International forum of researchers Students and Academician

Displaying 1-40 of 388 results

  • White Papers // Jun 2014

    Implementation of Energy Efficient Adaptive MAC Protocol for Wireless Sensor Network

    Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. However, low sensing ranges result in dense networks and thus it becomes necessary to achieve an efficient medium-access protocol...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Design and Implementation of BCD to Seven Segment Display Decoder Using SIMULINK Model

    Displaying of information in public places like banks, offices, airports etc. is a very important issue now-a-day. Numbers and alphabets can be displayed by using devices that use LEDs and LCDs. The internal circuits normally works with binary and ASCII codes which only uses two symbols, zero and one. Displaying...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Design and Development of Mote for WSNs

    In this paper, the authors present design and development of mote for Wireless Sensor Network (WSN). The node is equipped with sensors to sense the temperature and humidity of the environment. An embedded wireless sensor node has been developed by using AVR Atmel AT89S52 microcontroller and Zigbee transceiver as wireless...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Implementation of 8-Bit Multiplier in Verilog Using Reversible Logic Gates

    Reversible logic gates are very much in demand for the future computing technologies as they are known to produce zero power dissipation under ideal conditions. A digital combinational logic circuit is reversible if it maps each input pattern to a unique output pattern. Such circuits are of interest in quantum...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Credit Card Fraud Detection Using Amend K-Means

    Today, internet has become the essential component of life. As telephone, fridge it becomes the important feature. Now-a-days, people don't have much time and they wish to do shopping sitting at home. Credit card is purchase now and pays later. As credit card has the power to purchase the things,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Prediction of Student Academic Performance Using Clustering

    One of the significant facts in higher learning institution is the explosive growth of educational data. These data are increasing rapidly without any benefit to the management. The main objective of any higher educational institution is to improve the quality of managerial decisions and to impart quality education. Predicting successful...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Automating the Process of Normalization

    Normalization is the most exercised technique for the analysis of relational databases. It aims at creating a set of relational tables with minimum data redundancy that preserve consistency and facilitate correct insertion, deletion, and modification. A normalized database does not show anomalies due to future updates. It is very much...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Pattern Taxonomy Model in Text Mining

    Text documents in the form of digital data are rapidly increasing. Manually analyzing such data is a tiresome task. Data mining techniques have been considered to analyze such data and generate interesting patterns. Many existing techniques use term-based methods. Some term-based approaches are Rocchio and probabilistic models, BM25, rough set...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Enhancing the Accuracy of K-Means Clustering Algorithm by Mean-Based Initial Centroids

    In this paper, the authors reflect the comparative study of k-means clustering algorithm with the mean based initial centroids. The original k-means algorithm helps to calculate the distance between the data objects, but the difficulty is that the k-means algorithm is not efficient and accurate to calculate distance and henceforth...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    A Novel Data Warehouse Architecture for Improvement in the Extraction,Cleaning and Loading of Optimized Data in a Data Warehouse

    Over the past decade, companies have spent billions of dollars on data marts and warehouses. From their experiences, a substantial body of knowledge has been created. Deciding the most suitable architecture is the most crucial activity in the data warehouse life cycle. Architecture is the key factor in setting up...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A New Approach of Data Mining for Preserving the Privacy Using Data Perturbation Techniques

    Privacy is a critical requirement in distributed data mining. Recently a new class of data mining methods known as Privacy Preserving Data Mining (PPDM) algorithms is introduced. The aim of these algorithms is the extraction of relevant knowledge from large amount of data, while protecting the sensitive information at the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Spam Detection Using Email Abstraction

    Now-a-days, communication has been increased enormously. Today's generation consider email as a fastest medium of communication within shorter duration and for longer distance. Spam is junk email or email which users do not want in their inbox. For finding out spam mails several methods exist. These methods are broadly classified...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    An Anonymization Method Based Data Publishing Using Tradeoff Function

    Important issue in data publishing is privacy preservation. Techniques such as generalization and suppression are used for data anonymization privacy protection; many algorithms for anonymization are available in meeting the privacy requirements of the privacy models such as k-anonymity, l-diversity and t-closeness. Important consideration is tradeoff between privacy and utility....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Implementation of Clustering Algorithms in RapidMiner

