International Journal of Computer Applications Technology and Research

Displaying 1-40 of 54 results

  • White Papers // Apr 2014

    Analysis of Various Periodicity Detection Algorithms in Time Series Data with Design of New Algorithm

    Time series datasets consist of sequence of numeric values obtained over repeated measurements of time. They are Popular in many applications such as stock market analysis, power consumption, economic and sells forecasting, temperature etc. Periodic pattern mining or periodicity detection is process of finding periodic patterns in time series database....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2014

    Implementation of FSM-MBIST and Design of Hybrid MBIST for Memory Cluster in Asynchronous SoC

    In current scenario, power efficient MPSoC's are of great demand. The power efficient asynchronous MPSoC's with multiple memories are thought-off to replace clocked synchronous SoC, in which clock consumes more than 40% of the total power. It is right time to develop the test compliant asynchronous MpSoC. In this paper,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2014

    Cloud Computing: Technical, Non-Technical and Security Issues

    Cloud computing has been growing over the last few years as a result of cheaper access to high speed Internet connection and many applications that comes with it. Its infrastructure allows it to provide services and applications from anywhere in the world. However, there are numerous technical, non-technical and security...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    An Efficient Discovery of High Utility Item Sets from Large Database

    Identifying frequent items from database and treating each item in a database as equal. However, items are actually differs in many aspects like, profit in real application, such as retail marketing. The difference between items makes a strong impact on the decision making applications, where the values of each items...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    Swarm Intelligence Based Optimization for Web Usage Mining in Recommender System

    Now-a-days, the web has become one of the most effective and efficient platform for information change and retrieval. Due to heterogeneity and unstructured nature of the data available on the WWW, web mining uses various data mining techniques to discover useful knowledge from web hyperlinks, page content and usage log....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    Analysis of Cryptographic Algorithms for Network Security

    Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and software function, characteristics, features, operational procedures, accountability,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Insuring Security for Outsourced Data Stored in Cloud Environment

    The cloud storage offers users with infrastructure flexibility, faster deployment of applications and data, cost control, adaptation of cloud resources to real needs, improved productivity, etc. Inspite of these advantageous factors, there are several deterrents to the widespread adoption of cloud computing remain. Among them, security towards the correctness of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    An AMBA Advanced High performance Bus Tracer with Real time Compression for Support of SoC

    AMBA (Advanced Microcontroller based Bus Architecture) consists of AHB (Advanced High performance Bus), APB (Advanced Peripheral Bus), ASB (Advanced System Bus) and AXB (Advanced eXtensible Bus). This paper proposes the debugging and analyses of System-on-Chip (SoC) at various test conditions by verifying the functional aspects of the on-chip bus. Here...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Detecting and Preventing Data Overloading Difficulty using Concept Hierarchies

    Data mining is the process of extracting knowledge from large amount of data stored in database, data warehouse or other repositories. Concept hierarchy is defined as recursively reduce the data by replacing low level concepts (such as numeric values for age) by higher level concepts (such as young, middle-aged, or...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Comparative Study of Particle Swarm Optimization and Fuzzy C-Means to Data Clustering

    Data has an important role in all aspects of human life and so analyzing this data for discovering proper knowledge is important. Data mining refers to find useful information (extracting patterns or knowledge) from large amount of data. Clustering is an important data mining technique which aims to divide the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Novel Method for the Construction of Threshold Multiple-Secret Visual Cryptographic Schemes by Without Pixel Expansion

    The main concept of the original Visual Secret Sharing (VSS) scheme is to encrypt a secret image into n meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images except for all of images. The shared secret image can be...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    Clustering That Depends Upon Various Viewpoints Similarity Measure

    In data mining clustering takes key role when compared to other important ones. The main goal of clustering is to get intrinsic structures in information, and arrange them into perfect subgroups for future work and analysis. Between the data objects there must be cluster relationship which was assumed by clustering...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Survey on Enhancing the Efficiency of Various Web Structure Mining Algorithms

