International Journal of Advanced Research in Computer Science & Technology (IJARCST)

Displaying 1-40 of 246 results

  • White Papers // Jun 2015

    Performance of Alpha Minner Algorithm on Row Oriented and Column Oriented Database

    As in recent years, the demand of database is growing rapidly in every organization and with this the numbers of users are also increasing rapidly. In order to make work faster more and more hardware resources are needed to store and mange an increasing volume of data. For this, row-oriented...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Jun 2015

    Managing Big-Data Over Social Media: A Survey

    The increase in data storage over the server side has led to the introduction of the big data. This era marks the vital and plenty use of the social networking which has made the global interaction just on click of the applications. The increase in data collection over the social...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2015

    Ensuring Data Storage Security in Cloud Crop

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2015

    A Model of Opinion Mining for Classifying Movies

    Opinion analysis has become a flourishing frontier as of late. In this paper, the authors exhaustively study movie reviews from a popular online database. They randomly sample more than 1000 reviews with titles to train their model. It is capable of suggesting words during the process of appraising a film....

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2015

    Handling Big Data in E-Learning

    In this paper, the authors present a new e-learning model. There exists large amount of different types of data in e-learning environment both structured and unstructured. So, there is a need for enhancing the performance of big data processing in educational systems. Handling big data efficiently is required to serve...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2015

    Processing of Big-Data to Improve Performance Using Clouds

    Now-a-days, the authors have see that data is generated from different sources like click streams, sensors, social media, and log files, mobile devices etc. Big data is the data that exceeds more than thousands of terabytes. So, maximizing the performance of big data analytics services over distributed clouds is just...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2015

    A Novel Mobile Wallet Based on Android OS and Quick Response Code Technology

    The emergence of android mobile operating system has brought about a huge change in the smart phone industry. It has contributed to the increase in the range of services a smart phone can provide which includes the ability to be used in the exchange of financial value. Quick Response (QR)...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2015

    User-Friendly Virtual Operating System

    First time Linux users face various complexities such as Linux is not quite ready for prime time as it is difficult to install and configure. Various Windows application is not supported by Linux. There is a smaller selection of peripheral hardware drivers in Linux. Linux currently does not support blue-ray...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Jan 2015

    Security Challenges in Mobile Computing

    Currently, mobile application and computing are gaining a high momentum and playing a significant role in enhancing the internet computing infrastructure. With the rapid advances in wireless communication and portable computing devices, a new computing paradigm, which is called mobile computing, has evolved. This paper presents security challenges in mobile...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Data Mining Model for Network Intrusion Detection Using Boyer-Moore Algorithm

    Now-a-days, as information systems are more open to the Internet, the importance of protected networks is largely developed. New intelligent intrusion detection systems which are based on sophisticated algorithms rather than popular signature based detections are used frequently in well developed applications. Network based intrusion detection system monitor network activities....

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Offloading Android Applications Framework with the Help of Cloud

    The usage of Smartphone's is increasing rapidly over the last few years. Due to their mobility and good connectivity, Smartphone's are increasing thrice as compared to PCs. However they are still constrained by limited processing power, memory and battery. Thus, the applications cannot be made very rich. In this paper,...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    A Progress of Next Generation Network

    A Next Generation Networking (NGN) is a packet based and IP based network that used to transmit all kinds of services and information including voice data/calls, audio data/calls and multimedia information such as videos. It provides services like broadband, telecommunication and is also able to use QoS. Security protection is...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Authorized Data Sharing in Multiparty Access Control for Online Social Networks

    In recent years most well liked websites are social media; its tremendous growth absorb thought as a quick network to attach nation and therefore it's provide plan of many net user. Implementation of an access management model relies on the premise that the access management model is valid. The authors...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Improved AODV Routing Protocol for MANET to Enhance the Network Performance

    AODV is a prominent routing protocol for MANET that uses hop count as a path selection metric. However, AODV has no means to convey traffic load on current route. This paper focuses on introducing two metrics such as, Aggregate Interface Queue Length (AIQL) and link quality, in AODV to deal...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Peer to Peer Sharing using Cloud Based Mobile Social TV (Cloud MoV)