    Clustering can be used for data mining, information retrieval, text mining, web analysis and marketing etc. There are various Clustering algorithms but the authors have implemented three algorithms (K-means, DBScan and K-medoids) in RapidMiner. In data mining, Clustering can be considered as the most unsupervised learning techniques. Clustering is a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A Web Documents Clustering System Using Concept Based Mining

    Existing text mining techniques captures the importance of a term (word or phrase) using term frequency at document level only. The text mining techniques should capture the meaning or semantics of a text also. In this paper, a new concept-based mining system is introduced which analyzes the terms on sentence,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Preferences Extraction and Ranking and Functions in Mobile Search

    Mobile device interaction with users serves various purposes such as location service, road map, traffic information etc. It also helps user connect to the search engines. But the search query is limited to small words unlike those used when interacting with search engines through computers. This leads to drawback in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Hybrid Artificial Bee Colony Algorithm: A New Swarm Intelligence Approach for Data Clustering

    Clustering is a commonly encountered problem which must be solved in various fields of science and engineering. Recently, some approaches based on swarm intelligence were proposed for data clustering. Swarm intelligence is a computational intelligence technique to crack complex real-world problems. It is stimulated by intelligent behaviors of insect or...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    To Implement Distributed Data Mining to Make Intelligent Mobile Agent

    An agent is essentially a special software component that has autonomy that provides an interoperable interface to an arbitrary system and/or behaves like a human agent, working for some clients in pursuit of its own agenda. The paper focuses on mechanism of intelligent mobile agent architecture for the application domain...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Efficient Data Retrival Over Cloud

    As cloud computing become more flexible & effective in terms of economy, data owners are motivated to outsource their complex data systems from local sites to commercial public cloud. But for security of data, sensitive data has to be encrypted before outsourcing, which overcomes method of traditional data utilization based...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Home automation System Using Cloud Computing and Mobile Devices

    Home automation, as a model of pervasive computing, is progressively becoming substantial for people homed in developed societies. With the proliferation in the usage of household electronic and electrical appliances, numerous data and multifarious control-slevycumbersome burden on residential home automation control units, making it expensive and difficult for the users...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Comparative Study of FPGA Based Systems

    In this paper, the authors review the Field Programmable Gate Array (FPGA) with the focus on FPGA-based systems. The over view of FPGA and FPG A programming is represented in the literature. FPGA-based neural networks are provided in order to highlight the best advantage by using FPGA with this type...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Embedded System for Earthquake Victims

    The unprecedented scale and number of natural and man-made disasters in the past decade has urged International emergency search and rescue communities to seek for novel technology to enhance operation efficiency. Embedded search and rescue system that can navigate into material to search for victims and transfer critical field data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    An Efficient Test Vector Compression Scheme for SoC Design

    Memory is one of the most restricted resources in the embedded system design. Larger test data size in System-on-Chip (SoC) demands not only higher memory requirements, but also an increase in testing time. Code compression techniques have been used to address this issue by reducing the code size of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Microcontroller Based Speed Control of DC Motor Through RS 232 Interface with PC

    Role of electrical drives is a major concern in industrial automation. Industrial applications use dc motors because the speed-torque relationship can be varied to almost any useful form for both dc motor and regeneration applications in either direction of rotation. DC motors are often applied where they momentarily deliver three...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Large Data Reconfiguration Using Byzantine Fault Technique

    In this paper, the authors describe a knowledge large data storage that exploits local data versioning within each storage-node. With Byzantine failures technique of clients and server. The storage nodes work to client and high optimistic operations. This can be problematic in long-lived, large-scale systems where system membership is likely...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Algorithms for Anonymization Principles to Achieve Better Privacy in Data Publication

    ANGEL, a technique used for data publication. It publishes the original data in the form of BT (Batch Table) and GT (Generalized Table). This Technique uses anonymization principles such as k-anonymity and l-diversity. This paper also uses an advanced anonymization principle called t-closeness for smaller data sets and (n, t)-closeness...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Improving Maximal Frequent Itemset Mining for Sparse Dataset

