International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 1-40 of 1712 results

  • White Papers // Jun 2014

    A Comparative Study of SaaS, PaaS and IaaS in Cloud Computing

    Cloud computing - a relatively recent term, defines the paths ahead in computer science world and it Becomes highly demanded technology in IT industry now. Basically cloud is a collection of computer resources and provides a million of services to its user simultaneously. A cloud provides a friendly environment to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Review of Different Existing Image Mining Techniques

    In the area of data mining, image mining technology has been considered an advanced field for discovering information related to the images. Image mining is a process of extracting knowledge concerning images. The demand of image mining increases as the need of image data is growing day-by-day. There are many...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Big Data - Overview and Challenges

    In today's technology and knowledge driven society, data is considered to be the most critical resource of an organization. The processing and management of data, which is growing at a record rate in today's world is the most pressing challenge faced by almost every organization. This gigantic growth of data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Enhancing Security in Cloud Computing for Dynamic Data Storage

    In this paper the authors concentrate on cloud data storage security, which has dependably been an imperative part of quality of service. To guarantee the correctness of users' data in the cloud, they propose a powerful and adaptable appropriated plan with two striking characteristics, contradicting to its ancestors. By using...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Framework for Analyzing and Testing Cloud based Applications

    Software testing is the process of assessing the functionality and correctness of a program through execution and/or analysis. Testing is a challenging activity for many software engineering projects and is one of the five main technical activity areas of the software engineering lifecycle that still poses substantial challenges, especially for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Design of High Speed Data Transceiver Serial Front Pannel Data Port Protocol

    Serial Front Panel Data Port (SFPDP) is a serial communication protocol that is designed to have a low latency and a high transfer rate. This paper presents a high speed data transceiver Serial Front Panel Data Port (SFPDP) protocol which finds applications in most modern day communication systems. The design...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    SOA for Effective Data Integration of Virtual Learning Environment Systems

    Services Oriented Architecture (SOA), is important model that changed the traditional development techniques because it allows the systems to be integrated with each other more flexible, which leads to reduce the cost and time in the process of e-learning construction by using the web services technology which are reusable and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Better Cluster Head Management in WSN using Min Heap algorithm

    In this paper the authors reduce the consumption of network resource, to propose a clustering algorithm for load balancing. This enhanced clustering algorithm will improve network lifetime and as well as the scalability of wireless Sensor network. In this paper, an efficient load balancing clustering technique is proposed which is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Comparative Performance Study of CPU Scheduling Algorithms

    Some CPU scheduling algorithms such as First-Come-First-Serve (FCFS), Shortest Job First (SJF), priority, Round Robin (R-R), Multilevel Queue (MQ) and Multilevel Feedback Queue (MFQ) has been elaborated and assessed on the basic CPU scheduling objectives i.e.; Average Waiting Time (AWT), Average Turnaround Time (ATT) and Average Response Time (ART), Average...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Avoiding Load Issues in Wireless Sensor Networks by Adopting Data Aggregation Methods

    The authors investigate the following fundamental question - how fast can information be collected from a wireless sensor network organized as tree? To address this, they explore and evaluate a number of different techniques using realistic simulation models under the many-to-one communication paradigm known as convergecast. They first consider time...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Software Testing In Cloud Computing Environment

    Cloud computing is the next stage in the Internet's evolution, where - from computing power to computing infrastructure, applications, business processes to personal collaboration - can be delivered to end user as a service wherever and whenever the user need. Software testing based on cloud computing environment is known as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Multipurpose Robot with Laser Gun, Robotic Arm and ARM9 for Display

    Robots play a major role in many walks of life and are extensively used in the areas of defense, industries, medical and home appliances. They can carry out different risky jobs that cannot be done by human. This paper presents multipurpose autonomous robot that has PIR sensor, inductive proximity sensor,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    An Efficient Enhancement of Mining Top-K Association Rule

    Data mining on huge databases has been a major issue in research area, due to the problem of analyzing large volumes of data using traditional OLAP tools only. This type of process implies much computational power, disk I/O and memory, which can be used only by parallel computers. So, depending...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Opinion Mining through on to Tree

