Global Journals

Displaying 1-40 of 239 results

  • White Papers // Feb 2015

    Big Data Analysis: Ap Spark Perspective

    Big data have gained enormous attention in recent years. Analyzing big data is very common requirement today and such requirements become nightmare when analyzing of bulk data source such as Twitter twits are done, it is really a big challenge to analyze the bulk amount of twits to get relevance...

    Provided By Global Journals

  • White Papers // Jan 2015

    Improved Approaches to Handle Bigdata Through Hadoop

    Big data is an evolving term that describes any voluminous amount of structured, semi-structured and unstructured data that has the potential to be mined for information. Today's world produces a large amount of data from various sources, records and from different fields termed as "Big data". Such huge data is...

    Provided By Global Journals

  • White Papers // Jan 2015

    Data Mining in Biodata Analysis

    For finding interesting patterns in large databases has lot of development in recent years. Data mining is used in many fields like medicine, securing the data etc. Whereas bio data means the data regarding the biology, medical science, DNA technology and Bioinformatics in-depth analysis. Bioinformatics is the science which can...

    Provided By Global Journals

  • White Papers // Jan 2015

    Design of Low Power 4-Bit CMOS Braun Multiplier Based on Threshold Voltage Techniques

    A circuit design for a new low power 4-bit Braun multiplier is presented. The multiplier is implemented by using different threshold voltage techniques. Power reduction techniques are proposed for 4-bit Braun multiplier which is designed by full adders. To get optimum design low threshold voltages are used at critical paths...

    Provided By Global Journals

  • White Papers // Jan 2015

    An Efficient Implementation of Digit FIR Filters Using Memory Based Realization

    There are many hand-held products that include Digital Signal Processing (DSP), for example, cellular phones and hearing aids. In this paper, the authors are an exact common sub expression elimination algorithm for the optimum sharing of partial terms in Multiple Constant Multiplications (MCMs). Although many efficient high-level algorithms have been...

    Provided By Global Journals

  • White Papers // Jan 2015

    Energy Efficient FMA for Embedded Multimedia Application

    In this paper, the authors present energy efficient fused multiply add for multimedia applications. Low cost, low power and high performance factors diddle the design of many microprocessors directed to the low-power figuring market. The floating point unit occupies a significant percentage of the silicon area in a microprocessor due...

    Provided By Global Journals

  • White Papers // Dec 2014

    Does Gender Play a Role in Online Consumer Behavior?

    Electronic commerce (online shopping) is increasing in popularity now-a-days due to the popularity of computer usage and the prevalence of internet. Electronic commerce can produce numerous benefits to both sellers and consumers. Hence, the study of online consumer behavior can generate a better online atmosphere to facilitate greater profit to...

    Provided By Global Journals

  • White Papers // Dec 2014

    Effect of Visual Merchandising on Consumer Buying Behaviour

    The retailers are facing an intense competitive market place and as a consequence, they find many difficulties to differentiate their stores. Retail store elements such as color, lighting and visual merchandising have always been considered as having immediate effects on the buying decision making process. Visual merchandising is the presentation...

    Provided By Global Journals

  • White Papers // Oct 2014

    Area Efficient Layout Design of Multiply Complements Logic (MCL) Gate Using QCA Technology

    Quantum dot Cellular Automata (QCA) is one of now popular technology for its highly scalable feature and ultra-low power consumption that made its one of the promising alternatives to CMOS technology. This paper present a new layout design of Multiply Complements Logic (MCL) gate based on QCA INVerter (INV), QCA...

    Provided By Global Journals

  • White Papers // Sep 2014

    An Under-Sampled Approach for Handling Skewed Data Distribution Using Cluster Disjuncts

    In data mining and knowledge discovery hidden and valuable knowledge from the data sources is discovered. The traditional algorithms used for knowledge discovery are bottle necked due to wide range of data sources availability. Class imbalance is a one of the problem arises due to data source which provide unequal...

    Provided By Global Journals

  • White Papers // Sep 2014

    Digital Frequency Synthesis Using Multi-Phase NCO for Dielectric Characterization of Materials on Xilinx Zynq FPGA

    Precise measurement of dielectric characteristics of materials is becoming necessity in several engineering applications. The dielectric constant measurement over wide frequency range for emerging applications such as PCB manufacturing, agriculture, environmental and food processing industries has several challenges. With the advancement in digital VLSI and Field Programmable Gate Array (FPGA)...

    Provided By Global Journals

  • White Papers // Aug 2014

    ASIC Design, Implementation and Exploration on High Speed Parallel Multiplier

    Designing multiplier is always a challenging and interesting job, in order to satisfy user needs as per demand. Vedic multiplier is prominent system for faster result and optimized circuit design. In any digital system the throughput and power consumption decides the performance. The paper concentrated on Vedic multiplier power consumption...

    Provided By Global Journals

  • White Papers // Jul 2014

    An Improved Apriori Algorithm Based on Matrix Data Structure

    Mining regular/frequent itemsets is very important concept in association rule mining which shows association among the variables in huge database. The classical algorithm used for extracting regular itemsets faces two fatal deficiencies. Firstly it scans the database multiple times and secondly it generates large number of irregular itemsets hence increases...

