IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 613 results

  • White Papers // Jun 2015

    Robust And Enhanced Secured Multiple-keyword Search over Encrypted Cloud Data

    As distributed computing turn out to be more adaptable & compelling regarding economy, information proprietors are inspired to outsource their mind boggling information frameworks from nearby destinations to business open cloud. In any case, for security of information, touchy information must be scrambled before outsourcing, which succeeds system for conventional...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2015

    Power and Area Analysis of Flip Flop Using Different Techniques

    The use of Very Large Scale Integration (VLSI) technology in high performance computing, wireless communication and consumer electronics has been rising at a very fast rate. The challenge of advanced VLSI technology is growing in leakage power consumption. In these days, standby leakage power dissipation is emerging as the major...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2015

    Bulk Data Extraction, Validation and Processing of Records in a Spreadsheet File Using PL/SQL Constructs

    Traditionally, many stakeholders keep their information in spreadsheet sheets (.xls or .ods extension). Instead of changing the traditional way of storing the data in excel sheet by these users, the paper presented here, will allow them to store data in the spreadsheets and the API's written, will directly fetch the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Combining and Analysing Apriori and K-Means Algorithms for Efficient Data Mining on the Web

    Web mining is the combination of data assembled by combining information mining techniques and procedures with data accumulated over the World Wide Web. Mining means extricating something helpful or important from a large no of datasets. Web mining is utilized to comprehend client conduct, assess the adequacy of a specific...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    A Hybrid Approach for Content Based Image Retrieval From Large Dataset

    Image processing is one of the methods to convert an image into digital form and perform some operations on it, in order to get an enhanced image or to extract some useful information from it. The volume of digital images generated and uploaded on the internet are very large. The...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Multi Tiered Security and Privacy- Enhancing Multi-cloud Environment

    Technology and its advancement lead the people to research for the next level of the advancement. In the context of the cloud computing which the people can tell as the technological advancement plays the vital role in the industry of information technology. In this paper, the authors have given emphasis...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Protection in Cloud Storage: Exploration of the Projected Contract Signing Protocol

    Numerous tendencies are usually aperture up the cycle of cloud computing, that is an Internet-based building and utilize of computer technology. The extremely economical and an assortment additional controlling processors, collectively by signifies of the SaaS processing architecture, are modifying information facilities within pools of processing versions on an massive...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    An Innovative and Efficient Approach for Detecting Unknown Attacks Using Feature Extraction Scheme and Fuzzy-Neural Networks

    In the past two decades, internet have experienced tremendous growth that has sped up a shift in computing environments from centralized computer systems to network information systems. A large volume of valuable information such as personal profiles, banking details and other valuable information is distributed and transferred through internet. Hence,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Virtualization Head Roads in Information Technology

    In today's modern competition business environment data and its efficient management is the most vital business objective of any organization. It is crystal clear that the people are in the age of information explosion where people and organizations are bombarded with information and it becomes a difficult task to get...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Fastened Data Retrieval Algorithm (FDRA)

    Fastened Data Retrieval Algorithm (FDRA) is an approach to protect the data in a decentralized network. Disruption-Tolerant Network (DTN) technologies are most popular to retrieve information on wireless devices by exploiting external storage devices. The most challenging issue here is confidentiality and reliability. This can be achieved by using Cipher-text...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Efficient Layout Design of 4-Bit Full Adder using Transmission Gate

    In any digital circuit surface area and power both are very important parameters. In this paper, 4- bit full adder using transmission gate is designed. To design 4- bit full adder two methods are used. First is semi-custom design method and second is full custom design method. In first semi-custom...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Integrating Grid Computing Technology into Multimedia Application

    Systems now-a-days are requiring huge database and massive power of computation. This cannot be gained using the available computation technology or computers. Execution time and large data processing are problems which are usually encountered in highly demanded applications such as multimedia processing. Grid computing technology offers a possible solution for...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2015

    CDN in Intra-Cloud using Smartphones

    Mobile hand held devices such as smartphones has increasingly became powerful in years. Smartphones are not only with voice oriented device but also equipped with wide capabilities with internet access and some special network features such creating a network via Wi-Fi tethering. As mobile devices become more like PC's, it...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2015

