applied to non-traditional itemsets, existing approaches for finding frequent itemsets were out of date as they cannot satisfy the requirement of these domains. Hence,...

    Provided By Alagappa University

  • White Papers // Jan 2011

    An Efficient Cluster Based Approach for Multi-Source Multicast Routing Protocol in Mobile Ad Hoc Networks

    Mobile ad hoc networks are becoming an important concept of modern communication technologies and services. It provides some advantages to this communication world such as self-organizing and decentralization. In this paper, the authors are going to design a cluster-based multi source multicast routing protocol with new cluster head election, path...

    Provided By Alagappa University

  • White Papers // Nov 2010

    Ciphertext Policy Attribute Based Encryption With Anonymous Access Policy

    In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is sent along with the ciphertext. The authors propose a method in which the access policy need...

    Provided By Alagappa University

  • White Papers // Sep 2009

    Impact of Rushing Attack on Multicast in Mobile Ad Hoc Network

    A Mobile Ad hoc NETwork (MANETs) is a self-organizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. Nodes in a MANETs operate both as host as well as routers to forward packets...

    Provided By Alagappa University

  • White Papers // Sep 2012

    Enhanced Performance of Search Engine with Multi-Type Feature Co-Selection for Clustering Algorithm

    Information retrieval is a science of gathering information from unstructured data, the online information source i.e., www. WWW contains data of heterogeneous types and of high dimension. Retrieving information from such database is a tedious work. Many researches are going on, to find a best optimal solution. A search engine...

    Provided By Alagappa University

  • White Papers // Oct 2012

    Software Security Risk Mitigation With Historical Information

    Engineering of secure software is increasingly becoming a challenge confronted by many software engineers and managers owing to the permeation of software into many areas. Every software project is fraught with risks and the principles pertaining to the management of these risks are being studied by researchers. Security risk is...

    Provided By Alagappa University

  • White Papers // Jun 2012

    Extension of Playfair Cipher Using 16X16 Matrix

    The role of Cryptography in today's digital world is significant. It secures information mathematically by mangling message with key. The privacy of intended sender and receiver information is protected from eavesdropper. The objective of the paper is playfair cipher. The existing methods of playfair cipher are studied. The restrictions of...

    Provided By Alagappa University

  • White Papers // Mar 2013

    Enhanced Performance of Search Engine With Multitype Feature Co-Selection of Fuzzy K-Means Clustering Algorithm

    Information world meet many confronts nowadays and one such, is data retrieval from a multidimensional and heterogeneous data set. Han & et al carried out a trail for the mentioned challenge. A novel feature co-selection for Web document clustering is proposed by them, which is called Multitype Features Co-selection for...

    Provided By Alagappa University

  • White Papers // Mar 2013

    Cloud Computing: Security Challenges & Encryption Practices

    Cloud computing is a new era of the modern world. Reasons for development of cloud computing are different people and different purpose depends upon the demand. The improvement of the cloud technology also increases the security issues twice. So the authors need to solve the security issues in the cloud...

    Provided By Alagappa University

  • White Papers // Feb 2013

    An Overview of Routing Protocols in Mobile Ad-Hoc Network

    In recent years mobile ad hoc networks have become very popular and lots of research is being done on different aspects of MANET. Mobile Ad-hoc NETworks (MANET) a system of mobile nodes (laptops, sensors, etc.) interfacing without the assistance of centralized infrastructure (access points, bridges, etc.). There are different aspects...

    Provided By Alagappa University

  • White Papers // Apr 2013

    Privacy and Integrity Preserving Range Queries in Wireless Sensor Networks

    A two tiered sensor network architecture, where storage nodes act as an intermediate tier between sensor nodes and sink which is act as a receiver for storing data items and calculating queries. The author proposes beneficial techniques to save power consumption and memory space consumption and buildup efficient query processing....

    Provided By Alagappa University

  • White Papers // Jan 2013

    Efficient Patterns Using Hidden Web Trajectory Concept

    Previous existing concepts of pattern discovery focus on background knowledge and ranking. These kinds of patterns are not gives that any kind of benefits in business models. Background knowledge based patterns are contains some kinds of fake objects present it. That's why these patterns are not show the quality. Previous...

    Provided By Alagappa University

  • White Papers // Jun 2013

    A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk

    Sharing, transferring, mining and publishing data are fundamental operations in day to day life. Preserving the privacy of individuals is essential one. Sensitive personal information must be protected when data are published. There are two kinds of risks namely attributing disclosure and identity disclosure that affects privacy of individuals whose...

    Provided By Alagappa University

  • White Papers // Aug 2013

    Diagnosis for Dengue Fever Using Spatial Data Mining

    The research of spatial data is in its infancy stage and there is a need for an accurate method for rule mining. Association rule mining searches for interesting relationships among items in a given data set. This enable to extract pattern from spatial database using k-means algorithm which refers to...

    Provided By Alagappa University

  • White Papers // Sep 2013

    Classification Algorithm in Data mining: An Overview

    Data Mining is a technique used in various domains to give meaning to the available data Classification is a data mining (machine learning) technique used to predict group membership for data instances. In this paper, the authors present the basic classification techniques. Several major kinds of classification method including decision...

