International Journal of Computer Applications Technology and Research

Displaying 1-40 of 172 results

  • White Papers // May 2015

    Data Mining Using Improved Association Rule

    Data mining plays an important role in extracting patterns and other information from data. The Apriori algorithm has been the most popular techniques in-finding frequent patterns. However, Apriori algorithm scans the database many times leading to large I/O. This paper is proposed to overcome the limitations of Apriori algorithm while...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2015

    Frequent Data Mining in Data Publishing for Privacy Preservation

    Weighted frequent pattern mining is suggested to find out more important frequent pattern by considering different weights of each item. Weighted frequent patterns are generated in weight ascending and frequency descending order by using prefix tree structure. These generated weighted frequent patterns are applied to maximal frequent item set mining...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2015

    A Survey on the Clustering Algorithms in Sales Data Mining

    In this paper, the authors discuss different clustering techniques that can be used in sales databases. The advancement of digital data collection and build-up of data in data banks as a result of modernization in sales disciplines has brought in great challenges of data processing for better and meaningful results...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Semantically Enriched Knowledge Extraction with Data Mining

    While data mining has enjoyed great popularity and success in recent years, semantic web is shaping up as a next big step in the evolution of World Wide Web (WWW). It is the way web is growing as a smarter cyberspace. In field of information and communication technology huge amount...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    User Participation in ERP Implementation: A Case-Based Study

    Information System (IS), such as Enterprise Resource Planning (ERP) systems, are being developed and used in organizations to achieve their business goals and to enhance organizational effectiveness. The effect of user participation on successful systems development and implementation of ERP systems continues to be an area of interest to researchers....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    An Efficient Reconfigurable Filter Design for Reducing Dynamic Power

    In this paper, the authors present an architectural view of designing a digital filter. The main idea is to design a reconfigurable filter for reducing dynamic power consumption. By considering the input variation's they reduce the order of the filter considering the coefficient are fixed. The filter is implemented using...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Risk Prediction for Production of an Enterprise

    Despite all preventive measures, there is so much possibility of risks in any project development as well as in enterprise management. There is no any standard mechanism or methodology available to assess the risks in any project or production management. Using some precautionary steps, managers can only avoid the risks...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Functional Coverage for Low Power DDR2 Memory Controller in UVM

    It is a well-known fact today that verification consumes approximately 70% of the product cycle and it is one of the main hindrances in developing a complex design. The advanced CAD tools reduce the design time but still the verification time is increasing with the design complexity. Writing directed tests...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2015

    Order Size Dependent Trade Credit Study in a Three Echelon Supply Chain Model

    In this paper, the authors generalize order linked trade credit policy in three echelon supply chain system where manufacturer, distributor and retailer are involved and manufacturer provide a delay period to distributor and distributor also provide an order linked trade credit policy to their retailer. Whole paper is discussed in...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Design and Implementation of Refresh and Timing Controller Unit for LPDDR2 Memory Controller

    In this paper, the authors present an "Implementation of refresh and timing controller" unit for Low Power Double Data Rate 2 (LPDDR2) memory controller. "Refresh and timing controller" unit plays a vital role for LPDDR2 memory controller. It maintains different timing parameters to handle various commands for memory like refresh,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Spam Filtering by Using Genetic Based Feature Selection

    Spam is defined as redundant and unwanted electronically letters, and now-a-days, it has created many problems in business life such as occupying networks bandwidth and the space of user's mailbox. Due to these problems, much research has been carried out in this regard by using classification technique. The paper show...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Performance Prediction of Service-Oriented Architecture - A survey

    Performance prediction and evaluation for SOA based applications assist software consumers to estimate their applications based on service specifications created by service developers. Incorporating traditional performance models such as stochastic Petri nets, queuing networks, and simulation present drawbacks of SOA based applications due to special characteristics of SOA such as...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Location Based Tracking System for Emergency Services

