International Association of Engineering and Management Education (IAEME)

Displaying 1-40 of 115 results

  • White Papers // Oct 2014

    Load Testing for Jquery Based e-Commerce Web Applications With Cloud Performance Testing Tools

    Online shopping is becoming increasingly popular because of speed and ease of use for customers. Online purchase intention rates have doubled since 2011 for 12 of 22 measured categories. Fractions of a second can make the difference between online success and failure. Faster websites and pages are proven to increase...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2014

    Coalitional Game Theoretic Approach for IEEE 802.11E Standard Based on Incentive and Credit

    Vehicular ad hoc network (IEEE 802.11e) is dynamic network where independent identity node helps each other to forward the message. But some time node may not be interested in forwarding the message. Thus it is essential to give node some incentive to participate in message forwarding game on the basis...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2014

    Robust Wireless Reprogramming Method Using Differential Approach for Wireless Sensor Networks

    The concept of software reprogramming in wireless sensor networks allows end users to improve the overall functionality of sensor network. The main aim of software reprogramming in WSN is to improve the energy utilization performance with low cost. In this paper, the authors are discussing the overall research categories of...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2014

    An Enhanced IP Traceback Mechanism for Tracking the Attack Source Using Packet Marking and Path Reconstruction

    The Distributed Denial of Service (DDoS) attacks are launched synchronously from multiple locations and they are extremely harder to detect and stop. Identifying the true origin of the attacker along with the necessary preventive measures helps in blocking further occurrences these types of attacks. The issue of tracing the source...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2014

    A Novel Based Approach to Investigate Distinctive Region of Brain Connectivity Using Neural Maps

    Introduce two-dimensional neural maps for exploring connectivity in the brain. Main goal, which are primarily in the field of tractography visualization. First objectives are 2D path representation of tractography data sets that, in contrast to the previously used 2D point representation. Main objective is to achieve abstraction and filtration, can...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2014

    Implementation of Customized Network Monitoring Tool and Security Framework Monitoring System

    In the direction of cram the monitoring systems and identifying parameters that can be monitored with or without encrypting the data. In order to do so, in an Adaptive Distributed System (ADS) which changes dynamically in the real time environment. These changes could be process or link failures, changes in...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2014

    An Algorithm to Secure an Image Using Logistic Chaotic Mapping With Shuffling

    In the internet era security of communication is one of the major issues. Use of internet as communication medium increases numerous security threats. Security of digital image is one of the great issues when it is travels through internet. The approaches used in encryption of text are not suitable for...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2014

    Java Remote Control for Laboratory Monitoring

    The proposed system of 'Java remote control for laboratory monitoring' is an optimized and automated software model that is used as a remote control for PC's connected as a Local Area Network (LAN). This software is used to control varied resources and processes running on the remote computer. The test...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Modelling of Secured Video Streaming Application Using RFC 3711 in P2P Network

    The most important aspect of delivering multimedia services or applications over Internet protocol is not only meeting its optimized QoS objectives, rather see that how exactly the intellectual property is preserved. In this paper, encapsulation of IPTV system along with security protocol have been presented in order to ensure that...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    RFID a Smart Technology

    RFID is only one of numerous technologies grouped under the term Automatic IDentification (Auto ID), such as bar code, magnetic inks, optical character recognition, voice recognition, touch memory, smart cards and biometrics etc. Auto ID technologies are a new way of controlling information and material flow, especially suitable for large...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Private Cloud Data Security: Secured User Authentication by Using Enhanced Hybrid Algorithms

    Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, the authors must provide security guarantees not only on authentication but...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Load Balancing - Server Availability Issue

    Recent research works done on various load balancing techniques on web servers has disclosed that the load balancing mechanisms used by most of the popular websites and web applications which are always overloaded with huge volumes of user requests, fail to provide fast and reliable services to its users. There...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Privacy and Security Issues in RFID Technology

    Radio Frequency IDentification (RFID) systems are a common and useful in, supply chain management, asset tracking, animal tracking and retail inventory control. Due to hectic research and developments, in the near future, low-cost RFID tags may be a practical replacement candidate for optical barcodes on consumer items. Shockingly, the widespread...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    An Optimistic Sector Oriented Approach to Mitigate Broadcast Storm Problem in MANETs

