International Journal of Computer Applications Technology and Research

Displaying 1-40 of 133 results

  • White Papers // Oct 2014

    The Need to Integrate Usability Engineering into Agile Process Models for Mobile Applications and Devices Development

    Reliability of an interactive mobile computing device or the lack of it is often reflected in user satisfaction. The rapid proliferation and ubiquity of smart devices in the consumer market has forced the Software Engineering (SE) community to quickly adapt development approaches conscious of the novel capabilities of mobile applications....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Protecting Global Records Sharing with Identity Based Access Control List

    Generally, the information is stored in the database. Protecting sensitive information is encrypted before outsourcing to a service provider. The authors send the request to service provider through SQL queries. The query expressiveness is limited by means of any software-based cryptographical constructs then deployed, for server-side query working on the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Location Based Encryption-Decryption Approach for Data Security

    Data security is an important task in today's life. Data security can be done using GPS device. Among computer user mostly use data in electronic format. How to provide a security for data is important. In this paper, the authors propose a location based data-security system to secure data by...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    The Impact of Mobility Models on the Performance of AODV, DSR and LAR Routing Protocols

    MANETs are the collection of wireless nodes that can dynamically form a network anytime and anywhere to exchange information without using any pre-existing infrastructure. There are some challenges that make the design of mobile ad hoc network routing protocols a tough task. Firstly, in mobile ad hoc networks, node mobility...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    Steganography using Interpolation and LSB with Cryptography on Video Images-A Review

    Stegnography is the most common term used in the IT industry, which specifically means, \"Covered writing\" and is derived from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the communication between the sender and the receiver. In distinction...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    Intrusion Detection System Using Self Organizing Map Algorithms

    With the rapid expansion of computer usage and computer network the security of the computer system has became very important. Every day new kind of attacks is being faced by industries. Many methods have been proposed for the development of intrusion detection system using artificial intelligence technique. In this paper,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    The Use of Intelligent Algorithms to Detect Attacks In Intrusion Detection System

    More networks are connected to the Internet every day, which increases the amount of valuable data and the number of resources that can be attacked. Some systems have been designed and developed to secure these data and prevent attacks on resources. Unfortunately, new attacks are being created everyday, which makes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2014

    A Posteriori Perusal of Mobile Computing

    The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote portable devices have access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital due to the increase in the number of portable computers and the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes (stations) communicating in a multi hop way without any fixed infrastructure such as access points or base stations. MANET has not well specified defense mechanism, so malicious attacker can easily access this kind of network. In this paper, the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

    The attractive features of ad-hoc networks such as dynamic topology, absence of central authorities and distributed cooperation hold the promise of revolutionizing the ad-hoc networks across a range of civil, scientific, military and industrial applications. However, these characteristics make ad-hoc networks vulnerable to different types of attacks and make implementing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Resource Allocation in Computational Grids environment Using Improved Particle Swarm Optimization Algorithm

    Resource allocation in computational grids is considered as a NP-complete problem due to resources heterogeneity. Grid resources are related to various management areas exerting different management policies. Now-a-days, enhancing grid efficiency is regarded as a problem requiring proper and effective schedule. Unfortunately, grid resources dynamic nature, in addition to the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Data Mining Innovativeness of Data Give-and-Take Service Station in Teradata Client-Server Construction

    Teradata is a relational database management system that drives a company's data warehouse. Teradata provide the foundation to give a company the power to grow, to complete in today's dynamic marketplace, to achieve the goal of \"Transforming transactions into relationships\" and to evolve the business by getting answer to a...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    Information Security in Cloud Computing

    The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing refers to the following concepts...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2014

    An Evolutionary Based Data Mining technique in Engineering Faculty Evaluation using weka

    Data mining, the extraction of hidden knowledge from large amounts of data repositories. Data mining is used in a vast area and numerous commercial data mining applications including retail sales, e-commerce, remote sensing, bioinformatics etc. Education is an essential element for the progress of country. Mining in educational environment is...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    Efficient Web Data Extraction

