International Association of Engineering and Management Education (IAEME)

Displaying 1-40 of 95 results

  • White Papers // May 2014

    Pre-Processing of Server Log File Along With Mac Address Using Apriori and Decision Tree

    In today's world, there is heavy traffic on internet. Now-a-days, usually every task is done on internet. Because of high network traffic, so lots of risks from attackers are also there. Therefore, securing the data over internet becomes a difficult challenge for professionals. To deal with large amount of data,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // May 2014

    A Distance Based Clustering Algorithm

    Clustering is an unsupervised data mining technique used to determine the objects that are similar in characteristics and group them together. K-means is a widely used partitional clustering algorithm but the performance of K-means strongly depends on the initial guess of centers (centroid) and the final cluster centroids may not...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    A Critical Study of Requirement Gathering and Testing Techniques for Datawarehousing

    In light of high cost and higher rate of failure of data warehousing projects, it becomes imperative to study software processes being followed for data warehousing. In this paper, the authors present a survey of literature for data warehousing requirement gathering and testing. This paper has analyzed drawbacks of traditional...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    Secured Pattern Base Encryption Approach for Intranet Chat Server for Wired Network

    A system server for a channel-based network including one or more Internet sites and one or more user terminals. The system server includes a channel table database storing a master channel table that includes a list of channel numbers, each channel number having an associated Internet address and an associated...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    An Enhanced Algorithm for Classification of Web Data for Web Usage Mining Using Supervised Neural Network Algorithms

    The usage of data on the web is growing with a speed of light; huge amount of data is present on web. To extract useful information from such huge web data efficient data extraction or mining methods are required to achieve a variety of functionalities such a as web AD...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    Secure Data Sharing Through Cloud Computing

    As an emerging technology and business paradigm, cloud computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrastructure through web services. The authors consider the problem of building a secure cloud storage service where the registered user could store...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    IT-DHSD: Implicit Time Based Data Handling and Self Destruction Using Active Storage Object for Cloud Computing

    Computing is changing frequently to serve the user's needs for security and reducing a dependency which leads researcher to develop newer technologies. Cloud computing is one of those technologies which successfully delivers the service oriented architecture to reduce the burdensome of managing the devices. But in some situation instead of...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    A Framework for Personalization Using Query Log and Clickthrough Data

    Personalization of a web page involves dynamically altering the contents of the web pages according to the preferences or interests of users for retrieving, appropriate information for a given query. Although many personalization algorithms have been explored, but it is still not certain whether personalization is really helpful all time...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    The Privacy Feature of Trusted Computing Technology Using the Concept of Direct Anonymous Attestation With Cloud as a Technique

    The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security. In the distributed environment all the systems are connected together with a limited bandwidth security feature. The TPM module will increase the security feature by the concept of DAA. Direct...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Survey of Abstract Methods for How to Safeguard Against Distributed Denial of Service Attacks

    In this paper, the authors have tried to demonstrate that any business, large or small, that is dependent on Internet traffic to generate sales, service its customers, or maintain confidentiality is a candidate for stepped up protection against denial of service and distributed denial of service attacks for their network...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Dynamic Computation of the Application Between Smart Mobile Device and Cloud Computing

    The hardware-software partitioning problem is a key aspect of co-design of digital electronic systems; extensive research has been performed with diverse definitions of partitioning problems. However, existent partitioning solutions are not applicable to many real-time applications partly because of restricted input specification or insufficient constraints. By using the off-loading technique,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Survey on the Performance Analysis of Cloud Computing Services

    Cloud computing is a cutting edge technology for computing and people who are not a techsavy knew this buzz word. Now it is emerging rapidly in the research arena. It is an aggregation of pay-per-use computing paradigm and a utility computing. Voluminous data storage and timeliness of the needed resources...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Business Intelligence Over Cloud

    Managing such a big and complex data is getting very tough job. Therefore comes the idea of storing data and running BI over cloud. The use of Business Intelligence (BI) in the cloud is a gamechanger, as it makes BI affordable and easily available as compared to traditional BI. But...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Comparative Study of Remote Sensing Data Based on Genetic Algorithm

