Bharathiar University

Displaying 1-40 of 40 results

  • White Papers // Oct 2013

    An Ensemble Classification Approach for Intrusion Detection

    Increased cyber attacks in various forms compel everyone to implement effective intrusion detection systems for protecting their information wealth. From last two decades, there has been extensive research going on in intrusion detection system development using various techniques. But, designing detection systems producing maximum accuracy with minimum false positive is...

    Provided By Bharathiar University

  • White Papers // Sep 2013

    Study and Analysis of Knowledge Acquisition Techniques for Acquiring Knowledge on Product Functionality

    This research is concerned with the study and analysis of knowledge acquisition techniques, detailed study on product functionality, comparison of various knowledge acquisition techniques and to select a knowledge acquisition method for acquiring knowledge on product functionality efficiently. This paper investigates the efficiency of the various knowledge acquisition techniques in...

    Provided By Bharathiar University

  • White Papers // Jun 2013

    The Role Of Cloud Computing In Sharing Of Information Resources Among Digital Libraries In New Digital Era

    The evolution of traditional library collections to digital or virtual collections has given new dimension. The Internet, Web environment and associated sophisticated tools have given a new dynamic role to play and serve the new information based society in better ways than previously. Because of the powerful features of Web...

    Provided By Bharathiar University

  • White Papers // May 2013

    Data Integrity Using Encryption in Cloud Computing

    Data integrity is an important phase in cloud computing. Since the previous couple of years the protocols that was evoked during this field has reached greater heights. Existing protocols with the assistance of a third-party auditor in an exceedingly previous paper, Sebe

    Provided By Bharathiar University

  • White Papers // May 2013

    A Cross Layer Design for Achieving High Throughput Using S-ODMRP in Wireless Mesh Networks

    Multicast is an efficient method for implementing group communication. Achieving high throughput in wireless mesh networks is a hard problem due to malicious behavior of nodes and interference among those nodes in local transmission. In this paper, the authors propose a cross layer design for S-ODMRP (Secure on Demand Multicast...

    Provided By Bharathiar University

  • White Papers // Mar 2013

    Fault Tolerance in Mobile Ad Hoc Network: A Survey

    Fault-Tolerance is an important design issue to construct a reliable mobile ad hoc network. Many types of faults may occur in mobile network such as link failure, node failure, misbehaving nodes, network failure, power and energy consumption etc. This paper mainly aims in surveying the research papers by combining them...

    Provided By Bharathiar University

  • White Papers // Feb 2013

    Analysis of Fault Tolerance Approaches in Dynamic Cloud Computing

    Cloud computing provide many service to the user. Now a day the user level is highly increased to utilize the services in cloud computing. In cloud computing the major problem area is fault tolerance. Many clients can request the server at a time make the server overloading cause fault. In...

    Provided By Bharathiar University

  • White Papers // Nov 2012

    A Framework: Cluster Detection and Multidimensional Visualization of Automated Data Mining Using Intelligent Agents

    Data Mining techniques plays a vital role like extraction of required knowledge, finding unsuspected information to make strategic decision in a novel way which in term understandable by domain experts. A generalized frame work is proposed by considering non - domain experts during mining process for better understanding, making better...

    Provided By Bharathiar University

  • White Papers // Sep 2012

    Tripartite Key Agreement Protocol Using Triple Decomposition Search Problem

    A key agreement protocol is a tool by which two parties can share a common key for their subsequent communication .Many cryptographic protocols are based on the hardness of integer factorization and discrete logarithm problem. Very few protocols are based on search problems in non - abelian groups. In this...

    Provided By Bharathiar University

  • White Papers // Aug 2012

    Agent Based Mechanism for Maintaining Cache Consistency in Mobile Environment

    Caching at the mobile client is prospective technique that can reduce the number of uplink requests, lighten the server load. However, Variable data size, data updates, limited client resource and frequent client disconnection make cache management a challenge. Object caching is often used to improve the performance of mobile application....