    Web data extraction is an important problem for information integration as multiple web pages may present the same or similar information using completely different formats or syntaxes that make integration of information a challenging task. Hence the need of a system that automatically extracts the information from web pages is...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    A Survey of Image Steganography

    Today, computer and network technologies provide easy-to-use communication channels for steganography. In this paper, the authors present a general overview of the steganography. Steganography is the art of hiding the very presence of communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of steganography,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    Flood Prediction Model Using Artificial Neural Network

    In this paper, the authors present a Flood Prediction Model (FPM) to predict flood in rivers using Artificial Neural Network (ANN) approach. This model predicts river water level from rainfall and present river water level data. Though numbers of factors are responsible for changes in water level, only two of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    Study of Different Multi-Instance Learning kNN Algorithms

    Because of it is applicability in various field, multi-instance learning or multi-instance problem becoming more popular in machine learning research field. Different from supervised learning, multi-instance learning related to the problem of classifying an unknown bag into positive or negative label such that labels of instances of bags are ambiguous....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    A Review on Classification Based Approaches for STE-Ganalysis Detection

    In this paper, the authors present two scenarios of image steganalysis, in first scenario, an alternative feature set for steganalysis based on rate-distortion characteristics of images. Here features are based on two key observations: data embedding typically increases the image entropy in order to encode the hidden messages; data embedding...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    Classification and Searching in Java API Reference Documentation

    Application Program Interface (API) allows programmers to use predefined functions instead of writing them from scratch. Description of API elements that is methods, classes, constructors etc. is provided through API reference documentation. Hence API reference documentation acts as a guide to user or developer to use API's. Different types of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    Comparative Analysis of Quality of Service for Various Service Classes in WiMAX Network using NS-3

    Broadband access is an important requirement to satisfy user demands and support a new set of real time services and applications. WiMAX, as a broadband wireless access solution for wireless metropolitan area networks, covering large distances with high throughput and is a promising technology for next generation networks. Nevertheless, for...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    A Fault Tolerant System Based on Genetic Algorithm for Target Tracking in Wireless Sensor Networks

    In this paper, the authors explored the possibility of using Genetic Algorithm (GA) being used in wireless sensor networks in general with specific emphasize on fault tolerance. In wireless sensor networks, usually sensor and sink nodes are separated by long communication distance and hence to optimize the energy, they are...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    Router Based Mechanism for Mitigation of DDoS Attack- A Survey

    Today most of the activities like trade, e-commerce are dependent on the availability of Internet. The growing use of internet services in the past few years have facilitated increase in distributed denial of service attack. Due to DDos attacks, caused by malicious hosts secured data communication over the internet is...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    A Review on Privacy Preservation Data Mining (PPDM)

    It is often highly valuable for organizations to have their data analyzed by external agents. Data mining is a technique to analyze and extract useful information from large data sets. In the era of information society, sharing and publishing data has been a common practice for their wealth of opportunities....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2014

    Review on Clustering and Data Aggregation in Wireless Sensor Network

    Wireless sensor network is a collection of various sensor nodes with sensing and communication capabilities. Clustering is the process of grouping the set of objects so that the objects in the same group are similar to each other and different to objects in the other group. The main goal of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2014

    Various Clustering Techniques in Wireless Sensor Network

    A wireless sensor network can be an unstructured or structured network. An unstructured network does not have a fix topology. A structured network has a fix topology WSN are unstructured network because sensors keep on changing their location continuously. This paper describes the various clustering techniques used in wireless sensor...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2014

    Detection of Black Hole in AD- HOC Networks

    Unattended installation of sensor nodes in the environment causes many security threats in the ad-hoc networks. The security of the DSR protocol is threaded by a particular type of attack called black hole attack. Black hole in ad-hoc networks is a major problem. The proposed paper includes detection and countermeasure...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2014