    The fast increasing power of personal mobile devices (Smartphone, tablets, etc.) provides more advanced features like news, game app, health tips etc and social interactions to users in day-to-day life. This development however is suppressed by the limited battery lifetime of mobile devices and very much variable wireless connectivity, which...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Trustable Data Storage Services in Cloud Computing

    Cloud computing provides new vision to the world. The approach of cloud computing is totally different from traditional system. In traditional system for any service, the people need purchase, install, maintain and update by own. But in cloud environment they just pay for that service according to their usage basis...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    A Survey of Software Fault Tolerance, Reliability and Safety

    In this paper, the authors review the state of system reliability, safety and fault tolerance of the system. The system will provide the desired level of reliable service. The proposed paper, discusses why some assumptions underlying hardware fault tolerance do not hold for software. Presently their inability is to produce...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Dynamic Routing Protocol for Energy Efficiency Using Gateways in Wireless Sensor Network- A Review

    Most significant challenges for Wireless Sensor Networks (WSNs) is long-lived sensor nodes and minimization in overall power consumption. Energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the network. To show the energy level of nodes by heterogeneous and...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Bloggers Performance Improving by Exploiting (WordPress) Tools with Ubuntu 12.04 and Apache HTTP Server

    Blogger is a type of web applications like Facebook, Twitter, and others that allows multi-user blogs with time-stamped entries to publish services. Some difficulties occur in the server such as server failure or slow loading happened at opening the blogger, the authors propose WordPress blog toll, to overcome these problem...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    An Adaptive Channel Based Grid Topology with Minimum Interference in WMN's

    The wireless mesh network is basically a communication network made up of radio nodes organized in a mesh topology. These were working on two modes i.e. infrastructure mode and ad hoc mode. These modes were configured on IEEE 802.11 standards. In this WMN, number of clients are connected to the...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Vulnerability Analysis of a Device Connected to the Internet

    Secure communication is the major issue in the present society. Day-by-day adversaries adopting new methodologies, technologies and strategies to attack the target. In this paper, a framework has been developed and it will list the attack vectors and available exploits to launch the exploitation based on the operating system agnostically....

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Detecting IT Infrastructure Policy Violations in a LAN Environment Using Triggers

    Many organizations today make use of Acceptable Use Policy (AUP) to specify the actions prohibited to the users of an organizations' IT infrastructure. All users are usually required to adhere to all the policies specified in the AUP document without exception. Despite the use of Intrusion Detection Systems (IDSs) to...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Network Security- Virus Attacks and Defence using Antivirus Software

    Network security is important in every field of today's world such as government offices, educational institutions, any business organization etc. So data security is the extreme critical factor in ensuring the safe transmission of information through the network. Threats to data privacy are powerful tools in the hands of attackers...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Generalized Software Techniques

    Software has become a more important component of computer systems. However, universal methods of software engineering have yet to be established. Despite the rise of software, challenges endemic to the software engineering process as well as apprehension to any change in the process have made it difficult to establish universal...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Robustness of the Feedback PD Compensator used with Second-Order and Third-Order Processes

    Robustness is one of the requirements used in controllers and compensators design. The designs presented in the previous papers did not consider the robustness of the controller or compensator. Therefore, this paper is to investigate the robustness of the feedback compensator used to control second-order and third-order processes against uncertainty...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Harmonic-Aware Scheduling for Fixed-Priority Real-Time Systems

    In this paper, the authors discuss a semi-partitioned fixed priority scheduling of sporadic tasks on identical multi-processors based on rate monotonic scheduling. A well known fixed-priority algorithm is the rate-monotonic algorithm. This algorithm assigns priorities on their periods: shorter the period, higher the priority. The rate of a task is...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Real-Time Segmentation Algorithm for Moving Vehicles in Complex Outdoor Conditions

    Motion detection and segmentation of traffic vehicles in an outdoor environment, particularly under non ideal weather conditions, in the presence of camera noise and with variable or unfavorable luminance conditions is still an area of active research. Gaussian-based background modeling is commonly used to detect moving objects in computer vision...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Environment for Social Responsibility and Standards for Business Transparency and Quality

