International Journal of Computer Applications

Displaying 1-40 of 6961 results

  • White Papers // Apr 2015

    Design of Multinode Reconfigurable Network based Multiprocessor Systems on Chip

    Multi-Processor System-on-Chip (MPSoC) platforms are becoming increasingly more heterogeneous and are shifting towards a more communication-centric methodology. Network-on-Chip (NoC) have emerged as the design paradigm for scalable on-chip communication architectures. As the system complexity grows, the problem emerges as how to design and instantiate such a NoC-based MPSoC platform in...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Intelligent Task Allocation in Multi Core Environment

    The architectural advancements in desktop computing have made embedded devices in real-time applications to adopt multi-core architectures. Constrained power availability but ever increasing performance requirements are the main reason for this migration. Failure to allocate tasks to specific cores would result in some tasks running while other tasks in other...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Proposed Approach for Efficient Energy Utilization in Cloud Data Center

    Cloud computing has transmuted the IT industry on the whole and made easy to access the resources from anywhere and at any time. These resources can be accessed as a service rather than as a product. Clients pay for the service used as per their requirement. The huge demand of...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Software Bug Detection Using Data Mining

    The common software problems appear in a wide variety of applications and environments. Some software related problems arises in software project development i.e. software related problems are known as software defect in which software bug is a major problem arises in the coding implementation. There are no satisfied results found...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Performance Analysis of Magnitude Comparator Using Different Design Techniques

    Comparators are a basic design module and element in modern digital VLSI design, digital signal processors and data processing application-specific integrated circuits. This paper comprises of design of three different comparators for 2, 4 and 8-bit magnitude comparison. The above said designs are prepared using two different design approaches: weighted...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Interactive Technologies Utilization Model for University Relationship Marketing Strategies

    In this paper, the authors develop a usage model for interactive technologies for university marketing strategies, using a combination of the Task Technology Fit (TTF) model and the Information Systems Acceptance (ISA) model. Interactive technologies enables the universities to inexpensively engage their customers in one-to-one. Over the years, relationship marketing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Survey on Energy Performance Improvement with Data Aggregation Techniques for WSN

    In the recent advance in science and technology, the communication system has been marching towards quick development. Wireless sensor network is one of the important blocks for communication. The major limiting factors in wireless sensor network are power consumption requirements, life time of network, data integrity and data confidentiality. Data...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    VLSI Implementation of Low Power Area Efficient Fast Carry Select Adder

    Carry SeLect Adder (CSLA) is one of the speedy adders utilized as a part of numerous computational frameworks to perform quick number crunching operations. The carry select adder utilizes an effective plan by imparting the Common Boolean Logic (CLB) term. The modified CSLA architecture building design has created utilizing Binary...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design of NoC Router Architecture Using VHDL

    Network-on-Chip (NoC) is an advance design method of communication network into System-on-Chip (SoC). It provides solution to the problems of traditional bus-based SoC. It is widely considered that NoC will take the place of traditional bus-based design and will meet the communication requirements of next SoC design. A router is...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Spam Detection in Social Media Networks: A Data Mining Approach

    The ubiquitous use of social media has generated unparalleled amounts of social data. Data maybe texts, numbers or facts that is computable by a computer. A particular data is absolutely useless until and unless converted into some useful information. It is necessary to analyze this massive amount of data and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Unsupervised Technique for Web Data Extraction: Trinity

    Search engine is a program which searches specific information from huge amount of data. So, for getting results in an effective manner and within less time this technique is used. This paper is having a technique which depends on two or more web documents which are generated from same server-side...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Task Migration Mechanism in a Homogeneous X86 64bit Multikernel Environment

    Today, the machines are multi-cores and these cores are increasing rapidly. Multi-kernel treats multi-core machine as a network of independent cores. The multi-kernel can handle the challenges of multi-core by running independently kernel instances and finally these kernel instances are cooperating to form a single operating system. The multi-kernel concept...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Stegtorrent Using De-Clustering of Data

    Now-a-days, for uploading and downloading of data using torrent people widely use internet. Existing system was less secure and time consuming. To avoid this problem, steg-torrent using de-clustering of data is implemented. For file transfer service, steg-torrent is a new network steganographic method. To achieve availability and scalability of storage...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Validation of Deduplication in Data Using Similarity Measure

