Auricle Technologies

Displaying 1-40 of 131 results

  • White Papers // Sep 2014

    An Efficient FIS and RSA Based Signcryption Security Scheme

    In this paper, the authors overview signcryption security schemes and proposed an efficient signcryption technique which is based on RSA encryption and decryption technique. The data is first secured by RSA public, private and modules key and then the signcryption key is formed based on mixing of Float, Integer and...

    Provided By Auricle Technologies

  • White Papers // Sep 2014

    Analysis of Clustering Approaches for Data Mining In Large Data Sources

    A plethora of algorithms exist for clustering to discover actionable knowledge from large data sources. Given un-labeled data objects, clustering is an unsupervised learning to find natural groups of objects which are similar. Each cluster is a subset of objects that exhibit high similarity. Quality of clusters is high when...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Multiple Access System Based on ARM7 and 1-Wire Technology

    In a traditional 2-wire implementation, the microcontroller requires minimum two port pins for data and clock signaling to the two port slave device. 2-wire slave device also requires an additional VCC pin for device operation. 1-wire communication protocol is a simple serial signaling protocol combining data and power into single...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Multi Level Encryption Scheme for Transferring Secret Image

    As the rapid development of internet technology, security and privacy of data being transmitted has become the major issue. Transfer of data securely and reliably has become one of the challenges. Security issues should be considering because hackers may utilize weak link over communication network to steal information. Cryptography is...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Detecting Targeted Malicious Email Through Mail Client

    Sharing and storing of data in the web world is with the help of social networks. Messages are exchanged between hosts using the Simple Mail Transfer Protocol (SMTP). While the email messages are transporting between systems, SMTP communicates delivery parameters using a message envelope separate from the message (header and...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Iris Recognition System using Gabor Filter & Edge Detection

    Biometric identification is the recognition of an individual by means of their physical or behavioral characteristics. Iris recognition in past decade has become one of reliable & unique biometric identification. In this paper the various iris recognition method such as segmentation & normalization are applied on the eye image of...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Secretive Data Transactions Using Quantum Key in Wireless Networks

    Currently uses of wireless devices are increased rapidly. In real time environment, secret communication between two wireless devices plays a major role. Generally in wireless network evaluation of private key extraction, involves to extract d bits having very low entropy in Received Signal Strength (RSS). But it is not suitable...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    A Protected Single Sign-On Technique Using 2D Password in Distributed Computer Networks

    Single Sign-On (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, a new SSO scheme providing well-organized security argument failed to meet credential privacy and soundness of authentication. This paper is...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Load Balancing Algoritms in Cloud Computing Environment: A Review

    Cloud computing is an emerging internet based technology. Cloud is a platform providing pool of resources and virtualization. It is based on pay-as-you-go model. The numbers of users accessing the cloud are rising day-by-day. Generally clouds are based on data centers which are powerful to handle large number of users....

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Secure Transmission To Remote Cooperative Groups With Minimized Communication Overhead

    In wireless mesh networks there is a need to multicast to a remote cooperative group using encrypted transmission. The existing paradigms failed to provide better efficiency and security in these kind of transmissions. A major challenge in devising such a system involves in achieving efficient usage of bandwidth and reducing...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Selfish Attack Detection in Cognitive Ad-Hoc Network

    The wireless technologies have penetrated everyone's life in various ways in the recent past. So due to increase in the demand for the bandwidth in spectrum, as all the bandwidth allocation done is in static manner so there is scarcity of bandwidth in spectrum. So no bandwidth is left to...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Convergence of MLE to MVUE of Reliability for Exponential Class Software Reliability Models

    Software quality has become a major concern of all software manufacturers. One such measure of software quality is the reliability, which is the probability of failure-free operation of a software in a specified environment for a specified time. If T denotes the time to failure of any software, then, the...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    I/O Workload in Virtualized Data Center Using Hypervisor