    Corporate Social Responsibility (CSR) serves to delineate the accountability that business organizations owe to the society and to the environment. Various international standards have been formulated to serve as guidelines for the CSR performance of companies and the companies that follow or comply with those standards are seen to be...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Mining patterns in XML Data using X-Query and Vertical Data Regular Pattern Method

    In data mining the regularity of a pattern was treated as an important criterion in several online applications like market basket analysis, network monitoring, web page sequence and stock market. One of the simple methods to mine XML data is probably to transform the data from XML to relations. However,...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    A Review on Privacy Control Techniques in Context-Aware Web Services

    A system is context-aware if it uses context to provide relevant information or services to the user, where relevancy depends on the user's task. Context-awareness is offering services to users with react of proactively to user environment and service conditions. In the internet world web services as building blocks in...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    MCQ-TC: Mobility, Connectivity& Quality Based Dynamic Topology Control in MANET

    Wireless network is getting popular day by day because of its supportive technologies and wide range of device applicability. Mobile Ad-hoc NETwork (MANET) is one of such network which communicates using radio waves in small range. Routing is one of the well known operations required for transmitting the data from...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    Reactive Routing Protocols Route Discovery Using CNRR Approach in Mobile Ad HOC Network

    Information on the location of mobile nodes in Mobile Ad-hoc NETworks (MANETs) has the potential to significantly improve network performance. The node location information to develop new techniques for route discovery in on-demand routing protocols such as the Ad-hoc On-demand Distance Vector (AODV), thus making an important contribution to enhancing...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    Assessment of Congestion Control Technique in Wireless Mesh Network Using Routing Protocols

    In multi-radio, multi-channel and remote mesh networks the authors address the issue of congestion control. This issue is altogether more intricate on the grounds that it obliges the channel alterations and the movement allotments for every channel are mutually advanced. The path in which the blockage is taken care of...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    Outlier Detection Using High Dimensional Dataset for Comparision of Clustering Algorithms

    Data mining is an extensively studied field of research area. Data mining is a mining of knowledge from large amount of data. There are lot of problems exists in large database such as data redundancy, missing data, invalid data etc., one of the major problem in data stream research area...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    Research Paper on Enhanced Battery for Android Phones Using the Power of Cloud Through Data Synchronization

    In this paper, the authors show a review of the Cloud Computing, mobile Cloud Computing and data synchronization between mobile and cloud. In this paper, the focus has been made on improving the synchronization of Smartphone by using Cloud computing and virtualization techniques to shift the workload from merely a...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    A Software Complexity Metrics for Modified Approach on LCOM

    Over the past years, hardware was the major cost component of any information system. However, software has gradually become the larger part of the cost equation. Ensuring the quality in software designing and coding is highly recommended for enhancing the lifetime of software. There are many researches still going on...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    Performance Analysis of Intrusion Detection System on WSN Based on Euler Graph

    Intrusion detection system is a significant issue in the network security. This paper uses the chat Euler graph approach to prevent intrusion detection. Graph theory approaches are used in data mining. Data mining methods provide automatic intrusion detection capability. Network security is a significant part of the security management system...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    SLA Based Extended GA Algorithm for Load Balancing

    Load balancing is a main challenge in cloud environment. For better management of available good load balancing techniques are required. So that loads balancing in cloud becoming more interested area of research. And through better load balancing in cloud, performance is increased and user gets better services. Load balancing is...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    A Survey on Different Compression Techniques Algorithm for Data Compression

    Compression is useful because it helps the user to reduce the resources usage, such as data storage space or transmission capacity. Data compression is the technique of representing information in a compacted form. The actual aim of data compression is to be reduced redundancy in stored or communicated data, as...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    Genetic Algorithm with Range Selection Mechanism for Dynamic Multiservice Load Balancing in Cloud-Based Multimedia System

    Consider a centralized hierarchical Cloud-based Multimedia System (CMS) which has a resource manager, cluster heads, and server clusters. Resource manager accepts clients' requests for multimedia service tasks and allocates server clusters based on the task characteristics. Cluster head distributes the task to the servers within its server cluster. An effective...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Effective Performance Evaluation of Cluster Analysis

    Cluster analysis divides data into meaningful or useful groups (clusters). If meaningful clusters are the goal, then the resulting clusters should capture the \"Natural\" structure of the data. For example, cluster analysis has been used to group related documents for browsing, to find genes and proteins that have similar functionality,...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Implementation of 8 Bit Microcontroller Using VLSI

    VLSI is a promising field in the current development of world in the technology aspects. Microcontroller is a fundamental one which has a complete system on a single chip. This paper is to realize the basic functions of controller in spartan 3E kit by interfacing the kit with the computer....

