Bharathidasan University

Displaying 1-18 of 18 results

  • White Papers // Jul 2013

    Overview of DDOS Algorithms: A Survey

    The significance of the DDOS problem and the increased occurrence, sophistication and strength of attacks has led to the dawn of numerous prevention algorithms. Each proposed prevention algorithms has some unique advantages and disadvantages over the others. In this paper, the authors present a classification of available algorithms that are...

    Provided By Bharathidasan University

  • White Papers // Mar 2013

    Text Mining in Analyzing the Presentation of Educational Trainers

    This work deals with Text analysis that involves information retrieval through lexical analysis to learn word occurrence and distributions, pattern recognition, information extraction, data mining techniques and followed by visualization, and predictive analytics. The primary goal is to turn text into data for analysis, through application of Natural Language Processing...

    Provided By Bharathidasan University

  • White Papers // Mar 2013

    Software Defect Prediction Using Boosting Techniques

    Identification and removal of software defects is tedious and time consuming for software development. Improperly planned projects could have defects and the time spent to spot and fix them requires more than the code development time. A reverse engineering sub-area is identification of modules necessitating re-engineering; focusing on faulty modules...

    Provided By Bharathidasan University

  • White Papers // Feb 2013

    A Novel Cluster Validation Approach on Pso-Pac Mechanism in Ad Hoc Network

    The ad hoc network places a vital role in contemporary day's communication scenario. This network performance gets up while the clustering phenomenon has been incorporated. The cluster formation using the vital parameters is incredible on deciding the efficiency level of the clustered ad hoc networks. The PSO-PAC mechanism forms clusters...

    Provided By Bharathidasan University

  • White Papers // Oct 2012

    A Survey on Data and Transaction Management in Mobile Databases

    The popularity of the Mobile Database is increasing day by day as people need information even on the move in the fast changing world. This database technology permits employees using mobile devices to connect to their corporate networks, hoard the needed data, work in the disconnected mode and reconnect to...

    Provided By Bharathidasan University

  • White Papers // Oct 2012

    A Study on the Neural Network Model for Finger Print Recognition

    Finger Print Recognition [FPR] is an unique technique to avoid intruders in any part of the information system, where the data are very essential than somebody's life, like military code transaction, some secret operations at nation's higher authority level. Current finger print recognition systems are very tough to allow the...

    Provided By Bharathidasan University

  • White Papers // Sep 2012

    Classification Accuracy in Cognitive Load for Users Preference in Web Based Learning

    With increasing popularity of web based learning, it is required to design the web layout to reduce cognitive load. Cognitive load theory is widely used to predict the effectiveness of the web based and multimedia learning. The cognitive load induced by instructional and multimedia modes are measured by indirect or...

    Provided By Bharathidasan University

  • White Papers // Jul 2012

    High Reliable Secure Data Collection Using Complexity Exchanging Code Key Method Addressing Protocol in Wireless Sensor Network

    A Wireless Sensor Network (WSN) is emerging field in information and communication technology. In WSN data transmission and data collection are unsecure because of sensor node Incompatibility. So, providing security to sensor network is very important. The key based mechanism is secure data collection and it's mainly used to guarantee...

    Provided By Bharathidasan University

  • White Papers // Jul 2012

    A Cross Layer Based Vertical Handoff Decision Making Framework

    Emerging wireless communication technology focuses the development to provide the communication support for mobile devices based on the user demand and network connectivity for high-speed data transfer like multimedia, video and Voice over IP (VoIP). In wireless network the main issue to be addressed is channel allocation and network connectivity....

    Provided By Bharathidasan University

  • White Papers // Jul 2011

    Predictability Issues in Recommender Systems Based on Web Usage Behavior Towards Robust Collaborative Filtering

    In this paper, the authors examine the effect of recommender systems in security oriented issues. Currently research has begun to evaluate the vulnerabilities and robustness of various collaborative recommender techniques in the face of profile injection and shilling attacks. Standard collaborative filtering algorithms are vulnerable to attacks. The robustness of...

    Provided By Bharathidasan University

  • White Papers // Mar 2011

    Grilling Gratuitous Detour in Adhoc Network

    Routing is a critical function in ad hoc network which claim special attention and support extended by the trustable neighbor nodes. The peril of Gratuitous detour on routing process in ad hoc network is manifold which culminates in the deterioration of network performance amounting to deplorable network behavior. Routing in...

    Provided By Bharathidasan University

  • White Papers // Dec 2010

    ERP - CRM Integration By Neural NetWorks

    Enterprise Resource Planning (ERP) is a combination of all the resources of a company. ERP is mainly a computer based system. All kinds of organization data that is relating to each and every function of the organization is available in ERP. So most of the big business organizations are implementing...