    Layered Approach for Preprocessing of Data in Intrusion Prevention Systems

    Due to extensive growth of the Internet and increasing availability of tools and methods for intruding and attacking networks, intrusion detection has become a critical component of network security parameters. TCP/IP protocol suite is the defacto standard for communication on the Internet. The underlying vulnerabilities in the protocols are the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Effective Parameters of Image Steganography Techniques

    Steganography is a branch of information hiding method to hide secret data in the media such as audio, images, videos, etc. The use of images is very common in the world of electronic communication. In this paper, the parameters that are important in steganography images, have been studied and analyzed....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Pattern Recognition using Artificial Neural Network

    An Artificial Neural Network (ANN) usually called neural network. It can be considered as a resemblance to a paradigm which is inspired by biological nervous system. In network the signals are transmitted by the means of connections links. The links possess an associated way which is multiplied along with the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    A Recapitulation of Data Auditing Approaches for Cloud Data

    Cloud computing, a buzzword, a technology, has been exploring over the years since 1990s and presently, being considered as a today's s era dependency for the interconnected users. Online resources (like CPU processing power, memory space), software, hardware, capacities are being delivered to the associated users with no headache of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Distributed Addressing Protocol for Node Auto Configuration in Ad Hoc Networks using Bloom Filters

    The importance of wireless ad hoc networks in community and commercial connectivity cannot be underestimated in view of the benefits associated with such networks. An ad hoc network must assemble itself from any devices that happen to be nearby, and adapt as devices move in and out of wireless range....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic Petri Nets

    For a successful route request in Mobile Ad-hoc NETworks (MANETs), it is important to know that routing protocols work correctly. On the other hand, this phenomenon acts randomly and it is not often possible to predict their act from one moment to the next. One way for ensuring correct operation...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Implementation of Matrix based Mapping Method Using Elliptic Curve Cryptography

    Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it offers equal security even for smaller bit size, thus reducing the processing complexity. ECC encryption and decryption methods can only perform encrypt and decrypt operations on the curve but...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Encrypted Query Processing Based Log Management in the Cloud for Improved Potential for Confidentiality

    To address privacy concerns current implementation allows access to log records that are indirectly identified by upload-tag values. The authors plan to propose a practical homomorphic encryption schemes that will allow encryption of log records in such a way that the logging cloud can execute some queries on the encrypted...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Data Mining: Approach Towards the Accuracy Using \"Teradata\"!

    Data mining refers to the process or method that extracts or mines interesting knowledge or patterns from large amounts of data. Thus, the result of the natural evolution of information technology can be viewed by data mining. Data mining also involves assimilation, more willingly than a simple transformation. Data mining...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    Energy Saving Wireless Sensor Networks Using Kerberos

    The wireless sensor network is a networking field that combines sensing, computation, and communication into a single tiny device. As sensor networks frame closer towards well-known deployment, security issues become a vital concern. So far, much work has focused on making sensor networks realistic and useful, but still security in...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2014

    A Study of Sybil and Temporal Attacks in Vehicular Ad Hoc Networks: Types, Challenges, and Impacts

    In recent years, the number of automobiles on the road has increased tremendously. Due to high density and mobility of vehicles, possible threats and road accidents are increasing. Wireless communication allows sending safety and other critical information. Due to this inherent wireless characteristic and periodic exchange of safety packets, Vehicular...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2014

    Improvising Network Life Time of Wireless Sensor Networks Using Mobile Data Aggregator

    In Wireless Sensor Networks (WSNs) a large number of sensors scatter over a surveillance field and extract data of interests by reading real-world phenomena from the physical environment. Since sensors are typically battery-powered and left unattended after the initial deployment, it is generally infeasible to replenish the power supplies once...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2014

    Analysis of Various Periodicity Detection Algorithms in Time Series Data with Design of New Algorithm