    Provided By Bharathiar University

  • White Papers // Aug 2012

    Adaptive Position Based Reliable Routing Protocol (APBRRP) for Mobile Ad Hoc Networks

    Routing packets in mobile ad hoc networks has been considered to a great extent, even though the hypothesis on full connectivity is generally not valid in a real time system which means that a practical routing protocol ought to handle intermittent connectivity and the absence of end-to-end connections. In this...

    Provided By Bharathiar University

  • White Papers // Jul 2012

    Power Aware Range-Based MAC Protocol for Scalable Mobile Ad Hoc Networks

    In mobile ad hoc networks, collision problem which is caused by the expansion of the interference range of the receiver node due to the controlled transmission power of the sender node is uniquely a tarnished problem. This paper employs physical and virtual carrier-sensing schemes to avoid the collision problem. The...

    Provided By Bharathiar University

  • White Papers // May 2012

    A New Approach to Enhance Security in MPLS Network

    As MultiProtocol Label Switching (MPLS) is becoming a more widespread technology for providing Virtual Private Network (VPN) services, MPLS architecture security is of increasing concern to Service Providers (SPs) and VPN customers. MPLS suffers from a number of security issues as soon as an attacker successfully penetrates the core. This...

    Provided By Bharathiar University

  • White Papers // Mar 2012

    Performance Analysis of Genetic CR Selection in Multicast Multirate Network

    This paper presents a performance analysis of different methods used to select the congestion representative over the genetic algorithm based Congestion Representative selection in a multicast multirate network. A huge volume of control traffic is introduced into the network, and the routers are heavily loaded because the entire rate control...

    Provided By Bharathiar University

  • White Papers // Jan 2012

    Data Quality Measurement on Categorical Data Using Genetic Algorithm

    Data quality on categorical attribute is a difficult problem that has not received as much attention as numerical counterpart. The authors' basic idea is to employ association rule for the purpose of data quality measurement. Strong rule generation is an important area of data mining. Association rule mining problems can...

    Provided By Bharathiar University

  • White Papers // Dec 2011

    Maximum Spanning Tree Model on Personalized Web Based Collaborative Learning in Web 3.0

    Web 3.0 is an evolving extension of the current web environment. Information in web 3.0 can be collaborated and communicated when queried. Web 3.0 architecture provides an excellent learning experience to the students. Web 3.0 is 3D, media centric and semantic. Web based learning has been on high in recent...

    Provided By Bharathiar University

  • White Papers // Sep 2011

    Peer to Peer Networks

    The combination of Scalable Video Coding and Peer-to-Peer networks is a potential area of innovation in terms of video streaming on the Internet. Applications for sharing files, such as BitTorrent, have been broadly developed and nowadays they cater for the majority of the Internet traffic, adding the need for the...

    Provided By Bharathiar University

  • White Papers // Aug 2011

    Encoding and Decoding Techniques for Distributed Data Storage Systems

    Dimensionality reduction is the conversion of high-dimensional data into a meaningful representation of reduced data. Preferably, the reduced representation has a dimensionality that corresponds to the essential dimensionality of the data. The essential dimensionality of data is the minimum number of parameters needed to account for the observed properties of...

    Provided By Bharathiar University

  • White Papers // Jul 2011

    Thread Based Cache Consistency Model for Mobile Environment

    In this paper, the authors propose a cache consistency maintenance scheme called Thread Based Cache Consistency Model (TBCCM), for mobile environment. It lies on the following four key features. Use of log at both server and mobile user's cache maintains data consistency. Use of Thread Agent (TA) at both client...

    Provided By Bharathiar University

  • White Papers // Jul 2011

    Multimodal Biometric Cryptosystem Involving Face, Fingerprint and Palm Vein

    The proposed scheme involves an idea of including three biometric traits of a person where in the sense even if one fails the other trait could be utilized for verification or identity. Moreover, the concept of cryptosystem is involved, where one of the biometric trait - the palm vein itself...