    With the fast pace in internet technology, users get easily confused in large hyper text structure. Providing the relevant information to user is primary aim of the website owner. In order to achieve this goal, they use the concept of web mining. Web mining is used to categorize users and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Hybrid Approach for Enhancing the Capability of Spam Filter

    Electronic mail (e-mail) has become a promising component for Internet users. The most common problem observed in maintaining email inbox is the incoming spam mails. In this paper, a hybrid approach for enhancing the capability of spam filter is proposed. This hybrid approach has defined the best features like whitelisting,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Fault Injection Test Bed for Clock Violation

    In this paper, the International Data Encryption Algorithm (IDEA) algorithm synthesis models will be used as test encryption algorithm. The Xilinx digital clock manager component will be used for generation of clocks for different frequencies and phase shifts. The encryption output with faults introduced and without faults introduced is compared...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment

    Cloud computing becomes quite popular among cloud users by offering a variety of resources. This is an on demand service because it offers dynamic flexible resource allocation and guaranteed services in pay as-you-use manner to public. In this paper, the authors present the several dynamic resource allocation techniques and its...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Gender Specification Using Touch Less Fingerprint Recognition

    Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This paper touches on two major classes of algorithms (minutia and pattern) and four sensor designs...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Location Based Detection of Replication Attacks and Colluding Attacks

    Wireless sensor networks gains its importance because of the critical applications in which it is involved like industrial automation, healthcare applications, military and surveillance. Among security attacks in wireless sensor networks the authors consider an active attack, node replication attack and colluding attack. They use localized algorithms, ((i.e.) replication detection...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Presenting a New Method for Detection and Prevention of Single Black Holes Attack in AODV Protocol in Wireless Ad Hoc Network

    There is no infrastructure in wireless ad hoc networks, and nodes independently manage the networks. Therefore, the connection between nodes is provided by the nodes themselves, and these nodes act as a router. In this case, they use routing protocol such as AODV. In order to provide the connections, nodes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Implementation of Mobile-Cloudlet-Cloud Architecture for Face Recognition in Cloud Computing Using Android Mobile

    Real time face recognition applications use face recognition algorithms, which extract information such as shape, size, and position of facial features (eyes, nose, ear, lips) and then compare this extracted feature to stored featured database to locate matching images. Face recognition application used in airport security, in passport office, in...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Reviewing Cluster Based Collaborative Filtering Approaches

    With regard to rapid development of Internet technology and the increasing volume of data and information, the need for systems that can guide users toward their desired items and services may be felt more than ever. Recommender systems, as one of these systems, are one of information filtering systems predicting...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    QoS Driven Task Scheduling in Cloud Computing

    Cloud computing systems promise to offer pay per use, on demand computing services to users worldwide. Recently, there has been a dramatic increase in the demand for delivering services to a large number of users, so they need to offer differentiated services to users and meet their expected quality requirements....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    Detection of Outliers and Reduction of Their Undesirable Effects for Improving the Accuracy of K-Means Clustering Algorithm

    Clustering is an unsupervised categorization technique and also a highly used operation in data mining, in which, the data sets are divided into certain clusters according to similarity or dissimilarity criterions so that the assigned objects to each cluster would be more similar to each other comparing to the objects...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    An Improved Post-Quantum Cryptographic Scheme Based on NTRU

    In this paper, the authors report a more secure and efficient encryption algorithm based on the NTRU cryptographic scheme. NTRU is lattice based scheme resistant to quantum computing, hence it falls under the class of post quantum cryptosystems. It is based on shortest vector problem. The main characteristics of the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    Ensuring Security in Emergency Through SMS Alert System

    Short Message Services (SMS) are increasingly being relied upon to disseminate critical information during emergencies. In recent days, accident happens very common due to heavy traffic and increase in vehicle level and bad drivers, hence it requires a software to inform the service centre for instant help to save life...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    Interweaving Knowledge Acquisition and Product Functionality