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    LPEDAP: Localized Power Efficient Data Aggregation Tree Protocol for Wireless Sensor Networks

    In wireless sensor networks, the sensors collect the data from the nearby environment and deliver it to the base station. This requires more power. The problem with the previous approaches is it acts in a centralized manner. To overcome this problem, a localized approach called LPEDAP is used. The approach...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Sensitive Data Debility Identification and Prevention in Cloud Computing

    Increasing use of cloud storage in business, government and almost all aspects of daily life have led to a proliferation of online sensitive data, i.e., data that, if used improperly, can harm the data subjects. As a result, concern about the ownership, control, privacy, and accuracy of these data has...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Data Sharing in Cloud Using Hybrid Cryptosystem

    With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among cloud user. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an un trusted cloud is still a challenging issue, due to the frequently change of...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Two-Phase Top-down Specialization for High Scalability and Privacy Concerns

    Sharing the private data like financial transaction record in its most specific state poses a threat to individual privacy. MapReduce algorithm for determining generalization and provide protection for sensitive information. Data sets are generalized in a top-down manner until k-anonymity is violated, in order to expose the maximum utility. This...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Data Encryption Hiding Technique in Non-Standard Cover Files

    Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. One of the main fields of information security is the concept of hidden exchange...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Apr 2014

    An Algorithm to Extend An Existing Function for Query Optimization in Rough Dataset

    Uncertainty and incompleteness of knowledge is a challenging task in information technology. Rough set theory due to its versatility can be applied to handle this challenge. Here, rouge set theory is used for designing and querying Rough Relational DataBase (RRDB). Unlike traditional RDB, RRDB can contain multi-valued attributes and has...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Apr 2014

    An Optimizing K-Means Algorithm

    Data mining is a new technology, developing with database and artificial intelligence. It is a processing procedure of extracting credible, novel, effective and understandable patterns from database. Cluster analysis is an important data mining technique used to find data segmentation and pattern information. By clustering the data, people can obtain...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Apr 2014

    Android Applications Offloading Using Cloud Computing

    The usage of smart phones has increased rapidly over the last few years. Due to their mobility and good connectivity, Smartphone's are increasing thrice as compared to PC's. However, they are still constrained by limited processing power, memory and battery. In this paper, the authors propose a framework for making...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Jun 2014

    Secure the Cloud Computing Environment from Attackers using Intrusion Detection System

    Cloud computing is a method of novel internet infrastructure and demand industrial featuring that IT offers today. It provides a framework for end users easily attaching powerful services and many enterprise applications through cloud platforms. The wide utilize of cloud computing, security issues came out on a growing scale. It...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Jun 2014

    Color Based Image Segmentation Using Data Mining Functionalities

    Image classification the process of classifying image into n number of classes. Classification can be categorized into two types supervised classification and unsupervised classification. In this paper remote sensing image classification has been done using unsupervised technique which is known as clustering. There are so many methods used for clustering...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2015

    Ensuring Data Storage Security in Cloud Crop

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2015

    A Model of Opinion Mining for Classifying Movies

    Opinion analysis has become a flourishing frontier as of late. In this paper, the authors exhaustively study movie reviews from a popular online database. They randomly sample more than 1000 reviews with titles to train their model. It is capable of suggesting words during the process of appraising a film....