    De-duplication is the process of determining all categories of information within a dataset that signify the same real-life/world entity. The data gathered from various resources may have data high quality issues in it. The concept to identify duplicates by using windowing and blocking strategy. The objective is to achieve better...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Design Space Exploration of DSP Techniques for Hardware Software Co-Design: An OFDM Transmitter Case Study

    In this paper, the authors describe the exploration of design parameters for widely used Digital Signal Processing (DSP) algorithms and techniques. In this paper, some of the DSP algorithms and techniques are considered and executed them on soft-core processors like general purpose processors, digital signal processing processers and also on...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Process Mining by Using Event Logs

    Process mining techniques have usual notable attention within the literature for their ability to help within the re-design of complex processes by mechanically discovering models that specify the events registered in some log traces provided as input. Process mining refers to the extraction of process models from event logs. Now...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Framework for Social Network Data Mining

    Social networks have become a vital component in personal life. People are addicted to social network features, updating their profile page and collaborating virtually with other members have become daily routines. Social networks contain massive collection of data. Web data mining is a new trend in the current research body....

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Improving Current Hadoop MapReduce Workflow and Performance

    In this paper, the authors propose an improvement and implementation of enhanced Hadoop MapReduce workflow that develop the performance of the current Hadoop MapReduce. This architecture speeds up the process of manipulating big data by enhancing different parameters in the processing jobs. Big data needs to be divided into many...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Low Power VLSI Implementation of STTRAM Based TCAM for High Speed Switching Circuits

    Ternary Content-Addressable Memory (TCAM) is often used in high speed search intensive applications such as ATM switch, IP filters. Hence, currently ZTCAM, is introduced which emulates the TCAM functionality with SRAM. It has some drawbacks such as low scalability, low storage density, slow access time and high cost. But, this...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Domain and Language Construct Based Mapping to Convert Natural Language Query to SQL

    DataBase Management Systems (DBMSs) have been widely used for storing and retrieving data. However, databases are often hard to use since their interface is quite rigid in co-operating with users. End user is required to issue SQL query to retrieve information from the database. Thus, a user cannot interact directly...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    High Performance Computing and Big Data Analytics - Paradigms and Challenges

    The advent of technology has led to rise in data being captured, stored and analyzed. The requirement of improving the computational models along with managing the voluminous data is a primary concern. The transition of the high performance computing from catering to traditional problems to the newer domains like finance,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Algorithm to Monitor Suspicious Activity on Social Networking Sites Using Data Mining Techniques

    In today's world, social networks have become a platform to express opinions or feelings related to current events or any other topics. But, sometimes provocative posts related to renowned people, religion, sexuality, countries or any other sensitive topics create havoc in the society. Such posts must be administered and removed...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    A Regression Modeling Technique on Data Mining

    A regression algorithm estimates the value of the target (response) as a function of the predictors for each case in the build data. These relationships between predictors and target are summarized in a model, which can then be applied to a different data set in which the target values are...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Improving the Performance of Read Operations in Distributed File System Using Global Cache Mechanism and Anticipated Parallel Processing

    Distributed File System (DFS) is the main storage component of a Distributed System (DS). DFS provides scalable storage to the DS and it is also the main component of any cloud storage system. Improving the performance of read operations in a DFS is very important as many web-based applications deployed...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Recommender System Based on Learner Knowledge and Opining Using Data Mining Techniques in Synchronous E-Learning Environment

    Learners are often getting uncertainty by the flow of information and have trouble in selecting the material to learn that satisfies their requirements and interests. It is the fact that the learners, learning interest and behavior changes over the time and subject to subject. It is very important, thus, to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Accessing the Data Efficiently Using Prediction of Dynamic Data Algorithm

    The Internet carries an extensive range of information resources and services throughout the world. Without Internet finding a particular thing, or get details of those things is not possible. In this paper, the system focuses on accessing the data efficiently through offline or online. In addition of this paper, the...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    FPGA Implementation of a Modified Turbo Encoder

    Turbo Convolutional Codes (TCC) are excellent error correcting codes, however TCC decoding based on A-Posteriori Probability (APP) algorithm is computationally complex and the complexity is not significantly reduced even if puncturing mechanism is used. To overcome the above disadvantage, turbo codes need to be concatenated with other coding techniques such...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Predicting Examination Results Using Association Rule Mining