    In this paper, the authors concern with the detailed study on Product Functionality and to select a knowledge acquisition method for acquiring knowledge on product functionality efficiently. The purpose of this research is to ensure that important aspects of product data are taken into account in knowledge management projects. The...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2013

    Priority Based Hybrid Automation Testing Tool

    Software testing is an important means to ensure software quality and to improve software reliability. As the size and complexity of software applications is continually growing, manual testing becomes infeasible in such arena. Automation of the software testing process saves time and provides better utilization of resources and thus, plays...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2013

    Accountability in Distributed Environment for Data Sharing in the Cloud

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Secure Communication Using Generalized Digital Certificate

    A digital certificate is the combination of a statement and a signature of the statement, signed by a trusted certification authority. This work proposes using Generalized Digital Certificate (GDC), for user authentication and key agreement for efficient secure communication. A GDC contains user's public information, such as the information of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Framework for Monitoring Firewall Functionality Using Intrusion Detection Systems

    In the last few years, the intranet and Internet has experienced explosive growth due to number of benefits. Internet is insecure which makes security of private networks system an imported limitation. Firewall is installed as the first step of securing private networks. Firewalls are implemented at the block point of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    A Survey of Anomaly Detection Using Frequent Item Sets

    Knowledge extraction is a process of filtering some informative knowledge from the database so that it can be used wide variety of applications and analysis. Due to this highly efficient algorithm is required for data mining and for accessing data from large datasets. In frequent item sets are produced from...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Enhancing Web-Security With Stronger Captchas

    Captcha are used widely over the World Wide Web to prevent automated programs in order to scrape a data from websites. Captcha is a challenge response test used to ensure that the response is generated by a person not by a computer. Users are asked to read and type a...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    A Hybrid Model for Mining Multi Dimensional Data Sets

    Clustering and classification are the two familiar data mining techniques used for similar and dissimilar grouping of objects respectively. This paper presents a hybrid data mining approach based on supervised learning and unsupervised learning to identify the closest data patterns in the data base. This technique enables to achieve the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Profit Maximization for Service Providers Using Hybrid Pricing in Cloud Computing

    Cloud computing has recently emerged as one of the buzzwords in the IT industry. Several IT vendors are promising to offer computation, data/storage, and application hosting services, offering Service-Level Agreements (SLA) backed performance and uptime promises for their services. While these \"Clouds\" are the natural evolution of traditional clusters and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    Cooperative Demonstrable Data Retention for Integrity Verification in Multi-Cloud Storage

    Demonstrable Data Retention (DDR) is a technique which certain the integrity of data in storage outsourcing. In this paper, the authors propose an efficient DDR protocol that prevent attacker in gaining information from multiple cloud storage node. Their technique is for distributed cloud storage and support the scalability of services...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    Ensuring Privacy and Security in Data Sharing Under Cloud Environment

    An important application of data sharing in cloud environment is the storage and retrieval of Patient Health Records (PHR) that maintain the patient's personal and diagnosis information. These records should be maintained with privacy and security for safe retrieval. The privacy mechanism protects the sensitive attributes. The security schemes are...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    A Review of Machine Learning Based Anomaly Detection Techniques

    Intruders may be from outside the host or the network or legitimate users of the network. Intrusion detection is the process of monitoring the events that are occurring in the systems or networks and analyzing them for signs of possible incidents, which are violations or threats to computer security policies,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    An Improvised Tree Algorithm for Association Rule Mining Using Transaction Reduction

    Association rule mining technique plays an important role in data mining research where the aim is to find interesting correlations between sets of items in databases. The Apriori algorithm has been the most popular techniques in finding frequent patterns. However, when applying this method a database has to be scanned...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    Advanced Authentication Scheme Using Multimodal Biometric Scheme

    Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today's biometric system. The purpose of the authors' paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Mar 2013