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2015

    Handling Big Data in E-Learning

    In this paper, the authors present a new e-learning model. There exists large amount of different types of data in e-learning environment both structured and unstructured. So, there is a need for enhancing the performance of big data processing in educational systems. Handling big data efficiently is required to serve...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2015

    Processing of Big-Data to Improve Performance Using Clouds

    Now-a-days, the authors have see that data is generated from different sources like click streams, sensors, social media, and log files, mobile devices etc. Big data is the data that exceeds more than thousands of terabytes. So, maximizing the performance of big data analytics services over distributed clouds is just...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Robustness of the Feedback PD Compensator used with Second-Order and Third-Order Processes

    Robustness is one of the requirements used in controllers and compensators design. The designs presented in the previous papers did not consider the robustness of the controller or compensator. Therefore, this paper is to investigate the robustness of the feedback compensator used to control second-order and third-order processes against uncertainty...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Harmonic-Aware Scheduling for Fixed-Priority Real-Time Systems

    In this paper, the authors discuss a semi-partitioned fixed priority scheduling of sporadic tasks on identical multi-processors based on rate monotonic scheduling. A well known fixed-priority algorithm is the rate-monotonic algorithm. This algorithm assigns priorities on their periods: shorter the period, higher the priority. The rate of a task is...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Real-Time Segmentation Algorithm for Moving Vehicles in Complex Outdoor Conditions

    Motion detection and segmentation of traffic vehicles in an outdoor environment, particularly under non ideal weather conditions, in the presence of camera noise and with variable or unfavorable luminance conditions is still an area of active research. Gaussian-based background modeling is commonly used to detect moving objects in computer vision...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Environment for Social Responsibility and Standards for Business Transparency and Quality

    Corporate Social Responsibility (CSR) serves to delineate the accountability that business organizations owe to the society and to the environment. Various international standards have been formulated to serve as guidelines for the CSR performance of companies and the companies that follow or comply with those standards are seen to be...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Dec 2014

    Mining patterns in XML Data using X-Query and Vertical Data Regular Pattern Method

    In data mining the regularity of a pattern was treated as an important criterion in several online applications like market basket analysis, network monitoring, web page sequence and stock market. One of the simple methods to mine XML data is probably to transform the data from XML to relations. However,...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    Energy Minimization with Fault Tolerance in the Real Time System

    Real time system gives reliable results it's depends not only fault tolerance but also energy consumption in a system. Both are combination could easily find a reliability in the presence of faults. DVFS (Dynamic Voltage Frequency Scaling) is a technique which is used for energy minimization to adjust voltage as...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    Research on Signal Spectrum of Multirate Processing

    In this paper, the authors study the influence of extraction and interpolation of multirate signal processing to signal spectrum, theoretical derivation of the signal spectrum after integer times extraction and integer times zeros values interpolation is done by taking advantage of fourier transform, the regular pattern of signal spectrum after...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    An Efficient Clustering Algorithm for Text Mining Using Greedy Approach

    Text clustering is a text mining technique used to group text documents into groups (or clusters) based on similarity of content. This organization (i.e. clustering) is so as to make documents more understandable and easier to search the relevant information, easier to process, and even more efficient in utilizing communication...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    Enhance the Text Clustering using an Efficient Concept-Based Mining Model

    The common techniques in text mining are based on the statistical analysis of a term, either word or phrase. Statistical analysis of a term frequency captures the importance of the term within a document only. Two terms can have the same frequency in their documents, but one term contributes more...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    Multicore Processor, Parallelism and Their Performance Analysis

    Multicore Central Processing Units (CPUs) are becoming the standard for the current era of processors through the significant level of performance that CPUs offer. This includes multiple multicore architectures, different level of parallelism, different levels of performance, and with the variety of architectures, it becomes necessary to compare multicore architectures...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Sep 2014

    BCO for Multiprocessor Scheduling

    In the multiprocessor scheduling problem, a given list of tasks has to be scheduled on identical parallel processors. Each task in the list is defined by a release date, a due date and a processing time. The intent is to minimize the number of processors utilized while respecting the constraints...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Jun 2014

    Security Issues in High Performance Transfer Protocol-UDT

    In this paper, the authors study the various security issues in transfer protocol-UDT. Next-generation e-science applications will require the ability to transfer information at high data rates between distributed computing centers and data repositories. The development of next generation protocols, such as UDT (UDP-based Data Transfer), promptly addresses various infrastructure...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Jun 2014

