Indian Journal of Computer Science and Engineering (IJCSE)

Displaying 1-40 of 51 results

  • White Papers // May 2014

    Efficient Optimization Technique for FPGA Using PSO

    The Field Programmable Gate Arrays (FPGAs) represent one of today's most popular digital logic implementation options. The Field Programmable Gate Array (FPGA) is popular medium to develop digital circuits. In FPGA design flow placement plays major role to optimize the wirelength and channel width. Here to minimize the interconnection length...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2014

    A Hybrid Method to Reduce Congestion and Provide Data Security in Cloud Computing

    Cloud computing is used everywhere because it provides on demand access of resources and reduces cost; it offers dynamic allocation of resources for guaranteed and reliable services. Users store their data on a single virtual server, when user wants to access any data that data might be changed or modified...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2014

    Performance Enhancement of Classifiers using Integration of Clustering and Classification Techniques

    Medical professionals need a reliable prediction methodology to diagnose Diabetes. Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. The main goal of data mining is to discover new patterns for the users and to interpret the data patterns to provide meaningful...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2014

    Green Cloud: Smart Resource Allocation and Optimization using Simulated Annealing Technique

    Cloud computing aims to offer utility based IT services by interconnecting large number of computers through a real-time communication network such as the Internet. There has been a significant increase in the power consumption by the data centers that host the cloud applications because of the growing popularity of cloud...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2014

    A Technique to improve Security of Data in Multilevel Trust

    The privacy preserving data mining technique that is used widely to conserve security of data is a random perturbation method. The original data is modified and many copies are created according to the trust levels in each field. The addition of noise level also varies with each trust level. The...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2014

    Data Mining: A 'RIM' Algorithm for Spyware Detection With Pruning

    In this paper, the authors employ the principles of data mining and classify a new algorithm. In this method, they have proposed a new anti-spyware system (spyware detection), which is capable for classifying spyware files from legitimate files. Also they have evaluated the performance of their anti-spyware system with the...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Mar 2014

    EPICS Based Monitoring and Control in Data Acquisition System

    Data acquisition plays a great role in control and monitoring systems. There is a wide choice of both the hardware and software solutions for implementing a data acquisition system. The system experimental requirements were met using the Experimental Physics and Industrial Control System (EPICS) which has been standardized by the...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Mar 2014

    An Intelligent Software Agent Machine Condition Monitoring System Using GPRS and Data Mining

    There is a tremendous development in machine condition monitoring, since the cost of machine is very high, it is a tedious process to maintain the mechanical machine in good working condition and the delay in production would provide a drastic situation for the manufacturer. In this study a new condition...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2014

    Tracing Efficient Path Using Web Path Tracing

    In the fast improving society, people depend on online purchase of goods than spending time physically. So there are lots of resources emerged for this online buying and selling of materials. Efficient and attractive web sites would be the best to sell the goods to people. To know whether a...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2014

    Fuzzy Cluster Quality Index using Decision Theory

    Clustering can be defined as the process of grouping physical or abstract objects into classes of similar objects. It's an unsupervised learning problem of organizing unlabeled objects into natural groups in such a way objects in the same group is more similar than objects in the different groups. Conventional clustering...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2014

    Survey on Distributed Data Storage Schemes in Wireless Sensor Networks

    The most important goal of distributed data storage schemes in wireless sensor networks is to efficiently distribute data across the WSN. Distributed data storage can play a vital role in improving data availability, security, energy efficiency and network lifetime of wireless sensor networks. Many researchers have been proposed various techniques...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2014

    Relative Query Results Ranking for Online Users in Web Databases

    To handle with the problem of so many-answers replied from an online Web database in response to a relative query, this paper proposes a unique approach to rank the similar query results. Depending upon the on the database workload, the authors hypothesize how much the user worries about each and...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2014

    Analysis on Performance With Combination of Scheduling and Replication in Data Grids

    Data grid is the storage component of a grid environment. Amount of data transferred among nodes can be reduced by submitting the jobs to the nodes that having maximum requested files by scheduling and reducing the access latency by initiating data replication strategies. All techniques of scheduling and replication address...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Nov 2013