    In data mining fields, clustering is an important issue. Clustering is a technique to groups objects based on the information found in the data describing the objects. Image segmentation is the process of partitioning a digital image into multiple segments. Some of the image segmentation techniques are edge detection, region...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    An Enhanced Monitoring Mechanism for IaaS Platforms

    The monitoring mechanisms of open-source IaaS software OpenNebula and monitoring system Ganglia were analyzed. Reduce overload of retrieving resource usage information by deploying the Ganglia monitoring agent. And for improving the robustness of monitoring subsystem, the authors take measures on the privileged domain of virtualization nodes to hide the agent...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Implementation of Geo-Messaging Using Google Cloud Messaging and Location Based Services API of Android

    In this paper, the authors are proposing the implementation of geo-messaging using location based services and Google cloud messaging API's of Android. Geo-fencing can be defined as the process of sending messages tied to a location which means the receiver will not get the message until they enters the vicinity...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Web Usage Mining Contextual Factor: Human Information Behavior

    With the rapid development of information technology, the World Wide Web has been widely used in various applications, such as search engines, online learning and electronic commerce. These applications are used by a diverse population of users with heterogeneous backgrounds, in terms of their knowledge, skills, and needs. Therefore, human...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    A Study on Consumer Perception in Facilities Management Among the Middle Income Public in India for Various Analytical Factors Applied in the Strategic Management

    In this paper the authors identify the determinants of perception of consumers in facilities management in India. This paper was carried out in South India. Since the main objective of the paper was to identify the awareness and determinants of perception of consumer in the facilities management among the middle...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    QoS Ensured Optimal Replica Placement in Graph Based Data Grids

    In this paper the authors study the QoS ensured optimal replica placement problem. Most of the studies on replica placement concerns only about minimizing the data access time, without considering the quality of service issue. In heterogeneous environments, the quality assurance is important. They propose an algorithm named Replica Placement...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    Pro-Mining: Product Recommendation Using Web-Based Opinion Mining

    Effective recommendation is the key to success of any online marketing strategy. In this paper, the authors discuss the design and development of a novel recommendation system for consumer products. The proposed system helps the customer to select product of their choice. When a prospective customer passes a query (name...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    3-D Holographic Data Storage

    In response to the rapidly changing face of computing and demand for physically smaller, greater capacity and high bandwidth storage devices, the holographic memory came into existence. Holographic data storage using volume holograms offers high density and fast readout. It can store 1Tb-4Tb of information on a sugar cube sized...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    A Graph Based Approach to Find Candidate Keys in a Relational Database Scheme

    In this paper, a simple straightforward method to find all the candidate keys of a relational database schemes using graph is presented. First, the FD graph is drawn from the set of functional dependencies in a relational scheme. Thereafter, by using few very simple graph transformations, the FDG is reduced...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    E-Business Transaction Security: Changing Trends in Database Security-Critical Review

    The electronic business has grown leaps and bounds with the popularity of internet. The popularity has also grown due to the services provided by the ISP companies. As the e-business is growing, so is the problem of data breaching. For breaching, a hacker needs an internet connection and a careless...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Oct 2013

    A Review on Cloud-Based Intrusion Detection System for Android Smartphones

    Cloud computing is primarily being use for eliminating the need of local information resources. The ability of cloud offers vast variety of services on web. As Smartphone usage has been continuously increasing in recent years, but due to its complexity and functionality, they are also susceptible to the attacks such...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Oct 2013

    Review Paper on Privacy Protection of Database Access with Partial Shuffle

    Privacy protection is one of the fundamental security requirements for database outsourcing. A major threat is information leakage from database access patterns generated by query executions. Recent works propose to protect access patterns by introducing a trusted component with constant storage size. The resulting privacy assurance is as strong as...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Oct 2013

    Optimization of LZ77 Data Compression Algorithm

    Data compression refers to reducing the amount of space needed to store data or reducing the amount of time needed to transmit data. Many data compression techniques allow encoding the compressed form of data with different compression ratio. In particular, in the case of LZ77 technique, it reduces the data...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Oct 2013

    A Proposed Model for Mapping Infrastructure as a Service in Cloud Computing with Hardware Firewall for Distributed Security Environment