    A New Architecture for Group Replication in Data Grid

    Now-a-days, grid systems are vital technology for programs running with high performance and problems solving with large scale in scientific, engineering and business. In grid systems, heterogeneous computational resources and data should be shared between independent organizations that are scatter geographically. A data grid is a kind of grid types...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Novel Method for the Construction of Threshold Multiple-Secret Visual Cryptographic Schemes by Without Pixel Expansion

    The main concept of the original Visual Secret Sharing (VSS) scheme is to encrypt a secret image into n meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images except for all of images. The shared secret image can be...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Detecting and Preventing Data Overloading Difficulty using Concept Hierarchies

    Data mining is the process of extracting knowledge from large amount of data stored in database, data warehouse or other repositories. Concept hierarchy is defined as recursively reduce the data by replacing low level concepts (such as numeric values for age) by higher level concepts (such as young, middle-aged, or...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Comparative Study of Particle Swarm Optimization and Fuzzy C-Means to Data Clustering

    Data has an important role in all aspects of human life and so analyzing this data for discovering proper knowledge is important. Data mining refers to find useful information (extracting patterns or knowledge) from large amount of data. Clustering is an important data mining technique which aims to divide the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2014

    Insuring Security for Outsourced Data Stored in Cloud Environment

    The cloud storage offers users with infrastructure flexibility, faster deployment of applications and data, cost control, adaptation of cloud resources to real needs, improved productivity, etc. Inspite of these advantageous factors, there are several deterrents to the widespread adoption of cloud computing remain. Among them, security towards the correctness of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    An Efficient Discovery of High Utility Item Sets from Large Database

    Identifying frequent items from database and treating each item in a database as equal. However, items are actually differs in many aspects like, profit in real application, such as retail marketing. The difference between items makes a strong impact on the decision making applications, where the values of each items...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    Swarm Intelligence Based Optimization for Web Usage Mining in Recommender System

    Now-a-days, the web has become one of the most effective and efficient platform for information change and retrieval. Due to heterogeneity and unstructured nature of the data available on the WWW, web mining uses various data mining techniques to discover useful knowledge from web hyperlinks, page content and usage log....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Feb 2014

    Analysis of Cryptographic Algorithms for Network Security

    Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and software function, characteristics, features, operational procedures, accountability,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2013

    Priority Based Hybrid Automation Testing Tool

    Software testing is an important means to ensure software quality and to improve software reliability. As the size and complexity of software applications is continually growing, manual testing becomes infeasible in such arena. Automation of the software testing process saves time and provides better utilization of resources and thus, plays...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    Interweaving Knowledge Acquisition and Product Functionality

    In this paper, the authors concern with the detailed study on Product Functionality and to select a knowledge acquisition method for acquiring knowledge on product functionality efficiently. The purpose of this research is to ensure that important aspects of product data are taken into account in knowledge management projects. The...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    Ensuring Security in Emergency Through SMS Alert System

    Short Message Services (SMS) are increasingly being relied upon to disseminate critical information during emergencies. In recent days, accident happens very common due to heavy traffic and increase in vehicle level and bad drivers, hence it requires a software to inform the service centre for instant help to save life...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Aug 2013

    An Improved Post-Quantum Cryptographic Scheme Based on NTRU

    In this paper, the authors report a more secure and efficient encryption algorithm based on the NTRU cryptographic scheme. NTRU is lattice based scheme resistant to quantum computing, hence it falls under the class of post quantum cryptosystems. It is based on shortest vector problem. The main characteristics of the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    Detection of Outliers and Reduction of Their Undesirable Effects for Improving the Accuracy of K-Means Clustering Algorithm

    Clustering is an unsupervised categorization technique and also a highly used operation in data mining, in which, the data sets are divided into certain clusters according to similarity or dissimilarity criterions so that the assigned objects to each cluster would be more similar to each other comparing to the objects...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Sep 2013

    QoS Driven Task Scheduling in Cloud Computing

    Cloud computing systems promise to offer pay per use, on demand computing services to users worldwide. Recently, there has been a dramatic increase in the demand for delivering services to a large number of users, so they need to offer differentiated services to users and meet their expected quality requirements....

