IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 328 results

  • White Papers // Jun 2014

    Performance Comparison of Two Streaming Data Clustering Algorithms

    The Weighted Fuzzy C-Mean clustering algorithm (WFCM) and Weighted Fuzzy C-Mean-Adaptive Cluster number (WFCM-AC) are extension of traditional fuzzy c-mean algorithm to stream data clustering algorithm. Clusters in WFCM are generated by renewing the centers of weighted cluster by iteration. On the other hand, WFCM-AC generates clusters by applying WFCM...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Smart City Analysis Using Spatial Data and Predicting the Sustainability

    Smart city planning is crucial as it should balance among resources and the needs of the city. It allows to achieve good eco-friendly industries, there by supporting both the nature and the stake holders. Setting up an industry is a difficult problem, because it should optimize the resources and allocating...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2014

    Integration of Cloud Computing and Web2.0 Collaboration Technologies in E-Learning

    Cloud computing technology is an emerging new computing paradigm for delivering computing services. Although it still in its early stage, it has changed the way how many applications are developed and accessed. This computing approach relies on a number of existing technologies, such as Web2.0, virtualization, Service Oriented Architecture (SOA),...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Secure and Reliable Watermarking in Relational Databases

    The rapid growth of the Internet and related technologies has offered an unpredicted ability to access and redistribute original digital contents. Watermarking techniques have emerged as an important building block that plays a crucial role in addressing the ownership problem. A watermark is owner information that is securely and robustly...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Effective Classification of Text

    Text mining is the process of obtaining useful and interesting information from text. Huge amount of text data is available in the form of various formats. Most of it is unstructured. Text mining usually involves the process of structuring the input text which involves parsing it, structuring it by inserting...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Efficient Sink Scheduling for Data Travelling in WSNs with Delay Constraint

    The objective of system is to use sink mobility to prolong the network lifetime in wireless sensor networks where the information delay caused by moving the sink should be bounded. In this paper, a unified framework for analyzing the joint sink mobility, routing, delay, and so on is built. The...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Effectiveness in Packet Data Transmission in the Reserved Channel Bandwidth Wireless Sensor Network

    In the trend of wireless sensor network, where nodes plays the most important role in implementing the wave based communication. These days if people look the telecom Industry where IT plays the crucial role in implementing the path of communication has changed a lot, considering those factors in this paper...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    A Meta-heuristic Approach for Image Segmentation using Firefly Algorithm

    Image segmentation is one of the main steps of image processing, in which any image is being subdivided into multiple segments. Each segment will represent some kind of information to user in the form of color, intensity, or texture. Image segmentation is one of the basic and important steps of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Deadline - Cost Based Job Scheduling Using Greedy Approach in a Multi-Layer Environment

    Cloud computing is a well-liked computing model to support on demand services. With the use of Internet technologies, scalable resources are delivered as a service to external customers. Scheduling in cloud is responsible for selection of best suitable resources for task execution, by considering some static and dynamic parameters and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    An Implementation of Secure Data Exchange Ensuring Authentication and Authorization Using Color Drops

    Secure communication is when two entities are communicating and do not want a third party to listen in. For that they need to communicate in a way not susceptible to eavesdropping or interception. Here maintain user privacy, and preserve data integrity via encryption and decryption technique. Using a trust-overlay network...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    An Efficient Query Mining Framework Using Spatial Hidden Markov Models for Automatic Annotation of Images

    A novel method for automatic annotation of images is used with keywords from a generic vocabulary of concepts or objects combined with annotation-based retrieval of images. This can be done by using spatial hidden Markov model, in which states represent concepts. The parameters of this model are estimated from a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Attribute Based User Control Access for Cloud Storage Data

    Online documents provide very convenient ways for individuals to store and share various data including personal profile, business documents and etc on remote online data servers. Cloud computing, regarded as the future IT architecture, and even promises to provide unlimited and elastic computing resources to cloud users in a very...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Mobility in Cloud Systems