    Transmitting the geo-location information of a target via wireless networks is effective when both the target and the tracker are within Wi-Fi coverage area; the 802.11 wireless networks are not always accessible. When the target or the tracker is unable to access Wi-Fi, it is impossible to perform location tracking....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Local Restoration in Metro Ethernet Networks for Multiple Link Failures

    Ethernet a popular choice for Metropolitan-Area Networks (MANs) due to simplicity, cost effectiveness and scalability. The Spanning-Tree based switching mechanism, which is considered to be very efficient at avoiding switching loops in LAN environment, is a performance bottleneck in Metro network context. Handling of link failure is an important issue...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Prediction Model Using Web Usage Mining Techniques

    Popularity of WWW increasing day-by-day which results in the increase of web-based services, due to which web is now largest data repository. In order to handle this incremental nature of data various prediction techniques are used. If the prefetched pages are not visited by user in their subsequent access there...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Integration of Bus Specific Clock Gating and Power Gating

    In integrated circuits, a gargantuan portion of chip power is mostly consumed by clocking systems which comprises of flip-flops, latches and clock distribution networks. The two most widely used techniques for the reduction of dynamic and leakage power are Clock Gating (CG) and Power Gating (PG). The two techniques CG...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    A Survey on the Classification Techniques in Educational Data Mining

    Due to increasing interest in data mining and educational system, educational data mining is the emerging topic for research community. Educational data mining means to extract the hidden knowledge from large repositories of data with the use of technique and tools. Educational data mining develops new methods to discover knowledge...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    A Novel Method for Encoding Data Firmness in VLSI Circuits

    The number of tests, corresponding test data volume and test time increase with each new fabrication process technology. Higher circuit densities in System-On-Chip (SOC) designs have led to drastic increase in test data volume. Larger test data size demands not only higher memory requirements, but also an increase in testing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Illumination Invariant Face Recognition System using Local Directional Pattern and Principal Component Analysis

    In this paper, the authors propose an illumination-robust face recognition system using local directional pattern images. Usually, local pattern descriptors including local binary pattern and local directional pattern have been used in the field of the face recognition and facial expression recognition, since local pattern descriptors have important properties to...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Efficient Resource Management Mechanism with Fault Tolerant Model for Computational Grids

    Grid computing provides a framework and deployment environment that enables resource sharing, accessing, aggregation and management. It allows resource and coordinated use of various resources in dynamic, distributed virtual organization. The grid scheduling is responsible for resource discovery, resource selection and job assignment over a decentralized heterogeneous system. In the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Hybrid Based Resource Provisioning in Cloud

    The data centers and energy consumption characteristics of the various machines are often noted with different capacities. The public cloud workloads of different priorities and performance requirements of various applications when analyzed the authors had noted some invariant reports about cloud. The Cloud data centers become capable of sensing an...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Authentic Data Access Scheme for Variant Disruption- Tolerant Networks

    Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-Tolerant Network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Reverse Engineering for Documenting Software Architectures, a Literature Review

    Recently, much research in software engineering focused on reverse engineering of software systems which has become one of the major engineering trends for software evolution. This paper is to provide a literature review on the existing reverse engineering methodologies and approaches for documenting the architecture of software systems. The survey...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Dynamic Resource Provisioning with Authentication in Distributed Database

    Data center have the largest consumption amounts of energy in sharing the power. The public cloud workloads of different priorities and performance requirements of various applications. Cloud data center have capable of sensing an opportunity to present different programs. The author proposed construction and the name of the security level...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Guarding Against Large-Scale Scrabble In Social Network

    Generally, the botnet is one of the most dangerous threats in the network. It has number attackers in the network. The attacker consists of DDOS attack, remote attack, etc. Bots perform repetitive tasks automatically or on a schedule over the internet, tasks that would be too mundane or time-consuming for...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchical Attribute-Set-Based Encryption (HASBE) in Cloud Computing

    Cloud computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud computing the most important matter of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2014