    Cloud computing is gaining popularity as it's the way to virtualize the datacenter and increase flexibility in the use of computation resources. This virtual machine approach can dramatically improve the efficiency, power utilization and availability of costly hardware resources, such as CPU and memory. Virtualization in datacenter had been done...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    IMS Based IP Telephony Over MPLSNetwork

    Due to the fast growth of the internet, the present trend people request more applications over internet such as video calling and flash. VoIP (Voice over Internet Protocol) is an emerging technology for voice communication which deploys many techniques to produce a high-quality service. Signaling is one of the most...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Ant-Fuzzy Meta Heuristic Genetic Sensor Network System for Multi Sink Aggregated Data Transmission

    Wireless sensor network with the hierarchical organization of sensors aggregate the tasks into groups. The sensor nodes broadcast the aggregated data directly to the distant base station. Existing Mixed Integer Programming (MIP) formulation obtain the good solutions for multi-action processes but not effectual in developing the hybrid genetic algorithms with...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Performance Evaluation of Training Based Channel Estimation in MIMO-OFDM Wireless System

    In modern wireless communication systems, Multiple Input Multiple Output (MIMO) combined with Orthogonal Frequency Division Multiplexing (OFDM) can achieve reliable high data rate and better spectral efficiency. Channel estimation technique based on pilot arrangement for Multiple Input Multiple Output (MIMO) for Rayleigh fading channel is proposed in this paper. The...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Framework for Phishing Detection in Email under Heave Using Conceptual Similarity

    Today everything is available in online. Every day so many users start their online transactions. The main reason behind this is number of alternatives and best deals are available there. They can choose according to their taste with cost effective manner. This is one side of a coin. The other...

    Provided By Auricle Technologies

  • White Papers // Aug 2014

    Review on Analysis of LTE and Cognitive Radio Network using OFDM signal

    Long Term Evolution (LTE) and Cognitive Radio Network (CRN) are built to achieve high data rates with low latency and packet optimized system. Orthogonal Frequency Division Multiple access (OFDM) is adopted as the access technology for LTE in modern technology. OFDM provides several techniques and advantages for spectrum allocations to...

    Provided By Auricle Technologies

  • White Papers // Jun 2014

    Materialized View Creation for Query Optimization Using Database Client Engine

    Data warehouse and data centric environment is most important area now-a-days. The researcher required such technologies which reduce time complexity and space complexity. This paper introducing such technology which use cluster base approach to reduce time by clustering table column and table having same size. The common approach of creating...

    Provided By Auricle Technologies

  • White Papers // Jun 2014

    Verifying Data Integrity Using PDP Technique in Multi-Cloud Storage

    In cloud computing, one of the core design principles is dynamic scalability, which guarantees cloud storage service to handle growing amounts of application data in a flexible manner or to be readily enlarged. In this paper, the authors are going to say an efficient technique that describes how integrity is...

    Provided By Auricle Technologies

  • White Papers // Jun 2014

    Updating Streaming Data Ware House By Scalable Scheduling Using Multitrack Algorithm

    In this paper the authors deal with the update scheduling problem in streaming data warehouse, The proposed multitrack algorithm solves the problem of updating streaming data warehouse by scheduling the jobs where jobs corresponds to updates for tables as well as views. Those jobs load new data into tables, aim...

    Provided By Auricle Technologies

  • White Papers // Jun 2014

    Data Hiding in Color Image for Visual Information Security

    Visual cryptography is a special encryption technique to hide information in image in such a way that it can be decrypted by the human vision if the correct key image is used. Visual cryptography uses two transparent images one image contains random pixels and the other image contains the secret...

    Provided By Auricle Technologies

  • White Papers // Jun 2014

    Intranet Cloud Security

    Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services...

