International Journal of Computer & Organization Trends(IJCOT)

Displaying 1-40 of 106 results

  • White Papers // Aug 2014

    Analysis of Some Localization Algorithm in Wireless Sensor Networks

    Localization is an indispensable part in wireless sensor network, in Wireless Sensor Network (WSN), estimating the exact position of sensor node is an important research problem and its location accuracy impacts the efficiency of localization algorithms. comparison with conventional centroid is done by varying different parameters such as anchor nodes,...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jul 2014

    Up Approach: Mining High Utility Itemsets

    Now-a-days high utility item sets specially from large transaction databases is required task to process many day to day operations in quick time. In many relevant algorithms presented those are surface the problem of generating large number of candidate item set and thus degrades the mining performance in terms of...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jul 2014

    Application of Wireless Sensor Network in Home Automation

    In this paper, the authors propose on wireless sensor network for home automation using Wi-Fi and Zigbee to automate the home. In order to use low power and low cost for the solution of automating the home using Wi-Fi and Zigbee technology. A prototype automation system for monitoring and controlling...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jul 2014

    Distributed Data Collection Algorithm for Store and Forward Information in Wireless Sensor Network

    Sensors networks are capable of collecting an enormous amount of data over space and time often, the ultimate objective is to \"Sample, store and forward\" that is to sense the data, store it locally and ultimately forward it to accent almost and analyzed. Typical sensor nodes are wireless nodes with...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jul 2014

    Architectural Data Security in Cloud Computing

    Cloud computing sees a methodological and educational shift of computing assessment provision from being provided locally to being provided remotely, and by third-party examine provider. Data that was once housed under the security area of the service user has now been placed under the protection of the service provider. Users...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jul 2014

    Pre-Authentication Scheme for Achieving Security and Optimization of Handover in Mobile WiMAX Network

    The Worldwide interoperability for Microwave Access (WiMAX) is evolving as a 4th generation technology by using IEEE 802.16e standard. The demand for wireless broadband service is growing rapidly. The Mobile WiMAX technology is one of the technologies that provide seamless service to the user roaming anywhere. Mobile WiMAX does not...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jul 2014

    Validation and Verification For Embedded System Design - An Integrated Testing Process Approach

    In this paper, the authors identify the need for an integrated software solution to manage configuration requirements of currently popular software applications and tool chains used for the validation and verification tasks associated with embedded system design. The intended results of such an approach include: increased design development speed, decreased...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jun 2014

    Energy Study in the WSN S-MAC Protocol using OMNETPP

    As Wireless Sensor Network (WSN) uses battery for energy source which are limited, the challenge is to keep the network alive and keep the network sustainability. One of the main aspects of WSN communication is the transmission protocol. Even WSN uses multiple protocols, SMAC is the widely used protocol because...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jun 2014

    A Novel Event Rule Derivation for Processing Uncertain Data Events Using Genetic Network Programming

    Continuously growing size and number of databases in a variety of domains has boosted development of numerous data mining methods during the last decade. There is an increasing requirement to discover associations and relations among large and uncertain databases, which may be tackled by association rule mining. Two main challenges...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2014

    Efficient Query Processing for Distributed Hash Tree with Less Maintenance

    Hash tree is an efficient query with low maintenance indexing scheme in distributed hash trees. Two novel techniques contribute to the superior performance: a clever naming mechanism and a tree summarization strategy. The authors present two enhancements: an extensible technique for indexing scheme unbounded data domains and a double-naming strategy...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2014

    Reorganisation of Adaptive Websites Using Web Usage Mining Techniques

    Web usage mining is the part of Web mining for extraction of interesting knowledge from log files produced by Web servers. It focuses on techniques that predict the user behaviors based on the previous user access patterns. Adaptive Websites are web sites that automatically enhance their organization and presentation from...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2014

    The Research of Decision Tree Mining Based on Hadoop

    Cloud computing is the result of distributed processing, parallel processing and grid computing. For a single node massive data, the mining calculation of the decision tree is very large. In order to solve this problem, this paper proposes the HF-SPRINT parallel algorithm that bases on the Hadoop platform. The parallel...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2014

    A Review on Software Engineering Practices in SaaS Application Development

    A web application is a utility that is developed to serve a specific purpose in the industry. It is an application that follows a client-server architectural model for communication and functioning. This paper is a review of the methodologies proposed for web application development. A general software engineering approach for...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2014

    A Review of Clustering Techniques with FBPN

    A real time measurement made and classified by fuzzy back propagation network which produces more accurate results than any other method. This paper predicts the best supervised learning method of clustering techniques in Fuzzy Back Propagation Network (FBPN). Image processing algorithms are used to extract the information and patterns derived...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2014