    CMS Website Security Threat Protection Oriented Analyzer System

    Website security is a critical issue that needs to be considered in the web, in order to run the users' online business healthy and smoothly. It is very difficult situation when security of website is compromised when a brute force or other kind of attacker attacks on their web creation....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Authenticating Location Based Skyline Queries in Mobile Environment

    With the booming of Smartphone's and mobile devices, location-based services have experienced massive escalation in now-a-days. The outsourcing data processing services to cloud service provider becomes very trending in recent years, which provides solution to the clients instead of data owner. However, the authors cannot expect real solutions from the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Counter measures In Cloud Environment

    Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into the intrusion detection processes. The authors must note that the design of NICE does not intend to improve any...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Application of a Novel Software Algorithm for Information Reduction in High Frame Rate Ultrasonography

    Ultrasonography is a non invasive method in medical field and is generally used for imaging the abnormal tissue growth. The tissue growth can be benign or malignant and to diagnose the quality of the tissue growth based on the stiffness is a challenge. Orthogonal wave velocity is computed by observing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Rule Based Automatic Generation of Query Terms for SMS Based Retrieval Systems

    Every big and small need is fulfilled through the small hand held device called mobile. But matching the text standard of a mobile having limited space and of users' varying moods or limited capacity and knowledge, makes it difficult to comprehend what the user is actually seeking when it comes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2014

    Knowledge Management in the Cloud: Benefits and Risks

    The success of organizations largely depends on continual investment in learning and acquiring new knowledge that creates new businesses and improve existing performance. So, using knowledge management must result in better achieving, or even exceeding, organizations objectives. The purpose of knowledge management must not be to just become more knowledgeable,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Enhanced Detection System for Trust Aware P2P Communication Networks

    Botnet is a number of computers that have been set up to forward transmissions to other computers unknowingly to the user of the system and it is most significant to detect the botnets. However, Peer-To-Peer (P2P) structured botnets are very difficult to detect because, it doesn't have any centralized server....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Ensure Security and Scalable Performance in Multiple Relay Networks

    A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of some nodes. In such a network the source and destination cannot transmit to each other directly because the distance between the source and destination is greater...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    The Need to Integrate Usability Engineering into Agile Process Models for Mobile Applications and Devices Development

    Reliability of an interactive mobile computing device or the lack of it is often reflected in user satisfaction. The rapid proliferation and ubiquity of smart devices in the consumer market has forced the Software Engineering (SE) community to quickly adapt development approaches conscious of the novel capabilities of mobile applications....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Protecting Global Records Sharing with Identity Based Access Control List

    Generally, the information is stored in the database. Protecting sensitive information is encrypted before outsourcing to a service provider. The authors send the request to service provider through SQL queries. The query expressiveness is limited by means of any software-based cryptographical constructs then deployed, for server-side query working on the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    An Adaptative Accident Prevention Technique for Mobile Communications Systems

    In this paper, the authors introduce how many times the elders told about the ill-effects of using cell phones while driving, but how many of the users have taken their advices seriously. Well the authors think not even thirty percent. Isn't it? But whether they like it or not, it...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    VHDL Implementation of FPGA Based OFDM Modem for Wireless Applications

    The new mobile technologies trying to give broadband over wireless channel allowing the user to have bandwidth connectivity even inside moving vehicle. The metropolitan broadband wireless networks require a Non-Line-Of-Sight (NLOS) capability, and the scheme Orthogonal Frequency Division Multiplex (OFDM) becomes essential to overcome the effects of multipath fading. Orthogonal...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    A Review Study on Secure Authentication in Mobile System

    In mobile environment, the users communicate with each other about location based information and services with the help of network nodes. But providing security to data has become a difficult task. Currently available network security mechanisms are insufficient, but there is a greater demand for flexible, scalable security mechanisms. Mobile...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Oct 2014

    Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wireless Sensor Network

    One of the most effective ways to prevent unauthorized and corrupted message from being forward in wireless sensor network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But there is high computational and communication overhead in addition to lack of scalability and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    Detection of Outliers and Reduction of Their Undesirable Effects for Improving the Accuracy of K-Means Clustering Algorithm

    Clustering is an unsupervised categorization technique and also a highly used operation in data mining, in which, the data sets are divided into certain clusters according to similarity or dissimilarity criterions so that the assigned objects to each cluster would be more similar to each other comparing to the objects...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    QoS Driven Task Scheduling in Cloud Computing

    Cloud computing systems promise to offer pay per use, on demand computing services to users worldwide. Recently, there has been a dramatic increase in the demand for delivering services to a large number of users, so they need to offer differentiated services to users and meet their expected quality requirements....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Reviewing Cluster Based Collaborative Filtering Approaches

    With regard to rapid development of Internet technology and the increasing volume of data and information, the need for systems that can guide users toward their desired items and services may be felt more than ever. Recommender systems, as one of these systems, are one of information filtering systems predicting...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Implementation of Mobile-Cloudlet-Cloud Architecture for Face Recognition in Cloud Computing Using Android Mobile

    Real time face recognition applications use face recognition algorithms, which extract information such as shape, size, and position of facial features (eyes, nose, ear, lips) and then compare this extracted feature to stored featured database to locate matching images. Face recognition application used in airport security, in passport office, in...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Presenting a New Method for Detection and Prevention of Single Black Holes Attack in AODV Protocol in Wireless Ad Hoc Network

    There is no infrastructure in wireless ad hoc networks, and nodes independently manage the networks. Therefore, the connection between nodes is provided by the nodes themselves, and these nodes act as a router. In this case, they use routing protocol such as AODV. In order to provide the connections, nodes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Location Based Detection of Replication Attacks and Colluding Attacks

    Wireless sensor networks gains its importance because of the critical applications in which it is involved like industrial automation, healthcare applications, military and surveillance. Among security attacks in wireless sensor networks the authors consider an active attack, node replication attack and colluding attack. They use localized algorithms, ((i.e.) replication detection...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Gender Specification Using Touch Less Fingerprint Recognition

    Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This paper touches on two major classes of algorithms (minutia and pattern) and four sensor designs...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment

    Cloud computing becomes quite popular among cloud users by offering a variety of resources. This is an on demand service because it offers dynamic flexible resource allocation and guaranteed services in pay as-you-use manner to public. In this paper, the authors present the several dynamic resource allocation techniques and its...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Fault Injection Test Bed for Clock Violation

    In this paper, the International Data Encryption Algorithm (IDEA) algorithm synthesis models will be used as test encryption algorithm. The Xilinx digital clock manager component will be used for generation of clocks for different frequencies and phase shifts. The encryption output with faults introduced and without faults introduced is compared...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Hybrid Approach for Enhancing the Capability of Spam Filter

    Electronic mail (e-mail) has become a promising component for Internet users. The most common problem observed in maintaining email inbox is the incoming spam mails. In this paper, a hybrid approach for enhancing the capability of spam filter is proposed. This hybrid approach has defined the best features like whitelisting,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Survey on Enhancing the Efficiency of Various Web Structure Mining Algorithms

    With the fast pace in internet technology, users get easily confused in large hyper text structure. Providing the relevant information to user is primary aim of the website owner. In order to achieve this goal, they use the concept of web mining. Web mining is used to categorize users and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2012

    Bloom Filters & Their Applications

    A Bloom Filter (BF) is a data structure suitable for performing set membership queries very efficiently. A standard bloom filter representing a set of n elements is generated by an array of m bits and uses k independent hash functions. Bloom filters have some attractive properties including low storage requirement,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    An Improved Adaptive Space-Sharing Scheduling Policy for Non-Dedicated Heterogeneous Cluster Systems