    Cloud computing is a colloquial expression used to describe a variety of different types of computing concepts that involve a large number of computers connected through a real-time communication network (typically the internet). Cloud computing is a synonym for distributed computing over a network and it means the ability to...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Oct 2013

    Dynamic Data Replication and Job Scheduling Based on Popularity and Category

    Dealing with a huge amount of data puts the requirement for efficient data access more critical in data grids. Improving data access time is a one way of reducing the job execution time i.e. improving performance. To speed up the data access and reduce bandwidth consumption, data grids replicate data...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Oct 2013

    Dynamic Expiration Enabled Role Based Access Control Model (DEERBAC) for Cloud Computing Environment

    Cloud computing is one of the most emerging technique for fulfilling service demands in various forms. The key issue that is considered for its enhancement and optimization is the access control. In order to fulfill this requirement, here in this paper the author has proposed a robust system model called,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2013

    Attacks Classification in Network

    The authors have designed the intrusion detection and classification system based on the Modified Apriory Algorithm. The system detect and classify attacks. This feature enables the system to suggest proper actions against possible attacks. Internet is a global public network. With the growth of the Internet and its potential, there...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    Classification of Data Using Semi-Supervised Learning (A Learning Disability Case Study)

    In classification, Semi-supervised learning occurs when a large amount of unlabeled data is available. In such a situation, how to enhance predictability of classification through unlabeled data is the focus. In this paper, the authors propose a methodology based on Support Vector Machine of semi-supervised learning and implement it on...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    A Survey of Cloud Based Secured Web Application

    Cloud computing is a schema for allowing appropriate on request network access to a shared pool of configurable computing resources, that can be rapidly delivered and released by minimal management effort or service provider. In cloud computing, the user need a Web browser to access to everything needed to run...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    Reliable Security in Cloud Computing Environment

    Cloud computing is the newest term for the ongoing-dreamed vision of computing as a utility. The cloud provides convenient, on-demand network access to a centralized pool of configurable computing resources that can be rapidly deployed with great efficiency and minimal management overhead. The industry leaders and customers have wide-ranging expectations...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    An Approach for Secured Data Transmission at Client End in Cloud Computing

    Now-a-day's cloud computing is the most recent network infrastructure architecture model which provides convenient, on-demand access to a shared pool configurable computing resources. In this paper, the authors proposed an algorithm for data security for Software-as-a-Service (SaaS) model. When a client is accessing the applications from the cloud service provider...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    A New Approach for Improving Performance of Intrusion Detection System Over MANET

    A Mobile Ad-hoc NETwork (MANET) is one of the busy and public networks; Because of this the network suffers from the problems of different kind of attacks. In such attacks some malicious nodes are present that falsely claim itself as a valid node. It will accept the information and will...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    Study of Localization Techniques in Vehicular Ad-Hoc Networks

    In VANET, vehicle communicates with each other and also with roadside unit which provides various applications such as traffic safety, driver assistance, and internet access. Most of these applications need to know the precise current location of vehicle in real time. Most common technique for knowing the location of vehicle...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    A Premeditated CDM Algorithm in Cloud Computing Environment for FPM

    Cloud computing is a new concept with a broad definition. It has been acknowledged as one of the prevailing models for providing IT capacities Cloud computing is a new network computing paradigm based on IP architecture, and its potential lies in new business applications. The computing paradigm that comes with...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    Overlapped Clustering Approach for Maximizing the Service Reliability of Heterogeneous Distributed Computing Systems

    For Distributed Computing System (DCS) where server nodes can fail permanently with non-zero probability, the reliability of the system can be defined as the probability that the system run the entire tasks successfully assign on it before all the nodes fail. In heterogeneous distributed system where various nodes of the...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    A Dynamic Approach for Improving Performance of Intrusion Detection System Over MANET

    A Mobile Ad-hoc NETwork (MANET) is one of the busy and public networks; Because of this the network suffers from the problems of different kind of attacks. In such attacks some malicious nodes are present that falsely claim itself as a valid node. It will accept the information and will...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    Measurement of End to End Delays in Ad Hoc 802.11 Networks

    In order to have maximum utilization of the resources as well as to enhance the throughput of the network, its Quality of Service (QoS) plays a significant role. The decentralized characteristics of ad hoc network need a highly optimized and enhanced technique for optimizing the fundamental performance parameters of network....