    In Mobile Ad hoc NETworks (MANETs), due to frequent changes in topology there exist more link breakages which lead to high rate of path failures and route discoveries, which cause an increased routing control overhead. Thus, it is necessary to reduce the overhead of route discovery in the design of...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    A Survey on Wireless Mesh Network and Its Challenges at the Transport Layer

    Wireless Mesh Network (WMN) is a very promising and novel communication technology. The scope of wireless mesh networks is significantly wide both in terms of architecture and applicability. But as the technology is new and has a rather complex set of architectures, it possesses quite a few challenges in every...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2014

    Augmentation of B-Tree Search Operation

    A tree (strictly speaking, a free tree) is an acyclic, connected, undirected graph. Equivalently, a tree may be defined as an undirected graph in which there exists exactly one path between any given pair of nodes. Since a tree is a kind of graph, the same representations used to implement...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jul 2014

    Ontology Based Java Platform Personalization to Host Environment

    In this paper, the authors present a personalization platform to adapt Java based applications to host environment; this is to converge the performance and reliability toward platform dependant (e.g., like C++). Intelligent Java agent is designed to perceive Host Environment and embed Java Native Interfaces (JNI) to Java program at...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jul 2014

    Hybrid Cryptography Algorithms for Secure EAAC in MANET

    Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes along with wireless transmitter and receiver that with each other via a bi-directional links either directly or indirectly. A new intrusion detection system...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2014

    Review of Different Routing Protocol for MANET

    Wireless channel link quality is the difference a challenging problem was until recently data communication Use this attribute in a similar exploration. Broadcast transmission can be regarded as quite different, and usually independently on the receiver by different geographic locations. In addition, even the same stable receiver may over time,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2014

    Anomaly Based Detection and Prevention to Provide Secure MANET Using Dual Head Cluster in Hierarchical Cooperative IDS

    A purely wireless network wherein each device itself acts as a node and also performs the task of router is called as Mobile Ad-hoc NETwork (MANET). A MANET has become a need of today's fastest developing era. A measure issue in MANET is security as it is an autonomous system...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // May 2014

    Pre-Processing of Server Log File Along With Mac Address Using Apriori and Decision Tree

    In today's world, there is heavy traffic on internet. Now-a-days, usually every task is done on internet. Because of high network traffic, so lots of risks from attackers are also there. Therefore, securing the data over internet becomes a difficult challenge for professionals. To deal with large amount of data,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // May 2014

    A Distance Based Clustering Algorithm

    Clustering is an unsupervised data mining technique used to determine the objects that are similar in characteristics and group them together. K-means is a widely used partitional clustering algorithm but the performance of K-means strongly depends on the initial guess of centers (centroid) and the final cluster centroids may not...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    A Critical Study of Requirement Gathering and Testing Techniques for Datawarehousing

    In light of high cost and higher rate of failure of data warehousing projects, it becomes imperative to study software processes being followed for data warehousing. In this paper, the authors present a survey of literature for data warehousing requirement gathering and testing. This paper has analyzed drawbacks of traditional...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    Secured Pattern Base Encryption Approach for Intranet Chat Server for Wired Network

    A system server for a channel-based network including one or more Internet sites and one or more user terminals. The system server includes a channel table database storing a master channel table that includes a list of channel numbers, each channel number having an associated Internet address and an associated...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    An Enhanced Algorithm for Classification of Web Data for Web Usage Mining Using Supervised Neural Network Algorithms

    The usage of data on the web is growing with a speed of light; huge amount of data is present on web. To extract useful information from such huge web data efficient data extraction or mining methods are required to achieve a variety of functionalities such a as web AD...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    Secure Data Sharing Through Cloud Computing

    As an emerging technology and business paradigm, cloud computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrastructure through web services. The authors consider the problem of building a secure cloud storage service where the registered user could store...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2014

    IT-DHSD: Implicit Time Based Data Handling and Self Destruction Using Active Storage Object for Cloud Computing

    Computing is changing frequently to serve the user's needs for security and reducing a dependency which leads researcher to develop newer technologies. Cloud computing is one of those technologies which successfully delivers the service oriented architecture to reduce the burdensome of managing the devices. But in some situation instead of...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    A Framework for Personalization Using Query Log and Clickthrough Data