    Adaptive space-sharing scheduling algorithms tend to improve the performance of clusters by allocating processors to jobs based on the current system load. The focus of existing adaptive algorithms is on dedicated homogeneous and heterogeneous clusters. However, commodity clusters are naturally non-dedicated and tend to be heterogeneous over the time as...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Risk-Aware Response Mechanism With Extended D-S Theory

    Mobile Ad-hoc NETworks (MANETs) are having dynamic nature of its network infrastructure and it is vulnerable to all types of attacks. Among these attacks, the routing attacks getting more attention because it's changing the whole topology itself and it causes more damage to MANET. Even there is lot of intrusion...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Identifying the Number of Visitors to improve Website Usability from Educational Institution Web Log Data

    Web usage mining deals with understanding the visitor's behavior with a website. It helps in understanding the concerns such as present and future probability of every website user, relationship between behavior and website usability. It has different branches such as web content mining, web structure and web usage mining. The...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2013

    Data Transfer Security Solution for Wireless Sensor Network

    WSN is a wide growth area for specific resource limited application. Factor associated with technology like, the encryption security, operating speed and power consumption for network. Here, the authors introduce a mechanism for secure transferring of data is WSN and various security related issues. This energy-efficient encryption is a secure...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2013

    Web Services Based Information Retrieval Agent System for Cloud Computing

    Cloud computing is Internet based system development in which large scalable computing resources are provided \"As a service\" over the Internet to users and has attracted more and more attention from industry and research community. However, the concept of cloud computing does not provide facilities for the knowledge discovery and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    A Trusted Integrity Verification Architecture for Commodity Computers

    Trust is an indispensable part of the computing environment, the validity of any transaction or information depends heavily on the authenticity of the information source. In this paper, many mechanisms for ensuring the authenticity of the information source were developed, including password verification and biometrics. But as the attacks are...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    A New Architecture for Group Replication in Data Grid

    Now-a-days, grid systems are vital technology for programs running with high performance and problems solving with large scale in scientific, engineering and business. In grid systems, heterogeneous computational resources and data should be shared between independent organizations that are scatter geographically. A data grid is a kind of grid types...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    An Improvised Tree Algorithm for Association Rule Mining Using Transaction Reduction

    Association rule mining technique plays an important role in data mining research where the aim is to find interesting correlations between sets of items in databases. The Apriori algorithm has been the most popular techniques in finding frequent patterns. However, when applying this method a database has to be scanned...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    Advanced Authentication Scheme Using Multimodal Biometric Scheme

    Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today's biometric system. The purpose of the authors' paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    A Review of Machine Learning Based Anomaly Detection Techniques

    Intruders may be from outside the host or the network or legitimate users of the network. Intrusion detection is the process of monitoring the events that are occurring in the systems or networks and analyzing them for signs of possible incidents, which are violations or threats to computer security policies,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    Ensuring Privacy and Security in Data Sharing Under Cloud Environment

    An important application of data sharing in cloud environment is the storage and retrieval of Patient Health Records (PHR) that maintain the patient's personal and diagnosis information. These records should be maintained with privacy and security for safe retrieval. The privacy mechanism protects the sensitive attributes. The security schemes are...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    Comparative Analysis of Different Techniques for Novel Class Detection

    Data stream mining is the process of extracting knowledge from continuous data. Data stream can be viewed as a sequence of relational touples arrives continuously at time varying. Classification of data stream is more challenging task due to three major problems in data stream mining: infinite length, concept-drift, arrival of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in Cloud-By Using Nephel's Algorithm

    In recent years, ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    Clustering That Depends Upon Various Viewpoints Similarity Measure

    In data mining clustering takes key role when compared to other important ones. The main goal of clustering is to get intrinsic structures in information, and arrange them into perfect subgroups for future work and analysis. Between the data objects there must be cluster relationship which was assumed by clustering...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Novel Method for the Construction of Threshold Multiple-Secret Visual Cryptographic Schemes by Without Pixel Expansion

    The main concept of the original Visual Secret Sharing (VSS) scheme is to encrypt a secret image into n meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images except for all of images. The shared secret image can be...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Detecting and Preventing Data Overloading Difficulty using Concept Hierarchies