    Higher education has changed a lot in the last decade. The use of various innovative techniques and technologies, especially ICT in teaching learning process is increasing day-by-day. Number of information systems has been developed and successfully implemented to support educational processes. These systems typically capture almost every data regarding a...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Bisecting K-Means for Clustering Web Log data

    Web usage mining is the area of web mining which deals with extraction of useful knowledge from web log information produced by web servers. One of the most important tasks of Web Usage Mining (WUM) is web user clustering which forms groups of users exhibiting similar interests or similar browsing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Synchronous CR-OLAP Tool for Efficient Parallel Computing

    Real Time OLAP (OnLine Analytical Processing), or RTOLAP, is the capability to quickly retrieve, aggregate, analyze and present multidimensional data for cubes whenever there are changes to the data in the relational data sources, without having to run heavy processing on the cube. A big advantage of real time OLAP...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Fuzzy Goal Programming Approach to Solve Linear Multilevel Programming Problems using Genetic Algorithm

    In this paper, the authors introduce a priority based Fuzzy Goal Programming (FGP) method for modelling and solving MultiLevel Programming Problem (MLPP) through Genetic Algorithm (GA). In model formulation, the individual best solution of objectives of each of the Decision Makers (DMs) is determined by using the GA method for...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Efficient Data Dissemination Techniques in VANETs: A Review

    Vehicular Ad hoc NETworks (VANETs) being a sub class of MANET is a challenging field of wireless communication. It is a sensible way of using infrastructure fewer networks augmented with Intelligent Transportation System (ITS). It is an emerging trend now-a-days for vehicles to be equipped with an embedded on-board computing...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2015

    Review on Fault Tolerance Techniques in Cloud Computing

    With the immense growth of internet and its users, cloud computing, with its incredible possibilities in ease, quality of service and on-interest administrations has turned into a guaranteeing figuring stage for both business and non-business computation customers. It is an adoptable technology as it provides integration of software and resources...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details

    On everyday operations there is need to engage agents to perform some duties on their behalf, hence they are gaining acceptance as a technology and are being used. Most of the networked offices, networked homes, cyber cafes, learning institutions and other arenas where computers are interconnected on a Wi-Fi network,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on Efficient Clustering Methods with Effective Pruning Techniques for Probabilistic Graphs

    In this paper, the authors provide a survey on K-NN queries, DCR query, agglomerative complete linkage clustering and extension of edit-distance-based definition graph algorithm and solving decision problems under uncertainty. This existing system give an beginning to graph agglomeration aims to divide information into clusters per their similarities, and variety...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Verification of Reversible Logic Gates using Quantum Dot Cellular Automata

    In this paper, the authors portray the designing of reversible logic gates through the use of Quantum dot Cellular Automata (QCA) which is a nanotechnology concept and also a striking substitute for transistor based technologies. This technology helps them to rise above the confines of CMOS technology. It also gives...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Integrating Knowledge Management and Business Intelligence Processes for Empowering Government Business Organizations

    Emergence of information technologies has transformed the way business marketing is done and how business enterprises are managing the resources and information. Trend of globalization has induced the fierce competitiveness among business enterprises within domestic and international markets. The major quest for the technologies is not limited to strategic value...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An RTOS based Industrial Wireless Sensor Network using Multiprocessor Support

    RTOS (Real Time Operating System) is a process which is done between hardware and application in order to provide time constraints. Each industry has their own priority among the various tasks according to their process. RTOS is used here to assign the priorities. The values obtained in plant have to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Bee Colony based Multi-Objective Load Balancing Technique for Cloud Computing Environment

    With the recent development of open cloud systems a surge in outsourcing assignments from an internal server to a cloud supplier has been seen. The cloud can facilitate its clients enormous resources hence even during heavy load conditions. Since the cloud needed to be handle multiple clients workload at same...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Query based Recommendation and Gaussian Firefly based Clustering Algorithm for Inferring User Feedback Sessions with Search Goals

