IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 613 results

  • White Papers // Jun 2015

    Robust And Enhanced Secured Multiple-keyword Search over Encrypted Cloud Data

    As distributed computing turn out to be more adaptable & compelling regarding economy, information proprietors are inspired to outsource their mind boggling information frameworks from nearby destinations to business open cloud. In any case, for security of information, touchy information must be scrambled before outsourcing, which succeeds system for conventional...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2015

    Bulk Data Extraction, Validation and Processing of Records in a Spreadsheet File Using PL/SQL Constructs

    Traditionally, many stakeholders keep their information in spreadsheet sheets (.xls or .ods extension). Instead of changing the traditional way of storing the data in excel sheet by these users, the paper presented here, will allow them to store data in the spreadsheets and the API's written, will directly fetch the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2015

    Power and Area Analysis of Flip Flop Using Different Techniques

    The use of Very Large Scale Integration (VLSI) technology in high performance computing, wireless communication and consumer electronics has been rising at a very fast rate. The challenge of advanced VLSI technology is growing in leakage power consumption. In these days, standby leakage power dissipation is emerging as the major...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Combining and Analysing Apriori and K-Means Algorithms for Efficient Data Mining on the Web

    Web mining is the combination of data assembled by combining information mining techniques and procedures with data accumulated over the World Wide Web. Mining means extricating something helpful or important from a large no of datasets. Web mining is utilized to comprehend client conduct, assess the adequacy of a specific...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    A Hybrid Approach for Content Based Image Retrieval From Large Dataset

    Image processing is one of the methods to convert an image into digital form and perform some operations on it, in order to get an enhanced image or to extract some useful information from it. The volume of digital images generated and uploaded on the internet are very large. The...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Multi Tiered Security and Privacy- Enhancing Multi-cloud Environment

    Technology and its advancement lead the people to research for the next level of the advancement. In the context of the cloud computing which the people can tell as the technological advancement plays the vital role in the industry of information technology. In this paper, the authors have given emphasis...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Protection in Cloud Storage: Exploration of the Projected Contract Signing Protocol

    Numerous tendencies are usually aperture up the cycle of cloud computing, that is an Internet-based building and utilize of computer technology. The extremely economical and an assortment additional controlling processors, collectively by signifies of the SaaS processing architecture, are modifying information facilities within pools of processing versions on an massive...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    An Innovative and Efficient Approach for Detecting Unknown Attacks Using Feature Extraction Scheme and Fuzzy-Neural Networks

    In the past two decades, internet have experienced tremendous growth that has sped up a shift in computing environments from centralized computer systems to network information systems. A large volume of valuable information such as personal profiles, banking details and other valuable information is distributed and transferred through internet. Hence,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Virtualization Head Roads in Information Technology

    In today's modern competition business environment data and its efficient management is the most vital business objective of any organization. It is crystal clear that the people are in the age of information explosion where people and organizations are bombarded with information and it becomes a difficult task to get...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Fastened Data Retrieval Algorithm (FDRA)

    Fastened Data Retrieval Algorithm (FDRA) is an approach to protect the data in a decentralized network. Disruption-Tolerant Network (DTN) technologies are most popular to retrieve information on wireless devices by exploiting external storage devices. The most challenging issue here is confidentiality and reliability. This can be achieved by using Cipher-text...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Efficient Layout Design of 4-Bit Full Adder using Transmission Gate

    In any digital circuit surface area and power both are very important parameters. In this paper, 4- bit full adder using transmission gate is designed. To design 4- bit full adder two methods are used. First is semi-custom design method and second is full custom design method. In first semi-custom...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2015

    Integrating Grid Computing Technology into Multimedia Application

    Systems now-a-days are requiring huge database and massive power of computation. This cannot be gained using the available computation technology or computers. Execution time and large data processing are problems which are usually encountered in highly demanded applications such as multimedia processing. Grid computing technology offers a possible solution for...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2015

    CDN in Intra-Cloud using Smartphones

    Mobile hand held devices such as smartphones has increasingly became powerful in years. Smartphones are not only with voice oriented device but also equipped with wide capabilities with internet access and some special network features such creating a network via Wi-Fi tethering. As mobile devices become more like PC's, it...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2015