    Personalization of a web page involves dynamically altering the contents of the web pages according to the preferences or interests of users for retrieving, appropriate information for a given query. Although many personalization algorithms have been explored, but it is still not certain whether personalization is really helpful all time...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    The Privacy Feature of Trusted Computing Technology Using the Concept of Direct Anonymous Attestation With Cloud as a Technique

    The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security. In the distributed environment all the systems are connected together with a limited bandwidth security feature. The TPM module will increase the security feature by the concept of DAA. Direct...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Survey of Abstract Methods for How to Safeguard Against Distributed Denial of Service Attacks

    In this paper, the authors have tried to demonstrate that any business, large or small, that is dependent on Internet traffic to generate sales, service its customers, or maintain confidentiality is a candidate for stepped up protection against denial of service and distributed denial of service attacks for their network...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Dynamic Computation of the Application Between Smart Mobile Device and Cloud Computing

    The hardware-software partitioning problem is a key aspect of co-design of digital electronic systems; extensive research has been performed with diverse definitions of partitioning problems. However, existent partitioning solutions are not applicable to many real-time applications partly because of restricted input specification or insufficient constraints. By using the off-loading technique,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Survey on the Performance Analysis of Cloud Computing Services

    Cloud computing is a cutting edge technology for computing and people who are not a techsavy knew this buzz word. Now it is emerging rapidly in the research arena. It is an aggregation of pay-per-use computing paradigm and a utility computing. Voluminous data storage and timeliness of the needed resources...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Business Intelligence Over Cloud

    Managing such a big and complex data is getting very tough job. Therefore comes the idea of storing data and running BI over cloud. The use of Business Intelligence (BI) in the cloud is a gamechanger, as it makes BI affordable and easily available as compared to traditional BI. But...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Comparative Study of Remote Sensing Data Based on Genetic Algorithm

    In data mining fields, clustering is an important issue. Clustering is a technique to groups objects based on the information found in the data describing the objects. Image segmentation is the process of partitioning a digital image into multiple segments. Some of the image segmentation techniques are edge detection, region...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    An Enhanced Monitoring Mechanism for IaaS Platforms

    The monitoring mechanisms of open-source IaaS software OpenNebula and monitoring system Ganglia were analyzed. Reduce overload of retrieving resource usage information by deploying the Ganglia monitoring agent. And for improving the robustness of monitoring subsystem, the authors take measures on the privileged domain of virtualization nodes to hide the agent...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Implementation of Geo-Messaging Using Google Cloud Messaging and Location Based Services API of Android

    In this paper, the authors are proposing the implementation of geo-messaging using location based services and Google cloud messaging API's of Android. Geo-fencing can be defined as the process of sending messages tied to a location which means the receiver will not get the message until they enters the vicinity...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Web Usage Mining Contextual Factor: Human Information Behavior

    With the rapid development of information technology, the World Wide Web has been widely used in various applications, such as search engines, online learning and electronic commerce. These applications are used by a diverse population of users with heterogeneous backgrounds, in terms of their knowledge, skills, and needs. Therefore, human...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    A Study on Consumer Perception in Facilities Management Among the Middle Income Public in India for Various Analytical Factors Applied in the Strategic Management

    In this paper the authors identify the determinants of perception of consumers in facilities management in India. This paper was carried out in South India. Since the main objective of the paper was to identify the awareness and determinants of perception of consumer in the facilities management among the middle...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    QoS Ensured Optimal Replica Placement in Graph Based Data Grids

    In this paper the authors study the QoS ensured optimal replica placement problem. Most of the studies on replica placement concerns only about minimizing the data access time, without considering the quality of service issue. In heterogeneous environments, the quality assurance is important. They propose an algorithm named Replica Placement...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    Pro-Mining: Product Recommendation Using Web-Based Opinion Mining

    Effective recommendation is the key to success of any online marketing strategy. In this paper, the authors discuss the design and development of a novel recommendation system for consumer products. The proposed system helps the customer to select product of their choice. When a prospective customer passes a query (name...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2012

