International Journal of Computer Applications

Displaying 1-40 of 6341 results

  • White Papers // Feb 2015

    A Review on Big Data Integration

    Big data technologies are becoming a current talk and a new "Buzz-word" both in science and in industry. Today data have grown from terabytes to petabytes and now it is in zeta bytes. Increased amount of information increases the challenges in managing and manipulating data. Data integration is a main...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Comparative Study of Spatial Data Mining Techniques

    Spatial data mining is the process of discovering interesting and previously unknown, but potentially useful patterns from large spatial datasets. Spatial data mining is a mining knowledge from large amounts of spatial data. Spatial data mining algorithms can be separated into four general categories: clustering and outlier detection, association and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Mapping of Semantic Web Ontology in User Query System

    The main purpose of the semantic web promises a kind machine intelligence, which can support a verity of user tasks like efficiency of search engine or Question Answering (QA). Ontologies are needed for realization of the semantic web, which in turn depends on the ability of system to identify and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Detecting and Removing Noisy Data on Web Document Using Text Density Approach

    The web documents content are useful resources for many applications. However, this content could be classified into relevant content and irrelevant content with respect to the involved application. The irrelevant content, like advertisements banner, copyright information, and navigation menus assumed as noisy data. Noisy data that found among the content...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment

    In this paper, the authors are to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then, they suggest a detailed countermeasure; building upon the Jigsaw based secure data transfer for enhanced security of the data flow inside the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper

    In data mining is used to extract interested pattern or knowledge from large amount of data using many data mining technique. However it may also display sensitive information about individuals compromising the individual right to privacy when a collection of data is split among various parties. Now each and every...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Knowledge Discovery From Web Usage Data: An Efficient Implementation of Web Log Preprocessing Techniques

    Web Usage Mining (WUM) refers to extraction of knowledge from the web log data by application of data mining techniques. WUM generally consists of web log preprocessing, web log knowledge discovery and web log pattern analysis. Web log preprocessing is a major and complex task of WUM. Elimination of noise...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Technique of Data Fusion for Effective Text Retrieval

    The goal of information retrieval systems is to provide useful information for user's information need. For a collection of documents and a given query, an IR system returns a ranked list of documents. Different IR systems based on IR models such as vector space, smart vector space, extended Boolean, latent...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Review on Knowledge Discovery Using Text Classification Techniques in Text Mining

    Data mining is process of identify the knowledge from large data set. Knowledge discovery from textual database is a process of extracting interested or non-retrieval pattern from unstructured text document. With rapid growing of information increasing trends in people to extract knowledge from large text document. A text mining frame...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Approach to Determine Non-Filer's of Property Tax Using Clustering and Classification

    Data mining use everywhere successively, it is the knowledge extraction from large data. In this paper, the authors are using clustering and classification methods to mine the data by using hybrid algorithm. They use K-means algorithm from clustering and CART algorithm from decision tree. Clustering method will use for make...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Algorithm to Construct Decision Tree for Machine Learning Based on Similarity Factor

    Data mining is one of the most important steps of the knowledge discovery in databases process and is considered as significant subfield in knowledge management. A classification of the data mining methods would greatly simplify the understanding of the whole space of available methods. Decision tree learning algorithm has been...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Outliers Detection Using Subspace Method: A Survey

    Outliers detection is currently very active area of research in data set mining community. Outliers detection is an important research problem that aims to find objects that are considerably dissimilar, exceptional and inconsistent in the database. In this paper, the authors present a survey of outliers detection techniques using subspace...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A VPRS Based Approach for Enhancement in the Classification Efficiency of Machinery Datasets

    In this paper, an effective approach is proposed to enhance the classification accuracy of machinery datasets. Since in the today's world of data estimation, data is increasing at explosive rate. At the same time that bulk of data may contain relevant or irrelevant data. Presence of rough data in the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    The Impact of Virtual Experience and Informative Control on the Enhancement of Product Understanding

    There is no doubt that this way of knowledge delivering affords flexible and instant learning. Thus, many instructors afford online material as hypertexts concerning a set of faces and rules for students to generate a basis to achieve a comprehensive understanding. This paper borrowed the nature of e-learning and applied...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Survey Paper on Pattern Discovery Text Mining for Document Classification