    Triggering Uttermost Escalated Patterns for Refined Clustering

    The clustering algorithm, so far, are inefficient in finding interested patterns as they reckon on the position of data items which results in large number of illegitimate patterns. The generated illegitimate patterns have low association between them providing knowledge which is of nominal significance to the user. The existing algorithm...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2015

    Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems

    Information offering is an imperative usefulness in distributed storage. In this paper, the authors demonstrate to safely, productively, and adaptably impart information to others in distributed storage. They depict new open key cryptosystems which deliver steady size cipher texts such that productive designation of unscrambling rights for any arrangement of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2015

    A Generational Evolutionary Approach on Large Databases for Quality Records

    Different types of digital libraries and ecommerce websites are exist with duplicate contents. Previously many systems are present for removing replica or duplicate items. Previous approaches are implemented in different repositories for detection of duplicate records. It can provides the organized or alignment based results. Those approaches are detect the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2015

    Framework for Live Digital Forensics using Data Mining

    With the rapid advancements in information and communication technology in the world, crimes committed are becoming technically intensive. When crimes committed use digital devices, forensic examiners have to adopt practical frameworks and methods to recover data for analysis which can pose as evidence. This concept explains emerging cyber-crimes, forensic analysis...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2015

    Enabling Data Integrity Check and Corruption Prevention in Thin Cloud Storage

    Cloud computing has evolved and matured, it gets growing interest in the enterprise market where economic pressures are challenging traditional IT operations. Many IT organizations face inefficiency in areas like funding projects, and resource utilization. Cloud computing is focused on addressing these issues by cutting costs through better standardization, higher...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2015

    Industrial Computing Systems: A Case Study of Fault Tolerance Analysis

    Fault tolerance is a key factor of industrial computing systems design. But in practical terms, these systems, like every commercial product, are under great financial constraints and they have to remain in operational state as long as possible due to their commercial attractiveness. This paper provides an analysis of the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2015

    Empirical Evaluation of Classifiers' Performance Using Data Mining Algorithm

    The field of data mining and Knowledge Discovery in Databases (KDD) has been growing in leaps and bounds, and has shown great potential for the future. Data classification is an important task in KDD (knowledge discovery in databases) process. It has several potential applications. The performance of a classifier is...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2015

    Web Crawl Detection and Analysis of Semantic Data

    Web mining can be defined as mining of the WWW to retrieve useful knowledge and data about user behavior, user query, content and structure of the web. In this paper, aim on processing of structured and unstructured data mining will take place. With a tremendous development growth in website, web...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2015

    Hierarchical Filter based Document Clustering Algorithm

    Clustering is the one of the major important task in data mining. The task of clustering is to find the fundamental structures in data and categorize them into meaningful subgroups for supplementary study and examination. Existing K-means clustering with MVS measure it doesn't best position to cluster the data points....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Location Based Search Queries with Ultimate Privacy Preserving Considerations

    The location-based searching services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. To efficiently compute the location based queries which are found in any uncertain range in the entire region, and provide much more possible solutions related to that queries...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates

    In this paper, the authors base their research on biometric systems security. They begin by introducing biometrics after which they will describe how a biometric system works before they later define what a biometric template is. Thereafter, they will explore attacks on biometric systems and lay more emphasis on biometric...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    An Overview of the Existing Routing Protocols and Trust Based Algorithms in Mobile Ad-hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a temporary network that can be dynamically formed to exchange information by wireless hosts which may be mobile. The network is ad hoc because it does not rely on any pre-existing network infrastructure like routers in wired networks. The devices in a MANET can communicate...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Survey on Big Data: Management and Challenges

    Today people live in the digital world. With increased digitization the amount of structured and unstructured data being created and stored is exploding. The data is being generated from various sources - transactions, social media, sensors, digital images, videos, audios and click streams for domains including healthcare, retail, energy and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    An Efficient Mining Approach of Frequent Data Item Sets on Large Uncertain Databases