    A Survey on Trust Based Routing in MANET

    A Mobile Ad-hoc NETwork (MANET) is a peer-to-peer wireless network where nodes can communicate with each other without the use of infrastructure such as access points or base stations. Nodes can join and leave the network at anytime and are free to move randomly and organize themselves arbitrarily. In MANETs,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    Classification of Data Using Semi-Supervised Learning (A Learning Disability Case Study)

    In classification, Semi-supervised learning occurs when a large amount of unlabeled data is available. In such a situation, how to enhance predictability of classification through unlabeled data is the focus. In this paper, the authors propose a methodology based on Support Vector Machine of semi-supervised learning and implement it on...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Comparative Study of Remote Sensing Data Based on Genetic Algorithm

    In data mining fields, clustering is an important issue. Clustering is a technique to groups objects based on the information found in the data describing the objects. Image segmentation is the process of partitioning a digital image into multiple segments. Some of the image segmentation techniques are edge detection, region...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Resource Provisioning for Video on Demand in SaaS

    A cloud based video on demand is proposed solution to monitor the camera which is accessible to the client on demand. This camera is present on server computer which is controlled by cloud controller. Also it makes use of scheduling algorithms to handle multiple requests. This software provides functionality to...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Meta-Heuristic Based Clustering of Two-Dimensional Data Using Neighbourhood Search With Data Mining Technique as an Application of P-Median Problem

    The p-median difficulty is the well known facility allocation essence. The Neighborhood Search (NS) algorithm provides a solution to that problem. This NS algorithm is hybridized with Data Mining (DM) technique to attain a solution that is better than NS approach. Two new Metaheuristic clustering algorithms HDMNS (Hybrid Data Mining...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Privacy Preserving Clustering on Centralized Data Through Scaling Transformation

    Data sharing among organizations is considered to be useful as it offers mutual benefits for effective decision making and business growth. Data mining techniques can be applied on this shared data which can help in extracting meaningful, useful, previously unknown and ultimately comprehensible information from large databases. This ultimately leads...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Dynamic Approach to K-Means Clustering Algorithm

    K-means clustering algorithm is a heuristic algorithm that partitions the dataset into k clusters by minimizing the sum of squared distance in each cluster. In contrast, there are number of weaknesses. First it requires a prior knowledge of cluster number 'K'. Second it is sensitive to initialization which leads to...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    A Comparative Analysis of Data Mining Tools for Performance Mapping of WLAN Data

    Data mining is the non-trivial process of identifying the valid, potentially and understandable patterns in the form of knowledge discovery from the large volume of data. The main aim of this process is to discovering patterns and associations among preprocessed and transformed data. Data mining is used for two type...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Knowledge Extraction From Numerical Data: An Abc Based Approach

    Fuzzy rule based systems provide a framework for representing & processing information in a way that resembles human communication & reasoning process. Two approaches can be found in the literature which is used for rule based generation; in knowledge driven models the requisite rule base is provide by domain expert...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Improving Access Latency of Web Browser by Using Content Aliasing in Proxy Cache Server

    The web community is growing so quickly that the number of clients accessing web servers is increasing nearly tremendously. This rapid increase of web clients affected several aspects and characteristics of web such as reduced network bandwidth, increased latency, and higher response time for users who require large scale web...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Implementation of USB to USB Bridge for Computer Independent Data Transfer

    The authors' paper discusses a modern approach towards the way the data is transferred to and fro in the USB mass storage devices without using a computer. They have achieved this with a system that uses an independent solution for the problem - USB to USB Bridge. This bridge will...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Parametric Comparison Based on Split Criterion on Classification Algorithm in Stream Data Mining

    Stream data mining is a new emerging topic in the field of research. Today, there are number of application that generate massive amount of stream data. Examples of such kind of systems are sensor networks, real time surveillance systems, and telecommunication systems. Hence there is requirement of intelligent processing of...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    An Enhanced Monitoring Mechanism for IaaS Platforms

    The monitoring mechanisms of open-source IaaS software OpenNebula and monitoring system Ganglia were analyzed. Reduce overload of retrieving resource usage information by deploying the Ganglia monitoring agent. And for improving the robustness of monitoring subsystem, the authors take measures on the privileged domain of virtualization nodes to hide the agent...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    A Framework for Personalization Using Query Log and Clickthrough Data