    In this paper ontology based mixed approach is used for onto tree designing to identifying and analysis the opinion. This can be done by combining data structure retention techniques and ontology characteristics. Classification can be done by forming right positive and left negative sub tree to calculate the positive and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Fog Computing Providing Data Security: A Review

    Cloud computing is a delivery platform which promises a new way of accessing and storing personal as well as business information. It provides resources to its users through the Internet. But it also has a risk that is the involvement of a third party which makes it difficult to trust...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Mining Web Log Files for Web Analytics and Usage Patterns to Improve Web Organization

    The web access log is the best repositories for the information source; it keeps the whole record of even a tiny low event. One can simply determine internet usage patterns for numerous internet users. The web usage pattern analysis is a method of distinguishing browsing patterns by analyzing the user's...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Secret Sharing Based Approach to Enhance Security in Cloud Computing

    Cloud computing is recently aroused as a service program, where users can remotely depot their data into the cloud so as to take advantage of on-demand high quality services from a shared pool of configurable computing resources. Users can be freed from the burden of local data storage and maintenance...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Competent Approach for Extracting and Visualizing Web Opinions Using Clustering

    Huge amount of Web opinions are available in the social sites due to the development of web communication. Web opinion acts as a boundary between the Web users and Internet. It allows the users to communicate and articulate their opinions without eye to eye contact. Nevertheless the clustering and visualizing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Analysis of Global Kernels Using Fuzzy C Means Algorithm

    Today the field of remote sensing has become exciting and glamorous with rapidly expanding opportunities. Many organizations spend large amount of money on these fields. Two main reasons why these fields are so important in recent years are: now-a-days scientists, researchers, students, and even common people are showing great interest...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Advancement in Single Node Data Transfer Energy Protocol Using Gateways in Wireless Sensor Network

    The authors know in wireless sensor network energy consumption is major issue to enhance the life time of WSNs. In wireless sensor network there are different types of nodes which have different and same energy levels of nodes. The heterogeneous and homogeneous shows the energy level of nodes. As they...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Data Restoration and Privacy Preserving of Data Using C4.5 Algorithm

    Data mining extracts knowledge to support a variety of areas as marketing, medical diagnosis, weather forecasting, national security etc. successfully. There is an improved advance in hardware technology which increases the capability to store and record personal data about consumers and individuals. So there is a challenge to extract certain...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Energy Efficient Heterogeneous Clustering Protocol for Wireless Sensor Networks using Fuzzy Logic with different Base Station Locations

    Lifetime enhancement of a wireless sensor network is always an issue for network designers. To obtain this goal number of energy efficient protocols has been developed. Most of these protocols are based on hierarchical approach using clustering. LEACH (Low Energy Adaptive Clustering Hierarchy) was the first hierarchical based clustering algorithm...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Best Approach for LSB Based Steganography Using Genetic Algorithm and Visual Cryptography for Secured Data Hiding and Transmission over Networks

    A large number of commercial steganographic programs use the Least Significant Bit (LSB) embedding as the method of choice for hiding data as it has low computation complexity and high embedding capacity but certain RS analysis is considered as one of the most famous steganalysis algorithm which has the potential...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Simplified Data Mining Framework to Plan Effective Direct Marketing Campaigns

    The advancement in technology, competitive market environment and changing behavior of customers has generated an increased interest in direct marketing method for marketing. Data mining technology can predict and detect the changes in customer behavior which facilities the effective planning of direct marketing campaigns. This paper is to generate a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Energy Efficient Routing for Wireless Sensor Network through Event-Based Clustering Mechanism

    Sensor networks are collection of sensor nodes which co-operatively send sensed data to base station. As sensor nodes are battery driven, an efficient utilization of power is essential in order to use networks for long duration hence it is needed to reduce data traffic inside sensor networks, reduce amount of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Comparative Study of Data Mining Tools

    Today the rapid development of information technology and adoption of its several applications has created the revolution in business and various fields significantly. The growing interest in business using electronics and technology has brought vital improvement in data mining field also, since it's an important part of data accessibility. Data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Three Layered Security Model for Data Management in Hadoop Environment