    Searching SNT in XML Documents Using Reduction Factor

    XML has become the most popular standard for data representation. In XML standard the documents represented as rooted ordered trees. The efficient query processing can be performed on the labeled document structure. The major advantage of keyword search is the user need not understand the complex query language and the...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Nov 2013

    Functional Verification of Enhanced RISC Processor

    This paper presents design and verification of a 32-bit enhanced RISC processor core having floating point computations integrated within the core, has been designed to reduce the cost and complexity. The designed 3 stage pipelined 32-bit RISC processor is based on the ARM7 processor architecture with single precision floating point...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Nov 2013

    An Efficient Approach to Perform Pre-Processing

    Now-a-days, WWW (World Wide Web) becomes more popular and user friendly for transferring information. Therefore people are more interested in analyzing log files which can offer more useful insight into web site usage. Web usage mining is one of the data mining fields, which deals with the discovery and extract...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Nov 2013

    Service-Oriented Cloud Architecture Schema to Bridge Gap Between Student, Staff and Academia

    Cloud computing is a new resource platform that offers abundant amount of services for organizations to meet furthermore satisfies the needs without huge and prior investment. When it comes to the development of a cloud, architecture plays a critical role. Architectural design is the primary step to meet the client...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2013

    Design and Development of a Microcontroller Based Wireless Security Access System

    Security can simply be protecting the users' equipment and files from unauthorized access, but there is much more. Computer security helps ensure that their computers, networks, and peripherals work as expected all the time, and that their data is safe in the event of hard disk crash or a power...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2013

    Applying Parallel Association Rule Mining to Heterogeneous Environment

    Association rule mining, the major technique of data mining, involves finding frequent itemsets with minimum support and generating association rules with maximum confidence. The paper aims to discover frequent patterns by generating the candidates and frame the association rules after which filter out only the efficient rules based on various...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jul 2013

    Anonymization Based on Nested Clustering for Privacy Preservation in Data Mining

    Privacy preservation in data mining protects the data from revealing unauthorized extraction of information. Data anonymization techniques implement this by modifying the data, so that the original values cannot be acquired easily. Perturbation techniques are variedly used which will greatly affect the quality of data, since there is a trade-off...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jul 2013

    Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

    The major threat to wireless network is Denial of Service (DoS) attack. An adversary can target on the communication of the nodes and can attempt to create an attack to prevent the efficient communication. Here, the authors address the problem of jamming under an internal threat model by considering a...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jul 2013

    Adaptive Approach for Joining and Submissive View of Data in Data Warehouse Using ETL

    Data warehouses have emerged as a new business intelligence paradigm where data store and maintain in concurrent. The modifications are required in the implementation of Extract Transform Load (ETL) operations which now need to be executed in an online fashion. The adaptive approach takes two phases. The extraction phase and...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2013

    Comparative Study of Security Parameters by Cloud Providers

    Security is one of the major issues today around the world. Either it is a home user or corporate user, a small PC or a server system, nothing is totally secure, lots of issues have been raised regarding security. In this paper, the authors will be comparing the architectures of...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2013

    A Review Paper on Multidimentional Data Structures

    Multimedia data structures are needful for storing multimedia data such as text, images, audio, video, and graphical objects. The growth of digital content gave rise to the revolution of very large multimedia data structures, in which the need of efficient storage, organization and retrieval of multimedia contents came into a...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2013

    Countering the DDoS Attacks for a Secured Web Service

    Web services are the most widely used technology today. SOAP messages are the building blocks of web services. Since web services mostly deal with confidential data they must be protected from intruders. Intruders can be of any form. They can be a person or a program. One of the most...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Mar 2013

    An Efficient Text Clustering Algorithm Using Affinity Propagation

    The objective is to find among all partitions of the data set, best publishing according to some quality measure. Affinity propagation is a low error, high speed, flexible, and remarkably simple clustering algorithm that may be used in forming teams of participants for business simulations and experiential exercises, and in...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2013

    Employment of Footprint Recognition System

    A wide range of applications for foot print recognition system is discussed in this paper. The whole concept works under the principle that foot print is a parameter associated with biometrics that is very common as well as distinct. Its foremost application is at the government hospitals in the under...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2013