    Cloud computing is a huge amount of distributed and dynamic resources that are provided on request to clients over the Internet. This technology improves applications services by arranging machines and distributed resources in a single huge computational entity. Normally, cloud servers don't operate at full capacity; means there's some processing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Achieving Privacy Assured Outsourcing of Data in Cloud Using Optimalvisual Cryptography

    Security has emerged as the most feared aspect of cloud computing and a major hindrance for the customers. In existing system for establishing secure and privacy-assured service outsourcing in cloud computing which uses linear programming and compressed sensing techniques to transform images, which aims to take security, complexity, and efficiency...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    VirtuMob : Remote Display Virtualization Solution For Smartphones

    Mobility is an important attribute in today's computing world. Mobile devices, Smartphone and tablet PC are becoming an integral part of human life because they are most effective and convenient communication tools. This paper proposes a system to connect and access the desktops of remote computer systems using an android...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Energy Efficiency in Cloud Data Centers Using Load Balancing

    Cloud computing is an expanding area in research and industry today, which involves virtualization, distributed computing, internet, and software and web services. This paper presents an approach for scheduling algorithms that can maintain the load balancing. In this paper the authors have developed power optimization algorithm which over comes the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    A Qualitative Study of Various Improvements in Cluster Based Routing Protocols for WSN

    A wireless sensor network is comprised of hundreds and thousands of small tiny devices called sensor nodes which are distributed in such a way so as to monitor real environment conditions likewise temperature, pressure, humidity, etc. But most of the wireless sensor networks are constrained to their low network lifetime...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Improved Authentication Scheme for Dynamic Groups in the Cloud

    Now-a-days most of the organizations managing data to the cloud such that an active member of the group can be able to share data with other members of the group. Because of its insecure nature, the authors propose Initiator which acts as the middleware between the group manager and the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Survey on Clustering Algorithm for Document Clustering

    In today era all document are in electronic format to save space and easy access. So, the biggest task is to the retrieve document from large database. The document clustering is the process of partitioning collected data into subgroups with similarities. The purpose of document clustering is to provide technique...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Content Based Image Mining Technique for Image Retrieval Using Optimized Hybrid Clustering

    Content based image retrieval system is a widely used method for finding and retrieving images from large databases. In this paper, the authors describe the development and implementation of a content based image mining technique for image retrieval .The proposed CBIR technique uses more than one clustering techniques to improve...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    IDS in Cloud Environment

    During recent years, various new technologies have been invented for network based systems. A large volume of data is transferred between the systems via Internet. In today's time, providing security to the network based systems is very important to perform all operations in reliable manner. With graduate increase in number...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2014

    Unsupervised Opinion Mining From Text Reviews Using SentiWordNet

    Opinion mining is a discipline or area of text classification which continues gives contribution in research field. Sentiment analysis is one another name of opinion mining. Opinion mining analyzes and classifies the user generated data like reviews, blogs, comments, articles etc. Now-a-days every people use web services and gives their...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Journey from Data Mining to Web Mining to Big Data

    Data is the collection of values and variables related in certain sense and differing in some other sense. The size of data has always been increasing. Storing this data without using it in any sense is simply waste of storage space and storing time. Data should be processed to extract...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Survey on Clustering Algorithms for Sentence Level Text

    Clustering is an extensively studied data mining problem in the text domains. The difficulty finds numerous applications in customer segmentation, classification, collaborative filtering, visualization, document organization, and indexing. In text mining, clustering the sentence is one of the processes and used within general text mining tasks. Several clustering methods and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Automatic Database Clustering: Issues and Algorithms

    Clustering is the process of grouping of data, where the grouping is established by finding similarities between data based on their characteristics. Such groups are termed as clusters. Clustering is an unsupervised learning problem that group objects based upon distance or similarity. While a lot of work has been published...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Enhance the XML Documents Security using Web Services