    Time series datasets consist of sequence of numeric values obtained over repeated measurements of time. They are Popular in many applications such as stock market analysis, power consumption, economic and sells forecasting, temperature etc. Periodic pattern mining or periodicity detection is process of finding periodic patterns in time series database....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Security for Effective Data Storage in Multi Clouds

    Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    A Generic Model for Student Data Analytic Web Service (SDAWS)

    Any university management system accumulates a cartload of data and analytics can be applied on it to gather useful information to aid the academic decision making process. This paper is to demonstrate the significance of a data analytic web service in the education domain. This can be integrated with the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Handling Cross-Layer Attacks Using Neighbors Monitoring Scheme and Swarm Intelligence in MANET

    The standard MAC protocol widely used for Mobile Ad hoc NETworks (MANETs) is IEEE 802.11. When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2012

    Agent Based Task Scheduling in Grid

    Autonomous agents are intelligent entities that can operate on behalf of the human users autonomously to solve the problems, negotiate with other agents (peers), learn from the past and predict upcoming events. Grid computing is considered to be wide area distributed computing which provides sharing, selection and aggregation of distributed...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2012

    Task Scheduling Heuristic in Grid Computing

    Task scheduling is heart of any grid application which guides resource allocation in grid. Heuristic task scheduling strategies have been used for optimal task scheduling. Heuristic techniques have been widely used by the researchers to solve resource allocation problem in grid computing. In this paper, the authors classify heuristic task...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2014

    Cloud Computing: Technical, Non-Technical and Security Issues

    Cloud computing has been growing over the last few years as a result of cheaper access to high speed Internet connection and many applications that comes with it. Its infrastructure allows it to provide services and applications from anywhere in the world. However, there are numerous technical, non-technical and security...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2014

    Analysis of Various Periodicity Detection Algorithms in Time Series Data with Design of New Algorithm

    Time series datasets consist of sequence of numeric values obtained over repeated measurements of time. They are Popular in many applications such as stock market analysis, power consumption, economic and sells forecasting, temperature etc. Periodic pattern mining or periodicity detection is process of finding periodic patterns in time series database....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2014

    Implementation of FSM-MBIST and Design of Hybrid MBIST for Memory Cluster in Asynchronous SoC

    In current scenario, power efficient MPSoC's are of great demand. The power efficient asynchronous MPSoC's with multiple memories are thought-off to replace clocked synchronous SoC, in which clock consumes more than 40% of the total power. It is right time to develop the test compliant asynchronous MpSoC. In this paper,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    An AMBA Advanced High performance Bus Tracer with Real time Compression for Support of SoC

    AMBA (Advanced Microcontroller based Bus Architecture) consists of AHB (Advanced High performance Bus), APB (Advanced Peripheral Bus), ASB (Advanced System Bus) and AXB (Advanced eXtensible Bus). This paper proposes the debugging and analyses of System-on-Chip (SoC) at various test conditions by verifying the functional aspects of the on-chip bus. Here...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2013

    Web Services Based Information Retrieval Agent System for Cloud Computing

    Cloud computing is Internet based system development in which large scalable computing resources are provided \"As a service\" over the Internet to users and has attracted more and more attention from industry and research community. However, the concept of cloud computing does not provide facilities for the knowledge discovery and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    A Trusted Integrity Verification Architecture for Commodity Computers

    Trust is an indispensable part of the computing environment, the validity of any transaction or information depends heavily on the authenticity of the information source. In this paper, many mechanisms for ensuring the authenticity of the information source were developed, including password verification and biometrics. But as the attacks are...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

    Web usage mining deals with understanding the visitor's behavior with a website. It helps in understanding the concerns such as present and future probability of every website user, relationship between behavior and website usability. It has different branches such as web content mining, web structure and web usage mining. The...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2013