    Encrypted Privacy Preserving Based Association Rules in Distributed Environment

    Data mining techniques have already been developed in many applications. However, in addition they cause a threat to privacy preserving is one of the biggest problems in data mining applications. With this paper, the authors proposed a greedy way of hiding sensitive rules. Privacy-preserving data mining just emerged to address...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2014

    Realtime Network IP Traceback Mechanism Against DDOS Attacks

    Migration of DDOS attack is one the biggest challenge on the internet and LAN networks. Many techniques have been proposed, including DDOS prevention, ipspoof etc., each of them has advantages and disadvantages. Source IP spoofing attacks are critical issues to the Internet. There has been active research on IP traceback...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Apr 2014

    Improving the Performance of Load Balancing in Cloud Environment Using SJF in MapReduce

    Today cloud computing is a fast growing area in computing research and industry. Through virtualization many applications can be developed and various services can be offered to the end users. Cloud service providers are provided many services in a very flexible manner so that the users can scale up or...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Apr 2014

    Multimodal Image Search System on Mobile Device

    Mobile phones have involved into powerful image and video processing devices equipped with built-in cameras, color displays, and hardware-accelerated graphics. These more features allow users to give multimodal queries for searching information on the go from the World Wide Web. In this paper, the authors propose a multimodal image search...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Apr 2014

    APPLAUS: A Privacy Preserving Location proof for Location based service with K-anonymity

    Now-a-days because of increased of various mobile technology and wireless, there is large number of services which are location based are available. Specifically, location-sensitive applications depend on users. In APPLAUS, mobile devices which are in range mutually generate location proofs, which are stored to an untrusted location proof server which...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Apr 2014

    Traceback of DDoS Attacks

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet which deny normal service and degrade quality of service. However, the network security mechanism does not have effective and efficient methods to trace back the source of these attacks. The DDoS field is evolving quickly, and it is becoming...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Mar 2014

    Multicriteria Data Retrieval in Database using Advanced Database Operator

    Database management systems have been increasingly used in decision support applications. One of the features of such application is query with multiple, and sometimes conflicting, goals. People recently are interested in an advanced query operator for such queries named skyline which returns the objects that are not dominated by any...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Mar 2014

    Control Mechanisms for Robust Data Security

    Data undoubtedly is at the core of IT value chain in any organization. The evolution of technology responsible for storing, managing and processing data has noticeably taken giant strides in recent times with the inception of technologies like big data, in memory computing etc. With wide scale business process automation...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Mar 2014

    Detecting and Punishing the Selfish Node and its Behavior in WSN

    In Wireless Sensor Network (WSN) communication, every node transmits data packets to further nodes and spends its resources like battery power, CPU time and memory. In ideal situation all the nodes forward packets to other nodes according to their requirements .Presence of selfish nodes is a very big issue in...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Feb 2014

    Online Interactive Data Bidirectional System Using Embedded Applications

    Design of on-line embedded web server is a challenging part of many embedded and real time data acquisition and control system applications. World Wide Web is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billion of users worldwide and allows the...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Feb 2014

    Slicing: Privacy Preserving Data Publishing Technique

    Today, most enterprises are actively collecting and storing data in large databases. Many of them have recognized the potential value of these data as an information source for making business decisions. Privacy-Preserving Data Publishing (PPDP) provides methods and tools for publishing useful information while preserving data privacy. In this paper,...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Feb 2014

    Robust and Scalable Computation Model for Secured Communication in Multiagent Systems

    Transfer of data is being done in many ways. Here data is transferred through wireless. Security and privacy issues have become critically important with the fast expansion of multi agent systems. Most network applications such as pervasive computing, grid computing, and P2P networks can be viewed as multi agent systems...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Feb 2014

    Dynamic Data Possession and Review in Cloud

    Today the authors have got an inclination to transfer their data through mails and phones. There is a development attained instantly inside the sphere of technology. Computing service has become cheaper and powerful. Here it permits the user to store data and access it remotely at the time of their...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Feb 2014

    Activity Based Data Management in Mobile Environment Using Data Mining Techniques

    Wireless communications and mobile device technologies not only accentuate various wireless communications applications but also enable the provision of plentiful kinds of mobile services .In mobile service environments, mobile users may request various kinds of services and applications through mobile devices or laptop computers from arbitrary locations at any time...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Feb 2014

    Modified Ant-Miner for Large Datasets

    Data mining is the term used to describe the process of extracting value from a database. The data warehouse is a location where information is stored. The data stored depends largely on the type of industry and company. Ant-miner has produced good results when compared with more conventional data mining...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jan 2014

    Keyword Based Searching Techniques Over XML Data

    XML data format is widely used across devices to exchange data due to its main feature of supporting platform independency. Existing or current system used to find given keyword in XML data, a user need to know XML query language to create keyword query, submit the query for processing and...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Dec 2013