    Provided By Bharathidasan University

  • White Papers // Feb 2010

    Fuzzy Multicriteria Decision-Making Approach for Collaborative Recommender Systems

    The collaborative recommender systems provide personalized recommendations to users using the rating profiles of different users. These systems should maintain accurate model of user's interests and needs by collecting the user preferences either explicitly or implicitly using numerical scale. Although most of the current systems maintain single user ratings in...

    Provided By Bharathidasan University

  • White Papers // Jan 2010

    Ad Hoc Mobile Wireless Networks Routing Protocols A Review

    Mobile ad hoc networks(MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary adhoc network topologies, allowing people and devices to seamlessly internet work in areas with no preexisting communication infrastructure e.g., disaster recovery environments. An ad-hoc network is...

    Provided By Bharathidasan University

  • White Papers // Dec 2009

    An Analytical Performance Measure for Smooth Handoff in Mobile IPv6

    Mobility is the most important feature of a wireless communication system. The mobile device needs to connect multiple points of connection and perhaps multiple networks as it moves from one location to another. Handover management is the way a network uses to maintain connection to a mobile user as it...

    Provided By Bharathidasan University

  • White Papers // Aug 2009

    Utility Independent Privacy Preserving Data Mining on Vertically Partitioned Data

    Driven by mutual benefits, or by regulations that require certain data to be published, there has been a demand for the exchange and publication of data among various parties. Data publishing has been ubiquitous in many domains such as medical, business and education. Detailed person-specific data, present in the centralized...

    Provided By Bharathidasan University

  • White Papers // Feb 2009

    A Refined Algorithm for Efficient Route Identification in Future Generation Networks

    The challenges faced by the today's network are significantly increased. They decrease the efficiency of the network. If enough measures are not taken, this will lead to severe problems in future generation networks. Though many parameters are involved in improving the efficiency, this paper focuses on distance and bandwidth. The...

    Provided By Bharathidasan University

  • White Papers // Nov 2008

    Cross Site Scripting-Latest Developments and Solutions: A Survey

    Research reports indicate that more than 80% of the web applications are vulnerable to XSS threats. User friendly web applications are developed to increase the customer base and hackers utilize the features provided by the web applications. Research report shows that there is a shift in the focus of the...

    Provided By Bharathidasan University

  • White Papers // Sep 2012

    Classification Accuracy in Cognitive Load for Users Preference in Web Based Learning

    With increasing popularity of web based learning, it is required to design the web layout to reduce cognitive load. Cognitive load theory is widely used to predict the effectiveness of the web based and multimedia learning. The cognitive load induced by instructional and multimedia modes are measured by indirect or...

    Provided By Bharathidasan University

  • White Papers // Aug 2009

    Utility Independent Privacy Preserving Data Mining on Vertically Partitioned Data

    Driven by mutual benefits, or by regulations that require certain data to be published, there has been a demand for the exchange and publication of data among various parties. Data publishing has been ubiquitous in many domains such as medical, business and education. Detailed person-specific data, present in the centralized...

    Provided By Bharathidasan University

  • White Papers // Dec 2009

    An Analytical Performance Measure for Smooth Handoff in Mobile IPv6

    Mobility is the most important feature of a wireless communication system. The mobile device needs to connect multiple points of connection and perhaps multiple networks as it moves from one location to another. Handover management is the way a network uses to maintain connection to a mobile user as it...

    Provided By Bharathidasan University

  • White Papers // Mar 2011

    Grilling Gratuitous Detour in Adhoc Network

    Routing is a critical function in ad hoc network which claim special attention and support extended by the trustable neighbor nodes. The peril of Gratuitous detour on routing process in ad hoc network is manifold which culminates in the deterioration of network performance amounting to deplorable network behavior. Routing in...

    Provided By Bharathidasan University

  • White Papers // Feb 2009

    A Refined Algorithm for Efficient Route Identification in Future Generation Networks

    The challenges faced by the today's network are significantly increased. They decrease the efficiency of the network. If enough measures are not taken, this will lead to severe problems in future generation networks. Though many parameters are involved in improving the efficiency, this paper focuses on distance and bandwidth. The...

    Provided By Bharathidasan University

  • White Papers // Feb 2010

    Fuzzy Multicriteria Decision-Making Approach for Collaborative Recommender Systems

    The collaborative recommender systems provide personalized recommendations to users using the rating profiles of different users. These systems should maintain accurate model of user's interests and needs by collecting the user preferences either explicitly or implicitly using numerical scale. Although most of the current systems maintain single user ratings in...