    In web search based applications, queries are suggested by users to search and investigate web search engines information requirements regarding user. However the queries submitted by user sometimes might not easily understood by search engines, since queries submitted by user might be short representation and should not precisely characterize users'...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Resource Scheduling in Cloud using Bacterial Foraging Optimization Algorithm

    Cloud computing is a form of parallel and distributed computing that consists of interconnected and virtualized computers. Resource scheduling in cloud computing is considered to be a complex task since multiple copies of the same tasks are assigned to different computers. Bacterial foraging optimization algorithm is a global optimization algorithm...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Proposed Framework of Private Cloud Setup in Lab for Teaching and Research

    Advancement in the field of information technology has enabled the authors to optimize the use of physical infrastructure with the help of virtualization, most of which is only used in specific applications like vitalizing a local area network on switch or vitalizing a compute resource to run more than one...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Comprehensive Study of Challenges and Approaches for Clustering High Dimensional Data

    Clustering is one of the most effective methods for summarizing and analyzing datasets that are collection of data objects similar or dissimilar in nature. Clustering aims at finding groups, or clusters, of objects with similar attributes. Most clustering methods work efficiently for low dimensional data since distance measures are used...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Encoding Binary Images using Cellular Automata for Data Compression

    Taking into account the rapid development of science and technology, especially the rate of growth of information volumes, there is a need for rapid processing and finding the necessary useful information. In this paper, the author proposes a method for efficient coding of images using cellular automata. This method allows...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2010

    Applicability of Clustering and Classification Algorithms for Recruitment Data Mining

    Recruitment of appropriate employees and their retention are the major concerns towards creating the competitive strength in the knowledge economy. Every year IT companies recruit fresh graduates through their campus selection programs after examining their skills by conducting tests, group discussion and a number of interviews. The recruitment process requires...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2010

    A Frequent Concepts Based Document Clustering Algorithm

    This paper presents a novel technique of document clustering based on frequent concepts. The proposed technique, FCDC (Frequent Concepts based Document Clustering), a clustering algorithm works with frequent concepts rather than frequent items used in traditional text mining techniques. Many well known clustering algorithms deal with documents as bag of...

    Provided By International Journal of Computer Applications

  • White Papers // Feb 2014

    Fuzzy Based Tuning Congestion Window for Improving End-to-End Congestion Control Protocols

    Transmission Control Protocol (TCP) is the transport-layer protocol widely used in the internet today. TCP performance is strongly influenced by its congestion control algorithms which limit the amount of transmitted traffic based on the estimated network capacity to avoid sending packets that may be dropped later. In other words Congestion...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    D-Apriori: An Algorithm to Incorporate Dynamism in Apriori Algorithm

    Apriori algorithm mines the data from the large scale data warehouse using association rule mining. In this paper a new algorithm named as Dynamic Apriori (D-Apriori) algorithm is presented. The proposed D-Apriori algorithm incorporates the dynamism in classical Apriori for efficiently mining the frequent itemsets from a large scale database....

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Hybrid Rough Sets and Particle Swarm Optimization Application in Data Mining

    Optimization becomes a very important methodology appear in scientific life. It can be applied in many different application fields, like telecommunications, data mining, design, combinatorial optimization, power systems and Electronic circuits. Development of electronic circuit is a complex process that needs some simplification that may be difficult to be done...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Performance Evaluation of Virtual Environment with Respect to Physical Environment

    Virtualization is the most emerging technology of this decade in which advancement is taking place exponentially. Day-by-day virtualization is gaining a lot of popularity as it increases the hardware utilization and provides an easy management of the infrastructure. Virtualization is the foundation of cloud computing and forms the base for...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Memory Cutback for FP-Tree Approach

    The pattern growth approach of association rule mining is very efficient as avoiding the candidate generation step which was utilized in Apriori algorithm. Here, revisited of the pattern growth approaches are done to improve the performance using different criteria like item search order, conditional database representation and construction approach and...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Selective Compression Techniques Using Variable-to-Fixed and Fixed-to-Variable Codes

    System-on-Chip (SoC) revolution challenges both the fields of designing and testing, as it nowadays integrates multiple cores on a single piece of silicon to bring about a wide range of functionality on a single die. With the number of transistors increasing rapidly, chips emerge with billions of transistors, and this...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Energy Efficient Clustering Algorithm for Wireless Sensor Networks Using Fuzzy Logic