    Provided By Bharathiar University

  • White Papers // Jun 2011

    VEGAS: Better Performance Than Other TCP Congestion Control Algorithms on MANETs

    The wireless communication TCP/IP protocol is an important role in developing communication systems and which provides better and reliable communication capabilities in almost all kinds of networking environment. The wireless networking technology and the new kind of requirements in communication systems need some extensions to the original design of TCP...

    Provided By Bharathiar University

  • White Papers // Apr 2011

    A Novel Symmetrical Encryption Algorithm With High Security Based on Key Updating

    The hacking is the greatest problem in the Wireless Local Area Network (WLAN). Many algorithms like DES, 3DES, AES,CAST, UMARAM and RC6 have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. The authentication protocols have been used for...

    Provided By Bharathiar University

  • White Papers // Apr 2011

    A New Technique for Protecting Sensitive Data and Evaluating Clustering Performance

    Data mining researchers and policy makers have need of raw data collected from organizations and business companies for their analysis. Any transmission of data to third parties and the organizations outsourcing the authors' work should satisfy the privacy requirements in order to avoid the disclosure of sensitive information. In order...

    Provided By Bharathiar University

  • White Papers // Mar 2011

    A Survey on Recent Trends, Process and Development in Data Masking for Testing

    In today's information age, the data is an important asset of the organization so the security of the data is a vital role in the industry. In order to achieve the above aspect, the data masking is used. The data masking is mainly the data is replaced with realistic but...

    Provided By Bharathiar University

  • White Papers // Feb 2011

    Information Retrieval Using Xquery Processing Techniques

    In recent years, the extraction of data from XML documents is an important issue for XML research and development. Fuzzy processing techniques have been proposed for flexible querying to Native XML Databases. The authors propose the fuzzy XQuery processing techniques for Native XML database systems, where the weights of attributes...

    Provided By Bharathiar University

  • White Papers // Feb 2011

    An Evaluation of Two Position Based Hybrid Routing Algorithms Under Mobility Speed Over MANET

    Mobile Ad Hoc NETwork (MANET) is collection of wireless nodes forming temporary network without any infrastructure, ad-hoc networking is a computer communications concept. Here, each node participating in the network acts as host and a router and therefore must forward packets for other nodes. Researches in this area are mostly...

    Provided By Bharathiar University

  • White Papers // Feb 2011

    Biomining:-An Efficient Data Retrieval Tool for Bioinformatics to Avoid Redundant and Irrelevant Data Retrieval from Biological Databases

    Mining biological data is an emerging area of intersection between data mining and bioinformatics. Bioinformaticians have been working on the research and development of computational methodologies and tools for expanding the use of biological, medical, behavioral, or health-related data. Data mining researchers have been making substantial contribution to the development...

    Provided By Bharathiar University

  • White Papers // Jan 2011

    Detecting Redundancy in Biological Databases - An Efficient Approach

    Biological databases store data about molecular biological entities such as genes, proteins, diseases, etc. The main purpose of creating and maintaining such databases in commercial organizations is their importance in the process of drug discovery. As databases become more pervasive through the biological sciences, various data quality concerns are emerging....

    Provided By Bharathiar University

  • White Papers // Dec 2010

    A Secure Dynamic Authentication Scheme for Smart Card Based Networks

    Authentication is one of the essential security features in network communication. Authentication process ascertains the legitimacy of the communicating partners in communication. In authentication process, the originator of the communication and the respondent transacts some identification codes of each other prior to start of the message transaction. Several methods have...

    Provided By Bharathiar University

  • White Papers // Dec 2010

    Discussion on Improving Quality of Service through Available Bandwidth Estimation in Mobile Ad Hoc Networks

    The term bandwidth refers to the data rate that a network link or a network path can transfer. Bandwidth is one of the guarantee attribute to measure the performance of the network. Estimating accurate available bandwidth allows a node to make optimal decision before sending a packet in networks. It...