    Mining frequent items from large uncertain database is a crucial issue, according to the accuracy, performance and computational cost, where the authors need the frequent itemset is ascertained efficiently and accurately with low computational cost and high performance in detecting Probabilistic Frequent Item (PFI), so all of these factors are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    A Comparative Study: RTOS and Its Application

    Over past few decades the idea and need of compatible Real time operating systems has emerged as one of the key factors in the development of Real time operating systems, because of the abundance of incompatible real-time operating systems in the market, each targeted towards a specific segment of the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Fuzzy Predictable Algorithm for User Experience

    Predicting and describing a user experience is a critical issue for building professional and efficient systems. The user experience introduces new research activities that focused on the interactions between products, applications, designers, and users. To achieve specific user experience goals, the authors need to find an optimal model for predicting...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Design and Implementation of Database Independent Auto Sequence Numbers

    Developers across the world use auto-number or auto sequences field of the backend databases for developing both the desktop and web based data centric applications which is easier to use at the development and deployment purpose but can create a lot of problems under varied situations. This paper examines how...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Query Based Search Results Using Web Mining System and Ontology Approach

    Internet has become an enormous and updating information warehouse, and provides a new source for information gathering to user. Searching web information on the web can be challenging task for user as relevant information is not as per context. This paper is to provide effective solution for web information retrieval....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    An Improved Classification of Network Traffic Using Adaptive Nearest Cluster Based Classifier

    In modern network security and management architecture, classification of traffic plays a major role in recent years. In particular, the process of intrusion detection and QoS control is considered as a essential components in traffic classification. Recent method uses statistical feature related classification approach with machine learning techniques for traffic...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Adaptive Context-Aware Data Management Scheme for Mobile Environments

    Data sharing and delivering in mobile environments is one of the most important interest issues in such environments. Therefore, data management is one of the biggest problems in these dynamic environments. In this dynamic environment, a user's context such as user's profile, user's social situation, and user's interests may affect...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Cloud Computing for Retailing Industry: An Overview

    Cloud computing is a novel approach which is practicing by many industries in the world, specifically the small and medium scale industries. It has become a talk of the town in computing industry and in business. Its gaining popularity can provide a lot of opportunities for the retailing industry to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Service Differentiation based on Contention Window with Enhanced Collision Resolution LR-WPANs

    The IEEE 802.15.4 MAC standard defines the channel access for low-rate, low-power communication applications such as Wireless Sensor Networks but does not differentiate between high or low priority data. The authors study few priority based service differentiation mechanisms which distinguish between such data for each and every device, and also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Overview on - A Content Filter for Unwanted Messages in Online Social Network

    Data mining is a process of analyzing and extracting useful information from databases. It helps to retrieve more information in various fields. Thus, data mining techniques provide an ease of making decisions regarding their user needs. The term spam is defined as unsolicited message and the goal of spam categorization...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Analysis of Various Clustering Techniques for Wireless Sensor Networks

    Recent years have seen expanded interest with the potential utilization of Wireless Sensor Networks (WSNs) in a wide mixed bag of uses and it has changed into a hot examination range. Owing to various favorable circumstances, clustering is currently an element extension of steering innovation in WSNs. The outline of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    A Review on Effective Data Aggregation Techniques

    From the primarily based WSNs circumstance, energy as well as bandwidth on the sensors usually are valued assets and vital to consume skillfully. Data aggregation at the base section by individual nodes causes flooding on the data which consequences throughout maximum energy consumption. In this paper, the evaluation on Data...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    A Comprehensive Study of Mechanisms Dealing Credit Cards to Defy Social Engineering Crimes

    Now-a-days, credit cards have become a prerequisite in the people daily activities. The misuse of credit card is increasing day-by-day. There are several ways in which a offender performs a credit card fraud. It is always been advised to exercise and provide additional security to the credit cards in order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Efficient Robust Interactive Personalized Mobile Search Engine

    Technology and its service based cluster mechanism plays the most important role in the building the Technology in better and smarter way to implement the best of technological advancement. In the paper of recent era where mobile plays like a PC or the users can call these days mobile more...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Data Storage in Cloud Environment Enhance Privacy