    Security is one of the basic aspects required in any network model. But when the access is on any shared system such as hadoop, the security criticality is increased. This kind of systems is defined along with service and resource sharing services as well as to perform the data management...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Comparative Analysis of K-Means and Fuzzy C-Means Algorithms for teamassignment

    Data mining technology has been considered as useful means for identifying patterns and trends of large volume of data. This approach is basically used to extract the unknown pattern from the large set of data for business as well as real time applications. This paper is can comparative sturdy of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Low Leakage Power SRAM Design Using Lector Technique In Various CMOS Technology

    The major portion of total power consumption in the integrated device is leakage power dissipation and is expected to grow exponentially in the next decade as per the International Technology Roadmap For Semiconductor (ITRS). In CMOS circuit, reduction of threshold voltage due to voltage scaling leads to increase in sub-threshold...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Effective Web Log Mining: An Implementation View

    With the increase in popularity of web in the past few decades, web mining has attracted lots of attention. An important area in Web mining is Web usage mining, the discovery of patterns in the browsing and navigation data of Web users. Web log mining is application of data mining...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Green Cloud Computing using Artificial Neural Networks

    In this paper the authors present the results of simulation work performed to enhance the effectiveness of green cloud computing using artificial neural networks. It has been shown that to predict that whether the cloud architecture will be green or not can be made more accurate by employing artificial neural...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Security Services using ECDSA in Cloud Computing

    Cloud computing security is the set of control-based technologies and policies designed to comply with the rules and regulations framed by the provider team to support and protect information, data applications and infrastructure associated with cloud computing use. Cloud computing security process should address the issues faced by the cloud...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Review: Graph Databases

    Graph databases have brought a new trend of modeling the data and solving problems. They perform better than relational database. Many big organizations like Google, Twitter, and Facebook are using graph databases to handle their large amount of data and queries. The selection of the graph database should be on...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Efficient Resource Utilization of Smartphone's Using Cloud Computing

    As Smartphone are becoming more complex and powerful to provide better functionalities, concerns are increasing regarding resource utilization of Smartphone. To efficiently utilize the Smartphone resources the people is using cloud computing there by increases the battery life and the performance of the Smartphone. Consider two computational processes, one by...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    An Approach for Privacy Preserving Cost of Intermediate Datasets in Cloud

    In cloud computing at the time of processing a data intensive application a large volume of intermediate datasets are generated, instead of regenerating these intermediate datasets, the authors can store these datasets in the cloud for future purpose. If any adversary should analyze these intermediate datasets they can get the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Round Robin Approach for VM Load Balancing Algorithm in Cloud Computing Environment

    Cloud computing is a new emerging trend in computer technology that has influenced every other entity in the entire industry, whether it is in the public sector or private sector with the advance feature of the cloud there are new possibility opening up how application can be built and how...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    ANCHOR: A Stable Matching Framework for Managing Cloud Resources

    The authors present anchor, a general resource management architecture that uses the stable matching framework to decouple policies from mechanisms when mapping virtual machines to physical servers. In anchor, clients and operators are able to express a variety of distinct resource management policies as they deem fit and these policies...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Data Mining for Big Data: A Review

    Big data is the term for a collection of data sets which are large and complex, it contain structured and unstructured both type of data. Data comes from everywhere, sensors used to gather climate information, posts to social media sites, digital pictures and videos etc. this data is known as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Survey on Secure Data Aggregation in Wireless Sensor Network

    In wireless sensor network data aggregation is an important technique to achieve power efficiency in the sensor network. In some application such as: wireless sensor network, data mining, cloud computing and data aggregation is widely used. Because sensor node has limited battery power so data aggregation techniques have been proposed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Security Analysis for Data Grid Middle wares

    Grid computing is believed to be ultimate solution for meeting the increasing computation needs of organizations. At present the major focus is on load balancing in grid computing in order to improve the performance of grid. However, the user running an application on a remote machine in the grid-computing network...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Performance Analysis on Direct and Indirect Discrimination in Data Mining