    Provided By Bharathiar University

  • White Papers // Dec 2010

    Optimizing on Demand Weight -Based Clustering Using Trust Model for Mobile Ad Hoc Networks

    Mobile ad hoc networks are growing in popularity due to the explosive growth of modern devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is essential to evaluate...

    Provided By Bharathiar University

  • White Papers // Nov 2010

    Bit Transformation Perturbative Masking Technique for Protecting Sensitive Information in Privacy Preserving Data Mining

    The goal of data mining is ascertaining novel and valuable knowledge from data. In many situations, the extracted knowledge is highly confidential and it needs sanitization before giving to data mining researchers and the public in order to address privacy concerns. There have been two types of privacy in data...

    Provided By Bharathiar University

  • White Papers // Nov 2010

    Data Transformation Technique for Protecting Private Information in Privacy Preserving Data Mining

    Data mining is the process of extracting patterns from data. Data mining is seen as an increasingly important tool by modern business to transform data into an informational advantage. Data Mining can be utilized in any organization that needs to find patterns or relationships in their data. A group of...

    Provided By Bharathiar University

  • White Papers // Oct 2010

    Defending Denial of Service: State Overload Attacks

    In a Denial-of-Service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting one's computer and its network connection, or the computers and network of the sites they are trying to use, an attacker may be able to prevent one from accessing email, web...

    Provided By Bharathiar University

  • White Papers // Sep 2010

    A Three Party Authentication for Key Distributed Protocol Using Classical and Quantum Cryptography

    Computer networks are typically a shared resource used by many applications for many different purposes. Sometimes the data transmitted between application processes is confidential, and the applications would prefer that others be unable to read it. For example, when purchasing a product over the WWW (World Wide Web), users sometimes...

    Provided By Bharathiar University

  • White Papers // May 2010

    Efficient Bio Metric IRIS Recognition System Using Fuzzy Neural Network

    The High protection mechanism and security is very essential things in a grow of computer world. Biometric Authentication is in rider seat of the computer society. Authentication and security based on "What people are?" rather than what they have? Like Identity Card, Physical Key and what they know? Like Password....

    Provided By Bharathiar University

  • White Papers // Jan 2010

    Process Modeling Using ILOG JViews BPMN Modeler Tool to Identify Exceptions

    Today all the business analysts uses Business Process Modeling Notation (BPMN) to model business process diagrams. Business process modeling is the activity of representing processes of an enterprise, which allows the business analyst to focus on the proper sequence flow, of the business processes, without concerning himself / herself on...

    Provided By Bharathiar University

  • White Papers // Dec 2009

    Top Management Control Functions for Information Systems in Small and Medium Enterprises

    This paper analyzes the Top Management Control functions for Information Systems (IS) in Small and Medium Enterprises (SMEs). SMEs extensively rely on information technology resources to enhance their competence in today's global economy. They should have adequate top management control mechanisms in place for their efficient functioning. Top Management Controls...

    Provided By Bharathiar University

  • White Papers // Aug 2009

    DDoS Defense Mechanism by Applying Stamps

    In current trend, internet plays a vital role in the life and distributed computing structure grows dramatically in size, functionality and complexity and has become the integral part of the life. In distributed network computing there are lot of vulnerabilities such as Dos, DDos (Distributed Denial of service),virus, worms, etc....

    Provided By Bharathiar University

  • White Papers // Feb 2009

    A New Digital Envelope Approach for Secure Electronic Medical Records

    In the Metical sector doctors, patient and nurses need to have access to the medical records efficiently and in a secure manner. As information technology gets increasingly deployed in the medical sectors it becomes eminent that the medical records are stored electronically. Secure Electronic Medical Records (SEMR), which aims at...