    Triggering Uttermost Escalated Patterns for Refined Clustering

    The clustering algorithm, so far, are inefficient in finding interested patterns as they reckon on the position of data items which results in large number of illegitimate patterns. The generated illegitimate patterns have low association between them providing knowledge which is of nominal significance to the user. The existing algorithm...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2015

    Scalable Data Sharing in Cloud Storage using Key Aggregate Cryptosystems

    Information offering is an imperative usefulness in distributed storage. In this paper, the authors demonstrate to safely, productively, and adaptably impart information to others in distributed storage. They depict new open key cryptosystems which deliver steady size cipher texts such that productive designation of unscrambling rights for any arrangement of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2015

    A Generational Evolutionary Approach on Large Databases for Quality Records

    Different types of digital libraries and ecommerce websites are exist with duplicate contents. Previously many systems are present for removing replica or duplicate items. Previous approaches are implemented in different repositories for detection of duplicate records. It can provides the organized or alignment based results. Those approaches are detect the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2015

    Framework for Live Digital Forensics using Data Mining

    With the rapid advancements in information and communication technology in the world, crimes committed are becoming technically intensive. When crimes committed use digital devices, forensic examiners have to adopt practical frameworks and methods to recover data for analysis which can pose as evidence. This concept explains emerging cyber-crimes, forensic analysis...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2015

    Enabling Data Integrity Check and Corruption Prevention in Thin Cloud Storage

    Cloud computing has evolved and matured, it gets growing interest in the enterprise market where economic pressures are challenging traditional IT operations. Many IT organizations face inefficiency in areas like funding projects, and resource utilization. Cloud computing is focused on addressing these issues by cutting costs through better standardization, higher...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2015

    Industrial Computing Systems: A Case Study of Fault Tolerance Analysis

    Fault tolerance is a key factor of industrial computing systems design. But in practical terms, these systems, like every commercial product, are under great financial constraints and they have to remain in operational state as long as possible due to their commercial attractiveness. This paper provides an analysis of the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2015

    Empirical Evaluation of Classifiers' Performance Using Data Mining Algorithm

    The field of data mining and Knowledge Discovery in Databases (KDD) has been growing in leaps and bounds, and has shown great potential for the future. Data classification is an important task in KDD (knowledge discovery in databases) process. It has several potential applications. The performance of a classifier is...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2015

    Web Crawl Detection and Analysis of Semantic Data

    Web mining can be defined as mining of the WWW to retrieve useful knowledge and data about user behavior, user query, content and structure of the web. In this paper, aim on processing of structured and unstructured data mining will take place. With a tremendous development growth in website, web...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2015

    Hierarchical Filter based Document Clustering Algorithm

    Clustering is the one of the major important task in data mining. The task of clustering is to find the fundamental structures in data and categorize them into meaningful subgroups for supplementary study and examination. Existing K-means clustering with MVS measure it doesn't best position to cluster the data points....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Location Based Search Queries with Ultimate Privacy Preserving Considerations

    The location-based searching services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. To efficiently compute the location based queries which are found in any uncertain range in the entire region, and provide much more possible solutions related to that queries...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates

    In this paper, the authors base their research on biometric systems security. They begin by introducing biometrics after which they will describe how a biometric system works before they later define what a biometric template is. Thereafter, they will explore attacks on biometric systems and lay more emphasis on biometric...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    An Overview of the Existing Routing Protocols and Trust Based Algorithms in Mobile Ad-hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a temporary network that can be dynamically formed to exchange information by wireless hosts which may be mobile. The network is ad hoc because it does not rely on any pre-existing network infrastructure like routers in wired networks. The devices in a MANET can communicate...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Survey on Big Data: Management and Challenges

    Today people live in the digital world. With increased digitization the amount of structured and unstructured data being created and stored is exploding. The data is being generated from various sources - transactions, social media, sensors, digital images, videos, audios and click streams for domains including healthcare, retail, energy and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    An Efficient Mining Approach of Frequent Data Item Sets on Large Uncertain Databases