    In text documents data mining techniques have been discovered for mining useful patterns. But there are some questions, how to properly use and update discovered patterns is still an open research issue, specifically in the text mining. Therefore most existing text mining methods have used term-based approaches but they all...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Preprocessing and Classification of Data Analysis in Institutional System Using Weka

    In today's world, an organization generates more information in a week than most people can read in a lifetime. It is humanly impossible to study, decipher, and interpret all that data to find useful information. By applying data mining techniques people can work on the extraction of hidden, historical and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Efficient Approach for Association Rule Mining by Using Two Level Compression Technique

    Association rules are if and then statements that used to reveal relationships between uncorrelated data in a database, relational database or other information repository. One of the most important techniques of data mining is Association rule mining. Association Rule Mining (ARM) is a mining technique to integrate data from large...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Association Rule Mining Using Improved Apriori Algorithm

    The past few years have seen a marvelous curiosity in area of data mining. Data mining is usually thought of as the process of finding hidden, non trivial and formerly unknown information in large collection of data. Association rule mining is a significant component of data mining. Association rule are...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Designing Smart University Using RFID and WSN

    Attendance is one of the important factors that determine the students rendering. There is a necessity to build a smart system that decrease load in managing the attendance and improves the performance of colleges, universities and any educational institute. The most common actions in educational organizations involve identification of student,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    SLA-Based Virtual Machine Management for Mixed Workloads of Interactive Jobs in a Cloud Datacenter

    Efficient provisioning of resources is a challenging problem in cloud computing environments due to its dynamic nature and the need for supporting heterogeneous applications. Even though VM (Virtual Machine) technology allows several workloads to run concurrently and to use a shared infrastructure, still it does not guarantee application performance. Thus,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Cyber Warfare and Terrorism Based on Data Transmission Through Classical Cryptographic and Steganographic Algorithms

    The introduction of Internet has made it easier for everyone to access almost all information from different locations globally. This has made sensitive information prone to attack by malicious attackers. It therefore becomes important to come with measures that can be used to protect data on transmission from falling into...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Experimental Evaluation of Scalability and Reliability of a Multicast Protocol for MANETs

    In this era of social media, real time video multicast over Mobile Ad-hoc NETworks (MANETs) is subject of active research and new products are in use as a result of these research advancements. The authors have earlier proposed a simple and novel approach for multicasting in MANETs that is particularly...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Weighted Fair Queue Based SBPN (WFQ-SBPN) Algorithm to Improve QoS for Multimedia Application in Mobile Ad Hoc Networks

    In this paper, the authors investigate a new technique based on SBPN for congestion avoidance. In this technique, they proposed a new algorithm based on WFQ for improving the QoS for multimedia traffic in MANET. In traditional algorithm used SBPN-FIFO in which data transmitted in which order it's received. In...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Enhancing Virtual Machine Performance in Cloud Using Cache as a Service

    Caching is one of the important concept used for optimizing the performance gap across data hierarchies; in particular, disk storage systems. Cloud applications are generally resource hungry and may consist of high frequency of occasional resource consumption, which are common in the cloud; do benefit the most from caching. There...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Efficient Bandwidth Management and Implementation of Cross-Layer Queuing Model in a Wireless Campus Area Network

    In this paper, the authors investigate the use of an efficient bandwidth management scheme by implementing cross-layer M/M/1 queuing model. Strict Open System Interconnection (OSI) layer to layer communication problem is solved by introducing a common database that automatically synchronizes the status of each OSI layer to all the other...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

    Misbehavior of node represent a serious threat against routing in delay tolerant network. In this paper mainly focus to improve the packet loss during the transmission of packet one to another node and also deal with selfish and malicious node. In this paper introducing a periodically available trusted authority. TA...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Implementation of Secure Wireless Network for Avoiding Black hole Attack

    Mobile Ad-hoc NETwork (MANET) is a temporary infrastructure less network, Due to absence of infrastructure, MANET is vulnerable to attacks such as black hole attack, gray hole attack, wormhole attack, Sybil attack, and route table modification attack. This research is concerned with "Includes a way to produce and implement a...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Survey: Privacy Preserving Data Mining

    Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. The success of data mining relies on the availability of high quality data. To ensure quality of data mining, effective...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Performance Comparision of AODV and DSR Routing Protocols Using Real Time Test-Bed

    A Mobile Ad-hoc NETwork (MANET) is a collection of autonomous wireless nodes without any infrastructure and centralized administration. The main motivation of this work is to analyze AODV and DSR routing protocols based on different performance metrics in a real world environment. This test-bed allows for direct comparisons between ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Simulation Result's for Collabrative Caching Zonal Routing Protocol (CCZRP) for Mobile Adhoc Network: A Research Paper

    In understanding of how individual quality patterns form and impact the social network is proscribed, however it is important for a deeper understanding of network dynamics and evolution. This question is basically unknown, partly, as a result of the issue in getting large-scale society-wide information that at the same time...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Comparative Analysis of Lane Detection Techniques

    In many proposed systems, the lane detection consists of the localization of particular primitives such as markings of the plane of the painted roads. Various challenges like parked and moving vehicle, bad feature lines, shade of trees, buildings and other vehicles, road curvature, uneven lane shapes, integrated lanes, writings and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Eyelids, Eyelashes Detection Algorithm and Hough Transform Method for Noise Removal in Iris Recognition

    The biometric system is based on human's behavioral and physical characteristics. Among all of these, iris has unique structure, higher accuracy and it can remain stable over a person's life. Iris recognition is the method by which system recognize a person by their unique identical feature found in the eye....

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Time Execution Constraints Using Intricate Encryption and Decryption Process for Secure Data Transmission

    The encryption and decryption process is widely investigated and developed for a robust data security which is challenging to crack. Many researchers proposed different types of encryption and decryption algorithms such as DES, AES, RSA, etc., the proposed algorithms are encountered such as deficiency of stoutness and significant amount of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Simple and Efficient Roadmap to Process Fingerprint Images in Frequency Domain

    In the field of computer vision, image enhancement is one of the most important and critical stage, which eventually or indirectly decides the final results in the Boolean form, as far as image recognition or comparison is concern, fingerprint recognition system is also the part of computer vision and considered...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Design Issues and Challenges in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Design and Comparison of Three Rectangular-Slots-Loaded and No Slot-Loaded Square Shaped Micro-Strip Patch Antenna

    In this paper, the authors present a proposed design for square shaped micro-strip patch antenna by cutting three rectangular slots on the surface of the square patch. Using proposed antenna design and probe feeding at proper position they will compare the resultant return loss and VSWR and bandwidth with the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Encrypted Information Hiding Using Audio Steganography and Audio Cryptography

    With the growing importance of the internet, secure transmission of information is crucial. Steganography and cryptography helps in providing this much needed data confidentiality. Steganography hides secret information into a cover medium and cryptography converts data into an unrecognizable form. In this paper, the authors proposed a novel approach for...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Providing Data Security in Cloud Computing Using Novel and Mixed Agent Based Approach

    Determining the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment. In a cloud, user's data is stored in one or more remote server(s) which poses more security challenges for the system. Most important concern is to protect user's sensitive information from other...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Efficient Wireless Channel Estimation Using Alamouti STBC With MIMO and 16-PSK Modulation

    The wireless communication system is better for the new generation of data communication technology, because it facilitates the user to communicate of share information through mobile devices in mobile situation without any leased or dedicated line. This paper field is continuously exploring by the researchers to innovate new techniques to...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Survey on Hierarchical Attribute Set Based Encryption (HASBE) Access Control Model for Cloud Computing

    Cloud computing refers to the application and service that run on a distributed system using virtualized resources and access by common internet protocol and networking standard. Cloud computing virtualizes system by pooling and sharing resources. System and resources can be monitored from central infrastructure as needed. It requires high security...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2014

    Investigating the Influence of Website Design and Its Determinants on the E-Business Success: An Empirical Analysis

    The success for a company performing E-commerce operations on the web is greatly depending on the quality of its website design and its determinants. The literature mentioned that the determinants of a quality website deigns are; website interface, reliability, customer service/customer satisfaction, security and privacy and e-trust. The purpose is...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Comparative Study of Spatial Data Mining Techniques

