International Journal of Computer Applications

Displaying 1-40 of 6558 results

  • White Papers // Apr 2015

    Design of Multinode Reconfigurable Network based Multiprocessor Systems on Chip

    Multi-Processor System-on-Chip (MPSoC) platforms are becoming increasingly more heterogeneous and are shifting towards a more communication-centric methodology. Network-on-Chip (NoC) have emerged as the design paradigm for scalable on-chip communication architectures. As the system complexity grows, the problem emerges as how to design and instantiate such a NoC-based MPSoC platform in...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Mobile Agent based System for Listing Fundamental Wi-Fi Peer-to-Peer Network Details

    On everyday operations there is need to engage agents to perform some duties on their behalf, hence they are gaining acceptance as a technology and are being used. Most of the networked offices, networked homes, cyber cafes, learning institutions and other arenas where computers are interconnected on a Wi-Fi network,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on Efficient Clustering Methods with Effective Pruning Techniques for Probabilistic Graphs

    In this paper, the authors provide a survey on K-NN queries, DCR query, agglomerative complete linkage clustering and extension of edit-distance-based definition graph algorithm and solving decision problems under uncertainty. This existing system give an beginning to graph agglomeration aims to divide information into clusters per their similarities, and variety...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Verification of Reversible Logic Gates using Quantum Dot Cellular Automata

    In this paper, the authors portray the designing of reversible logic gates through the use of Quantum dot Cellular Automata (QCA) which is a nanotechnology concept and also a striking substitute for transistor based technologies. This technology helps them to rise above the confines of CMOS technology. It also gives...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Integrating Knowledge Management and Business Intelligence Processes for Empowering Government Business Organizations

    Emergence of information technologies has transformed the way business marketing is done and how business enterprises are managing the resources and information. Trend of globalization has induced the fierce competitiveness among business enterprises within domestic and international markets. The major quest for the technologies is not limited to strategic value...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An RTOS based Industrial Wireless Sensor Network using Multiprocessor Support

    RTOS (Real Time Operating System) is a process which is done between hardware and application in order to provide time constraints. Each industry has their own priority among the various tasks according to their process. RTOS is used here to assign the priorities. The values obtained in plant have to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Bee Colony based Multi-Objective Load Balancing Technique for Cloud Computing Environment

    With the recent development of open cloud systems a surge in outsourcing assignments from an internal server to a cloud supplier has been seen. The cloud can facilitate its clients enormous resources hence even during heavy load conditions. Since the cloud needed to be handle multiple clients workload at same...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Query based Recommendation and Gaussian Firefly based Clustering Algorithm for Inferring User Feedback Sessions with Search Goals

    In web search based applications, queries are suggested by users to search and investigate web search engines information requirements regarding user. However the queries submitted by user sometimes might not easily understood by search engines, since queries submitted by user might be short representation and should not precisely characterize users'...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Implementation of a GUI based Offline GIFT Tool to Exchange Data between different Systems

    Multiple Choice Questions or MCQs are very important for e-learning. Many MCQ tools allow the users to generate MCQs very easily. However, in most of the cases they are not portable. That means MCQs generated for one system cannot be used for other unless a common format is used. So,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Secure SOA Framework for Multi-Cloud Storage and Computing

    Distributed computing is a swearing up and down to technology to encourage advancement of extensive scale, on-interest, adaptable figuring foundations. Anyhow without security implanted into imaginative engineering that backings distributed computing, organizations are setting themselves up for a fall. The pattern of every now and again receiving this engineering by...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Automatic Obligation Generation and Monitor System for Privacy Policy to DBMS

    Data stored in the database includes personnel and sensitive data. Privacy policies in the database management system can control collection, access and disclosure of data. Policies are used to specify obligation. Obligation is certain actions or condition which has to be satisfied for accessing data. This paper is to enable...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Real Time Motion Detection using Dynamic Camera

    Video surveillance systems are a very important in the modern times. Now-a-days, security of valuable and secret assets is very important for large organization companies. Need of an efficient and reliable security system is cause due to limitation of human resources and man power. High level surveillance system for security...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Multi-Threaded Test Automation Framework for Testing Data-Centric Applications using Data Processing Algorithms