    The network lifetime is an important issue for employing wireless sensor networks in space and extreme environments. This is due to the fact that the sensing node energy is mainly consumed by transmissions. For maximizing the network lifetime in this paper a multi-hop clustering algorithm using the fuzzy logic improvement...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Design of Cloud Based Instant Messaging System on Android Smartphone Using Internet

    Cloud based instant messaging system for android Smartphone with help of internet is specially design for the people to communicate with their families, friends, and collage. In any organization employees can send and receive messages virtually without face to face contacting; meanwhile the employees can share data and information through...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    A Systematic Mapping Study on Cloud Computing Security

    From last two decades hype of cloud computing has been increased largely. With all of its advantageous cloud computing has some potential disadvantages. One of which is security. Cloud computing security has been discussed by many researchers. The researchers are paying their much attention about security of cloud computing. In...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    A Framework for Optimizing the Response Quality of Services in Mobile Cloud Computing Systems

    The concept of mobile cloud computing was introduced shortly after launching the cloud computing platform. Since then, with the increasing use of Smartphone's and access to the fast and reliable wireless Internet, people are more interested in using mobile applications and also cloud computing platform to have their required services....

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    GPU Matrix Sort (An Efficient Implementation of Merge Sort)

    Sorting is one of the frequent used operations in computer science. Due to highly parallel computing nature of GPU architecture; it can be utilized for sorting purpose. The authors have considered the input array that is to be sorted in a 2D matrix form and applied a modified version of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Computational Method to Quantify the Evolution of Ocean Properties

    Understanding the recent trends in observable changes of the ocean physical and chemical properties is of great importance in order to foresee their future evolution and to quantify the probable contribution of anthropogenic pressure to these changes. For that matter, it is necessary to consider new methods and concepts for...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Extracting Knowledge Concerning Digital Literacy by Using a Predictive Model in Data Mining

    Now-a-days, with considering changes and developments, vast amount of information and the production of unimaginable level of knowledge in different fields of science, everybody requires to learn skills and capabilities beyond the traditional literacy to keep up with these changes and developments, particularly in use of information the key to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Term Importance Degree Impact on Search Result Clustering

    As well actual clustering algorithms have to deal with explosive growth of documents of various sizes and terms of various frequencies, an appropriate term-weighting scheme has a crucial impact on the overall performance of such systems. Term-weighting is one of the critical processes for document retrieval and ranking in most...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Low Power Magnitude Comparator Circuit Design

    Now-a-days, low power design has become a critical need of technologies due to high demand of portable devices. The magnitude comparator is one of the fundamental arithmetic components of digital system with many applications such as: Digital Signal Processors (DSP) for data processing, encryption devices and microprocessor for decoding instruction....

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues

    Mobile Cloud Computing (MCC) is an emerging technology for mobile services gives new horizon to the IT industry and traditional Internet computing paradigm. It integrates the advantages of the cloud computing and the mobile communication environment. It also carries necessary issues related to network latency, limited bandwidth, availability, heterogeneity, privacy...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Optimized Agglomeration Algorithmic Rule to Uncover User Pattern Applying on Weblog Knowledge

    These days, event logs contain immense amounts of knowledge that may simply overwhelm a personality's. Consequently, mining content from the phenomenon of logs is accepted as a crucial function for the system management. This paper presents a completely unique clump rule for log file information sets that helps one to...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Scalability of Parallel Genetic Algorithm for Two-Mode Clustering

    Data matrix having the same set of entity in the rows and columns is known as one-mode data matrix, and traditional one-mode clustering algorithms can be used to cluster the rows (or columns) separately. With the popularity of use of two-mode data matrices where the rows and columns have different...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Identity Based Distributed Data Storage Using Digital Signature and Diffie Hellmann Key Exchange Mechanism

    The widespread use of Internet has increased the demand for computing. Grid computing is a large scale heterogeneous distributed system which helps in sharing of resources such as data storage, computational power, network dynamically. Grid security is an important component of computational grid infrastructure grid security solutions addresses critical requirements...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Applications of GIS in Business Decision Making: The Case of Egypt

    In this paper, the authors design a geospatial database that can help decision makers select the most perfect locations. This paper also analyzes GIS application with special reference to business administration. The decision makers in business can easily visualize or trace the result that can support the decision making process...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Enhancing the Performance of GPU for Face Detection