    Cloud data have to be encrypted to protect data privacy, before outsourced to the commercial public cloud. The encryption process makes effective data utilization service a very challenging task. Traditional searchable encryption techniques allow users to securely search over encrypted data through keywords. They support only Boolean search and are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Optimal Price Distribution Strategy for Mobile Service Providers

    Ubiquitous Multimedia Access has become a very common topic within the multimedia community during the last few years. Research centers and telecom providers address new, smart and efficient solutions for the ubiquitous access to multimedia data and in particular videos, from everywhere with mobile devices. But videos pose serious problems...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Handling Traffic Dynamics in Multipath Routing Topology

    To achieving a better quality of service and overall network performance, it is able to cope almost optimally with unpredicted traffic dynamics. Using multiple virtualized routing topologies, AMPLE (Adaptive Multi-topology traffic Engineering) system shows an effective routing performance. The proposed system consists of offline link weight optimization component that takes...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    FESCIM for Multi-Hop Cellular Network

    In multi-hop cellular networks, the mobile nodes forever advertise other's packets for fashionable the network performance and deployment. However, selfish nodes usually do not cooperate but make use of the cooperative nodes to relay their packets, which degrades network fairness and performance. Due to this, the authors propose a fair...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2013

    Routers Optimization and Minimizing Forwarding States with Explicit Multicast Forwarding

    Now-a-day's plenty of algorithms and techniques are available for optimization and multicast forwarding. But in this paper, the authors are improving the scalability (Efficiency) of IP multicast and source specific multicast and to reduce the number of routers for required storing the forwarding states. The Multicast forwarding mechanism optimizes the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Automatic Rule Extraction from Frequent Rules in Similar Network Sites

    Knowledge is an essential part of most Semantic Web applications and ontology. Ontology is the most important part of the knowledge. Ontology learning, which refers to extracting conceptual knowledge from several sources and building ontology from scratch, enriching, or adapting an existing ontology is one of the attempts at knowledge...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

    Patient Health Records (PHR) is maintained in the centralized server to maintain the patient's personal and diagnosis information. The patient records should be maintained with privacy and security. The privacy mechanism protects the sensitive attributes. The security schemes are used to protect the data from public access. Patient data can...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Unassailable Fuzzy Keyword Searching in Cloud Storages

    Cloud Computing allows users to dispense as well as access data remotely. The ongoing environment, in which the data is stored in cloud, has a security dent, which is still not yet resolved. A notable number of techniques have been developed to retrieve data using keyword searches through encrypted data....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Cloud Information Accountability Frameworks for Data Sharing in Cloud - A Review

    The difficulty of how to provide proper security and privacy protection for cloud computing is very important, and as yet not solved. In this paper, the authors review the cloud information accountability framework for the data sharing in which procedural and technical solutions are co-designed to demonstrate accountability by the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Security and Access Control Evaluation for Cloud Data Centers

    Cloud computing is a computing paradigm that enables highly scalable services to be consumed over the Internet on a shared basis. Cloud service providers place data in data centers which is distributed as shared data to the users. Users' data are usually processed remotely in unknown machines that users do...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Scalable Communication for Web Applications by Using Windows Azure Serive

    Cloud computing has emerged as an ideal platform for deploy scalable web applications. But at the same time they give up data consistency. However, many applications cannot give any data inconsistency scalable transaction manager which guarantee ACID properties for multi-item connections issued by Web application, even in the attendance of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Automatic Bus Recognition Through Mobile

    In this paper, the authors present a GPS (Global Positioning System) to track the vehicle in the remote areas. Here based on the latitude and longitude values of the vehicles anywhere on the globe, a microcontroller which will process the information and switch the GSM (Global System for Mobile communication)...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Vaccination Strategies of a Modified SIS Model on Complex Networks

    A new susceptible-infected-susceptible model is researched in this paper, which has an infective vector. And it describes epidemics (e.g. malaria) transmitted through an infective vector (e.g. mosquitoes) on complex networks. The authors compare the modified model with the standard SIS model having an infective vector. They also study and compare...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Reviewing Effectiveness of CAPTCHA