    Personalization of a web page involves dynamically altering the contents of the web pages according to the preferences or interests of users for retrieving, appropriate information for a given query. Although many personalization algorithms have been explored, but it is still not certain whether personalization is really helpful all time...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    The Privacy Feature of Trusted Computing Technology Using the Concept of Direct Anonymous Attestation With Cloud as a Technique

    The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security. In the distributed environment all the systems are connected together with a limited bandwidth security feature. The TPM module will increase the security feature by the concept of DAA. Direct...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    QoS Ensured Optimal Replica Placement in Graph Based Data Grids

    In this paper the authors study the QoS ensured optimal replica placement problem. Most of the studies on replica placement concerns only about minimizing the data access time, without considering the quality of service issue. In heterogeneous environments, the quality assurance is important. They propose an algorithm named Replica Placement...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    Pro-Mining: Product Recommendation Using Web-Based Opinion Mining

    Effective recommendation is the key to success of any online marketing strategy. In this paper, the authors discuss the design and development of a novel recommendation system for consumer products. The proposed system helps the customer to select product of their choice. When a prospective customer passes a query (name...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    3-D Holographic Data Storage

    In response to the rapidly changing face of computing and demand for physically smaller, greater capacity and high bandwidth storage devices, the holographic memory came into existence. Holographic data storage using volume holograms offers high density and fast readout. It can store 1Tb-4Tb of information on a sugar cube sized...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    A Graph Based Approach to Find Candidate Keys in a Relational Database Scheme

    In this paper, a simple straightforward method to find all the candidate keys of a relational database schemes using graph is presented. First, the FD graph is drawn from the set of functional dependencies in a relational scheme. Thereafter, by using few very simple graph transformations, the FDG is reduced...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Dec 2013

    E-Business Transaction Security: Changing Trends in Database Security-Critical Review

    The electronic business has grown leaps and bounds with the popularity of internet. The popularity has also grown due to the services provided by the ISP companies. As the e-business is growing, so is the problem of data breaching. For breaching, a hacker needs an internet connection and a careless...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Implementation of Geo-Messaging Using Google Cloud Messaging and Location Based Services API of Android

    In this paper, the authors are proposing the implementation of geo-messaging using location based services and Google cloud messaging API's of Android. Geo-fencing can be defined as the process of sending messages tied to a location which means the receiver will not get the message until they enters the vicinity...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Survey of Abstract Methods for How to Safeguard Against Distributed Denial of Service Attacks

    In this paper, the authors have tried to demonstrate that any business, large or small, that is dependent on Internet traffic to generate sales, service its customers, or maintain confidentiality is a candidate for stepped up protection against denial of service and distributed denial of service attacks for their network...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Dynamic Computation of the Application Between Smart Mobile Device and Cloud Computing

    The hardware-software partitioning problem is a key aspect of co-design of digital electronic systems; extensive research has been performed with diverse definitions of partitioning problems. However, existent partitioning solutions are not applicable to many real-time applications partly because of restricted input specification or insufficient constraints. By using the off-loading technique,...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Survey on the Performance Analysis of Cloud Computing Services

    Cloud computing is a cutting edge technology for computing and people who are not a techsavy knew this buzz word. Now it is emerging rapidly in the research arena. It is an aggregation of pay-per-use computing paradigm and a utility computing. Voluminous data storage and timeliness of the needed resources...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2012

    Surface Reconstruction and Display From Range and Color Data Under Realistic Situation

    In this paper the authors deal the problem of scanning both the color and geometry of real objects and displaying realistic images of the scanned objects from arbitrary viewpoints. A complete system that uses a stereo camera system with active lighting to scan the object surface geometry and color as...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2012

    Information System Through a Heterogeneous Wireless Technologies and Services: Detect Unwanted Attempts at Accessing, Manipulating, and Disabling by Enforcement of Security

    Existing paper in this area focuses either on user activity or on program operation but not on both simultaneously with the management information system as backbone. In this paper, Based on an intrusion detection framework, a novel user anomaly detection system has been programmed and conducted several intrusion detection experiments...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    Web Usage Mining Contextual Factor: Human Information Behavior