    Provided By Alagappa University

  • White Papers // Apr 2013

    Clustering Algorithm for Spatial Data Mining: An Overview

    Spatial data mining practice for the extraction of useful information and knowledge from massive and complex spatial database. Most research in this area has focused on efficient clustering algorithm for spatial database to analyze the complexity. This paper introduces an active spatial data mining approach that extends the current spatial...

    Provided By Alagappa University

  • White Papers // Mar 2014

    A New Hybrid Algorithm for Business Intelligence Recommender System

    Business Intelligence is a set of methods, process and technologies that transform raw data into meaningful and useful information. Recommender system is one of business intelligence system that is used to obtain knowledge to the active user for better decision making. Recommender systems apply data mining techniques to the problem...

    Provided By Alagappa University

  • White Papers // Nov 2010

    Ciphertext Policy Attribute Based Encryption With Anonymous Access Policy

    In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is sent along with the ciphertext. The authors propose a method in which the access policy need...

    Provided By Alagappa University

  • White Papers // Jan 2011

    An Efficient Cluster Based Approach for Multi-Source Multicast Routing Protocol in Mobile Ad Hoc Networks

    Mobile ad hoc networks are becoming an important concept of modern communication technologies and services. It provides some advantages to this communication world such as self-organizing and decentralization. In this paper, the authors are going to design a cluster-based multi source multicast routing protocol with new cluster head election, path...

    Provided By Alagappa University

  • White Papers // Mar 2011

    Employing Reverse Polish Notation in Encryption

    Cryptosystem is one of the effective principles helpful to internet aspirants to send message safely to the respondents. This principle ensures reliability for the message to be sent over internet. The basic requisite of the method is transforming the original message into some other stream to hide the syntax and...

    Provided By Alagappa University

  • White Papers // Feb 2011

    FP-Growth Based New Normalization Technique for Subgraph Ranking

    The various problems in large volume of data area have been solved using frequent itemset discovery algorithms. As data mining techniques are being introduced and widely applied to non-traditional itemsets, existing approaches for finding frequent itemsets were out of date as they cannot satisfy the requirement of these domains. Hence,...

    Provided By Alagappa University

  • White Papers // Sep 2009

    Impact of Rushing Attack on Multicast in Mobile Ad Hoc Network

    A Mobile Ad hoc NETwork (MANETs) is a self-organizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. Nodes in a MANETs operate both as host as well as routers to forward packets...

    Provided By Alagappa University

  • White Papers // Jul 2011

    Linear Network Fractional Routing

    A network is a finite directed acyclic graph with source messages from a fixed alphabet and message demands at sink nodes. Linear programming is an algorithm design method. It can be used when the solution to a problem can be viewed as the result of a sequence of decisions. The...

    Provided By Alagappa University

  • White Papers // Nov 2011

    An Effective Prevention of Attacks Using GI Time Frequency Algorithm Under DDOS

    With the tremendous growth of internet services, websites are becoming indispensable. When the number of users gets increased accessing the websites, the performance of the server gets down. Due to much burden on the server, the response time gets delayed. When the process becomes slow, the ratio of the users...

    Provided By Alagappa University

  • White Papers // Dec 2011

    Fault Detection and Test Minimization Methods for Combinational Circuits - A Survey

    Rapid increase in population increased the usage of digital components dramatically and their production. For profitable income, the cost of the finished product and time taken for marketing the product needs to be reduced. In this paper, the authors conducted extensive survey of methods developed earlier to detect faults and...

    Provided By Alagappa University

  • White Papers // Oct 2011

    Analysis of Algorithms for Handling Handoff in Wireless Mobile Network

    Personal Communication Network (PCN) is an emerging wireless network that promises many new services for the telecommunication industry. The proliferation of demands for extending wireless services to integrated services, which supports the transmission of data and multimedia information, has resulted in the need for broadband wireless systems that are able...

    Provided By Alagappa University

  • White Papers // Jan 2012

    A Novel Encryption Approach in Database Security

    Database servers are the most important thing in company environment. They store client details, financial information, human resource details and all the data are should be kept as very secret. Database security concerns the use of a broad range of information security controls to protect databases potentially including the data,...

    Provided By Alagappa University

  • White Papers // Apr 2012

    A Novel Adaptive Channel Allocation Scheme to Handle Handoffs

    Wireless networking is becoming an increasingly important and popular way of providing global information access to users on the move. One of the main challenges for seamless mobility is the availability of simple and robust handoff algorithms, which allow a mobile node to roam among heterogeneous wireless networks. In this...

    Provided By Alagappa University

  • White Papers // Mar 2012

    Efficient Utilization of Channels Using Dynamic Guard Channel Allocation With Channel Borrowing Strategy in Handoffs

    User mobility in wireless data networks is increasing because of technological advances and the desire for voice and multimedia applications. These applications, however, require fast handoffs between base stations to maintain the quality of the connections. In this paper, the authors describe the use of novel and efficient data structure...

    Provided By Alagappa University