    Mining of maximal frequent patterns is a basic problem in data mining applications. Small and useful association rules can be generated from maximal frequent itemset. The algorithms which are used to generate the maximal frequent patterns must perform efficiently. Most of the existing algorithms passed all frequent itemsets as candidates...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Study on Collaborative Web Mining Approaches

    Internet has become main source of information. With the popularization of computers and internet, even the common people find it useful to satisfy even their minute day-to-day information needs. At the same time it is an encyclopedia of all knowledge domains and an efficient medium of information sharing. However, the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Study and Analysis of Active Data Warehousing and its Implementation in Sun Oracle Data Base

    Business Intelligence (BI) is becoming an important part of more organizations' day-to-day operations, and active data warehousing is a prime enabling technology. As with many good business technologies, the concept of active data warehousing was born from user requirements rather than from vendors' technological ability. With active data warehousing, the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Hierarchical Bisecting Clustering with Multi View-Point Based Similarity Measure

    Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters, thereby providing a basis for intuitive and informative navigation and browsing mechanisms. There are some clustering methods which have to assume some cluster relationship among the data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Rough Set Based Privacy Preserving Attribute Reduction on Vertically Partitioned Data and Generation of Rules

    Data mining is the process of extracting knowledge from various databases. For security reasons organizations may partition their data horizontally or vertically. Another situation is hospitals maintaining sensitive information about patients. This paper can also be treated as vertical partitioning of data if all the hospitals maintain data in the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Streaming Data Ware Houses Modernization Under the Process of Scalable Scheduling

    Data mining is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Review on Mitigating Data Theft Attacks in the Fog Computing

    The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively scalable, efficient, agile, reliable and secure. The telecommunications networks have for many years, Demonstrated their ability to reliably enable network (voice) services creation, assurance...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Large Scale Reliable Storage Systems

    The available fault-tolerant storage systems either assume a static set of replicas, or have limitations in how they handle reconfigurations. This can be problematic in large-scale systems where system membership is likely to change during the system lifetime. In this paper, the authors present a better solution for dynamically changing...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Survey of Algorithms for Sentence Extraction & Text Summarization

    World is observing an explosion of unstructured data today, a significant part of it, is in text form. One of the most effective text analytics techniques is extraction of keywords. Keywords provide information to obtain the summary of a document and they help in correlating documents. The main challenge is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Data Mining Application in Telecommunication: Fraud Detection

    Data mining is used in many areas to extract useful information from the cluster of data. There are different steps included in data mining process which are stated as follows: gathering data, selecting an algorithm, regression. By following these steps one can extract the useful information from the heap of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Ontology Model for Ranking Techniques by Quality Reference for Domain-Specific Search

    Data mining is used to extract valid, previously unknown, and easily interpretable information from large data sets. As a model for knowledge description and formalization, ontology's are widely used to represent ranking techniques in personalized information gathering for the domain specific search. However, when representing Ranking Information, many models have...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Developing Method for Mining of Knowledge For Customer Relationship Management

    Data mining is process of extracting or mining of knowledge from huge quantity of data Modern companies and organizations are efficiently implementing a CRM strategy for managing a company interactions and relationships with customers. CRM systems have been developed and designed to support the areas of marketing, service process and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    An Implementation on 8x8 Vedic Multiplier Using Vedic Mathematics with High Speed Performance

    A high speed processor depends greatly on the multiplier as it is one of the key hardware blocks in most Digital Signal Processing (DSP) systems as well as in general processors. This paper presents a high speed 8x8 bit Vedic multiplier architecture which is quite different from the conventional method...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing Using Effective TPA

    Cloud computing is an internet based computing which enables sharing of services. Many users place their data in the cloud, so correctness of data and security is a prime concern. This paper studies the problem of ensuring the integrity and security of data storage in cloud computing. Security in cloud...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A Unified Approach for Outlier Detection Using Change Point for Intrusion Detection

    The number of computers connected to a network is increasing and Network Intrusion Detection System (NIDS) is one of the essential to an organization. The challenge here is to react quickly to different events with high detection rates and low false positives for real time traffic. Current research is in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Off-Line Signature Verification and Recognition