    Provided By Auricle Technologies

  • White Papers // Jun 2014

    Capturing and Analyzing Live Network Traffic in a Virtual Environment using Open Source IDS: Snort & Logging Alerts in MYSQL

    Network intrusion detection along with firewall provides an important layer of security for computer system or network. This paper describes a virtual network created using virtualization tool implemented with snort IDS to monitor traffic crossing the network. Snort is a freeware and open source NIDS tool which is basically a...

    Provided By Auricle Technologies

  • White Papers // Jun 2014

    Comparison of Clustering Techniques: PAM and SSM-PAM: Experiments and Test cases

    Clustering web usage data is useful to discover interesting sequential patterns related to user traversals, behavior and their characteristics, which helps for the improvement of better search engines and Web personalization. Clustering web sessions is to group them based on similarity and consists of minimizing the intra-cluster similarity and maximizing...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Enhanced Adaptive Acknowledgment in MANET'S with Clustering

    The mobility and scalability brought by wireless network made it possible in many applications. Mobile Ad-hoc NETwork (MANET) is one of the most important and unique applications. On the contrary to traditional network architecture, MANET does not require a fixed network infrastructure; every single node works as both a transmitter...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Mixed Pixel Clustering and Classification Techniques: A Review

    Remote sensor records the reflection factor of the pixels which leads to the confusion of the classification of pixels that are showing the more than one class. These pixels are known as mixed pixels. For example, in a multispectral image from a satellite, a pixel that response to the signal...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Faamac: Forensic Analysis of Android Mobile Applications using Cloud Computing

    Mobiles have gained widespread usage& in smart phones many interesting applications are made available through Google Play Android is one of the major Smartphone platform today. The explosive increase in mobile apps more and more threats migrate from traditional PC client to mobile device. Smartphone applications can steal users' private...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Linux Hardening

    In this paper, the authors focus on practical securing Linux production systems. It discusses basic Linux security requirements for systems that need to pass various audits in an enterprise environment. This paper also presents onto detect the vulnerabilities in the system by scanning configuration files and server files, to determine...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Comparative Study On Data Aggregation Techniques for Wireless Sensor Networks

    The Wireless Sensor Networks (WSN) is one of the emerging technologies in the field of wireless ad-hoc networks. It consists of several low cost and low power sensor nodes which are capable of sensing, processing and communicating the various environmental parameters. These sensor nodes are randomly and densely deployed in...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Collusion Avoidance in Fingerprinting Outsourced Relational Databases with Knowledge Preservation

    Large databases are mined to gain knowledge from them. Data is also mined to help decision makers to make efficient decisions. But not every organization which is collecting data can mine the data. So there arises need to handover this data to other mining expert organizations that can discover the...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Hamming Codes on SRAM Based FPGA for Space Applications

    In this paper, the authors discuss about the method for designing error tolerant systems in SRAM-based FPGAs. SRAM-based FPGAs are preferred in mission based critical space applications. But due to high radiation on the sensitive part of the circuits which introduces errors called Single Event Upset (SEU). Sometimes these types...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Improved Method of Cryptography for Privacy-assured Outsourcing of Image Reconstruction Service in Cloud

    To address various challenges related to large scale image data generation over clouds, recently the authors have studied the new approach called Outsourced Image Recovery Service (OIRS) architecture, which exploits different domain technologies and takes efficiency, security and design complexity into consideration from the very beginning of the service flow....

    Provided By Auricle Technologies

  • White Papers // May 2014

    16 Bit Carry Select Adder with Low Power and Area

    Carry select adder is a fast adder, which uses multiple narrow adders and results fast wide adders. Carry select adders have great scope by reducing area, power consumption and delay. The simple and efficient gate level modification helps to reduce the area and power of CSLA. In this paper the...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Design and Implementation of Efficient APRIORI Algorithm

    Association rule mining is one of the data mining tasks that are used for finding correlations between the transactions. Association rules are if/then statements that are used for finding relations between data in the database. Apriori algorithm is the classical algorithm used for association rule mining. In this paper, the...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Data Analysis of Students Marks with Descriptive Statistics