    Automatic Web Service Selection by Optimizing Cost of Composition in Slaky Composer Using Assignment Minimization Approach

    Web service composition is a means of building enterprises virtually by knitting relevant web services on the fly. Automatic web service composition is done dynamically at runtime. Extensive research has been done in the field of automatic web service composition. However, all the works focus on providing client oriented results...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2013

    A New Approach of Altered Fingerprints Detection on the Altered and Normal Fingerprint Database

    In this paper, the authors investigate the current techniques for Altered fingerprint detection. Pattern recognition modalities being used in the world are fingerprint, footprint, palm print. But these pattern recognition methods cannot identify the persons having altered finger. This paper is to propose an algorithm for detection. The proposed method...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Nov 2012

    Determining the Number of Clusters for a K-Means Clustering Algortihm

    Clustering is a process used to divide data into a number of groups. All data points have some mathematical parameter according to which grouping can be done. For instance, if the authors have a number of points on a two-dimensional grid, the x and y coordinates of the points are...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Nov 2012

    A Frequent Document Mining Algorithm With Clustering

    Now-a-days, finding the association rule from large number of item-set becomes very popular issue in the field of data mining. To determine the association rule researchers implemented a lot of algorithms and techniques. FP-growth is a very fast algorithm for finding frequent item-set. This paper, give the user a new...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Built-in self-repair (BISR) technique widely Used to repair embedded random access memories (RAMs)

    With the trend of System-on-Chip (SoC) technology, high density and high capacity embedded memories are required for successful implementation of the system. In modern SoCs, embedded memories occupy the largest part of the chip area and include an even larger amount of active devices. As memories are designed very tightly...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    MPEG-1/2 audio layer-3(MP3) ON THE RISC based ARM PROCESSOR (ARM92SAM9263)

    MPEG-1/2 audio layer-3(MP3) is a most popular format for playback 0f high quality compressed audio for portable devices such as audio players and mobile phones. Typically these devices are based on DSP architecture or RISC processor. While the DSP architecture is more efficient for implementing the MP3 algorithm, the challenges...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Face Recognition Based on Cuckoo Search Algorithm

    Feature Selection is a optimization technique used in face recognition technology. Feature selection removes the irrelevant, noisy and redundant data thus leading to the more accurate recognition of face from the database. Cuckko Algorithm is one of the recent optimization algorithm in the league of nature based algorithm. Its optimization...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Modeling Ordinary Differential Equations in Matlab Simulink

    Ordinary Differential Equations (ODEs) play a vital role in engineering problems. They are used to model continuous dynamical systems as initial and boundary value problems. There are several analytical and numerical methods to solve ODEs. Various numerical methods such as Euler's method, Runge-Kutta method, etc are so popular in solving...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    A Security Framework for an Enterprise System on Cloud

    Enterprise systems provide integrated information for all activities in an organization. These systems serve as a vital asset to any organization and hence it becomes mandatory to ensure their security. Information security combines systems, operations and internal controls to ensure the availability, integrity and confidentiality of data and operational procedures...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Head Mounted Input Device Using Mems Sensors

    A person who has limited control over their limbs cannot do much for themselves. If this person stay at home, they need others assistance to do a task. Task also implies those concerned with the PC. Hence, to make them handle and control a PC easily, in the authors' paper...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Privacy Aware Spatial Queries

    The advancement in mobile communications and its integration with Geographical Information System result in tremendous increase in Location aware computing. Users thirst for Geo-Point of interest leads to exploration of different classes of spatial queries like nearest neighbor, range queries, etc, in location based computing. Each query type is unique...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Multipath Virtual Queue Management System for Effective Packet Scheduling in MPLS Networks

    With the rapid development of communication and networking technologies VOIP has become an alternate to traditional telephony. These applications prefer timeliness in packet delivery. To perform load balancing, link utilization and to minimize the packet loss rate multipath virtual queue management system for effective packet scheduling in MPLS networks is...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Adaptive Genetic Algorithm Model for Intrusion Detection

    Intrusion detection systems are intelligent systems designed to identify and prevent the misuse of computer networks and systems. Various approaches to intrusion detection are currently being used, but they are relatively ineffective. Thus the emerging network security systems need be part of the life system and this is possible only...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2014