    Data Transfer Security Solution for Wireless Sensor Network

    WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption security, operating speed and power consumption for network. Here, the authors introduce a mechanism for secure transferring of data is WSN and various security related issues. This energy-efficient encryption is a secure...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    Advanced Authentication Scheme Using Multimodal Biometric Scheme

    Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today's biometric system. The purpose of the authors' paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    A Review of Machine Learning Based Anomaly Detection Techniques

    Intruders may be from outside the host or the network or legitimate users of the network. Intrusion detection is the process of monitoring the events that are occurring in the systems or networks and analyzing them for signs of possible incidents, which are violations or threats to computer security policies,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    A New Architecture for Group Replication in Data Grid

    Now-a-days, grid systems are vital technology for programs running with high performance and problems solving with large scale in scientific, engineering and business. In grid systems, heterogeneous computational resources and data should be shared between independent organizations that are scatter geographically. A data grid is a kind of grid types...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    An Improvised Tree Algorithm for Association Rule Mining Using Transaction Reduction

    Association rule mining technique plays an important role in data mining research where the aim is to find interesting correlations between sets of items in databases. The Apriori algorithm has been the most popular techniques in finding frequent patterns. However, when applying this method a database has to be scanned...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Risk-Aware Response Mechanism With Extended D-S Theory

    Mobile Ad-hoc NETworks (MANETs) are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks, the routing attacks getting more attention because it's changing the whole topology itself and it causes more damage to MANET. Even there is lot of intrusion...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    Ensuring Security in Emergency Through SMS Alert System

    Short Message Services (SMS) are increasingly being relied upon to disseminate critical information during emergencies. In recent days, accident happens very common due to heavy traffic and increase in vehicle level and bad drivers, hence it requires a software to inform the service centre for instant help to save life...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    Interweaving Knowledge Acquisition and Product Functionality

    In this paper, the authors concern with the detailed study on Product Functionality and to select a knowledge acquisition method for acquiring knowledge on product functionality efficiently. The purpose of this research is to ensure that important aspects of product data are taken into account in knowledge management projects. The...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2013

    Priority Based Hybrid Automation Testing Tool

    Software testing is an important means to ensure software quality and to improve software reliability. As the size and complexity of software applications is continually growing, manual testing becomes infeasible in such arena. Automation of the software testing process saves time and provides better utilization of resources and thus, plays...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2013

    Accountability in Distributed Environment for Data Sharing in the Cloud

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Reviewing Cluster Based Collaborative Filtering Approaches

    With regard to rapid development of Internet technology and the increasing volume of data and information, the need for systems that can guide users toward their desired items and services may be felt more than ever. Recommender systems, as one of these systems, are one of information filtering systems predicting...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    QoS Driven Task Scheduling in Cloud Computing

    Cloud computing systems promise to offer pay per use, on demand computing services to users worldwide. Recently, there has been a dramatic increase in the demand for delivering services to a large number of users, so they need to offer differentiated services to users and meet their expected quality requirements....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    Detection of Outliers and Reduction of Their Undesirable Effects for Improving the Accuracy of K-Means Clustering Algorithm

    Clustering is an unsupervised categorization technique and also a highly used operation in data mining, in which, the data sets are divided into certain clusters according to similarity or dissimilarity criterions so that the assigned objects to each cluster would be more similar to each other comparing to the objects...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    An Improved Post-Quantum Cryptographic Scheme Based on NTRU

    In this paper, the authors report a more secure and efficient encryption algorithm based on the NTRU cryptographic scheme. NTRU is lattice based scheme resistant to quantum computing, hence it falls under the class of post quantum cryptosystems. It is based on shortest vector problem. The main characteristics of the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Profit Maximization for Service Providers Using Hybrid Pricing in Cloud Computing

    Cloud computing has recently emerged as one of the buzzwords in the IT industry. Several IT vendors are promising to offer computation, data/storage, and application hosting services, offering Service-Level Agreements (SLA) backed performance and uptime promises for their services. While these \"Clouds\" are the natural evolution of traditional clusters and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    A Hybrid Model for Mining Multi Dimensional Data Sets