    Data mining is the process of extracting knowledge from large amount of data stored in database, data warehouse or other repositories. Concept hierarchy is defined as recursively reduce the data by replacing low level concepts (such as numeric values for age) by higher level concepts (such as young, middle-aged, or...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Comparative Study of Particle Swarm Optimization and Fuzzy C-Means to Data Clustering

    Data has an important role in all aspects of human life and so analyzing this data for discovering proper knowledge is important. Data mining refers to find useful information (extracting patterns or knowledge) from large amount of data. Clustering is an important data mining technique which aims to divide the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Insuring Security for Outsourced Data Stored in Cloud Environment

    The cloud storage offers users with infrastructure flexibility, faster deployment of applications and data, cost control, adaptation of cloud resources to real needs, improved productivity, etc. Inspite of these advantageous factors, there are several deterrents to the widespread adoption of cloud computing remain. Among them, security towards the correctness of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    An Efficient Discovery of High Utility Item Sets from Large Database

    Identifying frequent items from database and treating each item in a database as equal. However, items are actually differs in many aspects like, profit in real application, such as retail marketing. The difference between items makes a strong impact on the decision making applications, where the values of each items...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    Swarm Intelligence Based Optimization for Web Usage Mining in Recommender System

    Now-a-days, the web has become one of the most effective and efficient platform for information change and retrieval. Due to heterogeneity and unstructured nature of the data available on the WWW, web mining uses various data mining techniques to discover useful knowledge from web hyperlinks, page content and usage log....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    Analysis of Cryptographic Algorithms for Network Security

    Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and software function, characteristics, features, operational procedures, accountability,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    Cooperative Demonstrable Data Retention for Integrity Verification in Multi-Cloud Storage

    Demonstrable Data Retention (DDR) is a technique which certain the integrity of data in storage outsourcing. In this paper, the authors propose an efficient DDR protocol that prevent attacker in gaining information from multiple cloud storage node. Their technique is for distributed cloud storage and support the scalability of services...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    A Hybrid Model for Mining Multi Dimensional Data Sets

    Clustering and classification are the two familiar data mining techniques used for similar and dissimilar grouping of objects respectively. This paper presents a hybrid data mining approach based on supervised learning and unsupervised learning to identify the closest data patterns in the data base. This technique enables to achieve the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Profit Maximization for Service Providers Using Hybrid Pricing in Cloud Computing

    Cloud computing has recently emerged as one of the buzzwords in the IT industry. Several IT vendors are promising to offer computation, data/storage, and application hosting services, offering Service-Level Agreements (SLA) backed performance and uptime promises for their services. While these \"Clouds\" are the natural evolution of traditional clusters and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Enhancing Web-Security With Stronger Captchas

    Captcha are used widely over the World Wide Web to prevent automated programs in order to scrape a data from websites. Captcha is a challenge response test used to ensure that the response is generated by a person not by a computer. Users are asked to read and type a...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    A Survey of Anomaly Detection Using Frequent Item Sets

    Knowledge extraction is a process of filtering some informative knowledge from the database so that it can be used wide variety of applications and analysis. Due to this highly efficient algorithm is required for data mining and for accessing data from large datasets. In frequent item sets are produced from...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Framework for Monitoring Firewall Functionality Using Intrusion Detection Systems

    In the last few years, the intranet and Internet has experienced explosive growth due to number of benefits. Internet is insecure which makes security of private networks system an imported limitation. Firewall is installed as the first step of securing private networks. Firewalls are implemented at the block point of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Secure Communication Using Generalized Digital Certificate

    A digital certificate is the combination of a statement and a signature of the statement, signed by a trusted certification authority. This work proposes using Generalized Digital Certificate (GDC), for user authentication and key agreement for efficient secure communication. A GDC contains user's public information, such as the information of...

    Provided By International Journal of Computer Applications Technology and Research