    An increasing amount of semi-structured data, XML has become fundamental to humans and programs. XML changed by the World Wide Web Consortium (W3C) is quickly emerging as a new standard language for semi-structured data representation and transfer on the Internet. XML documents usually hold private information that cannot be shared...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Security Protection Mechanism for Social Networking Websites Based on Real-Time Proxy

    During the last two decades information technology has grown tremendously and became the main source of knowledge. In past few years the world getting closer and closer this is only because of social networking websites such as Facebook, Twitter etc. Yet with usefulness and the popularity, the misuse and cybercrime...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Creation of Load Balanced Mail Server Management System Using Cloud Computing

    Electronic mail service is the rapid growth of the Intranet/Internet its explains how to read and use Management Information Base (MIB), Simple Network Management Protocol (SNMP) these devices are managed ones that can be controlled, monitored and are capable of reporting events. This system facilitates mailing among the users of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Web Mining using Artificial Ant Colonies : A Survey

    Web mining has been very crucial to any organization as it provides useful insights to business patterns. It helps the company to understand its customers better. As the web is growing in pace, so is its importance and hence it becomes all the more necessary to find useful patterns. Here...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Survey Paper for Maximization of Profit in Cloud Computing

    The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Today, it has the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. The cloud computing is the concept implemented to decipher the daily...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Minimizing Spurious Patterns Using Association Rule Mining

    Most of the clustering algorithms extract patterns which are of least interest. Such pattern consists of data items which usually belong to widely different support levels. Such data items belonging to different support level have weak association between them, thus producing least interested patterns which are of least interest. The...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Data Acquisition and Reduction Algorithm for Shearing Interferometer Based Long Trace Profilometer

    The Long Trace Profilometer (LTP) is a non-contact optical profiling instrument, designed to measure the absolute surface figure to nanometer accuracy of long strip flat, spherical and aspherical X-ray optics of up to 1200mm in length of distance. A key feature of the LTP is the wide range of surface...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET

    Ad-hoc networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, bandwidth, and energy resources. Additionally, frequent packet loss errors require a security solution that can tolerate missed packets. The existing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Different Type of Feature Selection for Text Classification

    Text categorization is the task of deciding whether a document belongs to a set of pre specified classes of documents. Automatic classification schemes can greatly facilitate the process of categorization. Categorization of documents is challenging, as the number of discriminating words can be very large. Many existing algorithms simply would...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2014

    Web Content Classification: A Survey

    As the information contained within the web is increasing day-by-day, organizing this information could be a necessary requirement. The data mining process is to extract information from a data set and transform it into an understandable structure for further use. Classification of web page content is essential to many tasks...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Optimizing Resource Allocation in IAAS Clouds

    Cloud computing is a phenomenon which bestows new model of computing. It has various service modes. The service model which provides on-demand access to computing resources is known as Infrastructure-as-a-Service (IaaS). The IaaS allows cloud users to access resources in pay per use fashion. The problem with this service model...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    A Survey of Preprocessing Method for Web Usage Mining Process

    The amount of web applications are increasing in large amount and users of web applications are also increasing rapidly with high speed. By increasing number of users the size of log file also increases .The information which stores in log files cannot be directly used for analysis. Therefore preprocessing of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Revival of Secure Top-k Multi-Keyword over Encrypted Cloud Data

    Cloud computing has recently emerged as a new platform for deploying, managing, and provisioning large-scale services through an Internet-based infrastructure. However, concerns of sensitive information on cloud potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable Symmetric Encryption (SSE)...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment

    Cloud computing is an emerging technology in distributed computing which facilitates pay per model as per user demand and requirement. Cloud consists of a collection of virtual machine which includes both computational and storage facility. The primary aim of cloud computing is to provide efficient access to remote and geographically...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2014

    Analysis of Job Scheduling Algorithms in Cloud Computing

    Cloud computing is flourishing day-by-day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of issues are confronted like heavy load or traffic while computation. Job scheduling is one of the answers to these issues. It is...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2013