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Reviewing Cluster Based Collaborative Filtering Approaches

    With regard to rapid development of Internet technology and the increasing volume of data and information, the need for systems that can guide users toward their desired items and services may be felt more than ever. Recommender systems, as one of these systems, are one of information filtering systems predicting...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Implementation of Mobile-Cloudlet-Cloud Architecture for Face Recognition in Cloud Computing Using Android Mobile

    Real time face recognition applications use face recognition algorithms, which extract information such as shape, size, and position of facial features (eyes, nose, ear, lips) and then compare this extracted feature to stored featured database to locate matching images. Face recognition application used in airport security, in passport office, in...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Presenting a New Method for Detection and Prevention of Single Black Holes Attack in AODV Protocol in Wireless Ad Hoc Network

    There is no infrastructure in wireless ad hoc networks, and nodes independently manage the networks. Therefore, the connection between nodes is provided by the nodes themselves, and these nodes act as a router. In this case, they use routing protocol such as AODV. In order to provide the connections, nodes...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Location Based Detection of Replication Attacks and Colluding Attacks

    Wireless sensor networks gains its importance because of the critical applications in which it is involved like industrial automation, healthcare applications, military and surveillance. Among security attacks in wireless sensor networks the authors consider an active attack, node replication attack and colluding attack. They use localized algorithms, ((i.e.) replication detection...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Gender Specification Using Touch Less Fingerprint Recognition

    Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. This paper touches on two major classes of algorithms (minutia and pattern) and four sensor designs...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Survey on Dynamic Resource Allocation Strategy in Cloud Computing Environment

    Cloud computing becomes quite popular among cloud users by offering a variety of resources. This is an on demand service because it offers dynamic flexible resource allocation and guaranteed services in pay as-you-use manner to public. In this paper, the authors present the several dynamic resource allocation techniques and its...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2013

    Fault Injection Test Bed for Clock Violation

    In this paper, the International Data Encryption Algorithm (IDEA) algorithm synthesis models will be used as test encryption algorithm. The Xilinx digital clock manager component will be used for generation of clocks for different frequencies and phase shifts. The encryption output with faults introduced and without faults introduced is compared...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Hybrid Approach for Enhancing the Capability of Spam Filter

    Electronic mail (e-mail) has become a promising component for Internet users. The most common problem observed in maintaining email inbox is the incoming spam mails. In this paper, a hybrid approach for enhancing the capability of spam filter is proposed. This hybrid approach has defined the best features like whitelisting,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    A Survey on Enhancing the Efficiency of Various Web Structure Mining Algorithms

    With the fast pace in internet technology, users get easily confused in large hyper text structure. Providing the relevant information to user is primary aim of the website owner. In order to achieve this goal, they use the concept of web mining. Web mining is used to categorize users and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2012

    Bloom Filters & Their Applications

    A Bloom Filter (BF) is a data structure suitable for performing set membership queries very efficiently. A standard bloom filter representing a set of n elements is generated by an array of m bits and uses k independent hash functions. Bloom filters have some attractive properties including low storage requirement,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    An Improved Adaptive Space-Sharing Scheduling Policy for Non-Dedicated Heterogeneous Cluster Systems

    Adaptive space-sharing scheduling algorithms tend to improve the performance of clusters by allocating processors to jobs based on the current system load. The focus of existing adaptive algorithms is on dedicated homogeneous and heterogeneous clusters. However, commodity clusters are naturally non-dedicated and tend to be heterogeneous over the time as...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    Comparative Analysis of Different Techniques for Novel Class Detection

    Data stream mining is the process of extracting knowledge from continuous data. Data stream can be viewed as a sequence of relational touples arrives continuously at time varying. Classification of data stream is more challenging task due to three major problems in data stream mining: infinite length, concept-drift, arrival of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Nov 2012

    Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in Cloud-By Using Nephel's Algorithm