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2012

    A Survey on Trust Based Routing in MANET

    A Mobile Ad-hoc NETwork (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. Nodes can join and leave the network at anytime and are free to move randomly and organize themselves arbitrarily. In MANETs,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    Classification of Data Using Semi-Supervised Learning (A Learning Disability Case Study)

    In classification, Semi-supervised learning occurs when a large amount of unlabeled data is available. In such a situation, how to enhance predictability of classification through unlabeled data is the focus. In this paper, the authors propose a methodology based on Support Vector Machine of semi-supervised learning and implement it on...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Comparative Study of Remote Sensing Data Based on Genetic Algorithm

    In data mining fields, clustering is an important issue. Clustering is a technique to groups objects based on the information found in the data describing the objects. Image segmentation is the process of partitioning a digital image into multiple segments. Some of the image segmentation techniques are edge detection, region...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Resource Provisioning for Video on Demand in SaaS

    A cloud based video on demand is proposed solution to monitor the camera which is accessible to the client on demand. This camera is present on server computer which is controlled by cloud controller. Also it makes use of scheduling algorithms to handle multiple requests. This software provides functionality to...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Meta-Heuristic Based Clustering of Two-Dimensional Data Using Neighbourhood Search With Data Mining Technique as an Application of P-Median Problem

    The p-median difficulty is the well known facility allocation essence. The Neighborhood Search (NS) algorithm provides a solution to that problem. This NS algorithm is hybridized with Data Mining (DM) technique to attain a solution that is better than NS approach. Two new Metaheuristic clustering algorithms HDMNS (Hybrid Data Mining...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Privacy Preserving Clustering on Centralized Data Through Scaling Transformation

    Data sharing among organizations is considered to be useful as it offers mutual benefits for effective decision making and business growth. Data mining techniques can be applied on this shared data which can help in extracting meaningful, useful, previously unknown and ultimately comprehensible information from large databases. This ultimately leads...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Dynamic Approach to K-Means Clustering Algorithm

    K-means clustering algorithm is a heuristic algorithm that partitions the dataset into k clusters by minimizing the sum of squared distance in each cluster. In contrast, there are number of weaknesses. First it requires a prior knowledge of cluster number 'K'. Second it is sensitive to initialization which leads to...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    A Comparative Analysis of Data Mining Tools for Performance Mapping of WLAN Data

    Data mining is the non-trivial process of identifying the valid, potentially and understandable patterns in the form of knowledge discovery from the large volume of data. The main aim of this process is to discovering patterns and associations among preprocessed and transformed data. Data mining is used for two type...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Knowledge Extraction From Numerical Data: An Abc Based Approach

    Fuzzy rule based systems provide a framework for representing & processing information in a way that resembles human communication & reasoning process. Two approaches can be found in the literature which is used for rule based generation; in knowledge driven models the requisite rule base is provide by domain expert...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Improving Access Latency of Web Browser by Using Content Aliasing in Proxy Cache Server

    The web community is growing so quickly that the number of clients accessing web servers is increasing nearly tremendously. This rapid increase of web clients affected several aspects and characteristics of web such as reduced network bandwidth, increased latency, and higher response time for users who require large scale web...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Implementation of USB to USB Bridge for Computer Independent Data Transfer

    The authors' paper discusses a modern approach towards the way the data is transferred to and fro in the USB mass storage devices without using a computer. They have achieved this with a system that uses an independent solution for the problem - USB to USB Bridge. This bridge will...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Parametric Comparison Based on Split Criterion on Classification Algorithm in Stream Data Mining

    Stream data mining is a new emerging topic in the field of research. Today, there are number of application that generate massive amount of stream data. Examples of such kind of systems are sensor networks, real time surveillance systems, and telecommunication systems. Hence there is requirement of intelligent processing of...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    An Enhanced Monitoring Mechanism for IaaS Platforms