    An Improved Local Broadcast Transmission Reduction Technique in Wireless Networks

    Broadcasting is a common and basic operation designed to support various network protocols in wireless networks. To produce energy efficient broadcasting is very important for unplanned wireless sensor networks because sensors are typically combined with batteries with limited lifetimes. Two primary techniques, static and dynamic, to real broadcast algorithms in...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Dec 2013

    Packet Traceback Scheme for Detection IP Based Attack

    IP traceback is amongst the main challenges that face the security of today's internet. Many techniques were proposed, including in-band packets alert and outband packets each of them has advantages and disadvantages. Source IP spoofing attacks are critical issues to the internet. These attacks are considered to be sent from...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Dec 2013

    SEIDS-A Secure Enhanced Intrusion Detection System with DS in MANETS

    Mobile Ad-hoc NETworking (MANET) is receiving growing attention as a means of providing communications in environments where there is no existing infrastructure. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Dec 2013

    Secure Data Aggregation Schemes in WSN: A Survey

    A wireless sensor network consists of a large number of nodes and each node has a limited amount of energy, memory, processing and communication capabilities. It consumes much energy for transmission than any other process. In order to reduce the energy consumption the authors need to reduce the number of...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Dec 2013

    Improved Document Clustering Using Multi View Point Graph Index Model

    Clustering is among the data mining and text mining techniques designed to analyze datasets by dividing it into meaningful groups. The data points (objects) inside the dataset can have certain relationships among them. All clustering algorithms assume this are applied to various datasets. The existing algorithms for text mining make...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Dec 2013

    An Efficient Extended Attribute Selection Methods for Classification

    In recent years many applications of data mining deal with a high-dimensional data (very large number of features) impose a high computational cost as well as the risk of \"Over fitting\". In these cases, it is common practice to adopt feature selection method to improve the generalization accuracy. Data quantity...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Dec 2013

    Competitive Advantage through Business Intelligence for E-Commerce

    In today's competitive business world it is certain that there is lot of data to be processed. It is essential for the business organization to analyze and comprehend the generated data for the performance of the organization. In this paper the authors review a framework that allows Small and Medium...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Dec 2013

    An Effienct Collision Free MAC Scheme for Wireless LANS with Constant Contention Time

    IEEE 802.11 specifies a set of protocols for a wireless LAN defined by IEEE which covers the physical and data link layer. Now-a-days, IEEE 802.11 based WLAN has a widespread and providing wireless connectivity to several electronic devices like cell phones, laptops, gaming devices and so on. All these devices...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Nov 2013

    Modified Ant Colony Based Routing Algorithm in Manet

    In MANET, without the aid of any established infrastructure or centralized administration, a temporary network needs to be established whenever a node tries to send data to another node. Each node in MANET acts as an end system and also as a router for all other nodes in the system....

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Nov 2013

    Implementation of Image Cryptography Algorithms: A Review

    Cryptography techniques plays important role in image security systems in communication. There are many cryptographic algorithms are used to protect or hide confidential data from unauthorized access. Encryption is used to protect data in networks in unreadable form. On the other way, decryption is used to access unreadable form to...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Aug 2011

    Performance of Third Generation Wireless Networks

    In this paper, the authors make two main contributions. First, one is optimizing TCP performance over the 3G wireless networks is adapting to the significant delay and rate variations over the wireless channel. They present Window Regulator algorithms that use the receiver window field in the acknowledgment packets to convey...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Aug 2011

    Optimized Data Broadcast Scheme Mobile Computing

    The rapid development of wireless communication technology and battery powered portable devices is making mobile information services increasingly popular. Since the bandwidth resource of wireless networks is scarce and the mobile devices have a limited battery capacity, any solution for information access must be devised in such a way that...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Aug 2011

    Channel Fading in Mobile Communication

    In this paper, the authors study the channel fading in the mobile communication by using the Rayleigh method. Some parameters such as auto-correlation cross correlation, histograms and spectrums of the various signal represents through the graphs with the help of MATLAB. And Simulation results indicate that in a fast fading...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Aug 2011

    Antenna for WLAN and Wimax Application

    In this paper, the authors have presented the use of reconfigurable micro strip patch antenna elements in adaptive arrays. Adaptive array systems are generally referred as smart antennas. The adaptive array have the potential to reduce noise, increase the signal to noise ratio and enhance system capacity. Similarly the reconfigurable...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Nov 2011

    Energy Efficient Target Coverage Issues in Wireless Sensor Network

    A critical aspect of applications in wireless sensor network is network lifetime. Wireless sensor network are usable as long as they can communicate sensed data to processed node. Sensing and communication are important activities and they consume energy. So power management and sensor scheduling can effectively increase the networks lifetime....