    Signatures are composed of special characters and flourishes and therefore most of the time they can be unreadable. Also intrapersonal variations and interpersonal differences make it necessary to analyze them as complete images and not as letters and words put together. As signatures are the primary mechanism both for authentication...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Link Failure Tolerance by Path Restoration

    Due to channel interference, dynamic obstacles and/or applications' bandwidth demands multi-hop Wireless Mesh Networks (WMNs) experience frequent link failures. This results performance degradation in WMNs and require expensive, manual network management for their real-time recovery. Herewith the authors present an Autonomous network Reconfiguration System (ARS) that enables a multi-radio WMN...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Comparative Study for Quadruple Tank Process with Coefficient Diagram Method

    In this paper, a new decoupler method using Coefficient Diagram Method (CDM) for quadruple tank process is proposed. It consists of four inter connected water tanks and two pumps. The major problem in a multivariable process is that the loop interaction may arise and cause difficulty in feedback control design....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Connectivity-Based Localization Schema for Wireless Sensor Network

    In this paper, the author examines localization error will be minimal after adjusting the radio range of beacons' and error performance tradeoffs. Anchor based-range-free schema for Wireless Sensor Network. Localization algorithms are different in different network environments. His work is to find out an efficient localization algorithm for Wireless Sensor...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A CDMA Cellular Network Base Station Distributed Closed-Loop Power Control Algorithm Based on Sixteen-Iterations

    All users transmit on the same frequency and time and utilize the entire bandwidth in CDMA compared to TDMA or FDMA. Even though CDMA provides more capacity and better QoS, the capacity is affected by the near-far problem which degrades the performance of users far away from the BSs. It...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    On Dynamic Configurability and Adaptability of Intelligent Tags with Handheld Mobile Devices

    The availability of unlicensed spectrum coupled with the increasing popularity of wireless communication has given rise to wide range of wireless technologies. The overwhelming success of mobile devices and wireless communications is stressing the need for the development of wireless mobile application services. Device mobility requires services adapting their behavior...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Hiding Text in Audio Cover with the High Capacity and Security Using Multiple LSBs

    Stenography is an art of embedding hidden data or secret messages over a public channel so third party cannot detect the presence of secret messages. In this stenography method of embedding textual information in an audio file, a proposed technique is first audio sampled and then appropriate bit of each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Architecture of Data Warehouse ETL Tools- Performing Efficient and Effective Way

    Data warehousing has been a buzz word in the industry since mid 90's, but it was not wide spread due to be complex timing and maintenance. Business and technologies are now wider and wider so in modern technologies users cannot think in any organization without data warehouse. Data warehouse helps...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Wi-MAX Security Enhancement and Solution for Authentication Against Man-in-the-Middle Attack

    The paper presents security enhancement of Worldwide Interoperability for Microwave Access (WiMAX) for authentication frame work in IEEE 802.16 against man-in-the-middle attack. This gives secure authentication of legitimate Mobile Station (MS) and protects man-in-the-middle attack. To prevent this kind of attack and to make the authentication more secure, a Hash-Random...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Stability of Feedback Based LNA Topologies for UWB Communication

    Since the U.S. Federal Communications Commission (FCC) approved the application of Ultra Wide-Band (UWB) technology for commercial use in early 2002, ranging from 3.1 to 10.6 GHz (bandwidth: 7.5 GHz), the implementation of a UWB system and its sub-blocks has been a challenge for Integrated Circuit (IC) designers. In this...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Gallium Nitride-Based RF Power Amplifiers for Future Wireless Communication Systems

    Radio Frequency (RF) High Power Amplifiers (PAs) received increasing attention as key components responsible for a sizable portion of base station cost (power loss and cooling equipment) in wireless communication systems. Thus, high power and high efficiency amplifiers with low power loss are critically needed. To meet these requirements, higher...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    VLSI Based Wireless Sensor Network For Signal Classification