    Mining frequent items from large uncertain database is a crucial issue, according to the accuracy, performance and computational cost, where the authors need the frequent itemset is ascertained efficiently and accurately with low computational cost and high performance in detecting Probabilistic Frequent Item (PFI), so all of these factors are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    A Comparative Study: RTOS and Its Application

    Over past few decades the idea and need of compatible Real time operating systems has emerged as one of the key factors in the development of Real time operating systems, because of the abundance of incompatible real-time operating systems in the market, each targeted towards a specific segment of the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Fuzzy Predictable Algorithm for User Experience

    Predicting and describing a user experience is a critical issue for building professional and efficient systems. The user experience introduces new research activities that focused on the interactions between products, applications, designers, and users. To achieve specific user experience goals, the authors need to find an optimal model for predicting...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Design and Implementation of Database Independent Auto Sequence Numbers

    Developers across the world use auto-number or auto sequences field of the backend databases for developing both the desktop and web based data centric applications which is easier to use at the development and deployment purpose but can create a lot of problems under varied situations. This paper examines how...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Query Based Search Results Using Web Mining System and Ontology Approach

    Internet has become an enormous and updating information warehouse, and provides a new source for information gathering to user. Searching web information on the web can be challenging task for user as relevant information is not as per context. This paper is to provide effective solution for web information retrieval....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    An Improved Classification of Network Traffic Using Adaptive Nearest Cluster Based Classifier

    In modern network security and management architecture, classification of traffic plays a major role in recent years. In particular, the process of intrusion detection and QoS control is considered as a essential components in traffic classification. Recent method uses statistical feature related classification approach with machine learning techniques for traffic...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Adaptive Context-Aware Data Management Scheme for Mobile Environments

    Data sharing and delivering in mobile environments is one of the most important interest issues in such environments. Therefore, data management is one of the biggest problems in these dynamic environments. In this dynamic environment, a user's context such as user's profile, user's social situation, and user's interests may affect...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Cloud Computing for Retailing Industry: An Overview

    Cloud computing is a novel approach which is practicing by many industries in the world, specifically the small and medium scale industries. It has become a talk of the town in computing industry and in business. Its gaining popularity can provide a lot of opportunities for the retailing industry to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Big Data Analysis: Apache Storm Perspective

    The boom in the technology has resulted in emergence of new concepts and challenges. Big data is one of those spoke about terms today. Big data is becoming a synonym for competitive advantages in business rivalries. Despite enormous benefits, big data accompanies some serious challenges and when it comes to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Service Differentiation based on Contention Window with Enhanced Collision Resolution LR-WPANs

    The IEEE 802.15.4 MAC standard defines the channel access for low-rate, low-power communication applications such as Wireless Sensor Networks but does not differentiate between high or low priority data. The authors study few priority based service differentiation mechanisms which distinguish between such data for each and every device, and also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Overview on - A Content Filter for Unwanted Messages in Online Social Network

    Data mining is a process of analyzing and extracting useful information from databases. It helps to retrieve more information in various fields. Thus, data mining techniques provide an ease of making decisions regarding their user needs. The term spam is defined as unsolicited message and the goal of spam categorization...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Analysis of Various Clustering Techniques for Wireless Sensor Networks

    Recent years have seen expanded interest with the potential utilization of Wireless Sensor Networks (WSNs) in a wide mixed bag of uses and it has changed into a hot examination range. Owing to various favorable circumstances, clustering is currently an element extension of steering innovation in WSNs. The outline of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    A Review on Effective Data Aggregation Techniques

    From the primarily based WSNs circumstance, energy as well as bandwidth on the sensors usually are valued assets and vital to consume skillfully. Data aggregation at the base section by individual nodes causes flooding on the data which consequences throughout maximum energy consumption. In this paper, the evaluation on Data...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    A Comprehensive Study of Mechanisms Dealing Credit Cards to Defy Social Engineering Crimes

    Now-a-days, credit cards have become a prerequisite in the people daily activities. The misuse of credit card is increasing day-by-day. There are several ways in which a offender performs a credit card fraud. It is always been advised to exercise and provide additional security to the credit cards in order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Design of Adder in Multiple Logic Styles for Low Power VLSI