    Provided By Global Journals

  • White Papers // Jul 2014

    Low Power Conditional Sum Adder Using Modified Ripple Carry Adder

    Carry SeLect Adder (CSeLA) is mainly used to alleviate the propagation delay caused by carry bit and upon which sum bit is generated. It produces n+1 sum from n bits. In this paper, the author's present simple Gate level implementation of regular Carry Select Adder is compared with their proposed...

    Provided By Global Journals

  • White Papers // Jul 2014

    Design of a Novel Low-Power SRAM Column

    A novel SRAM column was designed. SRAM column includes SRAM cell, column select circuit, pre-charging circuit, and sense amplifier. The transmission gates are used for word line access in place of pass transistors which rectify the voltage drop problem; also there is an NMOS switch at the bottom of the...

    Provided By Global Journals

  • White Papers // Jun 2014

    Novel Design of BCD to Excess-3 Code Converter in Quantum Dots Cellular Automata (QCA)

    Quantum-dot Cellular Automata (QCA) represents a new technology at the nanotechnology level. Conventional digital technologies use ranges of voltage or current to represent binary values. In contrast, QCA uses the positions of electrons in quantum dots to represent binary Values '0' and '1'. Quantum technology has gradually applied in various...

    Provided By Global Journals

  • White Papers // Jun 2014

    How Customer Perception Shape Buying Online Decision

    Consumers are playing an important responsibility in online shopping. When online retailers can identify the factors that can affect consumers' buying behavior and the associations between these factors and type of online buyers, then they can further widen their marketing strategies to convert potential customers into active ones and at...

    Provided By Global Journals

  • White Papers // May 2014

    Optimized Model of Recommendation System for E-Commerce Website

    In this paper, the authors are to optimize the recommendation system by creating a new model of recommender system with different services in a global e-commerce website. In this model the most effective data sources are integrated to increase the accuracy of recommendations system, which provides the client more intuitive...

    Provided By Global Journals

  • White Papers // May 2014

    Maximising the Value of Missing Data

    The subject of missing values in databases and how to handle them has received very little attention in the statistics and data mining literature1, 2, 3 and even less, if any at all, in the marketing literature. The usual attitude of practitioners is the user will just have to ignore...

    Provided By Global Journals

  • White Papers // May 2014

    Concurrent Access Algorithms for Different Data Structures: A Research Review

    A concurrent data structure is a particular way of storing and organizing data for access by multiple computing threads (or processes) on a computer. Algorithms for concurrent data structure have gained attention in recent years as multi-core processors have become ubiquitous. Several features of shared-memory multi-processors make concurrent data structures...

    Provided By Global Journals

  • White Papers // May 2014

    Research of Data Mining Algorithm Based on Cloud Database

    There is an immense amount of data in the cloud database and among these data, much potential and valuable knowledge are implicit. The key point is to discover and pick out the useful knowledge, and to do so automatically. In this paper, the data model of the cloud database is...

    Provided By Global Journals

  • White Papers // May 2014

    Cost Based Model for Big Data Processing with Hadoop Architecture

    With fast pace growth in technology, the users are getting more options for making better and optimized systems. For handling huge amount of data, scalable resources are required. In order to move data for computation, measurable amount of time is taken by the systems. Here comes the technology of Hadoop,...

    Provided By Global Journals

  • White Papers // Feb 2014

    Performance Analysis of Secure Integrated Circuits using Blowfish Algorithm

    Security is an essential feature of Information Communication Technology (ICT). Information has to be encrypted at the transmitter side to maintain secrecy and decrypted at the receiver side to retrieve the original information for secure data transmission over insecure computer data communication networks. This paper analyzes the performance metrics of...

    Provided By Global Journals

  • White Papers // Feb 2014

    A Performance Comparison Between Enlightenment and Emulation in Microsoft Hyper-V

    Microsoft (MS) Hyper-V is a native hypervisor that enables platform virtualization on x86-64 systems. It is a micro-kernelized hypervisor where a host operating system provides the drivers for the hardware. This approach leverages MS Hyper-V to support enlightenments (the Microsoft name for Paravirtualization) in addition to the hardware emulation virtualization...

    Provided By Global Journals

  • White Papers // Jan 2014

    Behavior based access Control & Encryption (BBACE) Security Model as a Service in Cloud Platform

    Cloud computing is a new flexible approach for providing higher computational power in shared medium. It provides the distributed model based on self evaluating techniques to improve the processing capabilities of the system with lesser managerial concerns. It is made up of client, application, platform, servers and infrastructures. This computing...

    Provided By Global Journals

  • White Papers // Jan 2014

    E-Commerce Model Based on Fuzzy Based Certain Trust Model

    Trustworthiness especially for service oriented system is very important topic now-a-days in IT field of the whole world. There are many successful E-commerce organizations presently run in the whole world, but e-commerce has not reached its full potential. The main reason behind this is lack of trust of people in...