    The tremendous increase in the Wireless Sensor Network (WSN) in the last decade has increased the potential applications including environment monitoring, smart spaces, medical systems, and robotics exploration. Sensors integrated into structures, machinery, and the environment has led to fewer catastrophic failures, conservation of natural resources, improved manufacturing productivity, improved...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Spectral Entropy Based VAD Using Teager Energy Operator and HOS

    In this paper, the authors presents Voice Activity Detection (VAD) algorithm for detecting voice in noisy environments. The presented robust VAD utilizes the Spectral Entropy (SE) with Teager Energy Operator (TEO) to provide a better representation of formant information resulting in high performance of classification of speech/non-speech priori to entropy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Survey Report on Implementation of Optimized Cryptographic Algorithm

    Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Cryptographic algorithms are widely used in Internet Systems. Applications of cryptographic algorithms include credentials establishment i.e....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Proposed Architecture for Agent Communication Manager in Mobile Ad-hoc Network

    In this paper, the authors are going to introduce the proposed architecture for agent communication manager in MANETS. Here they are introducing a manager for agent communication that support the dynamic as well the static infrastructure according to the nature of the problem. The architecture proposed by them consists of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Realization of the SISO Architecture for Downlink Data Channels of 3GPP-LTE Using PlanAhead Tool and Virtex-5 Device

    Long Term Evolution (LTE) of UMTS Terrestrial Radio Access and Radio Access Network is a Fourth Generation wireless broadband technology which is capable of providing backward compatibility with 2G and 3G technologies. As compared with other promises LTE is able to deliver high data rate and low latency with reduced...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Comparative Study Of Cross Domain Models in Sentiment Mining

    Sentiment mining is the application of text mining to infer the sentiment expressed in a piece of text about a chosen target. Sentiment mining or opinion mining refers to the application of natural language processing, computational linguistics, and text analytics to identify and extract subjective information in source materials. Generally...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    A Nodal Relational Approach to Database Virtualization

    Virtualization has become a necessarily in today's IT world. Virtualization has successfully reduced the problems like space, time taken in setting up the environments and Green IT problems. But there are certain issues which need to be focused on virtual environments. One of the most important issues is performance. This...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Approach on Privacy Preserving Data Mining Based on Fuzzy C-Means

    Extracting information from an existing data warehouse and transforming it to a human understandable form for further use is the main objective of data mining. The data mining process does not enclose, any security any person can repossess the information from the data warehouse. The data are categorized in the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Data Mining Techniques for Crime/Terror Databases

    There have been several developments in data mining and the technology is being used for a wide variety of applications. It is also becoming a useful tool for detecting and preventing crime and terrorism. This paper will begin with an overview of the application field or the crime types with...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Secure Data Collection in WSN Using Randomized Dispersive Routes

    In this paper, the authors define the problem to provide security to the network having intruders and reconstruction of original information using Shamir's secret sharing algorithm. The proposed system secure data collection in a Wireless Sensor Network with compromised nodes in order to circumvent or overcome the 'Black Holes'. It...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Distinct User Identification Method Using Web Log data

    With the Internet usage gaining popularity and the steady growth of users, the World Wide Web has become a huge repository of data and serves as an important platform for the dissemination of information. The users' accesses to Web sites are stored in Web server logs. However, the data stored...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Review on Data Security in Data Warehousing

    Data Warehouses are used for storing historic and current data and are used for creating trending reports for annual and quarterly comparisons for the enterprises. Data Warehouses are the most valuable assets which contains critical business data and information for the enterprises in today's world. Most of the existing data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Survey on Data Mining in Cloud Computing

    Data and information has a significant role on human activities, thus data sources are growing to be larger and distributed. But the main problem is not storing data; it is analyzing, mine, and process data for understanding it. Current era is of networking and communication; people are interested in keeping...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Approach for Enhancement of Data Security in Cloud Computing-A Review

    Cloud computing is an emerging trend which can transform information technology and the way it is used. The main issue is data security as it should not be a concern over the large data to be shared in cloud and hence not limit its use. This is a review of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Optimized Data Warehouse Model Through Pentaho ETL Tool