    Improving student's academic performance is not an easy task for the academic community of higher learning. Descriptive statistics is the discipline of quantitatively describing the main features of a collection of information, or the quantitative description itself. The authors will be collecting the marks of 100 students as population and...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Critical Analysis of Cryptography Methods Used for Secure Data Transmission

    Cryptography technologies provide best mechanism of protecting the information from unauthorized access without putting the business on risk, this paper focus on the concept of different cryptography method likewise hierarchical visual cryptography in this method expansion ratio is reduced to one ratio two from one ratio four. Another method is...

    Provided By Auricle Technologies

  • White Papers // May 2014

    Removal of Data Vulnerabilities Using SQL (Seqel)

    SQL injection attacks are one of the severe threats for web applications. SQL injection is a security vulnerability that occurs in the database layer of an application. SQL Injection is the act of passing SQL code into web applications, such attacks target interactive web applications that employ database services. By...

    Provided By Auricle Technologies

  • White Papers // Apr 2014

    Secure Data Transmission Using Wireless Data Transmission and Face Detection

    In this paper, the authors focus on the need of a flexible and low cost biometric security system. The natural choice for data transmission of the wireless sensor network is its flexibility. Swarm Intelligence (SI) is used to optimize routing in distributed time varying network. In this paper, while consuming...

    Provided By Auricle Technologies

  • White Papers // Apr 2014

    Data Security in Cloud Computing Using Separate Encryption/Decryption Cloud Service

    Usually users store data on internal storage and protect that data by installing firewalls. In cloud computing, the data will be stored in storage provided by service providers. Service provider must have a visible way to protect their user's data, especially to prevent the data from unauthorized access by insiders....

    Provided By Auricle Technologies

  • White Papers // Apr 2013

    Cloud Computing a CRM Service Based on Separate Encryption and Decryption Using Blowfish Algorithm

    Enterprises always store the data in the internal storage of the organization itself. Especially in a Customer Relationship management system all the data of the customers will be stored in the internal storage itself. In cloud computing, the data will be stored in storage provided by service providers. If a...

    Provided By Auricle Technologies

  • White Papers // Apr 2013

    Data Accountability in Cloud Using Reliable Log Files Forwarding

    Cloud computing is receiving a great deal of attention, both in publications and among users, from individuals at home to the government. The cloud makes it possible for the user to access their information from anywhere at any time. While a traditional computer setup requires them to be in the...

    Provided By Auricle Technologies

  • White Papers // Apr 2013

    Design of Reconfigurable Crossbar Switch for BiNoC Router

    This paper presents implementation of 10x10 Reconfigurable Crossbar Switch (RCS) architecture for Dynamic Self-Reconfigurable BiNoC Architecture for Network On Chip. Its main purpose is to increase the performance, flexibility. This paper presents a VHDL based cycle accurate register transfer level model for evaluating the, Power and Area of reconfigurable crossbar...

    Provided By Auricle Technologies

  • White Papers // Apr 2013

    Development of Advanced Smart and Secured System

    A smart system is designed to control the lighting system, fans and security in the industries. The authors all know sometimes forget to switch off the lights and fans before leaving the room. This system can control 8 units of lights and 6 units of fans every day. Besides, their...

    Provided By Auricle Technologies

  • White Papers // Apr 2013

    Arduino Based Wifi Enabled Wireless Speaker

    This paper is to create a system to wirelessly broadcast an audio signal from a computer to a set of speakers using Wi???Fi. This allows one to play music files from a computer and have the sound come out of any speakers that are in range of the wireless network....

    Provided By Auricle Technologies

  • White Papers // Apr 2013

    Implementation of Serial Communication Using UART With Configurable Baud Rate

    Today in real world the actual applications, usually needed only a few key features of UART. Specific interface chip will cause waste of resources and increased cost. Particularly in the field of electronic design, SOC technology is recently becoming increasingly mature. This situation results in the requirement of realizing the...