    Discrimination is a presuppose privileges where provide to the each separate group for the safety of the data which is stored .discrimination is two type direct and in direct discrimination is based on sensitive information. Direct discrimination is based on sensitive information .In direct discrimination is based on non sensitive...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Layered Issues in Wireless Mesh Networks

    With the use of wireless sensor networks in industrial settings, a new type of network topology, mesh networks, has emerged in today's market. Wireless mesh network is a promising technology is providing the last mile broadband access. Wireless mesh networks has the potential to deliver Internet broadband access, wireless local...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Hierarchical Window Centric Method of Modeling Spatial Co-Location Patterns on Spatial Database

    With the growing technology, most of the focus is on spatial data mining. Spatial data mining refers to the extraction of unknown and unexpected information from spatial data sets of massive, high dimensionality and complex spatial databases. Spatial data mining is a process to discover related knowledge, potentially constructive and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Survey on Web Usage Mining with Clicking Pattern in Grid Computing Environment

    Web usage mining is a current and drastic research area in web usage mining focused on learning about web users and their interaction about web sites. The aim of web usage mining is to find user's access moves frequently and quickly from the massive web log data such as through...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Gait Recognition System for Improved Human Identification using ENN and NN

    Recognition of any individual is a task to identify people. Human identification using Gait is method to identify an individual by the way he walk or manner of moving on foot. Gait recognition is a type of biometric recognition and related to the behavioral characteristics of biometric recognition. Gait recognition...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    The Complete Reference and an Overview of Cloud Computing

    Cloud computing is a paradigm shift in which computing is moved away from personal computers and even the individual enterprise application server to a cloud of computers. A cloud is a virtualized server pool which can provide the different computing resources of their clients. The data and the services provided...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A New and Efficient K-Means Clustering Algorithm

    A cluster is a collection of data objects that are similar to one another within the same cluster and are dissimilar to the objects in other clusters. Since K-means is widely used for general clustering, its performance is a critical point. This performance depends highly on initial cluster centers since...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Variants of Wormhole Attack in MANET and their Counter Measurements

    Mobile ad hoc network is a network that is organized by itself, adaptive in nature and on an ad hoc basis. As a results of decentralized infrastructure several security problems are arise and malicious activity performed by offender. MANET routing disrupts if participating node do not perform its intended function...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Implementation of Energy Aware Routing Protocol for Mobile Ad Hoc Networks

    In this paper, the authors proposes an Energy Aware Routing Protocol (E-AODV) based on AODV which incorporates local routing of intermediate nodes to increase the lifetime of the network .NS2 (Version 2.34) simulator is used for the simulation of new protocol and AODV protocol for the performance parameters packet delivery...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Clustering with Multi-view Point Based Similarity Measure

    All clustering methods have to assume some cluster relationship among the data objects that they are applied on. Similarity between a pair of objects can be defined either explicitly or implicitly. In this paper, the authors introduce a novel multi-viewpoint based similarity measure and two related clustering methods. The major...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Ensure Software Growth a Survey

    Technology and its applications are arousing day-by-day fashion, in the people daily life they are several times acted with different kinds of computer and its application that shows consequences of technology in their daily life. To design and spread an application that helps one on different utilities are made possible...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Modified K- Means Clustering Algorithm for Data Mining in Education Domain

    Data mining is a process of extracting previously unknown, valid, potentially useful and hidden patterns from large data sets. Data mining is mainly used in commercial applications. Clustering is a multivariate analysis technique where individuals with similar characteristics are determined and classified (grouped) accordingly. In data mining, K-Means clustering is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    An Analytical Comparison of Reactive Protocols in Mobile Network

    Mobile communication is most required communication network in today's scenarios. In such network, different kind of data is communicated over the network. The main consideration in such network is given to routing protocol used for the communication. The presented work is about to identify the effective mobile protocol by performing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Power and Position Optimization Techniques for MANETs