    Clustering and classification are the two familiar data mining techniques used for similar and dissimilar grouping of objects respectively. This paper presents a hybrid data mining approach based on supervised learning and unsupervised learning to identify the closest data patterns in the data base. This technique enables to achieve the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    Cooperative Demonstrable Data Retention for Integrity Verification in Multi-Cloud Storage

    Demonstrable Data Retention (DDR) is a technique which certain the integrity of data in storage outsourcing. In this paper, the authors propose an efficient DDR protocol that prevent attacker in gaining information from multiple cloud storage node. Their technique is for distributed cloud storage and support the scalability of services...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    Ensuring Privacy and Security in Data Sharing Under Cloud Environment

    An important application of data sharing in cloud environment is the storage and retrieval of Patient Health Records (PHR) that maintain the patient's personal and diagnosis information. These records should be maintained with privacy and security for safe retrieval. The privacy mechanism protects the sensitive attributes. The security schemes are...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Secure Communication Using Generalized Digital Certificate

    A digital certificate is the combination of a statement and a signature of the statement, signed by a trusted certification authority. This work proposes using Generalized Digital Certificate (GDC), for user authentication and key agreement for efficient secure communication. A GDC contains user's public information, such as the information of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Framework for Monitoring Firewall Functionality Using Intrusion Detection Systems

    In the last few years, the intranet and Internet has experienced explosive growth due to number of benefits. Internet is insecure which makes security of private networks system an imported limitation. Firewall is installed as the first step of securing private networks. Firewalls are implemented at the block point of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    A Survey of Anomaly Detection Using Frequent Item Sets

    Knowledge extraction is a process of filtering some informative knowledge from the database so that it can be used wide variety of applications and analysis. Due to this highly efficient algorithm is required for data mining and for accessing data from large datasets. In frequent item sets are produced from...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Enhancing Web-Security With Stronger Captchas

    Captcha are used widely over the World Wide Web to prevent automated programs in order to scrape a data from websites. Captcha is a challenge response test used to ensure that the response is generated by a person not by a computer. Users are asked to read and type a...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2012

    Bloom Filters & Their Applications

    A Bloom Filter (BF) is a data structure suitable for performing set membership queries very efficiently. A standard bloom filter representing a set of n elements is generated by an array of m bits and uses k independent hash functions. Bloom filters have some attractive properties including low storage requirement,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    An Improved Adaptive Space-Sharing Scheduling Policy for Non-Dedicated Heterogeneous Cluster Systems

    Adaptive space-sharing scheduling algorithms tend to improve the performance of clusters by allocating processors to jobs based on the current system load. The focus of existing adaptive algorithms is on dedicated homogeneous and heterogeneous clusters. However, commodity clusters are naturally non-dedicated and tend to be heterogeneous over the time as...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    Comparative Analysis of Different Techniques for Novel Class Detection

    Data stream mining is the process of extracting knowledge from continuous data. Data stream can be viewed as a sequence of relational touples arrives continuously at time varying. Classification of data stream is more challenging task due to three major problems in data stream mining: infinite length, concept-drift, arrival of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in Cloud-By Using Nephel's Algorithm

    In recent years, ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    Clustering That Depends Upon Various Viewpoints Similarity Measure

    In data mining clustering takes key role when compared to other important ones. The main goal of clustering is to get intrinsic structures in information, and arrange them into perfect subgroups for future work and analysis. Between the data objects there must be cluster relationship which was assumed by clustering...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Novel Method for the Construction of Threshold Multiple-Secret Visual Cryptographic Schemes by Without Pixel Expansion

    The main concept of the original Visual Secret Sharing (VSS) scheme is to encrypt a secret image into n meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images except for all of images. The shared secret image can be...

    Provided By International Journal of Computer Applications Technology and Research