    Efficient Optimization Technique for FPGA Using PSO

    The Field Programmable Gate Arrays (FPGAs) represent one of today's most popular digital logic implementation options. The Field Programmable Gate Array (FPGA) is popular medium to develop digital circuits. In FPGA design flow placement plays major role to optimize the wirelength and channel width. Here to minimize the interconnection length...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2014

    A Hybrid Method to Reduce Congestion and Provide Data Security in Cloud Computing

    Cloud computing is used everywhere because it provides on demand access of resources and reduces cost; it offers dynamic allocation of resources for guaranteed and reliable services. Users store their data on a single virtual server, when user wants to access any data that data might be changed or modified...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2014

    Performance Enhancement of Classifiers using Integration of Clustering and Classification Techniques

    Medical professionals need a reliable prediction methodology to diagnose Diabetes. Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. The main goal of data mining is to discover new patterns for the users and to interpret the data patterns to provide meaningful...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Mar 2014

    EPICS Based Monitoring and Control in Data Acquisition System

    Data acquisition plays a great role in control and monitoring systems. There is a wide choice of both the hardware and software solutions for implementing a data acquisition system. The system experimental requirements were met using the Experimental Physics and Industrial Control System (EPICS) which has been standardized by the...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Mar 2014

    An Intelligent Software Agent Machine Condition Monitoring System Using GPRS and Data Mining

    There is a tremendous development in machine condition monitoring, since the cost of machine is very high, it is a tedious process to maintain the mechanical machine in good working condition and the delay in production would provide a drastic situation for the manufacturer. In this study a new condition...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2013

    Design and Development of a Microcontroller Based Wireless Security Access System

    Security can simply be protecting the users' equipment and files from unauthorized access, but there is much more. Computer security helps ensure that their computers, networks, and peripherals work as expected all the time, and that their data is safe in the event of hard disk crash or a power...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Built-in self-repair (BISR) technique widely Used to repair embedded random access memories (RAMs)

    With the trend of System-on-Chip (SoC) technology, high density and high capacity embedded memories are required for successful implementation of the system. In modern SoCs, embedded memories occupy the largest part of the chip area and include an even larger amount of active devices. As memories are designed very tightly...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    MPEG-1/2 audio layer-3(MP3) ON THE RISC based ARM PROCESSOR (ARM92SAM9263)

    MPEG-1/2 audio layer-3(MP3) is a most popular format for playback 0f high quality compressed audio for portable devices such as audio players and mobile phones. Typically these devices are based on DSP architecture or RISC processor. While the DSP architecture is more efficient for implementing the MP3 algorithm, the challenges...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Face Recognition Based on Cuckoo Search Algorithm

    Feature Selection is a optimization technique used in face recognition technology. Feature selection removes the irrelevant, noisy and redundant data thus leading to the more accurate recognition of face from the database. Cuckko Algorithm is one of the recent optimization algorithm in the league of nature based algorithm. Its optimization...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Modeling Ordinary Differential Equations in Matlab Simulink

    Ordinary Differential Equations (ODEs) play a vital role in engineering problems. They are used to model continuous dynamical systems as initial and boundary value problems. There are several analytical and numerical methods to solve ODEs. Various numerical methods such as Euler's method, Runge-Kutta method, etc are so popular in solving...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jul 2012

    Survey Some Attacks on Client Side, Browser & Cloud

    Cloud computing is not a new name in the technology world, but there are many new issues arises related with cloud. Every time in consumer mind a fear rotates because they are aware from vulnerabilities related with cloud. Security of customer data is not only responsibility of service provider, but...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jul 2012

    A Methodology for Template Extraction From Heterogeneous Web Pages

    The World Wide Web is a vast and most useful collection of information. To achieve high productivity in publishing the web pages are automatically evaluated using common templates with contents. The templates are considered harmful because they compromise the relevance judgement of many web information retrieval and web mining methods...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jul 2012

    Multilevel Association Rules in Data Mining

    Data is the basic building block of any organization. Be it an individual or an organization of any type, it is surrounded by huge flow of quantitative or qualitative data. Data are the patterns which are used to develop or enhance information or knowledge. All the organizations big or small...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    A Security Framework for an Enterprise System on Cloud