    Testing data-centric applications is always a challenging and a time consuming task. The goal of this paper is to present a test automation framework for testing data warehouse and business intelligence applications using an open source test automation tool. An Implementation methodology for multithreaded test execution is being explained that...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Cloud Commerce: A Drift from E-Commerce to Cloud

    Electronic commerce is internet based commerce, which is rapidly developing throughout the globe. The adaption of cloud computing services in electronic commerce had improved tremendously the ease and use of the E-commerce. The vendors of E-commerce are already adopting the cloud services such as Supply chain management, Platform-as-a-Service (PaaS) to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Modeling Implementation of TBDSA-Token based Data Security Algorithm in Cloud Computing

    Security during data transmission in cloud computing using TBDSA (Token Based Data Security Algorithm) along with its implementation is presented in this paper. The auto-generated token based certificate activation approach with SSL (Secure Socket Layer) provides the appropriate collaboration between the cloud client and the cloud service provider, so that...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on MAC Protocols for Data Collection in Wireless Sensor Networks

    Data collection is the most basic task in wireless sensor networks. A wireless sensor network consists of large numbers of nodes which collects data and then forwards collected data to sink. An important area of research in WSN is energy conservation. Medium Access Control (MAC) protocols plays vital role in...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Relative Performance Analysis of Different CMOS Full Adder Circuits

    Different adder circuits are elementary blocks in many contemporary integrated circuits, which are not only employed to perform addition operations, but also other arithmetic operations such as subtraction, multiplication and division. Full adder is the basic building block of any adder circuit. Area, speed and power are the three main...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Applications of Data Mining in Correlating Stock Data and Building Recommender Systems

    Data mining is the process of discovering hidden patterns, trends and knowledge from large data stores which can't generally be found by simple analysis of databases. Data mining uncovers unknown patterns, and new rules from large databases between objects that are potentially useful in making crucial business decisions. It applies...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Learning based Clustering for the Automatic Annotations from Web Databases

    Rapid increase of use of internet provides knowledge extraction from the web databases and HTML pages associated with it. Although there are various techniques implemented for the access of the annotations of the search results from the web databases. Here in this paper, by identifying the problems with the existing...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Proposed Data Mining Framework for Higher Education System

    Educational data mining is concerned with the development methods for exploring the unique types of data that come from the educational context. Furthermore, educational data mining is an emerging discipline that concerned with the developing methods for exploring the unique types of data that come from the educational context. This...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Windows and Linux Random Number Generation Process: A Comparative Analysis

    Random number generation plays a critical role in cryptography and cryptanalysis. It is essential for many cryptographic tasks such as keys generation, initialization vectors, and cryptographic nonce. In this paper, the authors explore and analyze the structure and functions of Random Number Generator (RNG) in Windows and Linux operating systems....

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Review of Error Rate and Computation Time of Clustering Algorithms on Social Networking Sites

    Data mining is a method of finding useful patters from large volumes of data. It is an extension of traditional data analysis and statistical approaches. Data clustering is a task of grouping a set of items or objects into subsets (called clusters). It is an algorithm to discover the similarity...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Enhancing Proxy Server Cache Management using Log Analysis and Recommendations

    Now-a-days, web based applications are growing rapidly due to this the network performance is affected significantly. Thus a performance improvement technique is required by which the application speed is maintained and delivers the high performance web pages. Thus pre-fetching techniques are applied. There are various kinds of pre-fetching techniques are...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    NASLA: Novel Auto Scaling Approach based on Learning Automata for Web Application in Cloud Computing Environment

    Considering the growing interest in using cloud services, the accessibility and the effective management of the required resources, irrespective of the time and place, seems to be of great importance both to the service providers and users. One of the best ways for increasing utilization and improving the performance of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Automated Check-Post on Cloud using BigData Analysis with Web Service Security

    In this real world each and every check post perform the same operation. But the operation must be done manually. This operation includes various parameters. The manual operation of the check post requires the man power in order to perform the operations such as opening the gate, closing the gate,...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Techniques for Low Power and Area Optimized VLSI Testing using Novel Scan Flip-Flop

    Power consumption of any circuit is high during test mode than its normal mode of functioning. Different techniques are proposed to reduce the test power. This paper presents the consolidated research work carried to reduce the test power. Usually the power dissipation is due to the sequential and combinational elements...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Conflict Identification and Resolution in Heterogeneous Datasets: A Comprehensive Survey