    Face detection and tracking is one of the fast-growing subjects in computer vision world, and one of the most processing intensive algorithms due to the variations in the face features. Computer Vision algorithms are considered computationally intensive problems. Face detection is one of the most complex objects to detect due...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Survey on Feature Selection for Data Reduction

    The storage capabilities and advanced in data collection has led to an information load and the size of databases increases in dimensions, not only in rows but also in columns. Data Reduction (DR) plays a vital role as a data prepossessing techniques in the area of knowledge discovery from the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Mobile Stand-Alone Application Code Off-Loading: Architecture and Challenges

    Dynamically migrating code for execution from a device to a remote server has been a topic of active research for nearly a few years now. With the advent and the rapid growth of mobile devices, this area has been extended to mobile operating systems. Although mobile devices such as phones...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Distributed Sequential Pattern Mining: A Survey and Future Scope

    Distributed sequential pattern mining is the data mining method to discover sequential patterns from large sequential database on distributed environment. It is used in many wide applications including web mining, customer shopping record, biomedical analysis, scientific research, etc. A large research has been done on sequential pattern mining on various...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Analysis of Fuzzy Clustering Methods

    Fuzzy logic is an organized and mathematical method of handling inherently imprecise concepts through the use of membership functions, which allows membership with a certain degree. It has found application in numerous problem domains. It has been used in the interval [0, 1] fuzzy clustering, in pattern recognition and in...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Falcon-AO++: An Improved Ontology Alignment System

    With the semantic web, data becomes machine-readable and ontologies define the data. Ontologies in any domain are heterogeneous due to rapid increase in ontology development and differences in views of developers. Agents can fully understand the data only if the correspondences between ontologies are known. Various ontology alignment systems have...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment

    Day-by-day increasing traffic on internet introduces the requirement of load balancing concept to get the most utilization of the resources available on Cloud. There are so many complex calculations and concepts implemented to achieve better and better resource utilization and performance. Out of all this complexity the round-robin algorithm provide...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Extension of MAC Protocol for Mobility Detection and Efficient Data Transmission

    In this paper, the authors introduce an extension of MAC protocol for mobility detection of nodes and efficient data transmission in mobile, multihop wireless sensor network. Here for mobility detection, receiving power of the node is consider by the transmitting node. If gradual degradation in communication link does due to...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Mining Web Access Patterns using Root-set of Suffix Trees

    With the rapidly growing uses of World Wide Web (WWW) for various important and sensitive purposes it becomes a sensible necessity to find out the interesting web access patterns from the web access sequences tracked by users frequently. Web access sequential patterns can be used to achieve business intelligence for...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Effective Incentive Compatible Model for Privacy Preservation of Information in Secure Data Sharing and Publishing

    Privacy preserving is one of the most important research topics in the data security field and it has become a serious concern in the secure transformation of personal data in recent years. For example, different credit card companies and disease control centers may try to build better data sharing or...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Parallel Lexical Analysis of Multiple Files on Multi-Core Machines

    Compiler is a complex program that translates source program written in one language into an equivalent program in target language. The multi-core machines open new doors to achieve parallelism in single machine. This new architecture has influenced every field of computing. Parallel compilation is one of the areas that still...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Enhanced Web Mining Technique To Clean Web Log File

    The arrival of the computer technology has contributed the ability to produce and store the massive amounts of data. Now the world is not confined only to manually generated files or reports, but has become a giant store where vast amounts of data are collected and exchanged daily. Web pages...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    New Design Principles for Effective Knowledge Discovery from Big Data

    Big data is creating hype in IT industry. Knowledge discovery from big data can allow organizations to have deeper insights, look at the bigger picture and project big returns. There are various principles that have been presented for knowledge discovery from big data by ORNL (Oak Ridge NationaL university), USA....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Optimal Round Robin CPU Scheduling Algorithm using Euclidean Distance

    CPU scheduling is an essential operating task. The performance of round robin CPU scheduling algorithm is entirely dependent on the time quantum selected. This paper describes a new method to calculate the time quantum without user intervention by finding the relationship between the burst times of all processes in the...

    Provided By International Journal of Computer Applications