    Provided By Auricle Technologies

  • White Papers // Jan 2013

    Overview of Performance of Coding Techniques in Mobile WiMAX Based System

    In this paper, the authors present the review of the Convolution Coding (CC) and Convolutional Product Code (CPC) based on mobile WiMAX system. In coding techniques the number of symbols in the source encoded message is increased in a controlled manner in order to facilitate two basic objectives at the...

    Provided By Auricle Technologies

  • White Papers // Jan 2013

    Go SaaS, Go Green Green Computing Using Software as a Service

    Green computing means the study and practice of designing, manufacturing, using and disposing of computers, servers and associated subsystems efficiently and effectively with no impact on the environment. Power consumption is one of the best area where the authors found that Software as a Service (SaaS) is greener than on-premises....

    Provided By Auricle Technologies

  • White Papers // Jan 2013

    A Survey on Detection of Blackhole Attack Using AODV Protocol in MANET

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructureless network of mobile devices. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. AODV (Ad-hoc...

    Provided By Auricle Technologies

  • White Papers // Jan 2013

    I.t's Boon: "Implimentation of Wireless Sensor Networking" on "Local Tree Protection"

    Jitter is extremely important in PLL based systems. The effects of jitter range from not having any effect on system operation to rendering the system completely non-functional. Reducing Jitter and power supply is one way to help to improve the system performance. This review will concentrate on jitter and power...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Reducing Upload and Download Time on Cloud Using Content Distribution Algorithm

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and web services. Cloud services provide resources efficiently based on demand. Central of these lies in the establishment of an effective algorithm to Achieve Minimum Distribution Time (MDT). Achieving MDT is crucial for bulk-synchronous applications, when every client...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Designing of Wide Area Network With the Use of Frame Relay Concept in Real Time Environment: A Proposal

    These days inter-domain routing protocol, i.e., BGP (Border Gateway Protocol), is getting complicated day by day due to policy mis-configuration by individual autonomous systems. Existing configuration analysis techniques are either manual or tedious, or do not scale beyond a small number of nodes due to the state explosion problem. To...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    A Review on Cloud Computing Model

    Cloud computing is model of computing that use the internet for sharing of information, software and resources to computer and other devices upon demand. This enables the end user to access the cloud computing resource anytime from any platform such as cell phone, mobile computing platform or the desktop. The...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Cryptographic Method to Secure Ad-Hoc on Demand Distance Vector (AODV) Routing Protocol From Black Hole Attack

    Secure communication is more challenging task in Mobile Ad-hoc NETwork (MANET). Protocols are the common sets of rules and signals that are used to communicate over network. Ad-hoc On-Demand Distance Vector Routing (AODV) is an on-demand reactive routing protocol designed for operation of MANET. Black hole attack is an attack...

    Provided By Auricle Technologies

  • White Papers // Apr 2013

    SQL Injection Attacks and Prevention Techniques

    SQL injection attacks are a serious security threat to Web applications. They allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive information these database contain. Various researchers have proposed various methods to address the SQL injection problem. To address this problem, the...

    Provided By Auricle Technologies

  • White Papers // Apr 2013

    UMA (Unlicensed Mobile Access): A New Approach Towards Mobility

    The purpose of this paper is to describe the fixed-mobile convergence solution using Unlicensed Mobile Access (UMA) technology. This paper describes elements for UMA access and convergence solution and the evolution towards the IP based network. UMA technology offers an alternative to the cellular Radio Access Network (RAN), which uses...