    Data integration has become the vital necessities of today's interconnected world. Information is scattered everywhere and to retain the strategic advantage, it becomes mandatory for organizations to obtain as much information as possible. Hence combining the scattered data sources to obtain information becomes the only solution. Data integration is posed...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Design and Implementation of an Algorithm to Enhance Cloud Security

    Cloud computing concept has been envisioned as architecture of the next generation for Information Technology (IT) enterprise. The cloud computing idea offers with dynamic scalable resources provisioned as examine on the Internet. It allows access to remote computing services and users only have to pay for what they want to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Fast Edge Detection Architecture using Different Levels of Parallelism on a FPGA

    Implementing edge detection techniques on a FPGA has recently become more popular since it benefits high speed which is desired for real-time applications. This paper presents a fast FPGA-based architecture for first order derivative edge detection methods. Fast pipeline-based architectures are presented which are able to perform edge detection using...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Survey on Fraud Detection Techniques in Ecommerce

    E-commerce becomes popular for online shopping, banking, financial institution and government. Fraudulent activity exits in many areas of businesses and the people daily life. Such activities are most prevalent in telecommunication, credit card fraud detection, network intrusion, finance and insurance and scientific applications, billions of dollars are loss every day...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Community Kernels Detection in OSN using SVM Clustering and Classification

    Security is an important issue in online social networking web sites. Here in OSN users can post their messages publicly on wall. In OSN a person may be attached to a community and can post any message on their friend's wall, hence it is necessary to check the validity of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    VHDL Realization of Hybrid Control Strategy for a Nonlinear System

    The process industries are automated to keeping in tune with the changing requirements. It creates the need of a well-defined philosophy to cater to the extent of sophistication. The scheme projects a mechanism to adapt to the evolving scenario and orient a strategy to accomplish the desired objective. A conical...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Frequent Patterns Analysis using Apriory: A Survey

    In applications such as location-based services, natural habitat monitoring, web data integration, and biometric applications, the values of the underlying data are inherently noisy or imprecise. Consider a location-based application that provides querying facilities on geographical objects (e.g., airports, vehicles, and people) extracted from satellite images. Due to the errors...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Efficient Storage Management over Cloud using Data Compression without Losing Searching Capacity

    Now-a-days, due to social media, people may communicate with each other, share their thoughts and moments of life in form of texts, images or videos. The authors are uploading their private data in terms of photos, videos, and documents on internet websites like Facebook, WhatsApp, Google+ and YouTube etc. In...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Novel Design of SET-CMOS Half Subtractor and Full Subtractor

    Single electron transistor have high integration density, ultra-low power dissipation, ultra-small size, unique coulomb blockade oscillation characteristics which makes an attractive technology for future low power VLSI/ULSI systems. The single electron transistor have extremely poor driving capabilities so that direct application to practical circuits is a yet almost impossible, to...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Study of SQL of Injections Techniques and their Prevention Methods

    Rapid evolution of technology and increasing necessity of storing data and securing it as well gave rise to various techniques to secure it along with the new innovative malicious techniques to have a hazardous impact on the organization by wrecking the database and manipulating data. In this paper, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    An Energy-Saving Routing Algorithm for Wireless Body Sensor Network using Data Compression Technique

    A Wireless Sensor Network (WSN) is used to monitor the environmental condition. There consist of N number of sensor nodes which are connected to each other and they are clustered in to different groups. There have a Cluster Head (CH) which is used to manage the Cluster Members (CMs). when...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    Improving the Life of the Wireless Sensor Network using Energy Harvesting Clustering

    In the modern era, Wireless Sensor Network (WSN) has seen new horizons among the research community. It has largest range of applications in most of the fields. Its beauty lies in its application area and it can be deployed anywhere. WSN has low cost, low power sensor nodes, can be...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Secure Private Cloud Server Implementation for Data Storage

    Cloud computing has recently reached popularity in computer networking world which provide centralized data storage service, remote accessibility and many more cloud is very new, safe, and advanced technology it provides remote access service and centralized data storage service to the cloud consumers and its domain client in cloud. This...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2015