    The monitoring mechanisms of open-source IaaS software OpenNebula and monitoring system Ganglia were analyzed. Reduce overload of retrieving resource usage information by deploying the Ganglia monitoring agent. And for improving the robustness of monitoring subsystem, the authors take measures on the privileged domain of virtualization nodes to hide the agent...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    A Framework for Personalization Using Query Log and Clickthrough Data

    Personalization of a web page involves dynamically altering the contents of the web pages according to the preferences or interests of users for retrieving, appropriate information for a given query. Although many personalization algorithms have been explored, but it is still not certain whether personalization is really helpful all time...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    The Privacy Feature of Trusted Computing Technology Using the Concept of Direct Anonymous Attestation With Cloud as a Technique

    The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security. In the distributed environment all the systems are connected together with a limited bandwidth security feature. The TPM module will increase the security feature by the concept of DAA. Direct...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    QoS Ensured Optimal Replica Placement in Graph Based Data Grids

    In this paper the authors study the QoS ensured optimal replica placement problem. Most of the studies on replica placement concerns only about minimizing the data access time, without considering the quality of service issue. In heterogeneous environments, the quality assurance is important. They propose an algorithm named Replica Placement...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    Pro-Mining: Product Recommendation Using Web-Based Opinion Mining

    Effective recommendation is the key to success of any online marketing strategy. In this paper, the authors discuss the design and development of a novel recommendation system for consumer products. The proposed system helps the customer to select product of their choice. When a prospective customer passes a query (name...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    3-D Holographic Data Storage

    In response to the rapidly changing face of computing and demand for physically smaller, greater capacity and high bandwidth storage devices, the holographic memory came into existence. Holographic data storage using volume holograms offers high density and fast readout. It can store 1Tb-4Tb of information on a sugar cube sized...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    A Graph Based Approach to Find Candidate Keys in a Relational Database Scheme

    In this paper, a simple straightforward method to find all the candidate keys of a relational database schemes using graph is presented. First, the FD graph is drawn from the set of functional dependencies in a relational scheme. Thereafter, by using few very simple graph transformations, the FDG is reduced...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    E-Business Transaction Security: Changing Trends in Database Security-Critical Review

    The electronic business has grown leaps and bounds with the popularity of internet. The popularity has also grown due to the services provided by the ISP companies. As the e-business is growing, so is the problem of data breaching. For breaching, a hacker needs an internet connection and a careless...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Implementation of Geo-Messaging Using Google Cloud Messaging and Location Based Services API of Android

    In this paper, the authors are proposing the implementation of geo-messaging using location based services and Google cloud messaging API's of Android. Geo-fencing can be defined as the process of sending messages tied to a location which means the receiver will not get the message until they enters the vicinity...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Survey of Abstract Methods for How to Safeguard Against Distributed Denial of Service Attacks

    In this paper, the authors have tried to demonstrate that any business, large or small, that is dependent on Internet traffic to generate sales, service its customers, or maintain confidentiality is a candidate for stepped up protection against denial of service and distributed denial of service attacks for their network...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Dynamic Computation of the Application Between Smart Mobile Device and Cloud Computing

    The hardware-software partitioning problem is a key aspect of co-design of digital electronic systems; extensive research has been performed with diverse definitions of partitioning problems. However, existent partitioning solutions are not applicable to many real-time applications partly because of restricted input specification or insufficient constraints. By using the off-loading technique,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Survey on the Performance Analysis of Cloud Computing Services

    Cloud computing is a cutting edge technology for computing and people who are not a techsavy knew this buzz word. Now it is emerging rapidly in the research arena. It is an aggregation of pay-per-use computing paradigm and a utility computing. Voluminous data storage and timeliness of the needed resources...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2012

    Surface Reconstruction and Display From Range and Color Data Under Realistic Situation

    In this paper the authors deal the problem of scanning both the color and geometry of real objects and displaying realistic images of the scanned objects from arbitrary viewpoints. A complete system that uses a stereo camera system with active lighting to scan the object surface geometry and color as...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2012

    Information System Through a Heterogeneous Wireless Technologies and Services: Detect Unwanted Attempts at Accessing, Manipulating, and Disabling by Enforcement of Security