    The main consideration for design and implementation of various logics and arithmetic functions, such as an adder, are the choice of basic pass transistor approach due to their high operating speed and low power dissipation. This paper is to design carry skip adder based on different technologies such as CPL...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    LowPower 32-Bit DADDA Multipleir

    Now-a-days, low power applications play a crucial task in designing of VLSI based digital circuits. They demand to investigate different techniques to reduce power consumption in digital circuits while maintains computational throughput. Low power VLSI design is a significant research area for past decades since the increasing demands on portable...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jun 2012

    Design of a Multiplexer in Multiple Logic Styles for Low Power VLSI

    The increasing demand for low-power Very Large Scale Integration (VLSI) can be addressed at different design levels, such as the architectural, circuit, layout, and the process technology level. At the circuit design level, considerable potential for power savings exists by means of proper choice of a logic style for implementing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jul 2013

    A Comparative Study of 7T SRAM Cells

    Memories are integral part of most of the digital devices and hence reducing power consumption of memory is very important in improving the system performance, efficiency and stability. In this paper, a novel 7T SRAM cell is introduced and it is compared with the two existing 7T SRAM cells. The...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    An Improved Classification of Network Traffic Using Adaptive Nearest Cluster Based Classifier

    In modern network security and management architecture, classification of traffic plays a major role in recent years. In particular, the process of intrusion detection and QoS control is considered as a essential components in traffic classification. Recent method uses statistical feature related classification approach with machine learning techniques for traffic...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Adaptive Context-Aware Data Management Scheme for Mobile Environments

    Data sharing and delivering in mobile environments is one of the most important interest issues in such environments. Therefore, data management is one of the biggest problems in these dynamic environments. In this dynamic environment, a user's context such as user's profile, user's social situation, and user's interests may affect...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Cloud Computing for Retailing Industry: An Overview

    Cloud computing is a novel approach which is practicing by many industries in the world, specifically the small and medium scale industries. It has become a talk of the town in computing industry and in business. Its gaining popularity can provide a lot of opportunities for the retailing industry to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    Location Based Search Queries with Ultimate Privacy Preserving Considerations

    The location-based searching services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. To efficiently compute the location based queries which are found in any uncertain range in the entire region, and provide much more possible solutions related to that queries...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates

    In this paper, the authors base their research on biometric systems security. They begin by introducing biometrics after which they will describe how a biometric system works before they later define what a biometric template is. Thereafter, they will explore attacks on biometric systems and lay more emphasis on biometric...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    An Overview of the Existing Routing Protocols and Trust Based Algorithms in Mobile Ad-hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a temporary network that can be dynamically formed to exchange information by wireless hosts which may be mobile. The network is ad hoc because it does not rely on any pre-existing network infrastructure like routers in wired networks. The devices in a MANET can communicate...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Service Differentiation based on Contention Window with Enhanced Collision Resolution LR-WPANs

    The IEEE 802.15.4 MAC standard defines the channel access for low-rate, low-power communication applications such as Wireless Sensor Networks but does not differentiate between high or low priority data. The authors study few priority based service differentiation mechanisms which distinguish between such data for each and every device, and also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Overview on - A Content Filter for Unwanted Messages in Online Social Network

    Data mining is a process of analyzing and extracting useful information from databases. It helps to retrieve more information in various fields. Thus, data mining techniques provide an ease of making decisions regarding their user needs. The term spam is defined as unsolicited message and the goal of spam categorization...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Analysis of Various Clustering Techniques for Wireless Sensor Networks

    Recent years have seen expanded interest with the potential utilization of Wireless Sensor Networks (WSNs) in a wide mixed bag of uses and it has changed into a hot examination range. Owing to various favorable circumstances, clustering is currently an element extension of steering innovation in WSNs. The outline of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    A Review on Effective Data Aggregation Techniques