    A Concern Towards Data Security in Cloud Computing

    Cloud computing is one of the emerging innovative trend of IT technology today. This trend has got remarkable advancement in computing world. Although cloud is boon to computing world but its adoption in IT sector is lack behind due to many issues. In this paper, the authors focus on most...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Correlation-Based Attribute Selection Using Genetic Algorithm

    Integration of data sources to build a Data Warehouse (DW), refers to the task of developing a common schema as well as data transformation solutions for a number of data sources with related content. The large number and size of modern data sources make the integration process cumbersome. In such...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2010

    A Novel Methodology for Benchmarking the Hypervisors over Heterogeneous Workloads - Multi Vari Approach

    This paper is to implement the Multivari approach along with Design Of Experiment (DOE) framework to effectively benchmark the hypervisors over heterogeneous workloads. Multivari approach determines the interaction effect very easily for many factors at a time by keeping panel parameter constant. This experiment has given a very interesting way...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Mining Access Patterns Using Clustering

    Web usage mining is an application of data mining techniques to discover usage patterns from web data, in order to understand and better serve the needs of web based application. The aim of this paper is to discuss about a system proposed which would perform clustering of user sessions extracted...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Algorithms to Optimally Use Hardware Forwarding Resources in a Router Domain

    Routers and forwarders in a router domain would likely have different amount of hardware Resources. The least capable switch should not hold the performance of the Router network domain to ransom. This write up lists some smart choices the forwarders and routers in the Router domain can make to most...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Teaching Parallel Programming for Time-Efficient Computer Applications

    Academic research and engineering challenge both require High Performance Computing (HPC), which can be achieved through parallel programming. The existing curricula of most universities do not properly address the major transition from single-core to multi-core systems and sequential to parallel programming. They focus on applying Application Program Interface (API) libraries...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Comparative Study of Apriori Algorithms for Parallel Mining of Frequent Itemsets

    Apriori algorithms are used on very large data sets with high dimensionality. Therefore parallel computing can be applied for mining of association rules. The process of association rule mining consists of finding frequent item sets and generating rules from the frequent item sets. Finding frequent itemsets is more expensive in...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Data Compression Considering Text Files

    Lossless text data compression is an important field as it significantly reduces storage requirement and communication cost. In this paper, the focus is directed mainly to different file compression coding techniques and comparisons between them. Some memory efficient encoding schemes are analyzed and implemented in this paper. They are: shannon...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Application Specific Cache Simulation Analysis for Application Specific Instruction set Processor

    An efficient simulation of Application Specific Instruction-set Processors (ASIP) is a challenging onus in the area of VLSI design. This paper reconnoiters the possibility of use of ASIP simulators for ASIP Simulation. This proposed paper allow as the simulation of the cache memory design with various ASIP simulators like Simple...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Achieving Better Compression Applying Index-based Byte-Pair Transformation before Arithmetic Coding

    Arithmetic coding is used in many compression techniques during the entropy encoding stage. Further compression is not possible without changing the data model and increasing redundancy in the data set. To increase the redundancy, the authors have applied Index based Byte-Pair Transformation (BPT-I) as a pre-processing to arithmetic coding. BPT-I...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    A Secure Multi-Tenant Model for SaaS System

    World Wide Web is working as a fuel to the systems like SaaS. SaaS shares both the application delivery model and the business model. It provides the customers to access the application using a web browser. It provides better scalability to users. SaaS applications mostly support multi-tenant system to provide...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Multi-Agent based Sequence Algorithm for Detecting Plagiarism and Clones in Java Source Code using Abstract Syntax Tree

    Plagiarism and clone detection plays an important role in software security protection, software maintenance and license issues. Source-code similarity detection method can be classified as string-based, token-based, parse-tree-based and program-dependency-based. All of these approaches have certain limitations and cannot meet the requirements when the source code is large and may...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    A Framework based on Authentication and Authorization to ensure Secure Data Storage in Cloud

    The new era of computing has arrived i.e. cloud computing. The arrival of cloud computing is beginning of transformation in IT Industry because of its low cost, high accessibility, high performance and also other characteristics. In this technology user can access services reside in the remote servers maintained by third...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Securing Data Storage on Cloud by Extending Role based Access Control

    Role-Based Access Control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management and ability to model organizational structure and their capability to reduce administrative expenses. In this paper, the authors highlight the drawbacks of RBAC models in terms of...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    A Dashboard of an Education Data Portal using Big Data Solutions