    With the rapid development of information technology, the World Wide Web has been widely used in various applications, such as search engines, online learning and electronic commerce. These applications are used by a diverse population of users with heterogeneous backgrounds, in terms of their knowledge, skills, and needs. Therefore, human...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jan 2014

    A Study on Consumer Perception in Facilities Management Among the Middle Income Public in India for Various Analytical Factors Applied in the Strategic Management

    In this paper the authors identify the determinants of perception of consumers in facilities management in India. This paper was carried out in South India. Since the main objective of the paper was to identify the awareness and determinants of perception of consumer in the facilities management among the middle...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2014

    Business Intelligence Over Cloud

    Managing such a big and complex data is getting very tough job. Therefore comes the idea of storing data and running BI over cloud. The use of Business Intelligence (BI) in the cloud is a gamechanger, as it makes BI affordable and easily available as compared to traditional BI. But...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    A Survey of Cloud Based Secured Web Application

    Cloud computing is a schema for allowing appropriate on request network access to a shared pool of configurable computing resources, that can be rapidly delivered and released by minimal management effort or service provider. In cloud computing, the user need a Web browser to access to everything needed to run...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    A Survey on Secured Data Outsourcing in Cloud Computing

    Cloud computing has gained a lot of publicity in the current it world. After the internet, cloud computing is the next big thing in the computer world. Cloud computing is the use of the internet for the tasks performed on the computer and it is the next-generation architecture of it...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2012

    Improving Dendritic Cell Algorithm by Dempster Belief Theory

    In this paper, the authors present a novel method of intrusion detection based on artificial immune system. Adopting the dendritic cell algorithm and dempster - belief theory, a novel solution is presented to identify all intrusion correctly and minimized the false alarm generation. In order to increase the accuracy of...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2013

    Data Mining with Human Genetics to Enhance Gene Based Algorithm and Dna Database Security

    The goal of data mining in DNA Database is to check some possible combinations of DNA sequences and to generate a common sympathetic code or algorithm to formulate the sequence on mutations. Since the data mining is the best technique to analyze and extract the data, it is also helpful...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Aug 2013

    Reliable Security in Cloud Computing Environment

    Cloud computing is the newest term for the ongoing-dreamed vision of computing as a utility. The cloud provides convenient, on-demand network access to a centralized pool of configurable computing resources that can be rapidly deployed with great efficiency and minimal management overhead. The industry leaders and customers have wide-ranging expectations...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Perceiving and Recovering Degraded Data on Secure Cloud

    Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand. Cloud Storage deals with file blocks, simplifying storage management and eliminating metadata concern. Data are continuously distributed through multiple servers in cloud. The token is computed dynamically. If data lost, then it...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Apr 2013

    Security Issues Vs User Awareness in Mobile Devices: A Survey

    Mobile devices help modern man stay connected. Mobile phones come handy to serve this purpose; they use a radio link available in a geographical area, to make and receive telephonic calls, without compromising on the mobility. In the most recent years, the mobile phones are not just meant for making...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Jun 2012

    A Literature Review on the Data Mining and Information Security

    In this paper, the authors dealt with the data mining and security related issues. Now-a-days storing and procuring data is very easier as if the authors are having the handful of technocrats to warehouse the data and the cryptographic techniques are there to Mining the data in order to find...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2012

    E-Commerce Online Security and Trust Marks

    E-commerce web site owners on one side are thinking of how to attract more customers and how to make the visitors feel secured when working on the site, on the other side how the end users should rate a ecommerce website and what they should do to protect themselves as...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Sep 2012

    Security in RFID Technology

    RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use RFID for various applications such as personal/vehicle access control, departmental store security, equipment tracking, baggage, fast food establishments, logistics, etc. The enhancement...

    Provided By International Association of Engineering and Management Education (IAEME)

  • White Papers // Feb 2013

    Data Security Framework for Cloud Computing Networks

    Cloud computing is used for management of resources applications and information as services over the cloud. The resources used in cloud computing are the resources that are usually distributed as services. The cloud allows its services as a utility and because of the flexibility in its architecture, exposes it to...

    Provided By International Association of Engineering and Management Education (IAEME)