    Investigating on Multiparty Profile Matching in Mobile Social Networks

    The regard of handheld devices has created an outbreak of research activity into novel protocols and applications that can knob and develops the defining characteristic of this new-fangled environment - user mobility. Accumulation to mobility, another defining characteristic of mobile systems is user social communication. The function of this paper...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Jun 2014

    Filtering Information for Short Text Using OSN

    Online Social Networks (OSNs) are used to share the information among the different kind of people. There is a major task of online social network is information filtering. An online social network provides the little support for allowing sharing the information on the user walls. Using, machine learning algorithms text...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Jun 2014

    A Study on Data Sources Exploited in Opinion Mining

    When it's time to reach a decision or choose among myriad of options available for an automobile, gadget, movie, restaurant or any other product or service; people generally prefer to rely on public or peers' experience or opinion. Especially when one has to spend time and money to buy products...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    An Efficient Framework for Unified Automation Testing: A Case Study on Software Industry

    Manual software testing becomes difficult, time consuming and costly as software systems evolve since it is performed by a human sitting in front of a computer carefully going through application screens, trying various usage and input combinations, comparing the results to the expected behavior and recording their observations. Manual tests...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Novel Probability Model to Analyse Redundancy Management for Multipath Routing in Heterogenous Wireless Sensor Network

    In intra-cluster scheduling and inter-cluster multi-hop routing schemes to maximize network processing time. A Heterogenous Wireless Sensor Network (HWSN) having larger energy and processing capabilities and failures are occurred to predict the malicious. In this paper, use a multipath routing, it is the routing technique of using multi alternative paths...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Multi-Hop Wireless Network Optimization Solution using Automatic Distributed Joint Routing for Delay Sensitive Applications

    Multi-hop wireless network can be modeled as a dynamic network, consisting of several interconnected wireless nodes, which aim to jointly optimize the overall network utility, given the resource constraints of the wireless communication channels and also, importantly, the mutual interferences (coupling) resulting when nodes are simultaneously transmitting. The proposed system...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Efficient Spectrum Sensing Pattern Using Intelligent Matrix in Cognitive Radio Network

    Cognitive Radio (CR) can successfully deal with the growing demand and scarcity of the wireless spectrum. To exploit limited spectrum efficiently, CR technology allows unlicensed users to access licensed spectrum bands. Since licensed users have priorities to use the bands, the unlicensed users need to continuously monitor the licensed users'...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Spectrum Holes Sensing Policy For Cognitive Radio Network Using Reinforcement-Learning

    Cognitive radio is a promising technology that allows Secondary (unlicensed) Users (SU) to access and share the frequency band originally allocated to Primary (licensed) Users (PU). Secondary nodes are cognitive radio and primary users have license to use spectrum. The secondary nodes utilize the spectrum whenever it is free or...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Efficient Routing Protocol for Update the Position of Node in MANET

    To develop a routing protocol and optimize routing paths in mobile ad hoc networks is the challenge process. Geographic routing has become one of the most suitable routing strategies in wireless mobile ad hoc network mainly due to its scalability. In geographic routing nodes will periodic broadcasting the beacon packet...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Design of Novel Routing Protocol for Wireless Sensor Network

    A wireless sensor network transfers the data from one node to another node as well as node coverage, and then neighbor location can be identified. In WSN the collisions were avoided and the data's are transferred in efficient manner. To predict the life time of wireless sensor networks before their...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    Performance of Multi-flow Wireless Multimedia Transmissions

    Wireless multimedia services are major applications of next generation wireless networks. In wireless network, an efficient utilization of network resources are necessary for its increasing performance. The major goal of the efficient utilization of network resources is to increase the number of performance guaranteed concurrent multimedia flows. The concurrent multimedia...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)

  • White Papers // Mar 2014

    QOS Parameter Optimization For Cognitive Radio Networks

    The drastic developments in the field of wireless communication have led to the problem of spectrum scarcity which is becoming more worsened day-by-day. Cognitive Radio (CR) has been to overcome spectrum scarcity problem. CR is self-configurable wireless communication system that has the capability to measure un-used portions of the existing...

    Provided By International Journal of Advanced Research in Computer Science & Technology (IJARCST)