    Meticulous Tasks of Various Cryptographic Techniques in Secure Communications

    A hash function is a function that takes a relatively arbitrary amount of input and produces an output of fixed size. In this paper the authors provide an understandable knowledge about cryptographic techniques. This paper deals with various message authentication codes, hash functions and encryption techniques and provides in-depth analysis...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2013

    Database Based Validation of Union of Two Multigranular Rough Sets

    Most of the traditional tools for undertaking modeling, reasoning and other computing are found not only crisp but also highly deterministic and more precise in character which usually limits their applicability in real life situations led to the extension of the concept of crisp sets so as to model imprecise...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2013

    An Effective Algorithm for Mining and Grouping Online Transactions in Online Systems

    Online transaction data between online visitors and online functionalities usually convey users' task-oriented behavior models. Grouping online transactions might be captured knowledge which provides information, in return, creating user accounts, which may be associated with different navigational models. Some future online applications like online recommendations or online personalized applications, the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2013

    An Effective Instruction by Mining Online Graphs

    Today heavy explosion of various contents created on the internet, instruction techniques have become increasingly essential. The different kinds of instruction techniques are made on the online, today the authors observe these instruction techniques on movies, music, images, books, query resolution, tags idea, etc. for priority purpose. Different data sources...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2013

    Multi Input Multi Output Network Systems with Explicit Rate Schemes

    In multi-input - multi-output network system applications data is shared over the network. Presently with the increase in such kind of networks there are many limitations such as loss of data, speed of network, network congestion, to make an effective network the authors have focused on the design of an...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2013

    Sparse Social Domains Based Scalable Learning of Collective Behaviour

    Social networking is process where many people get connected with each other share their views and images. Social networking has become very important these days where many people get connected globally, every individual today has a social networking site account for example the people can consider Facebook which has gained...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2013

    Data Sharing Website Using Personalised Search

    Large-scale user contributed images with tags are easily available on photo sharing sites. However, the disturbance or in-appropriate correspondence between the images and tags prohibits them from being leveraged for precise image retrieval and efficient management. To resolve the tag refinement problem, the authors proposing a Ranking method based and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2013

    Web Data Extraction Using the Approach of Segmentation and Parsing

    Given the URL's, automatically extracting the data from these result pages is very important for many applications, such as data integration, which need to cooperate with multiple web databases. In this paper the authors present a method which can extract the data of their interest out of the identified data...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2013

    Key Features and Optimum Performance of Network Simulators: A Brief Study

    In the network area, to establish a network in real time for any experiment is very difficult. To test a simple problem takes a large amount of time and cost. So it is not quite possible to implement the whole network scenario in a real time. There are many tools...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Sep 2013

    Comparison of Graph Clustering Algorithms

    Clustering algorithms are one of the ways of extracting the valuable information apart from a large database by partitioning them. All of these clustering algorithms have their main goal that is to find clusters by maximizing the similarity in intra clusters and reducing the similarity between different clusters. Besides of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2013

    Optimizing Energy Consumption Using Cluster Based Approach for Collision Avoidance in Wireless Sensor Network

    In wireless sensor networks, congestion happens when the traffic load being offered exceeds the obtainable capability of sensing element nodes. In most applications, each sensing element node will send the event it's detected to a sink node. This operation makes the sensors nearer to the sink, leading to congestion. Congestion...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2013

    Survey of Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

    Mobile ad-hoc network is a communications less and decentralized network which request a robust dynamic routing protocol. To provide the needs of communications for Mobile Ad hoc NETwork (MANET) many routing protocols have been proposed in earlier works. Routing is the challenging issues in Mobile Ad hoc NETwork (MANET). Most...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2013

    Handling Queries in MANETs Using Apriori Algorithm to Increase Data Availability and Reduce Query Latency

    In mobile ad-hoc networks, node or link failures are common due to frequent network partition and that problem is solved by using replication technique. In this technique, the data items are replicating on mobile hosts. Some schemes are exists to balance the trade-offs between data availability and query latency under...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2013