    Energy efficiency, Reliability and on demand data delivery are the usual challenging factors encountered in mobile ad hoc networks. Previously used ad hoc routing protocols where guard nodes relay the packet with prioritized back off time when the intended node fails and becomes a contender nodes themselves are inefficient considering...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Clustering Analysis Based on Greedy Heuristic Algorithm

    Due to increase of the mining of compressed data from various types of applications. Clustering is the process for resolving that type of applications. Traditionally the users' are using different clustering applications for grouping elements with equal priority. And the authors represent single clustering process with multi dimensional data grouping...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Survey Paper on Recent Clustering Approaches in Data Mining

    A significant issue of data mining task is fast retrieval of the relevant information from databases. The important goal of data mining process is to collect the information from large dataset and then transform that data into some meaningful manner. Clustering is one of the most essential task in data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Topology Base Routing Attacks in Vehicular Ad hoc Network - Survey

    Vehicular ad-hoc networking is an emerging technology for future on-the-road communications. Due to the virtue of vehicle-to-vehicle and vehicle-to-infrastructure communications, Vehicular Ad hoc NETworks (VANETs) are expected to enable a plethora of communication - based automotive applications including diverse in-vehicle infotainment applications and road safety services. Even though vehicles are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Application of RFID and Wireless Sensor Network for Optimizing the Dynamic Placement of Materials in Storage Houses

    Storage houses are an important part of certain businesses. As the cost per unit of area of these storage houses is very high, it becomes very important for the businesses to optimize the placement of the different kind of materials. Some of these materials have their own environmental requirements which...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Disperse Processing of Presumption Top-K Inquire in Wireless Sensor Networks

    The Top-k query processing in sensor network is to evaluate the high ranked data tuples from the sensor node. Data pruning operations are performed on the cluster head for uncertain data. Accordingly, the new algorithm such as Sufficient Set-Based (SSB), Necessary Set-Based (NSB) for local Inter-cluster processing of the query....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Compressed Bitmap Vector Method to Assess Aggregate Queries Competently

    The retrieval and storage of data plays important role in the Data Clustering (DC) and Data Warehousing (DW) methods. The competence of a data retrieving method depends on precise queries for retrieving the data from the relational database systems. IceBerg (IB) query is an aggregate query, which calculate s aggregate...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Application of Data Mining Techniques for Financial Accounting Fraud Detection Scheme

    Data mining techniques are providing great aid in financial accounting fraud detection, since dealing with the large data volumes and complexities of financial data are big challenges for forensic accounting. The implementation of data mining techniques for fraud detection follows the traditional information flow of data mining, which begins with...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Survey on Recent Steganography Technique Using Audio Carrier

    Steganography is a branch of cryptography, which literally means \"Hidden writing\", is about hiding the existence of a message inside text, images, audio, video. Audio as a cover medium in steganography has its own place due to its bigger size compare to other carrier's file like (text, image, etc.). So...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Survey on Text Based Indexing Techniques in Hadoop

    Cloud computing is an emerging area within the field of Information Technology (IT). In a pure cloud computing model, this means having all the software and data hosted on a server or a pool of servers, and accessing them through the internet without the need for very much (if any)...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Open Service Framework Mining (OSFM) for Executing Data Mining Tasks

    Data mining services on grids is the need of today's era. Workflow environments are widely used in data mining systems to manage data and execution flows associated to complex applications. Weka, one of the most used open-source data mining systems, includes the knowledge-flow environment which provides a drag-and-drop inter-face to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Energy Aware Hybrid Approach for Data Aggregation in Wireless Sensor Networks

    The emerging field of wireless sensor networks combines sensing, computation, and communication into a single tiny device. Through advanced mesh networking protocols, these devices form a sea of connectivity that extends the reach of cyber space out into the physical world. Unlike traditional wireless devices, wireless sensor nodes do not...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Impact of Implementation of Cryptographic IDEA Algorithms for Secure Data Communication

    Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. The IDEA algorithm is an interesting one. It consists of a certain number of steps which, primarily, make it seem like having...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    An Analysis of Blinding Over Asymmetric Cryptosystems Technique of Cryptography