    Enterprise systems provide integrated information for all activities in an organization. These systems serve as a vital asset to any organization and hence it becomes mandatory to ensure their security. Information security combines systems, operations and internal controls to ensure the availability, integrity and confidentiality of data and operational procedures...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Head Mounted Input Device Using Mems Sensors

    A person who has limited control over their limbs cannot do much for themselves. If this person stay at home, they need others assistance to do a task. Task also implies those concerned with the PC. Hence, to make them handle and control a PC easily, in the authors' paper...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Privacy Aware Spatial Queries

    The advancement in mobile communications and its integration with Geographical Information System result in tremendous increase in Location aware computing. Users thirst for Geo-Point of interest leads to exploration of different classes of spatial queries like nearest neighbor, range queries, etc, in location based computing. Each query type is unique...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Multipath Virtual Queue Management System for Effective Packet Scheduling in MPLS Networks

    With the rapid development of communication and networking technologies VOIP has become an alternate to traditional telephony. These applications prefer timeliness in packet delivery. To perform load balancing, link utilization and to minimize the packet loss rate multipath virtual queue management system for effective packet scheduling in MPLS networks is...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Adaptive Genetic Algorithm Model for Intrusion Detection

    Intrusion detection systems are intelligent systems designed to identify and prevent the misuse of computer networks and systems. Various approaches to intrusion detection are currently being used, but they are relatively ineffective. Thus the emerging network security systems need be part of the life system and this is possible only...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Effective Cum Efficient Bandwidth by LZW Compression Technique

    The Internet and World Wide Web (WWW) have made electronic commerce a reality. According to an estimate the WWW presently contains more than 800 millions pages, encompassing about 6 terabytes of text data on about 3 million servers. As the number of web users is increasing rapidly, there is a...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    A Review Paper on Cryptographic Approach for License Management System in Cloud Computing

    Computational world is become very large and complex. Cloud computing has emerged as a popular computing model to support on demand services. It has inherited the legacy technology and adding new ideas. The goal of cloud computing is to make effective utilization of distributed resources, and put them together in...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2012

    Jamm Scheduling: A More Efficient Approach

    Scheduling involves the allocation of resources and time to tasks in such a way that certain performance requirements are met. CPU scheduling is the mechanisms of selecting a process among various processes and allocate a processor in such a way so that other processes in a ready queue wait for...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jun 2012

    Extended Dynamic Source Routing Protocol for Ad Hoc Network

    MANET is a collection of self-configurable mobile nodes. Several routing protocols are proposed for ad hoc network among which DSR and AODV On demand routing protocols are mostly used. Existing Dynamic source routing protocol is not suitable for large network because packet size gets increased according to the number of...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jun 2012

    Performance of Concurrency Control Mechanisms in Centralised Database Systems

    This paper is to propose user control system that definitely increases the performance of real-time data service. However the most existing work on this RTDB was based on very critical closed loop control system. To overcome this problem, they design a system called user control database model which stimulate the...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Mar 2012

    Different Security Mechanisms for Different Type of Security Lapses in WMN-A Review

    The Wireless Mesh Network (WMN) is a wide network over globe. It is a multi-hop network which is made of static as well as the Mobile nodes which are connected with each other via special node called routers and Backbone gateways. As the infrastructure of WMN is large and it...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jul 2011

    Enrichment of Security Through Cryptographic Public Key Algorithm Based on Block Cipher

    In recent years, data security using cryptography has emerged as a topic of significant interest in both academic and industry circles. In this paper, the authors deal with a new algorithm, which is based on linear block cipher. Their goal is to build upon the new asymmetric key algorithm based...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2014

    Tracing Efficient Path Using Web Path Tracing

    In the fast improving society, people depend on online purchase of goods than spending time physically. So there are lots of resources emerged for this online buying and selling of materials. Efficient and attractive web sites would be the best to sell the goods to people. To know whether a...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2014