    The massive use of the Internet and WWW by the government and commercial organizations for automation of work has resulted in extensive proliferation of online computing. To avoid online forms being filled by bots or malicious computers the form designers usually use a cryptic image known as CAPTHA (Completely Automated...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Assuring Data Sharing and Culpability as a Service in Cloud

    Cloud computing presents a replacement thanks to supplement the present consumption and delivery model for IT services supported the net, by providing for dynamically accessible and sometimes virtualized resources as a service over the net. Data handling is outsourced by the direct Cloud Service Provider (CSP) to alternative entities within...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Implementation Opass Authentication Protocol System for Net Security

    Safety may be a major focus of awareness for operators and users of the web site and its several applications, among the tough issues still inefficiently self-addressed is identity authentication for functions of associating specific user with particular services and authorizations. Asking may be thanks to classify users such shaping...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Wireless LAN Security: Addressing Challenges, Attacks and Solutions

    With tremendous growth and advancement in wireless technology and excessive use of internet in all the applications, security has become one of the most crucial and most demanding factors in wireless LAN, no matter if it is an individual, home or a business network. Regardless of different benefits of wireless...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Secure Multi Party Computation For Participating Parties

    Internet and distributed computer provides joint computations. SMC is a mechanism is used for joint computations in distributed environment. It can be defined as, to provide computations in a secure manner. With SMC, parties can perform global computation on their private data without loss of data. It provides secure multiparty...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Security Through Multiple Unrelated Clouds in Cloud Computing

    Cloud computing is the latest technology that is used by many organizations in this competitive world. As many organizations are using cloud computing, the major issue that has arised is security. In single cloud there are many security issues and the possibility of malicious insiders is also high. But in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Ensuring Data Privacy and Access Anonymity using CryptographicTechniques in Cloud Computing

    Cloud computing offers many advantages, such as data ubiquity, flexibility of access, better performance and low start up cost. However, this introduces new challenges. The main challenge is the owner's loss of control of his data and the reliance on the trustworthiness of the service provider. Secure access control policies,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Hybridization of Symmetric Key Encryption and Visual Cryptography

    Visual cryptography technique encipher the visual information in such a way, that decipher can be performed by human visual system without any complex decoding process. As visual cryptography, is a secure tactics for transmitting visual information but, if anyone gets access to all shares, he/she can reveal out the secret...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    An Integrated Research Analysis of Cloud Forensics for Secured Computing Environment

    Cloud forensics under cloud computing an on-demand paradigm becoming a well transformative technology in the computing now a day's grabbing important attention towards pursuing in-depth analysis of security issues, migrations from disasters, outages experienced by many CSP today in cloud environment. In spite of better understanding about the domain this...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Slicing Technique For Privacy Preserving Data Publishing

    Privacy-preserving data mining is the area of data mining that used to safeguard sensitive information from unsanctioned disclosure .The problem of privacy-preserving data mining has become more important in recent years because of the increasing ability to store personal data about users. A number of techniques such as randomization and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Security Issues and Solutions for Cloud Computing

    The "Lower costs" of cloud services, "Flexibility" and the "Speed of deployment" are all vastly demanded by most of the organizations in today's world. However, a common concern remains amongst large enterprises is about the handover of the control of data to cloud providers. It is true that many technology...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Attack Pattern Discovery for Autonomous System

    The Border Gateway Protocol is a most important component of the Internet's routing infrastructure .It is used to exchange the routing information between the Autonomous System. The BGP is the one which helps to verify the vulnerability, authenticity and also helps in prioritize the traffic .By analyzing the network traffic...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    A FEC Decoding in LTE and WiMAX Systems

    In this paper, the authors are mainly dealing with Forward Error Correction (FEC) which is a technique used for controlling data errors in unreliable or noisy channels. Recent wireless systems such as EDGE, WIMAX, LTE are using LDPC, tail biting and turbo convolution codes as the Forward Error Correction codes...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Eradicate Energy Inefficiencies That Reduce The Lifetime Using Clustering Approach For WSN