    Extraction-Transformation-Loading (ETL) tools are available for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. In this paper, the authors have focus on how to build optimized data warehouse model through Pentaho ETL tool. Initially they have taken data set that is given...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Review on RFID Data Cleaning Problem Using Data Mining Tools

    The data stream produced by RFID reader is sometimes inaccurate. As a result there is a big load of unreliable data which is useless for higher level processing. Therefore the authors need to clean this unreliable data which they sometimes call dirty data. Dirty data appears in three reading errors...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Vehicular Traffic Surveillance Using Multiple Methodology

    Digital image processing is the use of computer algorithms to perform image processing on digital images. As a subcategory or field of digital signal processing, digital image processing has many advantages and applications. One of the applications of digital image processing is for traffic analysis. In literature survey found that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2013

    Monitoring & Detecting the Application Layer DDOS Attacks that Affects Popular Websites

    One of the major threats for the Internet's reliability and stability is Distributed Denial-Of-Service (DDOS) attack. The attackers are becoming more sophisticated and organized; also several high-profile attacks targeted prominent websites. These are the prime reasons that gained importance for the study of DDOS attack detection and prevention. It becomes...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Improving the Atmospheric Delay Effects on the Received Global Positioning System Signals

    There are several error sources that cause the estimated position and time measuring from Global Positioning System (GPS) receivers to be inaccurate. The most significant error sources are the satellite clock drifts, mismodeling of gravitational and non-gravitational forces in combining the orbits, geometry of the satellites, ionospheric and tropospheric atmospheric...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Techniques to Improve Performance of VoIP Over 802.11e WLAN

    Voice over Internet Protocol is an important service with strict quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e standard has been introduced recently for providing Quality of Service (QoS) capabilities in the emerging Wireless Local Area Networks. This 802.11e introduces a contention window based that is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Load Balancing in Wireless Mobile AD HOC Networks

    Ad hoc networks consist of a set of homogeneous nodes (computers or embedded devices) that move in an independent fashion and communicate with the other node in the topology over a wireless channel. Such networks are logically realized as a set of clusters by grouping together. Nodes which are in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Distributed DACS Based on Low Cost Internet Controlled Embedded Servers

    Now-a-days everyone using many networked embedded systems for monitoring and control the home or industrial devices. With the scalable networking solution, the server enables web access to distributed measurement/control systems and provides optimization for educational laboratories, instrumentation, industrial and home automation. In this paper, the authors present the principles and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Identification of Web User Sessions using Clustering Technique

    The common definition of a user-session is given by a period of time during which the user is generating traffic in internet a user-session is then terminated by a "Long" inactivity period. Within an activity period, many TCP connections may be used to transfer data. Unfortunately, the identification of active...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Multi-Copy: Routing Efficiently in Intermittently Connected Mobile Networks

    Intermittently connected mobile networks are wireless networks where most of the time there does not exist complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this paper, conventional...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Analysis of BER in BPSK and GMSK Employing Different Coding

    In this paper, BPSK and GMSK communication system model using AWGN channel and different coding and decoding is analyzed. In the paper performance of BPSK using Convolutional coding and viterbi decoding is compared to GMSK uncoded and GMSK employing Reed Solomon coding. The simulation shows that GMSK using Reed Solomon...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Intrusion Detection System in Ad-Hoc Network

    Intrusion detection prevention measures, such as encryption and authentication can be used in ad-hoc networks to reduce intrusions but cannot eliminate them. For example, encryption and authentication cannot defend against compromised mobile nodes, which often carry private keys. Integrity validation using redundant information (from different nodes), such as those being...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Approach for Efficient Delay Tolerant Networks Using Conditional Shortest Path Routing

    This paper deals with Delay Tolerant Networks (DTNs) where each node knows the probabilistic distribution of contacts with other nodes. Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Improving Network Processing Technique in Internet Controlled Embedded Systems

    The RTCS Embedded Internet stack provides IP networking for the MQX platform. RTCS is provided with a rich assortment of TCP/IP networking application protocols and uses the MQX RTOS drivers for Ethernet or serial connectivity. RTCS is tightly integrated with the latest ColdFire and Power Architecture processors from Freescale and...

    Provided By International forum of researchers Students and Academician