    An Educational Data Portal (EDP) play important role in teaching and learning as it contains useful resources. Every big educational institution such as university shall build an EDP soon or later. The aim of this paper is to utilize big data solutions in building a dashboard for an education data...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Intrusion Detection and Prevention System for Cloud Simulation Environment using Hidden Markov Model and MD5

    Any activity aimed at disrupting a service or making a resource unavailable or gaining unauthorized access can be termed as an intrusion. Intrusion Detection Systems (IDSs) play a key role in detecting such malicious activities and enable administrators in securing network systems. The cloud computing platform gives people the opportunity...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2014

    Secure Cloud Architecture based on YAK and ECC

    In the present scenario security is biggest issue over internet cloud computing acronym is served everywhere in fast and growing computer generation. So security over the cloud is prime concern .In this paper YAK and ECC are security measures use over the cloud YAK is an asymmetric key cryptography. Whereas...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Analysis of Different Data Mining Tools Using Classification, Clustering and Association Rule Mining

    Data can be in any form like facts, text or numeric which can be computed by computer. This data when converted to meaningful data becomes information. Knowledge is nothing but useful information. Data mining is process of finding knowledge from huge collection of data. It has various methods to extract...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

    The term data security refers to the degree of resistance of protection given to information from unintended or unauthorized access. The core principles of information security remain the same - confidentiality, integrity and availability also referred as CIA triad. With cloud adoption the confidential enterprise data is moved from organization...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Performance Improvement Through Parallelization of Graph Clustering Algorithm

    Clustering is defined as dividing elements in to groups called clusters. Clustering task has been used in many fields including image/video processing, machine learning, data mining, biochemistry and bioinformatics etc. Different types of clustering algorithms have been developed like partitional, hierarchical, graph-based clustering etc. according to the properties of the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Association Rule Mining Model for Finding the Interesting Patterns in Stock Market Dataset

    In these days, stock market forecasting is one of the most interesting issues, which has gained a more attention due to vast profits. To precisely predict the price of share and making profits has been always challenging task since the longest period of time. This has engrossed the interest and...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Performance Analysis for Crowdsourcing Context Submission Using Hierarchical Clustering Algorithm and Classification

    Crowdsourcing, text mining and information retrieval are closely related with each other. Crowdsourcing is widely used for information retrieval and information retrieval is distributed form of text mining. Text mining is nothing but using data mining techniques for using useful patterns from unstructured data. In the data mining concept one...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Information Retrieval Using Natural Language Interfaces

    Database systems are designed to manage large bodies of information. A DataBase Management System (DBMS) is designed to provide enterprise with centralize control of data. In DataBase Management System (DBMS) is collection of interrelated data and set of programs to access and modify the data. In Relational DBMS (RDBMS), data...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2014

    Dimension Reduction: A Review

    Dimension reduction is the process of keeping only those dimensions in a dataset which are important from the point of view of problem at hand and discarding of the others. This paper helps to design easily computable algorithms and to increase the performance of classifiers. It has gained importance as...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A Study on Various Data De-Duplication Systems

    Data is the heart of any organization; hence it is necessary to protect it. For doing so, it is the needed to implement a good backup and recovery plan. But the redundant nature of the backup data makes the storage a concern; hence it is necessary to avoid the redundant...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A Review on Data Security in Cloud Computing

    Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years, but security issue is one of the major inhibitor in decreasing the growth of cloud computing. It essentially shifts the user data and application software to large datacenters...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A Context-Based Approach to Semantic Correctness

    Research on business processes modeling has extensively studied the structural aspects of business processes. Most business process modeling languages are graph-based and emphasis has been put on structural concerns such as verifying if all jobs terminate properly, if tasks are properly synchronized or if there are sub-procedures that are never...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A New Approach of Designing a Client/Server Model with Smart Screen

    Computer networks can be used for numerous services; both for companies and for individual. For companies, networks of personal computers using shared servers often provide flexibility and good price/performance ratio. For individuals, networks offer access to a variety of information and entertainment resources. For connected terminals of network and the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Privacy Preserving Data Mining Techniques in a Distributed Environment