    Spatial data mining is the process of discovering interesting and previously unknown, but potentially useful patterns from large spatial datasets. Spatial data mining is a mining knowledge from large amounts of spatial data. Spatial data mining algorithms can be separated into four general categories: clustering and outlier detection, association and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Mapping of Semantic Web Ontology in User Query System

    The main purpose of the semantic web promises a kind machine intelligence, which can support a verity of user tasks like efficiency of search engine or Question Answering (QA). Ontologies are needed for realization of the semantic web, which in turn depends on the ability of system to identify and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Mapping of Legacy Relational Data for Semantic Web: A Survey

    Web has transformed the way people communicate with each other and the way business is conducted. Web in its current form is one of the most successful engineering artifacts, but the current technology suffers from limitations with respect to machine understandability. Semantic Web's promise of data integration requires the inclusion...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    An Approach for Designing and Implementing Eager and Lazy Data Replication

    Replication is the storing of copies of the same data in more than one location (site) and then consistently updating these copies. Replication can be a success factor in database systems as well as perhaps being one of the needs of proliferation, expansion, and the rapid progress of databases and...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    SVM Based Feature Extraction for Novel Class Detection From Streaming Data

    World have huge amount of data. Data stream classification contains several problems such as infinite length, concept drift, concept evolution and feature evolution. Infinite length means data available in huge amount and it is difficult to store all historical data for training. Concept evolution occurs as a result of new...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Analysis of Simple K-Means with Multiple Dimensions Using WEKA

    Clustering techniques have more importance in data mining especially when the data size is very large. It is widely used in the fields including pattern recognition system, machine learning algorithms, analysis of images, information retrieval and bio-informatics. Different clustering algorithms are available such as Expectation Maximization (EM), Cobweb, Farthest First,...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Deposit Subscribe Prediction Using Data Mining Techniques Based Real Marketing Dataset

    Recently, economic depression, which scoured all over the world, affects business organizations and banking sectors. Such economic pose causes a severe attrition for banks and customer retention becomes impossible. Accordingly, marketing managers are in need to increase marketing campaigns, whereas organizations evade both expenses and business expansion. In order to...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Comparative Study and Results Analysis of Feature Vector and Adjacency Matrix for Representing FSM for Data Reduction

    A finite state automaton is conceptual graphs which are considered to be an important type of graph method. As a result of the expansion of using the graphs in the process of data mining, the use of FMS is still limited because of the difficulty in processing databases, therefore this...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Performance Evaluation of K-means Clustering Algorithm with Various Distance Metrics

    Cluster analysis has been widely used in several disciplines, such as statistics, software engineering, biology, psychology and other social sciences, in order to identify natural groups in large amounts of data. Clustering has also been widely adopted by researchers within computer science and especially the database community. K-means is the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Detecting and Removing Noisy Data on Web Document Using Text Density Approach

    The web documents content are useful resources for many applications. However, this content could be classified into relevant content and irrelevant content with respect to the involved application. The irrelevant content, like advertisements banner, copyright information, and navigation menus assumed as noisy data. Noisy data that found among the content...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Multipath Routing of Fragmented Data Transfer in a Smart Grid Environment

    In this paper, the authors are to do a general survey on the existing communication modes inside a smart grid, the existing security loopholes and their countermeasures. Then, they suggest a detailed countermeasure; building upon the Jigsaw based secure data transfer for enhanced security of the data flow inside the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Privacy Preserving Association Rule Mining using Horizontally Partition Data: Review Paper

    In data mining is used to extract interested pattern or knowledge from large amount of data using many data mining technique. However it may also display sensitive information about individuals compromising the individual right to privacy when a collection of data is split among various parties. Now each and every...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Knowledge Discovery From Web Usage Data: An Efficient Implementation of Web Log Preprocessing Techniques

    Web Usage Mining (WUM) refers to extraction of knowledge from the web log data by application of data mining techniques. WUM generally consists of web log preprocessing, web log knowledge discovery and web log pattern analysis. Web log preprocessing is a major and complex task of WUM. Elimination of noise...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Technique of Data Fusion for Effective Text Retrieval