    From the primarily based WSNs circumstance, energy as well as bandwidth on the sensors usually are valued assets and vital to consume skillfully. Data aggregation at the base section by individual nodes causes flooding on the data which consequences throughout maximum energy consumption. In this paper, the evaluation on Data...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    A Comprehensive Study of Mechanisms Dealing Credit Cards to Defy Social Engineering Crimes

    Now-a-days, credit cards have become a prerequisite in the people daily activities. The misuse of credit card is increasing day-by-day. There are several ways in which a offender performs a credit card fraud. It is always been advised to exercise and provide additional security to the credit cards in order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Efficient Robust Interactive Personalized Mobile Search Engine

    Technology and its service based cluster mechanism plays the most important role in the building the Technology in better and smarter way to implement the best of technological advancement. In the paper of recent era where mobile plays like a PC or the users can call these days mobile more...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    An Enhanced TCP Performance Based on Dynamically Weighted HMM in Optical Burst Switching for Loss Classification

    In recent times, Optical Burst Switching (OBS) is a raising contending technology in the network performance area. Therefore, because of the in efficiency of buffers, losses exist due to contention on the concurrent burst arrival in the core nodes. In this paper, contention loss occur which doesn't indicates the congestion...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Framework for Digital Forensics to Protect the Logging Information on Clouds

    Cloud computing is a rapidly developing information technology-IT occurrence. somewhat procure, manage and deploy a physical IT communications to host their organizations, software applications are progressively more deploying their communications into virtualized environments, remote, often managed and hosted by third parties. This development has considerable implications for digital forensic investigators,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Secure and Privacy-Preserving Distributed File Systems on Load Rebalancing in Cloud Computing

    Distributed file systems in cloud computing because Google File System (GFS) and Hadoop Distributed File Systems (HDFS) scheduled central servers in the direction of manage and load balancing in the metadata. Enabling technology for large-scale computation for big data originated by Google. Open source implementation by Yahoo and Facebook. Distributed...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Image Retrieval Process from Online Server with Markov-Chain Query Processing

    Here the authors are implanted a way of image based search method to get the information from server. Here searching process has done on automatic annotation image retrieval method and it have some keywords for each and every image independently, user can send their search request to the server in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Data Transformation by Privacy Preserving with Unknown ID Obligation

    Algorithms for anonymous sharing of the private data between N parties are established. This technique is used iteratively to assign these nodes Id ranging from the number 1 to N. This assignment is anonymous in that the identities received are unknown to the other members of the group. The resistance...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    SQL Backing in Databases to Support Search on the Web

    The search as the user type system computes answers on the fly as the user type in the keyword query character by character. The authors study in the support search as the user type on the data residing in relational DBMS. They fully focus on how to the support this...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Construing Search Results from the Web Databases

    The number of databases is converted web accessible over html based search boundaries. The data parts are returned from the original database are generally encoded into the outcome pages dynamically for normal user browsing. The encoded data parts to be machine process capable which is necessary for different applications like...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Data Mining Analysis for the Direct and Indirect Discrimination Prevention

    Data mining is a progressively important technology for extracting beneficial knowledge unseen in large assortments of the data. There are, however, negative social perceptions nearby data mining, between which potential privacy attack and potential discrimination. The latter consists of unfairly considering people on the basis of their fitting to a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Identify Effective Factors for Improving E-Trust of E-Transactions in the Context of E-Commerce and E-Government

    Now-a-days, application of e-commerce for companies or economic corporate and also entities and states has changed to an unavoidable issue, seeming necessary to observe its advantages and disadvantages. Due to the performance of processes in virtual or cyber site, e-commerce has been always followed by many worries, challenges and problems...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2014

    Digital Forensic Identification, Collection, Examination and Decoding of Windows Registry Keys for Discovering User Activities Patterns

    In this paper, the authors begin the investigation process with the initial forensic analysis in the segments of the storage media which would definitely contain the digital forensic evidences. These storage media locations are referred as the Windows registry. Identifying the forensic evidence from windows registry may take less time...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Supporting Search-As-You-Type Using SQL in Databases

    A search-as-you-type system determines answers while a user types a keyword query character by character. The authors study the search-as-you-type on data which is residing in a relational DBMS. They focus on native database language, SQL as how to support this type of search. A main challenge is how to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2014