    Data storing and retrieving has been important since decades in the world of information. It makes this process prolific, when the retrieved information becomes smartly meaningful. Data mining is this new flavor. In the recent years data mining is a wide spread and active area of research. Its meaningfulness has...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    A Comparative Study of Open Source Operating Systems for Virtualization with Executing Applications

    Virtualization is becoming increasingly popular, both for desktop as well as server systems. It has great demand in Information Technology industry because of inherent benefits like physical resource sharing that result in better utilization and ease in managing the system. Several studies have been done to find out the impact...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    An Algorithm for Leakage Power Reduction Through IVC in CMOS VLSI Digital Circuits

    Leakage current in CMOS circuits can be controlled at the circuit level and at the device level as well. One of the circuit level control techniques is the Input Vector Control (IVC). By using IVC, leakage power consumption of a circuit can be reduced in the sleep state. In this...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Dynamic Consolidation of Virtual Machines with Multi-Agent System

    Cloud computing systems supply massive infrastructures for high-performance computing that are flexible as they are able to acclimate to user and application requirements. Cloud computing offers on demand services which are used by virtue of a service-oriented interface that execute the anything-as-a-service archetype. The enlargement of cloud computing has resulted...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Proactive and Adaptive Data Migration in Hierarchical Storage Systems Using Reinforcement Learning Agent

    With the data generation rates growing exponentially, businesses are having a difficult time maintaining data center infrastructure. Hierarchical storage systems has evolved as a better alternate to managing data, as frequently accessed data is placed on higher tiers and the least frequently accessed data on lower tiers. But the data...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Passive Optical Networks Beneficial to Cloud Computing

    The cloud is transforming IT infrastructure and making it possible for any size business to adopt and afford enterprise-class apps, computing and storage without the cost, complexity and constraints of traditional networks. In this paper, the authors focus on BPON (Broadband Passive Optical Network) with Metropolitan Area Network (MAN) in...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Spatial Co-Location Patterns Mining

    Data mining refers to a process of analyzing data from different perspectives and summarizing it into useful information that can be used in variety of data centric applications in real time. Geographical Information System (GIS) combined with data mining has long being an area of research. GIS is a system...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Multi-Functional Social CRM in Cloud with Cross-Platform Mobile Application

    In this paper, the authors try to represent the importance of communication and interaction between an organization and its clients. Cloud CRM (Customer Relationship Model) is a dynamic application that is developed with latest technologies in order to mark a remarking presence of CRM process. This is built as a...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Optimization of Horizontal Aggregation in SQL by Using C4.5 Algorithm

    For efficient analysis of some data mining system and algorithms, data is required in the horizontal aggregated format. In a relational database, datasets are highly normalized and major efforts are required to compute aggregation when they are expected in horizontal form which is suitable for some data mining, statistical and...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Securing Data with Authentication in Mobile Cloud Environment: Methods, Models and Issues

    Mobile Cloud Computing (MCC) is an emerging technology for mobile services gives new horizon to the IT industry and traditional Internet computing paradigm. It integrates the advantages of the cloud computing and the mobile communication environment. It also carries necessary issues related to network latency, limited bandwidth, availability, heterogeneity, privacy...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Optimized Agglomeration Algorithmic Rule to Uncover User Pattern Applying on Weblog Knowledge

    These days, event logs contain immense amounts of knowledge that may simply overwhelm a personality's. Consequently, mining content from the phenomenon of logs is accepted as a crucial function for the system management. This paper presents a completely unique clump rule for log file information sets that helps one to...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Scalability of Parallel Genetic Algorithm for Two-Mode Clustering

    Data matrix having the same set of entity in the rows and columns is known as one-mode data matrix, and traditional one-mode clustering algorithms can be used to cluster the rows (or columns) separately. With the popularity of use of two-mode data matrices where the rows and columns have different...

    Provided By International Journal of Computer Applications

  • White Papers // May 2014

    Identity Based Distributed Data Storage Using Digital Signature and Diffie Hellmann Key Exchange Mechanism

    The widespread use of Internet has increased the demand for computing. Grid computing is a large scale heterogeneous distributed system which helps in sharing of resources such as data storage, computational power, network dynamically. Grid security is an important component of computational grid infrastructure grid security solutions addresses critical requirements...

    Provided By International Journal of Computer Applications