    The Wireless Sensor Network technology is a enter constituent for everywhere. A Wireless Sensor Network consists of a huge number of sensor nodes. Every sensor node senses ecological circumstances such as temperature, force and light and sends the sensed data to a base station which is a long way off...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Secure CRM Cloud Service using RC5 Algorithm

    Enterprises always used organizational internal storage system for storing data. Mainly in a Customer Relational Management i.e. CRM system, the internal storage will be used for storing all the data of the customer. On the other hand, the main drawbacks in the data storage are there may be intruders in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Secure Web Mining Framework for e-Commerce Websites

    In this paper, the authors deal with e-commerce website and shows the usage of web mining technology to provide security for e-commerce websites. User behavior on the web is based on web mining, security and e-commerce. Customer behavior pattern is analyzed to improve e-commerce websites. Different web mining algorithm and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Review of Transactions on Illuminated Facial Image Preprocessing for User Authentication

    In this paper, the authors mainly deal with improving the performance of face detection security system by removing the two most important factors that is illumination and reflectance which hamper detection or reorganization. The problem in 2D face verification system is poor illumination condition which causes variation in facial image...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Cryptoviral Extortion: A virus based approach

    As the authors know that traditionally, "Cryptography" is used for information processing and communications, it helps people to store information securely and it is used very frequently for private communications. But Cryptovirology is the study of applications of cryptography to build the malicious software (malware). It is an investigation, how...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Analysis and Implementation of Different Digital Image Watermarking Techniques for Secure Data Transmission

    The rapid advancement of internet has made it easier to send the data/image accurate and faster to the destination. The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. Diverse techniques including watermarking, steganography, and cryptography have been introduced...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Securing User's Data in HDFS

    With the advent of technology and increasing growth in volume of data the business are finding the cloud as suitable option to host their data. However, putting the sensitive data on third-party infrastructure poses several security risks to their data utilizing the advantages of the Clouds. Though there are many...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Challenges and Issues in 4G - Networks Mobility Management

    Wireless broadband technology is now in motion to provide higher data rate, wider coverage and improved mobility. Towards this, the 4G-network is an integration of various wireless technologies and expected to provide seamless mobility. Moreover 4G-networks will be entirely packet switched systems based on IP protocol. One of the research...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Chain Clustered Communication Protocol for WSN

    A Wireless Sensor Network (WSN) is composed of a collection of sensor nodes. Sensor nodes being small energy constrained devices; hence the main focus is that these have to be as energy efficient as possible. The focus should also be on minimizing the transmitting and receiving of data, as these...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Mobile Location-Based Tour Guide System

    Mobile phones are the most commonly used communication tools. Using mobile phones to obtain information is not only quick, but also more convenient shortcut to improve people's lives. In the paper, the authors propose the software development architecture based on Web services. This framework introduces the three-layer architecture of Web...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    An Efficient Approach For Integrating Data Mining Into Cloud Computing

    Cloud computing and data mining are the two emerging trends now a days in the world of information technology and computing. This paper deals with the study of how data mining is used in cloud computing. Data mining is a process of extracting potentially useful information from raw data, and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Spectral Flatness Measurements for Detection of C-Worms

    Active Worms such as Morris (1988), CodeRed (2001), Nimda (2001), Slammer worm (2003),Blaster (2003) and Witty (2004) had always caused large parts of the Internet to be temporarily inaccessible, costing both public and private sectors millions of dollars. The authors identified a hard to detect new class of worms like...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2013

    Secure Mobile System Using NTRU Encrypt

    The first IM system created by Mirabilis (a pioneer of online chatting that revolutionized communication over the Internet), dubbed ICQ (I seek you), in 1996 which achieved widespread adoption quickly among netizens. Although other Instant Messaging (IM) systems have surpassed ICQ in popularity, the medium of IM remains a popular...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2013

    Dual Encryption Schema with Cheating Text and NTRU

    Shared data systems have grown in numbers and hence they are susceptible to many security challenges. The sender embeds a plain message in another plain text called Cheating Text. The positions of the characters of the plain text in the cheating text are stored in a Real Message Index File...

    Provided By IJCTT-International Journal of Computer Trends and Technology