    Existing paper in this area focuses either on user activity or on program operation but not on both simultaneously with the management information system as backbone. In this paper, Based on an intrusion detection framework, a novel user anomaly detection system has been programmed and conducted several intrusion detection experiments...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Web Usage Mining Contextual Factor: Human Information Behavior

    With the rapid development of information technology, the World Wide Web has been widely used in various applications, such as search engines, online learning and electronic commerce. These applications are used by a diverse population of users with heterogeneous backgrounds, in terms of their knowledge, skills, and needs. Therefore, human...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    A Study on Consumer Perception in Facilities Management Among the Middle Income Public in India for Various Analytical Factors Applied in the Strategic Management

    In this paper the authors identify the determinants of perception of consumers in facilities management in India. This paper was carried out in South India. Since the main objective of the paper was to identify the awareness and determinants of perception of consumer in the facilities management among the middle...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Business Intelligence Over Cloud

    Managing such a big and complex data is getting very tough job. Therefore comes the idea of storing data and running BI over cloud. The use of Business Intelligence (BI) in the cloud is a gamechanger, as it makes BI affordable and easily available as compared to traditional BI. But...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    A Survey of Cloud Based Secured Web Application

    Cloud computing is a schema for allowing appropriate on request network access to a shared pool of configurable computing resources, that can be rapidly delivered and released by minimal management effort or service provider. In cloud computing, the user need a Web browser to access to everything needed to run...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    A Survey on Secured Data Outsourcing in Cloud Computing

    Cloud computing has gained a lot of publicity in the current it world. After the internet, cloud computing is the next big thing in the computer world. Cloud computing is the use of the internet for the tasks performed on the computer and it is the next-generation architecture of it...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2012

    Improving Dendritic Cell Algorithm by Dempster Belief Theory

    In this paper, the authors present a novel method of intrusion detection based on artificial immune system. Adopting the dendritic cell algorithm and dempster - belief theory, a novel solution is presented to identify all intrusion correctly and minimized the false alarm generation. In order to increase the accuracy of...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Data Mining with Human Genetics to Enhance Gene Based Algorithm and Dna Database Security

    The goal of data mining in DNA Database is to check some possible combinations of DNA sequences and to generate a common sympathetic code or algorithm to formulate the sequence on mutations. Since the data mining is the best technique to analyze and extract the data, it is also helpful...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    Reliable Security in Cloud Computing Environment

    Cloud computing is the newest term for the ongoing-dreamed vision of computing as a utility. The cloud provides convenient, on-demand network access to a centralized pool of configurable computing resources that can be rapidly deployed with great efficiency and minimal management overhead. The industry leaders and customers have wide-ranging expectations...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Perceiving and Recovering Degraded Data on Secure Cloud

    Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand. Cloud Storage deals with file blocks, simplifying storage management and eliminating metadata concern. Data are continuously distributed through multiple servers in cloud. The token is computed dynamically. If data lost, then it...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Security Issues Vs User Awareness in Mobile Devices: A Survey

    Mobile devices help modern man stay connected. Mobile phones come handy to serve this purpose; they use a radio link available in a geographical area, to make and receive telephonic calls, without compromising on the mobility. In the most recent years, the mobile phones are not just meant for making...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2012

    A Literature Review on the Data Mining and Information Security

    In this paper, the authors dealt with the data mining and security related issues. Now-a-days storing and procuring data is very easier as if the authors are having the handful of technocrats to warehouse the data and the cryptographic techniques are there to Mining the data in order to find...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2012

    E-Commerce Online Security and Trust Marks

    E-commerce web site owners on one side are thinking of how to attract more customers and how to make the visitors feel secured when working on the site, on the other side how the end users should rate a ecommerce website and what they should do to protect themselves as...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2012

    Security in RFID Technology

    RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use RFID for various applications such as personal/vehicle access control, departmental store security, equipment tracking, baggage, fast food establishments, logistics, etc. The enhancement...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2013

    Data Security Framework for Cloud Computing Networks

    Cloud computing is used for management of resources applications and information as services over the cloud. The resources used in cloud computing are the resources that are usually distributed as services. The cloud allows its services as a utility and because of the flexibility in its architecture, exposes it to...

    Provided By International Association of Engineering and Management Education (IAEME)