    Provided By Auricle Technologies

  • White Papers // Apr 2013

    A Study of Zigbee Technology

    The zigbee communication is a communication technology to connect local wireless nodes and provides high stability and transfer rate due to data communication with low power. In the nodes away from coordinator in one PAN, the signal strength is weak causing the network a shortage of low performance and inefficient...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    A State of Art Concept in Contriving of Underwater Networks

    The underwater ocean environment is widely considered as one of the most difficult communications channels. Underwater acoustic networks have recently emerged as a new area of research in wireless networking. Underwater networks are generally formed by acoustically connected ocean-bottom sensors, underwater gateways and a surface station, which provides a link...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Comparative Analysis of MANET Reactive Protocols

    An ad-hoc network is a group of mobile nodes. In an ad-hoc network a mobile node can directly communicate with the other node that lies in its transmission range or it can forward its information to the other node that will act as an intermediate node and forwards the information...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Comparative Study Between the Generations of Mobile Communication 2G, 3G & 4G

    Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband access wherever they go, Out of 1.8 billion people who will have broadband by 2012, some two-thirds will be mobile broadband consumers - and the majority of these will be served by HSPA (High Speed...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Smart Homes-Based on Mobile IP

    Smart Home Using MIPv6 is the Integration of Technology and services for better quality of living. This paper provides a review of the recent Developments, Technology, Architecture, Application and future scope for Smart Homes with the tremendous help of MIPv6.The principles of MIPv6 are included for mobility on the design...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Review on NEXT Generation Technologies of Wireless Communication

    Cellular communication has brought in an unparallel revolution in the field of communication during the past two decades. The mobile communication industry growth has surpassed growth of all other fields. Even the people own country is not left behind. The number of mobile subscribers in the country rose to over...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Necessity to Secure Wireless Sensor Network

    Wireless sensor networks are often deployed in hostile and unattended environments. The nodes will be failure by fault, intrusion and battery exhaustion. Node-failure tolerance is an acceptable method to improve the networks lifetime. In this paper, two key problems for topology control are presented: first, how to get a node-failure...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Wireless Electricity Theft Detection System Using Zigbee Technology

    Wireless electricity theft detection system using ZIGBEE technology present an efficient and less costly way to adulterate the wireless technique used in this research paper. This wireless system is used to overcome the theft of electricity via bypassing the energy meter and hence it also controls the revenue losses and...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Battle Against Phishing

    Phishing is a model problem for usability concerns in privacy and security because both system designers and attackers battle in the user interface space. Careful analysis of the phishing problem promises to shed light on a wide range of security usability problems. In this paper, the authors examine the case...

    Provided By Auricle Technologies

  • White Papers // Jan 2013

    Design and FPGA Implementation of Channelizer & Frequency Hopping for Advanced SATCOM System

    Advanced satellite communication systems should be capable of preventing unauthorized access or exploitation of communication services by adversaries. This can be achieved by use of wideband multi-channel digital transceivers which employ channelizer to extract the channel of interest from digitized RF bands for further baseband processing. Various anti-jamming techniques like...

    Provided By Auricle Technologies

  • White Papers // Jan 2013

    Accuracy Extended Ensemble - A Brood Purposive Stream Data mining

    Data mining is to haul out knowledge from gigantic quantity of data. The storage, querying and mining of such data sets are highly computationally challenging tasks. Mining data streams is concerned with extracting knowledge structures represented in models and patterns in non stopping streams of information. The research in data...

    Provided By Auricle Technologies

  • White Papers // Jan 2013

    A High-Speed Tree-Based 64-Bit Binary Comparator

    The high-speed tree-based 64-bit binary comparator is proposed in this brief. Comparison is most basic arithmetic operation that determines if one number is greater than, equal to, or less than the other number. Comparator is most fundamental component that performs comparison operation. This brief presents comparison of modified and existing...

    Provided By Auricle Technologies

  • White Papers // Jan 2013

    Centric Model Assessment for Collaborative Data Mining

    Data mining is the task of discovering interesting patterns from large amounts of data. There are many data mining tasks, such as classification, clustering, association rule mining and sequential pattern mining. Sequential pattern mining finds sets of data items that occur together frequently in some sequences. Collaborative data mining refers...