    The goal of information retrieval systems is to provide useful information for user's information need. For a collection of documents and a given query, an IR system returns a ranked list of documents. Different IR systems based on IR models such as vector space, smart vector space, extended Boolean, latent...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A Review on Knowledge Discovery Using Text Classification Techniques in Text Mining

    Data mining is process of identify the knowledge from large data set. Knowledge discovery from textual database is a process of extracting interested or non-retrieval pattern from unstructured text document. With rapid growing of information increasing trends in people to extract knowledge from large text document. A text mining frame...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Approach to Determine Non-Filer's of Property Tax Using Clustering and Classification

    Data mining use everywhere successively, it is the knowledge extraction from large data. In this paper, the authors are using clustering and classification methods to mine the data by using hybrid algorithm. They use K-means algorithm from clustering and CART algorithm from decision tree. Clustering method will use for make...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Algorithm to Construct Decision Tree for Machine Learning Based on Similarity Factor

    Data mining is one of the most important steps of the knowledge discovery in databases process and is considered as significant subfield in knowledge management. A classification of the data mining methods would greatly simplify the understanding of the whole space of available methods. Decision tree learning algorithm has been...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Outliers Detection Using Subspace Method: A Survey

    Outliers detection is currently very active area of research in data set mining community. Outliers detection is an important research problem that aims to find objects that are considerably dissimilar, exceptional and inconsistent in the database. In this paper, the authors present a survey of outliers detection techniques using subspace...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    A VPRS Based Approach for Enhancement in the Classification Efficiency of Machinery Datasets

    In this paper, an effective approach is proposed to enhance the classification accuracy of machinery datasets. Since in the today's world of data estimation, data is increasing at explosive rate. At the same time that bulk of data may contain relevant or irrelevant data. Presence of rough data in the...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    The Impact of Virtual Experience and Informative Control on the Enhancement of Product Understanding

    There is no doubt that this way of knowledge delivering affords flexible and instant learning. Thus, many instructors afford online material as hypertexts concerning a set of faces and rules for students to generate a basis to achieve a comprehensive understanding. This paper borrowed the nature of e-learning and applied...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    A New Dynamic Distributed Algorithm for Frequent Item Sets Mining

    Mining for association rules between items in large transactional databases is a central problem in the field of knowledge discovery. It has crucial applications in decision support and marketing strategy. centralized and Distributed Association Rules Mining (DARM) include two phases of frequent itemset extraction and strong rule generation. The most...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Survey on Collaborative Filtering, Content-Based Filtering and Hybrid Recommendation System

    Recommender systems or recommendation systems are a subset of information filtering system that used to anticipate the 'Evaluation' or 'Preference' that user would feed to an item. In recent years E-commerce applications are widely using recommender system. Generally the most popular E-commerce sites are probably music, news, books, research papers,...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2015

    Integration of Policy and Reputation Based Trust Mechanisms in E-Commerce Industry

    The e-commerce systems are being tackled from commerce behavior and internet technologies. Therefore, trust aspect between buyer/seller transactions is a potential element which needs to be addressed in competitive e-commerce industry. The e-commerce industry is currently handling two different trust approaches. First approach consists on centralized mechanism where digital credentials/set...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2014

    Marketing Data Mining Classifiers: Criteria Selection Issues in Customer Segmentation

    Data mining is automated or semi-automated Knowledge Discovery from large amounts of stored data in order to discovering meaningful patterns and rules. Marketing related data mining applied to market segmentation, customer services, credit and behavior scoring, and benchmarking. There are different classifiers including decision tree, ID3, CART, Quest, Neural networks,...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Survey Paper on Pattern Discovery Text Mining for Document Classification

    In text documents data mining techniques have been discovered for mining useful patterns. But there are some questions, how to properly use and update discovered patterns is still an open research issue, specifically in the text mining. Therefore most existing text mining methods have used term-based approaches but they all...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Preprocessing and Classification of Data Analysis in Institutional System Using Weka

    In today's world, an organization generates more information in a week than most people can read in a lifetime. It is humanly impossible to study, decipher, and interpret all that data to find useful information. By applying data mining techniques people can work on the extraction of hidden, historical and...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    An Efficient Approach for Association Rule Mining by Using Two Level Compression Technique