    Foundation for Frequent Pattern Mining Algorithms' Implementation

    As with the development of the IT technologies, the amount of accumulated data is also increasing. Thus the role of data mining comes into picture. Association rule mining becomes one of the significant responsibilities of descriptive technique which can be defined as discovering meaningful patterns from large collection of data....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2013

    Privacy Preserving Visualization Using Clustering

    Today privacy preserving plays a major role in maintaining databases. Because there are many privacy breaching techniques have been developed to breach privacy and view the secured data. To overcome this drawback many techniques like k-anonymity and l-diversity are developed but they did not completely provide privacy and repeated attacks...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    A Survey and Taxonomy of Cyber Foraging of Mobile Devices

    With the ever-increasing advancement of mobile device technology and their pervasive usage, users expect to run their applications on mobile devices and get the same performance as if they used to run their applications on powerful non-mobile computers. There is a challenge though in that mobile devices deliver lower performance...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Reduction of SQL Injection & XSS Attacks Using IPAAS

    Network security is a main challenge now-a-days. There are different types of attacks in network. SQL Injection attacks are the most common attacks. Statistical survey says that most of the web sites which collaborate with the database are decumbent to SQL Injection or cross site scripting attacks. Detecting these attacks...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    To Improve Data Security by Using Secure Data Transmission

    The \"Secure data transmission\" is a software solution which provides security during transmission. Present day security is the main issue that the third person attacks on the data. To provide security Tiny Encryption Algorithm (TEA) is used. TEA is used for encryption and decryption of data. Encryption plays a cordial...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET

    An ad hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    An Effective Cloud Service Reservation Through Negotiation

    When making reservations for cloud services, the consumer should provide with price and time slot for the service. The provider gives the price and time slot which are available, then the particular service will be provided to the user by negotiation of both price and time. Since there is a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Proficient and Protected Content Dispensation In Distributed Environment To Client Proxy-Based Transcoding Approach

    Currently internet client varies widely both in hardware and software properties. The ever increasing requirements of clients to support heterogeneous environment demand some techniques to adapt the same content to diverse devices by pervasive computing. Content service may perform media conversion such as from text to audio. The transcoding function...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Secured Packet Hiding Technique for Packet Jamming Attacks

    Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. Jamming attacks can severely interfere with the normal operation of networks and, consequently, mechanisms are needed that can cope with jamming attacks. The Denial of Service attacks (DoS); the most widespread attack...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Design an Algorithm for Data Encryption and Decryption Using Pentaoctagesimal SNS

    Encryption is the most effective way of computer science concerned with developing schemes and formula to achieve data and information security through the use of codes. Today the privacy is the main issue to sending information from one point to another in data transmission. Encryption is the procedure that allows...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Statistical Anomaly Detection Technique for Real Time Datasets

    Data mining is the technique of discovering patterns among data to analyze patterns or decision making predictions. Anomaly detection is the technique of identifying occurrences that deviate immensely from the large amount of data samples. Advances in computing generates large amount of data from different sources, which is very difficult...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Vertical Clustering of 3D Elliptical Helical Data

    In this paper the authors propose an effective vertical clustering strategy of 3D data in an elliptical helical shape based on 2D geometry. The clustering object is an elliptical cross-sectioned metal pipe which is been bended in to an elliptical helical shape which is used in wearable muscle support designing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Efficient Preprocessing and Patterns Identification Approach for Text Mining

    Due to the rapid expansion of digital data, knowledge discovery and data mining have attracted significant amount of attention for turning such data into helpful information and knowledge. Text categorization is continuing to become the most researched NLP problems on account of the ever-increasing levels of electronic documents and digital...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    An Efficient Classification Approach for Novel Class Detection by Evolving Feature Datastreams

    Data stream classification has been an extensively studied research problem in recent years. Data stream classification requires efficient and effective techniques that are significantly different from static data classification techniques because of its dynamic nature. Existing system faces major challenges in the methods namely feature-evolution, infinite length, concept-drift and concept-evolution....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    A Novel Approach to Detect Spam Worms Propagation with Monitoring the Footprinting