    Glossing User Search Results From Large Web Databases

    An increasing number of databases have become web accessible through HTML form-based search interfaces. Hence the data units returned from the underlying database are usually encoded into the result pages dynamically for human browsing. For the encoded data units which is to be machine processable, which is necessary for many...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Big Data Analysis: Apache Storm Perspective

    The boom in the technology has resulted in emergence of new concepts and challenges. Big data is one of those spoke about terms today. Big data is becoming a synonym for competitive advantages in business rivalries. Despite enormous benefits, big data accompanies some serious challenges and when it comes to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Extended SQL Aggregation for Database Transformation

    Product life cycles to prepare a normalized data set from relational database for analysis require significant efforts and it is time consuming task. The main reason is that, in general the database grows with many tables and views that must be joined, aggregated and transformed in order to build the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Novel Integrated Approach for Big Data Mining

    The growing volume of digital internet of things is fuelling it even extra. The rate of data increase is surprising and this information comes at a speed, with diversity which is not necessarily structured. Ability to examine this massive amount of data is bringing a new age of productivity growth,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Enhanced Classification to Counter the Problem of Cluster Disjuncts

    In this paper, the authors preset a rigorous yet practical model dubbed as Cluster Disjunct Minority Oversampling TEchnique (CDMOTE) for learning from skewed training data. This algorithm provides a simpler and faster alternative by using cluster disjunct concept. They conduct experiments using fifteen UCI data sets from various application domains...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Statistical Survey on Imperial Data Handling in Big Data

    Big data technologies describe a new generation of technologies & architecture. Big data requires a change in computing architecture to customers so that they can handle data storage and server processing heavily. Most of the companies rely on applications for communication and to provide service to the customers, so big...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2013

    Position Based Opportunistic Routing Protocols for Highly Dynamic Mobile Ad- Hoc Networks

    Communications in mobile ad hoc networks in emergency situations play an important role. In such network reliability of packet delivery is indispensable as the information exchange accuracy has to be guaranteed. At the same time information has to be reached to the intended node in timely fashion. The existing solutions...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2013

    Multi-User Tool for Scientific Work Flow Composition

    Scientists with diverse expertise and located in different geographical locations may work together in order to achieve desired results. This collaboration is required in modern society as skill set required are spread multiple scientists. In order to utilize the diversified skills associated with human experts, it is essential to have...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2013

    Bi-Directional Prefix Preserving Closed Extension for Linear Time Closed Pattern Mining

    In data mining frequent closed pattern has its own role the authors undertake the closed pattern which was frequent discovery crisis for structured data class, which is an extended version of a perfect algorithm Linear time Closed pattern Miner (LCM) for the purpose of mining closed patterns which are frequent...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2013

    Maximizing Quality and Performance of Network Through Adaptive Traffic Engineering

    Network management systems are to handle traffic dynamics in order to ensure congestion free network with highest throughput. IP environments are able to provide simple facilities for forwarding and routing packets. However, in presence of dynamic traffic conditions efficient management of resources is yet to be achieved. Recently the researcher...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2013

    Improvised Convert Channel Capacity In Mls Networks

    Transmission of data from a lower-level system to higher-level system without response in return will be not able to be relied upon and not firm or unsafe even with acknowledgements. In order to provide safe & secured, reliable and performance through a communication buffer, this transmits the messages to the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2013

    An Empirical Evaluation of Internal Gateway Protocols (IGP) for Real Applications

    A range of IP network routing protocols are being used in transmitting the packets from the source node to the destination node in determining the best route. This paper presents results in the empirical evaluation of Internal Gateway Routing (IGP) protocols for real applications such as database entry, database query,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2013

    Exploring Load Balancing to Solve Various Problems in Distributed Computing

    Web base applications have grown huge and complex owing to dynamic computations and large number of dispersed users. This paper highlights some challenges before the researchers causing overload in the web based applications and necessitate the use of scheduling techniques like Dynamic Load Balancing (DLB) in Information Technology. The primary...

    Provided By IJCTT-International Journal of Computer Trends and Technology