    Association rules are if and then statements that used to reveal relationships between uncorrelated data in a database, relational database or other information repository. One of the most important techniques of data mining is Association rule mining. Association Rule Mining (ARM) is a mining technique to integrate data from large...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2015

    Association Rule Mining Using Improved Apriori Algorithm

    The past few years have seen a marvelous curiosity in area of data mining. Data mining is usually thought of as the process of finding hidden, non trivial and formerly unknown information in large collection of data. Association rule mining is a significant component of data mining. Association rule are...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Protecting Location Privacy in Wireless Sensor Networks Against a Local Eavesdropper - A Survey

    This paper presents the review of the existing privacy techniques in Wireless Sensor Networks (WSN). There are two main categories of privacy preservation in WSN. They are data privacy and the context privacy. This paper presents the context privacy. In context privacy, the authors focus on location privacy. Location privacy...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Efficiency Privacy Preservation Scheme for Distributed Digital Document Using Cache-Cache Mechanism

    In data mining, Privacy preservation plays a major role to provide an efficient communication for the users. Several methods have been employed for privacy preservation scheme they are Secured Multiparty Computation (SMC), Data Transformation Technique (DTT) and Cryptographic Technique. Most of the recent works concentrated on SMC and DTT as...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Comprehensive Exploration for Proposing Hybrid Scheme Upon Congestion Avoidance Algorithms

    Congestion free services are ultimate preference of every network consumer and service providers. Variety of parameters like packet dropping rate, latency, jitter, throughput, bandwidth, fair response of resources, link utilization and queue length are responsible to fabricate or reduce congestion. Current TCP model for high speed networks is unstable and...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Ontology Based Semantic Querying of the Web using Prot?g

    Currently, the Web is primarily composed of documents written in HTML. Information on the web is designed for human consumption. Retrieval of information on web is mostly restricted to keyword searches. This limitation may be overcome by semantic web which is an intelligent and meaningful web proposed by Sir Tim...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Review on Empirical Data Collection and Analysis of Bertoni's Model at 1.8 GHz

    In any kind of network planning it is the central task to estimate and thus analyze propagation characteristics of a radio system through a medium in order to state accuracy in signal parameters for efficient network planning. The system must necessarily incorporate in itself the ability to predict the accurateness...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Data Mining Considering the Instances of Item-Sets

    In the field of computer science, data mining is the process that attempts to discover patterns in large data sets. However it deals mostly with the relationship between two or more item objects. For example A to B, where 'A' and 'B' are the item objects. But in the real...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    An Efficient Key Management Scheme with Key Agreement to Mitigate Malicious Attacks for Wireless Mesh Network

    In the recent times the IT industry has been witnessing rapid development in wireless communication technologies such as 3G, 4G, etc. Wireless Mesh Network is one such promising wireless communication technology which provides high bandwidth internet connectivity in a sizable geographic area at a much lower cost than with classic...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Wi-Rover: A Wi-Fi Controlled Remotely Operated Video Enhanced Receiver

    The aim of the system is to demonstrate the use of wireless digital communication over the internet to control and communicate with a vehicular system. Design a rover which has the capability to navigate based on the commands issued to it remotely by an operator. Rover should provide a communication...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Adaptive Layered Approach Using Machine Learning Techniques with Gain Ratio for Intrusion Detection Systems

    Intrusion Detection System (IDS) has increasingly become a crucial issue for computer and network systems. Optimizing performance of IDS becomes an important open problem which receives more and more attention from the research community. In this paper, A multi-layer intrusion detection model is designed and developed to achieve high efficiency...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    Contextual Ontology: A Storage Tool for Extracting Context from Web Pages

    Contextual ontology helps in the knowledge-full indexing of documents, providing semantic structure to the document. The named entity and the associated keywords can be a clue to the contextual sense of the documents in the corpus. The proposed technique for the information retrieval creates the ecology of ontology which stores...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2012

    A Support to Neuromotor Rehabilitation Based on Multimedia Enhanced Hypnosis

    The proposed work stems from positive tests obtained in the past using hypnosis enhanced by multimedia technology as a learning support for people with cognitive disabilities. The present study intends to test the effectiveness of this technique in patients underlying rehabilitation after cerebral ischemic stroke. Reference is made in this...

    Provided By International Journal of Computer Applications