    One of the key security threats on the Internet are the compromised machines that can be used to launch various security attacks such as spamming and spreading malware, accessing useful information and DDoS. Attackers for spamming activity are volunteer by large number of compromised machines. The authors' main focus is...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Reducing Binding update in NEMO Supported PMIPV6

    Proxy Mobile IPV6 (PMIPV6) is a network-based mobility management protocol, designed to keep track of individual mobile node's mobility. Numerous research works are in progress to enhance functionality of PMIPV6 to support NEtwork MObility (NEMO) as well. NEMO-BSP (NEMO Basic Support Protocol) is the protocol designed for NEMO and it...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Multi-Level Association Rule Mining: A Review

    Association rule mining is the most popular technique in the area of data mining. The main task of this technique is to find the frequent patterns by using minimum support thresholds decided by the user. The Apriori algorithm is a classical algorithm among association rule mining techniques. This algorithm is...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    A Tree of Life Approach for Multidimensional Data

    With the recent exponential growth of ICT, there is explosive growth of data of varied nature. Human effort is always to efficiently store the data for the current and future usages. In the present day, the people create data with a speed that 90% of the total data in the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Cluster Head Election and Multi Hop Using Fuzzy Logic for Wireless Sensor Network

    A wireless Sensor Network (WSN) consists of such spatially distributed autonomous sensors (a device that is generally able to perform its task without being connected to the interrogation unit) to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Data Concealing in Encrypted Images Using Reversible Data Hiding (RDH) Technique

    In the new era of technology, more attention is needed to be given to hide some personal data or secret information, etc. This can be exactly brought out through Reversible Data Hiding, since it maintains the splendid property that the original cover can be retrieved back after data is embedded....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Anomaly Detection Based on Access Behavior and Document Rank Algorithm

    Distributed Denial of Service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding, ICMP flooding and UDP flooding, which are called DDoS attacks. The intention of these DDoS attacks is to utilize the network bandwidth and deny...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Proactive Web Server Protocol for Complaint Assessment

    Vulnerability discovery with attack Injection security threats are increasing for the server software, when software is developed, the software tested for the functionality. Due to unawareness of software vulnerabilities most of the software before pre-release the software should be thoroughly tested for not only functionality reliability, but should be tested...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2013

    Ranking Based Approach To Maximize Utility Of Recommender Systems

    E-commerce applications that sell products online need to recommend suitable products to customers to fasten their decision making. The recommender systems are required in order to help users and also the businesses alike. There were many algorithms that came into existence to built recommender systems. However they focused on recommendation...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2014

    Novel Implementation of O-Pass Security Model Design of User Authentication for Password Stealing and Reuse Attacks

    Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users' passwords are prone to be stolen and compromised under different threats and vulnerabilities. Firstly, users often select weak passwords and reuse the same passwords across different websites. Routinely reusing passwords...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    Secure Similarity Search on Outsourced Metric Data

    Cloud computing has become an affordable technology for outsourcing data. This will help individuals and organizations to have plethora benefits such as storage, platform, software and other services. In spite of the advantages, the cloud users have security concerns as the cloud server is considered \"Untrusted\". In this paper the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2013

    A Novel Technique in Cryptography for Data Hiding in Digital Images

    Visual cryptography, an emerging technology used in the purpose of data hiding and other specific purposes, uses the characteristics of normal encryption and decryption levels of many digital images. Generally, technology that uses images needs neither cryptography knowledge nor complex computation. For ensured concerns, it also assures that cyberpunks cannot...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2014

    M-Privacy Preserving Synergetic for Data Publishing

    The goal of privacy preserving data mining is to develop data mining methods without increasing the risk of misuse of the data used to generate those methods. In this paper, the authors' focus is on the study of Data mining is the extraction of interesting patterns or knowledge from huge...

    Provided By IJCTT-International Journal of Computer Trends and Technology