    Provided By Bharathidasan University

  • White Papers // Jul 2012

    High Reliable Secure Data Collection Using Complexity Exchanging Code Key Method Addressing Protocol in Wireless Sensor Network

    A Wireless Sensor Network (WSN) is emerging field in information and communication technology. In WSN data transmission and data collection are unsecure because of sensor node Incompatibility. So, providing security to sensor network is very important. The key based mechanism is secure data collection and it's mainly used to guarantee...

    Provided By Bharathidasan University

  • White Papers // Oct 2012

    A Survey on Data and Transaction Management in Mobile Databases

    The popularity of the Mobile Database is increasing day by day as people need information even on the move in the fast changing world. This database technology permits employees using mobile devices to connect to their corporate networks, hoard the needed data, work in the disconnected mode and reconnect to...

    Provided By Bharathidasan University

  • White Papers // Oct 2012

    A Study on the Neural Network Model for Finger Print Recognition

    Finger Print Recognition [FPR] is an unique technique to avoid intruders in any part of the information system, where the data are very essential than somebody's life, like military code transaction, some secret operations at nation's higher authority level. Current finger print recognition systems are very tough to allow the...

    Provided By Bharathidasan University

  • White Papers // Jul 2012

    A Cross Layer Based Vertical Handoff Decision Making Framework

    Emerging wireless communication technology focuses the development to provide the communication support for mobile devices based on the user demand and network connectivity for high-speed data transfer like multimedia, video and Voice over IP (VoIP). In wireless network the main issue to be addressed is channel allocation and network connectivity....

    Provided By Bharathidasan University

  • White Papers // Mar 2013

    Text Mining in Analyzing the Presentation of Educational Trainers

    This work deals with Text analysis that involves information retrieval through lexical analysis to learn word occurrence and distributions, pattern recognition, information extraction, data mining techniques and followed by visualization, and predictive analytics. The primary goal is to turn text into data for analysis, through application of Natural Language Processing...

    Provided By Bharathidasan University

  • White Papers // Mar 2013

    Software Defect Prediction Using Boosting Techniques

    Identification and removal of software defects is tedious and time consuming for software development. Improperly planned projects could have defects and the time spent to spot and fix them requires more than the code development time. A reverse engineering sub-area is identification of modules necessitating re-engineering; focusing on faulty modules...

    Provided By Bharathidasan University

  • White Papers // Feb 2013

    A Novel Cluster Validation Approach on Pso-Pac Mechanism in Ad Hoc Network

    The ad hoc network places a vital role in contemporary day's communication scenario. This network performance gets up while the clustering phenomenon has been incorporated. The cluster formation using the vital parameters is incredible on deciding the efficiency level of the clustered ad hoc networks. The PSO-PAC mechanism forms clusters...

    Provided By Bharathidasan University

  • White Papers // Jul 2011

    Predictability Issues in Recommender Systems Based on Web Usage Behavior Towards Robust Collaborative Filtering

    In this paper, the authors examine the effect of recommender systems in security oriented issues. Currently research has begun to evaluate the vulnerabilities and robustness of various collaborative recommender techniques in the face of profile injection and shilling attacks. Standard collaborative filtering algorithms are vulnerable to attacks. The robustness of...

    Provided By Bharathidasan University

  • White Papers // Jul 2013

    Overview of DDOS Algorithms: A Survey

    The significance of the DDOS problem and the increased occurrence, sophistication and strength of attacks has led to the dawn of numerous prevention algorithms. Each proposed prevention algorithms has some unique advantages and disadvantages over the others. In this paper, the authors present a classification of available algorithms that are...

    Provided By Bharathidasan University

  • White Papers // Nov 2008

    Cross Site Scripting-Latest Developments and Solutions: A Survey

    Research reports indicate that more than 80% of the web applications are vulnerable to XSS threats. User friendly web applications are developed to increase the customer base and hackers utilize the features provided by the web applications. Research report shows that there is a shift in the focus of the...

    Provided By Bharathidasan University

  • White Papers // Jan 2010

    Ad Hoc Mobile Wireless Networks Routing Protocols A Review

    Mobile ad hoc networks(MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary adhoc network topologies, allowing people and devices to seamlessly internet work in areas with no preexisting communication infrastructure e.g., disaster recovery environments. An ad-hoc network is...

    Provided By Bharathidasan University

  • White Papers // Dec 2010

    ERP - CRM Integration By Neural NetWorks

    Enterprise Resource Planning (ERP) is a combination of all the resources of a company. ERP is mainly a computer based system. All kinds of organization data that is relating to each and every function of the organization is available in ERP. So most of the big business organizations are implementing...

    Provided By Bharathidasan University