    Day-to-day internet users visits a number of sites depends on Hyper Text transfer Protocol for unbroken communication with the sites they designed to visit. From Last few Years, attackers attack on the system or network to fetch the unauthorized information. To make the information more secure from unauthorized access, protection...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Emergency Alert Systems over Private Network Using Message Broadcasting

    SMS is a superior approach for transmission of EAS messages i.e. broadcasting critical information during emergency situations to protect lives and properties of people. Several departments has joined with third-party providers to provide efficient solutions, regrettably they do not work efficiently due to the limitations in cellular communication system. To...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Steganography: Secret Transmission of Data

    In this paper, the authors present a method to enhance data security during transmission by hiding the information into any other data. Steganography is a technique of hiding data within data. This paper is advancement of their previous paper which was based on image encryption. Steganography is the advancement of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Survey Paper on Grid Computing

    The last decade has seen a substantial increase in commodity computer and network performance, mainly as a result of faster hardware and more sophisticated software. Nevertheless, there are still problems, in the fields of science, engineering, and business, which cannot be effectively dealt with using the current generation of supercomputers....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Agent-Based Decision Support System Using Case-Based Reasoning

    A formal model is a representation of a system within a defined mathematical framework. A good model captures the key characteristics of the system under study so that the system can be better understood and better decisions can be made about it. Because the model is merely an abstract representation...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    An Exemplary Study of Privacy Preserving Association Rule Mining Techniques

    The Privacy Preserving Data Mining (PPDM) has become an important issue in recent years because of abundance of sensitive information on the internet. In this paper, the authors present taxonomy and a survey of recent approaches that have been applied to PPDM .Subsequently; they present taxonomy on Association Rule hiding...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Novel Encoding Technique of Broadcasting XML Data Using Twig Patterns in Wireless Environment

    This paper is to improve energy and latency efficiency of XML dissemination scheme for the mobile computing, which is based on Lineage Encoding, G-node and scheduling algorithm for streaming XML data in the wireless environment. It uses the advantages of the structure indexing and attribute summarization methods. The Lineage Encoding...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Performance Evaluation: A Comparative Study of Various Classifiers

    Real-world knowledge discovery processes typically consist of complex data pre-processing, machine learning, evaluation, and visualization steps. Hence a data mining platform should allow complex nested operator chains or trees, provide the transparent data managing, comfortable constraint handling and optimization, be flexible, extendable and easy-to-use. Modern machine learning techniques have encouraged...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Survey on Web Search Results Personalization Techniques

    Web has become the best source of information throughout the world. Search engines play a key role in finding out the information, which is abundant. As such search engines are enhanced with new technology. Though search engines find much information with one key word, fail to provide the accurate, exact...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    LSB Steganography Based on Encryption

    Steganography, introduced in 2003, is a techniques employed for concealed message transfer among two secret parties. It is an ability of hidden message transfer. It also relates to the areas like network protocols and security for practical data hiding in communication networks using Transmission Control Protocol/Internet Protocol. The distinctive steganographic...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Survey on Overview of Clustering Techniques for Data Mining

    Clustering is the unconfirmed categorization of patterns into groups. This groups are known as clusters. Group consists of objects that are very similar among themselves whereas less similar compared to objects of the other cluster. This paper provides a Review of the existing literature on clustering techniques for data mining....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Survey on Mining Actionable Clusters from High Dimensional Datasets

    The datasets which are in the form of object-attribute-time format is referred to as Three-Dimensional (3D) data sets. Clustering these Three Dimensional (3D) data sets is a difficult task. So the subspace clustering method is applied to cluster the Three-Dimensional (3D) data sets. But finding the subspaces in the these...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Shifting VANET to Cloud - Survey

    Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety and infotainment. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several technologies have been deployed to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Energy Efficient Data Dissemination Protocols under Various Transmission Range for Wireless Sensor Network

    Wireless Sensor Networks (WSNs) consists of numerous tiny sensors deployed at high density in regions requiring surveillance and monitoring. Data dissemination protocols are used to transfer the data from source node to sink node. The most important issue in wireless sensor network is to save sensor node's energy. Because sensor...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)