    Provided By Bharathiar University

  • White Papers // Apr 2011

    A Novel Symmetrical Encryption Algorithm With High Security Based on Key Updating

    The hacking is the greatest problem in the Wireless Local Area Network (WLAN). Many algorithms like DES, 3DES, AES,CAST, UMARAM and RC6 have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. The authentication protocols have been used for...

    Provided By Bharathiar University

  • White Papers // Mar 2012

    Performance Analysis of Genetic CR Selection in Multicast Multirate Network

    This paper presents a performance analysis of different methods used to select the congestion representative over the genetic algorithm based Congestion Representative selection in a multicast multirate network. A huge volume of control traffic is introduced into the network, and the routers are heavily loaded because the entire rate control...

    Provided By Bharathiar University

  • White Papers // May 2012

    A New Approach to Enhance Security in MPLS Network

    As MultiProtocol Label Switching (MPLS) is becoming a more widespread technology for providing Virtual Private Network (VPN) services, MPLS architecture security is of increasing concern to Service Providers (SPs) and VPN customers. MPLS suffers from a number of security issues as soon as an attacker successfully penetrates the core. This...

    Provided By Bharathiar University

  • White Papers // Aug 2012

    Agent Based Mechanism for Maintaining Cache Consistency in Mobile Environment

    Caching at the mobile client is prospective technique that can reduce the number of uplink requests, lighten the server load. However, Variable data size, data updates, limited client resource and frequent client disconnection make cache management a challenge. Object caching is often used to improve the performance of mobile application....

    Provided By Bharathiar University

  • White Papers // Nov 2012

    A Framework: Cluster Detection and Multidimensional Visualization of Automated Data Mining Using Intelligent Agents

    Data Mining techniques plays a vital role like extraction of required knowledge, finding unsuspected information to make strategic decision in a novel way which in term understandable by domain experts. A generalized frame work is proposed by considering non - domain experts during mining process for better understanding, making better...

    Provided By Bharathiar University

  • White Papers // Feb 2011

    Information Retrieval Using Xquery Processing Techniques

    In recent years, the extraction of data from XML documents is an important issue for XML research and development. Fuzzy processing techniques have been proposed for flexible querying to Native XML Databases. The authors propose the fuzzy XQuery processing techniques for Native XML database systems, where the weights of attributes...

    Provided By Bharathiar University

  • White Papers // Nov 2010

    Bit Transformation Perturbative Masking Technique for Protecting Sensitive Information in Privacy Preserving Data Mining

    The goal of data mining is ascertaining novel and valuable knowledge from data. In many situations, the extracted knowledge is highly confidential and it needs sanitization before giving to data mining researchers and the public in order to address privacy concerns. There have been two types of privacy in data...

    Provided By Bharathiar University

  • White Papers // Sep 2010

    A Three Party Authentication for Key Distributed Protocol Using Classical and Quantum Cryptography

    Computer networks are typically a shared resource used by many applications for many different purposes. Sometimes the data transmitted between application processes is confidential, and the applications would prefer that others be unable to read it. For example, when purchasing a product over the WWW (World Wide Web), users sometimes...

    Provided By Bharathiar University

  • White Papers // Feb 2011

    An Evaluation of Two Position Based Hybrid Routing Algorithms Under Mobility Speed Over MANET

    Mobile Ad Hoc NETwork (MANET) is collection of wireless nodes forming temporary network without any infrastructure, ad-hoc networking is a computer communications concept. Here, each node participating in the network acts as host and a router and therefore must forward packets for other nodes. Researches in this area are mostly...

    Provided By Bharathiar University

  • White Papers // Dec 2010

    A Secure Dynamic Authentication Scheme for Smart Card Based Networks

    Authentication is one of the essential security features in network communication. Authentication process ascertains the legitimacy of the communicating partners in communication. In authentication process, the originator of the communication and the respondent transacts some identification codes of each other prior to start of the message transaction. Several methods have...