    Provided By Auricle Technologies

  • White Papers // Jan 2013

    Database Security

    Ensuring the security of databases is a complex issue. The more complex the databases are the more complex the security measures that are to be applied are. Network and Internet connections to databases may complicate things even further. Also, each and every additional internal user that would be added can...

    Provided By Auricle Technologies

  • White Papers // Jul 2013

    Privacy Preserving Data Mining: Comparion of Three Groups and Four Groups Randomized Response Techniques

    Privacy and accuracy are the important issues in data mining when data is shared. A fruitful direction for future data mining research will be the development of techniques that incorporate privacy concerns. Most of the methods use random permutation techniques to mask the data, for preserving the privacy of sensitive...

    Provided By Auricle Technologies

  • White Papers // Jul 2013

    Fault Tolerance Model for Reliable Cloud Computing

    Cloud computing has emerged as a platform that grants users with direct yet shared access to remote computing resources and services. Cloud must provide services to many users at the same time; the scheduling strategy should be developed for multiple tasks. In cloud computing processing is done on remote computer...

    Provided By Auricle Technologies

  • White Papers // Jul 2013

    Data Mining - A Review and Description

    Data mining is a powerful and new technique with great potential. It converts the raw data into the useful information. Data mining is the process of extracting knowledge from data warehouses. To store databases, enterprises make data warehouses and data marts. Data warehouses and data marts contain large amounts of...

    Provided By Auricle Technologies

  • White Papers // Aug 2013

    Secure Database Access and Transfer Using Public Key Cryptography

    Now-a-days many transactions on internet are implemented by security mechanisms. So authentication plays a vital role in securing data, not only in a single process but with various transactions. Many security initiatives are defensive strategies - aimed at protecting the perimeter of the network. But these works may ignore a...

    Provided By Auricle Technologies

  • White Papers // Aug 2013

    Extraction of Page-Level Data for Efficient Webpage Indexing

    A commercial web page typically contains many information blocks. Apart from the main content blocks, it usually has such blocks as navigation panels, copyright and privacy notices, and advertisements (for business purposes and for easy user access). The authors call these blocks that are not the main content blocks of...

    Provided By Auricle Technologies

  • White Papers // Aug 2013

    Analyze Different approaches for IDS using KDD 99 Data Set

    The integrity, confidentiality, and availability of network security are one of the challenging issue and so as Intrusion Detection System (IDS). IDS are an essential component of the network to be secured. Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order...

    Provided By Auricle Technologies

  • White Papers // Sep 2013

    Comparison between RSA and Triple DES in Cloud Environment

    Cloud computing delivers infrastructure, platform, and software that are made available as subscription-based services in a pay-as-the user-go model to consumers. These services are referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) in industries. Today communication is an important...

    Provided By Auricle Technologies

  • White Papers // Sep 2013

    PID Controller of Speed and Torque of ServoMotor Using MATLAB

    In this paper the authors design a controller for servo motor in discrete-time systems. The experimental is used to obtain the transfer function to design the PID controller. The effectiveness of the design is validated using MATLAB/Simulink. This new design method gives them a simple and powerful way to design...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Implementation of Elliptic Curve Crypto Processor and Its Performance Analysis

    ECDSA stands for \"Elliptic Curve Digital Signature Algorithm\", it is used to create a digital signature of data (a file for example) in order to allow the users to verify its authenticity without compromising its security. This paper presents the architecture of finite field multiplication. The proposed multiplier is hybrid...

    Provided By Auricle Technologies

  • White Papers // Mar 2013

    Viral Marketing in Social Network Using Data Mining

    Data mining is a process of analyzing data from different perspectives and summarizing it into useful information. The proposed paper focus on clustering application which is \"Collaborative data mining\" which mines different subgroups from some networks in the form of graph such as a social network. In this paper using...

    Provided By Auricle Technologies