    In recent years, ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Dec 2013

    Clustering That Depends Upon Various Viewpoints Similarity Measure

    In data mining clustering takes key role when compared to other important ones. The main goal of clustering is to get intrinsic structures in information, and arrange them into perfect subgroups for future work and analysis. Between the data objects there must be cluster relationship which was assumed by clustering...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    A Review of Machine Learning Based Anomaly Detection Techniques

    Intruders may be from outside the host or the network or legitimate users of the network. Intrusion detection is the process of monitoring the events that are occurring in the systems or networks and analyzing them for signs of possible incidents, which are violations or threats to computer security policies,...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    Ensuring Privacy and Security in Data Sharing Under Cloud Environment

    An important application of data sharing in cloud environment is the storage and retrieval of Patient Health Records (PHR) that maintain the patient's personal and diagnosis information. These records should be maintained with privacy and security for safe retrieval. The privacy mechanism protects the sensitive attributes. The security schemes are...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Apr 2013

    Cooperative Demonstrable Data Retention for Integrity Verification in Multi-Cloud Storage

    Demonstrable Data Retention (DDR) is a technique which certain the integrity of data in storage outsourcing. In this paper, the authors propose an efficient DDR protocol that prevent attacker in gaining information from multiple cloud storage node. Their technique is for distributed cloud storage and support the scalability of services...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    A Hybrid Model for Mining Multi Dimensional Data Sets

    Clustering and classification are the two familiar data mining techniques used for similar and dissimilar grouping of objects respectively. This paper presents a hybrid data mining approach based on supervised learning and unsupervised learning to identify the closest data patterns in the data base. This technique enables to achieve the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Profit Maximization for Service Providers Using Hybrid Pricing in Cloud Computing

    Cloud computing has recently emerged as one of the buzzwords in the IT industry. Several IT vendors are promising to offer computation, data/storage, and application hosting services, offering Service-Level Agreements (SLA) backed performance and uptime promises for their services. While these \"Clouds\" are the natural evolution of traditional clusters and...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // May 2013

    Enhancing Web-Security With Stronger Captchas

    Captcha are used widely over the World Wide Web to prevent automated programs in order to scrape a data from websites. Captcha is a challenge response test used to ensure that the response is generated by a person not by a computer. Users are asked to read and type a...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    A Survey of Anomaly Detection Using Frequent Item Sets

    Knowledge extraction is a process of filtering some informative knowledge from the database so that it can be used wide variety of applications and analysis. Due to this highly efficient algorithm is required for data mining and for accessing data from large datasets. In frequent item sets are produced from...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Framework for Monitoring Firewall Functionality Using Intrusion Detection Systems

    In the last few years, the intranet and Internet has experienced explosive growth due to number of benefits. Internet is insecure which makes security of private networks system an imported limitation. Firewall is installed as the first step of securing private networks. Firewalls are implemented at the block point of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jun 2013

    Secure Communication Using Generalized Digital Certificate

    A digital certificate is the combination of a statement and a signature of the statement, signed by a trusted certification authority. This work proposes using Generalized Digital Certificate (GDC), for user authentication and key agreement for efficient secure communication. A GDC contains user's public information, such as the information of...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jul 2013

    Accountability in Distributed Environment for Data Sharing in the Cloud

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Security for Effective Data Storage in Multi Clouds

    Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    A Generic Model for Student Data Analytic Web Service (SDAWS)

    Any university management system accumulates a cartload of data and analytics can be applied on it to gather useful information to aid the academic decision making process. This paper is to demonstrate the significance of a data analytic web service in the education domain. This can be integrated with the...

    Provided By International Journal of Computer Applications Technology and Research

  • White Papers // Jan 2013

    Handling Cross-Layer Attacks Using Neighbors Monitoring Scheme and Swarm Intelligence in MANET

    The standard MAC protocol widely used for Mobile Ad hoc NETworks (MANETs) is IEEE 802.11. When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a...

    Provided By International Journal of Computer Applications Technology and Research