    Provided By Bharathiar University

  • White Papers // Jul 2011

    Thread Based Cache Consistency Model for Mobile Environment

    In this paper, the authors propose a cache consistency maintenance scheme called Thread Based Cache Consistency Model (TBCCM), for mobile environment. It lies on the following four key features. Use of log at both server and mobile user's cache maintains data consistency. Use of Thread Agent (TA) at both client...

    Provided By Bharathiar University

  • White Papers // Jun 2011

    VEGAS: Better Performance Than Other TCP Congestion Control Algorithms on MANETs

    The wireless communication TCP/IP protocol is an important role in developing communication systems and which provides better and reliable communication capabilities in almost all kinds of networking environment. The wireless networking technology and the new kind of requirements in communication systems need some extensions to the original design of TCP...

    Provided By Bharathiar University

  • White Papers // Dec 2011

    Maximum Spanning Tree Model on Personalized Web Based Collaborative Learning in Web 3.0

    Web 3.0 is an evolving extension of the current web environment. Information in web 3.0 can be collaborated and communicated when queried. Web 3.0 architecture provides an excellent learning experience to the students. Web 3.0 is 3D, media centric and semantic. Web based learning has been on high in recent...

    Provided By Bharathiar University

  • White Papers // Sep 2011

    Peer to Peer Networks

    The combination of Scalable Video Coding and Peer-to-Peer networks is a potential area of innovation in terms of video streaming on the Internet. Applications for sharing files, such as BitTorrent, have been broadly developed and nowadays they cater for the majority of the Internet traffic, adding the need for the...

    Provided By Bharathiar University

  • White Papers // Apr 2011

    A New Technique for Protecting Sensitive Data and Evaluating Clustering Performance

    Data mining researchers and policy makers have need of raw data collected from organizations and business companies for their analysis. Any transmission of data to third parties and the organizations outsourcing the authors' work should satisfy the privacy requirements in order to avoid the disclosure of sensitive information. In order...

    Provided By Bharathiar University

  • White Papers // Sep 2012

    Tripartite Key Agreement Protocol Using Triple Decomposition Search Problem

    A key agreement protocol is a tool by which two parties can share a common key for their subsequent communication .Many cryptographic protocols are based on the hardness of integer factorization and discrete logarithm problem. Very few protocols are based on search problems in non - abelian groups. In this...

    Provided By Bharathiar University

  • White Papers // Aug 2012

    Adaptive Position Based Reliable Routing Protocol (APBRRP) for Mobile Ad Hoc Networks

    Routing packets in mobile ad hoc networks has been considered to a great extent, even though the hypothesis on full connectivity is generally not valid in a real time system which means that a practical routing protocol ought to handle intermittent connectivity and the absence of end-to-end connections. In this...

    Provided By Bharathiar University

  • White Papers // Jul 2012

    Power Aware Range-Based MAC Protocol for Scalable Mobile Ad Hoc Networks

    In mobile ad hoc networks, collision problem which is caused by the expansion of the interference range of the receiver node due to the controlled transmission power of the sender node is uniquely a tarnished problem. This paper employs physical and virtual carrier-sensing schemes to avoid the collision problem. The...

    Provided By Bharathiar University

  • White Papers // Mar 2013

    Fault Tolerance in Mobile Ad Hoc Network: A Survey

    Fault-Tolerance is an important design issue to construct a reliable mobile ad hoc network. Many types of faults may occur in mobile network such as link failure, node failure, misbehaving nodes, network failure, power and energy consumption etc. This paper mainly aims in surveying the research papers by combining them...

    Provided By Bharathiar University

  • White Papers // Feb 2013

    Analysis of Fault Tolerance Approaches in Dynamic Cloud Computing

    Cloud computing provide many service to the user. Now a day the user level is highly increased to utilize the services in cloud computing. In cloud computing the major problem area is fault tolerance. Many clients can request the server at a time make the server overloading cause fault. In...