    Fuzzy Cluster Quality Index using Decision Theory

    Clustering can be defined as the process of grouping physical or abstract objects into classes of similar objects. It's an unsupervised learning problem of organizing unlabeled objects into natural groups in such a way objects in the same group is more similar than objects in the different groups. Conventional clustering...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2014

    Survey on Distributed Data Storage Schemes in Wireless Sensor Networks

    The most important goal of distributed data storage schemes in wireless sensor networks is to efficiently distribute data across the WSN. Distributed data storage can play a vital role in improving data availability, security, energy efficiency and network lifetime of wireless sensor networks. Many researchers have been proposed various techniques...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2014

    Relative Query Results Ranking for Online Users in Web Databases

    To handle with the problem of so many-answers replied from an online Web database in response to a relative query, this paper proposes a unique approach to rank the similar query results. Depending upon the on the database workload, the authors hypothesize how much the user worries about each and...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2014

    Analysis on Performance With Combination of Scheduling and Replication in Data Grids

    Data grid is the storage component of a grid environment. Amount of data transferred among nodes can be reduced by submitting the jobs to the nodes that having maximum requested files by scheduling and reducing the access latency by initiating data replication strategies. All techniques of scheduling and replication address...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Nov 2013

    Searching SNT in XML Documents Using Reduction Factor

    XML has become the most popular standard for data representation. In XML standard the documents represented as rooted ordered trees. The efficient query processing can be performed on the labeled document structure. The major advantage of keyword search is the user need not understand the complex query language and the...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Sep 2013

    Applying Parallel Association Rule Mining to Heterogeneous Environment

    Association rule mining, the major technique of data mining, involves finding frequent itemsets with minimum support and generating association rules with maximum confidence. The paper aims to discover frequent patterns by generating the candidates and frame the association rules after which filter out only the efficient rules based on various...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jul 2013

    Anonymization Based on Nested Clustering for Privacy Preservation in Data Mining

    Privacy preservation in data mining protects the data from revealing unauthorized extraction of information. Data anonymization techniques implement this by modifying the data, so that the original values cannot be acquired easily. Perturbation techniques are variedly used which will greatly affect the quality of data, since there is a trade-off...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jul 2013

    Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

    The major threat to wireless network is Denial of Service (DoS) attack. An adversary can target on the communication of the nodes and can attempt to create an attack to prevent the efficient communication. Here, the authors address the problem of jamming under an internal threat model by considering a...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jul 2013

    Adaptive Approach for Joining and Submissive View of Data in Data Warehouse Using ETL

    Data warehouses have emerged as a new business intelligence paradigm where data store and maintain in concurrent. The modifications are required in the implementation of Extract Transform Load (ETL) operations which now need to be executed in an online fashion. The adaptive approach takes two phases. The extraction phase and...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2013

    Comparative Study of Security Parameters by Cloud Providers

    Security is one of the major issues today around the world. Either it is a home user or corporate user, a small PC or a server system, nothing is totally secure, lots of issues have been raised regarding security. In this paper, the authors will be comparing the architectures of...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2013

    A Review Paper on Multidimentional Data Structures

    Multimedia data structures are needful for storing multimedia data such as text, images, audio, video, and graphical objects. The growth of digital content gave rise to the revolution of very large multimedia data structures, in which the need of efficient storage, organization and retrieval of multimedia contents came into a...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // May 2013

    Countering the DDoS Attacks for a Secured Web Service

    Web services are the most widely used technology today. SOAP messages are the building blocks of web services. Since web services mostly deal with confidential data they must be protected from intruders. Intruders can be of any form. They can be a person or a program. One of the most...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Mar 2013

    An Efficient Text Clustering Algorithm Using Affinity Propagation

    The objective is to find among all partitions of the data set, best publishing according to some quality measure. Affinity propagation is a low error, high speed, flexible, and remarkably simple clustering algorithm that may be used in forming teams of participants for business simulations and experiential exercises, and in...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)

  • White Papers // Jan 2013

    Employment of Footprint Recognition System

    A wide range of applications for foot print recognition system is discussed in this paper. The whole concept works under the principle that foot print is a parameter associated with biometrics that is very common as well as distinct. Its foremost application is at the government hospitals in the under...

    Provided By Indian Journal of Computer Science and Engineering (IJCSE)