    Provided By Global Journals

  • White Papers // Jan 2014

    TPA Ensuring Data Integrity in Cloud Environment

    Cloud computing is an internet based computing where virtual shared servers provide software, infrastructure, platform and other resources to customers on a pay-as-you-use basis. In one of the services offered by cloud viz. Storage-as-a-Service (SaaS), users outsource their data to cloud without having direct possession or control on it. Storage...

    Provided By Global Journals

  • White Papers // Jan 2014

    Analysis of Data Mining Classification with Decision tree Technique

    The diversity and applicability of data mining are increasing day-to-day so need to extract hidden patterns from massive data. The paper states the problem of attribute bias. Decision tree technique based on information of attribute is biased toward multi value attributes which have more but insignificant information content. Attributes that...

    Provided By Global Journals

  • White Papers // Jan 2014

    Security Provisioning in Cloud Environments using Dynamic Expiration Enabled Role based Access Control Model

    In cloud environment the Role Based Access Control (RBAC) system model has come up with certain promising facilities for security communities. This system has established itself as highly robust, powerful and generalized framework for providing access control for security management. There are numerous practical applications and circumstances where the users...

    Provided By Global Journals

  • White Papers // Dec 2013

    HRM Focus on Distinctive Human Capital and Strategy of Building-Retaining Competitive Advantage

    Every business is a people business. At the heart of every successful business are the people who make things happen. Human capital is its most valuable resource, which provides the solid foundation needed to build long-term profitability and ongoing success of an organization. Therefore, businesses must constantly seek new and...

    Provided By Global Journals

  • White Papers // Dec 2013

    An Aprori Algorithm in Distributed Data Mining System

    Many existing Data Mining (DM) tasks can be proficient effectively only in a distributed condition. The ground of Distributed Data Mining (DDM) has therefore gained growing weightage in the preceding decades. The Apriori Algorithm (AA) has appeared as one of the greatest Association Rule Mining (ARM) algorithms. Ii also provides...

    Provided By Global Journals

  • White Papers // Dec 2013

    A Study of Encryption Algorithms AES, DES and RSA for Security

    In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. This paper focus on cryptography to secure the data while transmitting in the network. Firstly...

    Provided By Global Journals

  • White Papers // Dec 2013

    Efficient use of Mobile Agents for Network Security & Management

    Mobile agents are composition of computer software and data which migrates from one computer to another. While doing this, they continue their itinerary up to the home computer. Mobile agents have special characteristics which can help intrusion detection in several ways. The use of mobile codes and mobile agent based...

    Provided By Global Journals

  • White Papers // Nov 2013

    An Adder with Novel PMOS and NMOS for Ultra Low Power Applications in Deep Submicron Technology

    Power has become a burning issue in modern VLSI design, as the technology advances especially below 45nm technology, Leakage power become more problem apart of the dynamic power. This paper presents a full adder with novel PMOS and NMOS which consume less power compare to conventional full adder and DTMOS...

    Provided By Global Journals

  • White Papers // Nov 2013

    Trend and Need of Application Virtualization in Cloud Computing

    As the variety of applications increases so does the complexity of delivering and managing those applications also increases, many organizations tried to manage that complexity by standardizing on a fixed portfolio of applications in a locked-down configuration. This approach reduces the IT labour costs, but the restrictions involved lead to...

    Provided By Global Journals

  • White Papers // Nov 2013

    Safeguarding the Liabilities of Data Accessing in Cloud Computing

    Cloud computing is the process of providing the virtualized services over the internet. The space in the web commonly known as cloud has been monitored by service provider. In a real time scenario, a user registers for a particular service and shares the user data as well as access credential...

    Provided By Global Journals

  • White Papers // Nov 2013

    Single Process Architecture for E-Learning Over Cloud Computing

    A cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers. Cloud computing refers to both...

    Provided By Global Journals

  • White Papers // Nov 2013

    Implementing Cloud Data Security by Encryption using Rijndael Algorithm

    Cloud computing emerges as a new computing paradigm which aims to provide reliable, customized and QoS guaranteed dynamic computing environments for end-users. However, adopting a cloud computing paradigm may have positive as well as negative effects on the data security of service consumers. In a cloud computing environment, data and...

    Provided By Global Journals

  • White Papers // Nov 2013

    Challenge Token based Security for Hybrid Clouds

    Cloud has now become the essential part of the web technology and fast growth of cloud computing technique making it worth for the companies to invest in cloud. Growth of number of clouds is requiring inter cloud communication as concept of multi cloud or hybrid cloud is also spreading quickly....

    Provided By Global Journals

  • White Papers // Oct 2013

    FPGA Controlled Stator Resistance Estimation in IVC of IM Using FLC

    In this paper online estimation of stator resistance in Indirect Vector Control (IVC) of Induction Motor (IM) is proposed using Fuzzy Logic Controller (FLC). It is renowned that stator resistance of Induction motor which is sensitive to temperature rise in machine leads to performance deterioration as resistance used in controller...

    Provided By Global Journals