    Provided By Bharathiar University

  • White Papers // Jan 2012

    Data Quality Measurement on Categorical Data Using Genetic Algorithm

    Data quality on categorical attribute is a difficult problem that has not received as much attention as numerical counterpart. The authors' basic idea is to employ association rule for the purpose of data quality measurement. Strong rule generation is an important area of data mining. Association rule mining problems can...

    Provided By Bharathiar University

  • White Papers // Dec 2009

    Top Management Control Functions for Information Systems in Small and Medium Enterprises

    This paper analyzes the Top Management Control functions for Information Systems (IS) in Small and Medium Enterprises (SMEs). SMEs extensively rely on information technology resources to enhance their competence in today's global economy. They should have adequate top management control mechanisms in place for their efficient functioning. Top Management Controls...

    Provided By Bharathiar University

  • White Papers // Jan 2010

    Process Modeling Using ILOG JViews BPMN Modeler Tool to Identify Exceptions

    Today all the business analysts uses Business Process Modeling Notation (BPMN) to model business process diagrams. Business process modeling is the activity of representing processes of an enterprise, which allows the business analyst to focus on the proper sequence flow, of the business processes, without concerning himself / herself on...

    Provided By Bharathiar University

  • White Papers // Jul 2011

    Multimodal Biometric Cryptosystem Involving Face, Fingerprint and Palm Vein

    The proposed scheme involves an idea of including three biometric traits of a person where in the sense even if one fails the other trait could be utilized for verification or identity. Moreover, the concept of cryptosystem is involved, where one of the biometric trait - the palm vein itself...

    Provided By Bharathiar University

  • White Papers // Jun 2013

    The Role Of Cloud Computing In Sharing Of Information Resources Among Digital Libraries In New Digital Era

    The evolution of traditional library collections to digital or virtual collections has given new dimension. The Internet, Web environment and associated sophisticated tools have given a new dynamic role to play and serve the new information based society in better ways than previously. Because of the powerful features of Web...

    Provided By Bharathiar University

  • White Papers // May 2013

    Data Integrity Using Encryption in Cloud Computing

    Data integrity is an important phase in cloud computing. Since the previous couple of years the protocols that was evoked during this field has reached greater heights. Existing protocols with the assistance of a third-party auditor in an exceedingly previous paper, Sebe

    Provided By Bharathiar University

  • White Papers // Jan 2011

    Detecting Redundancy in Biological Databases - An Efficient Approach

    Biological databases store data about molecular biological entities such as genes, proteins, diseases, etc. The main purpose of creating and maintaining such databases in commercial organizations is their importance in the process of drug discovery. As databases become more pervasive through the biological sciences, various data quality concerns are emerging....

    Provided By Bharathiar University

  • White Papers // Feb 2011

    Biomining:-An Efficient Data Retrieval Tool for Bioinformatics to Avoid Redundant and Irrelevant Data Retrieval from Biological Databases

    Mining biological data is an emerging area of intersection between data mining and bioinformatics. Bioinformaticians have been working on the research and development of computational methodologies and tools for expanding the use of biological, medical, behavioral, or health-related data. Data mining researchers have been making substantial contribution to the development...

    Provided By Bharathiar University

  • White Papers // Aug 2011

    Encoding and Decoding Techniques for Distributed Data Storage Systems

    Dimensionality reduction is the conversion of high-dimensional data into a meaningful representation of reduced data. Preferably, the reduced representation has a dimensionality that corresponds to the essential dimensionality of the data. The essential dimensionality of data is the minimum number of parameters needed to account for the observed properties of...

    Provided By Bharathiar University

  • White Papers // Oct 2013

    An Ensemble Classification Approach for Intrusion Detection

    Increased cyber attacks in various forms compel everyone to implement effective intrusion detection systems for protecting their information wealth. From last two decades, there has been extensive research going on in intrusion detection system development using various techniques. But, designing detection systems producing maximum accuracy with minimum false positive is...

    Provided By Bharathiar University

  • White Papers // Mar 2011

    A Survey on Recent Trends, Process and Development in Data Masking for Testing

    In today's information age, the data is an important asset of the organization so the security of the data is a vital role in the industry. In order to achieve the above aspect, the data masking is used. The data masking is mainly the data is replaced with realistic but...

    Provided By Bharathiar University

  • White Papers // Sep 2013

    Study and Analysis of Knowledge Acquisition Techniques for Acquiring Knowledge on Product Functionality

    This research is concerned with the study and analysis of knowledge acquisition techniques, detailed study on product functionality, comparison of various knowledge acquisition techniques and to select a knowledge acquisition method for acquiring knowledge on product functionality efficiently. This paper investigates the efficiency of the various knowledge acquisition techniques in...

    Provided By Bharathiar University

  • White Papers // May 2013

    A Cross Layer Design for Achieving High Throughput Using S-ODMRP in Wireless Mesh Networks

    Multicast is an efficient method for implementing group communication. Achieving high throughput in wireless mesh networks is a hard problem due to malicious behavior of nodes and interference among those nodes in local transmission. In this paper, the authors propose a cross layer design for S-ODMRP (Secure on Demand Multicast...

    Provided By Bharathiar University

  • White Papers // Aug 2009

    DDoS Defense Mechanism by Applying Stamps

    In current trend, internet plays a vital role in the life and distributed computing structure grows dramatically in size, functionality and complexity and has become the integral part of the life. In distributed network computing there are lot of vulnerabilities such as Dos, DDos (Distributed Denial of service),virus, worms, etc....

    Provided By Bharathiar University

  • White Papers // Feb 2009

    A New Digital Envelope Approach for Secure Electronic Medical Records

    In the Metical sector doctors, patient and nurses need to have access to the medical records efficiently and in a secure manner. As information technology gets increasingly deployed in the medical sectors it becomes eminent that the medical records are stored electronically. Secure Electronic Medical Records (SEMR), which aims at...

    Provided By Bharathiar University

  • White Papers // Dec 2010

    Discussion on Improving Quality of Service through Available Bandwidth Estimation in Mobile Ad Hoc Networks

    The term bandwidth refers to the data rate that a network link or a network path can transfer. Bandwidth is one of the guarantee attribute to measure the performance of the network. Estimating accurate available bandwidth allows a node to make optimal decision before sending a packet in networks. It...

    Provided By Bharathiar University

  • White Papers // May 2010

    Efficient Bio Metric IRIS Recognition System Using Fuzzy Neural Network

    The High protection mechanism and security is very essential things in a grow of computer world. Biometric Authentication is in rider seat of the computer society. Authentication and security based on "What people are?" rather than what they have? Like Identity Card, Physical Key and what they know? Like Password....

    Provided By Bharathiar University

  • White Papers // Oct 2010

    Defending Denial of Service: State Overload Attacks

    In a Denial-of-Service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting one's computer and its network connection, or the computers and network of the sites they are trying to use, an attacker may be able to prevent one from accessing email, web...

    Provided By Bharathiar University

  • White Papers // Nov 2010

    Data Transformation Technique for Protecting Private Information in Privacy Preserving Data Mining

    Data mining is the process of extracting patterns from data. Data mining is seen as an increasingly important tool by modern business to transform data into an informational advantage. Data Mining can be utilized in any organization that needs to find patterns or relationships in their data. A group of...

    Provided By Bharathiar University

  • White Papers // Dec 2010

    Optimizing on Demand Weight -Based Clustering Using Trust Model for Mobile Ad Hoc Networks

    Mobile ad hoc networks are growing in popularity due to the explosive growth of modern devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is essential to evaluate...

    Provided By Bharathiar University