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Dec 2011

    Comparison and Evaluation of Scaled Data Mining Algorithms

    Association rule mining is the most popular technique in data mining. Mining association rules is a prototypical problem as the data are being generated and stored every day in corporate computer database systems. To manage this knowledge, rules have to be pruned and grouped, so that only reasonable numbers of...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jan 2012

    Iris Authentication Using PSO

    The paper proposes a Wavelet Probabilistic Neural Network (WPNN) for iris biometric classifier. The WPNN combines wavelet neural network and probabilistic neural network for a new classifier model which will be able to improve the biometrics recognition accuracy as well as the global system performance. A simple and fast training...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jul 2012

    An Integrated Approach to Measurement Software Defect Using Software Matrices

    Software measurement is a quantified attribute of a characteristic of a software product or the software process. It is a discipline within software engineering. Measurement programs in software organizations are an important source of control over quality, defects evaluation and cost in software development. Software measurement has evolved into a...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Aug 2012

    Congestion Control in Wireless Sensor Network-A Survey

    Wireless Sensor network is the network of sensors. The sensors are the nothing but the small devices which have the sensing ability, storage capacity and also the energy or the power storage. The function of the sensors is to sense the environmental conditions like temperature, humidity and send this information...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2012

    SE Code Optimization Using Data Mining Approach

    Data mining also holds promises for other software engineering processes, which have to deal with uncertainty and intangible data such as cost estimation, effort estimation and quality. It can also aid in interesting by helping the software engineer to arrive at the require test cases that ensure accurate testing. Data...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Mar 2014

    Multicriteria Data Retrieval in Database using Advanced Database Operator

    Database management systems have been increasingly used in decision support applications. One of the features of such application is query with multiple, and sometimes conflicting, goals. People recently are interested in an advanced query operator for such queries named skyline which returns the objects that are not dominated by any...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Feb 2014

    Online Interactive Data Bidirectional System Using Embedded Applications

    Design of on-line embedded web server is a challenging part of many embedded and real time data acquisition and control system applications. World Wide Web is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billion of users worldwide and allows the...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Feb 2014

    Slicing: Privacy Preserving Data Publishing Technique

    Today, most enterprises are actively collecting and storing data in large databases. Many of them have recognized the potential value of these data as an information source for making business decisions. Privacy-Preserving Data Publishing (PPDP) provides methods and tools for publishing useful information while preserving data privacy. In this paper,...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Sep 2013

    A Survey on Resource Allocation Strategies and Recent Trends in Cloud Environment

    Cloud computing is an on demand technology for dynamic and resource allocation for guaranteed services to public. Clouds can make it to access applications and data from anywhere. Companies are able to rent resources from cloud for storage so that their infrastructure cost can be reduced significantly. This technology allows...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jul 2014

    Up Approach: Mining High Utility Itemsets

    Now-a-days high utility item sets specially from large transaction databases is required task to process many day to day operations in quick time. In many relevant algorithms presented those are surface the problem of generating large number of candidate item set and thus degrades the mining performance in terms of...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Apr 2013

    All-Embracing Review of Wireless Network Protocol, Optimum Network Simulator

    Wireless connectivity is the new murmur utterance in computer networks. It involves connecting laptops, mobile libraries and even fridges to computer networks, without physical wire connections. Wireless connectivity means that individuals can potentially entr

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Oct 2012

    Robust Data Clustering Algorithms for Network Intrusion Detection

    An ID (Intrusion Detection system) is an active and driving defense technology. Intrusion detection is to detect attacks against a computer system. This paper mainly focuses on intrusion detection based on data mining. Data mining is to identify valid, novel, potentially useful, and ultimately understandable patterns in massive data. One...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Oct 2012

    Detecting and Alerting TCP-IP Packets Againt TCP SYN Attacks

    Transmission Control Protocol SYNchronized (TCP SYN) flood has become a problem to the network management to maintain the network server from being attacked by the malicious attackers. Possibly one of the problems in detecting SYN Flood is that hosting server nodes or firewalls cannot distinguish the SYN packets of normal...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Oct 2012

    Fingerprint Validation and Outlier Detection Using Minutiae Approach in Network Security

    In this recent information technology biometric techniques are being used increasingly against identity theft. The basic need of biometric applications provides a measurable physical characteristic is a more reliable indicator of identity than legacy systems such as passwords and pins. The necessity for security in fields such as improving airport...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Oct 2012

    Security Requirements in Software Requirements Engineering

    In the last few decades, software projects have encountered major difficulties. Most software engineering projects tend to be late and over budget. Several of the causes of these failures are related to requirements engineering issues such as requirements creep, poorly documented requirements, requirements that were impossible to satisfy, and requirements...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2012

    Implementation of Neural Network in Pattern Recognization

    There are seven common methods and techniques of data mining which are the methods of statistical analysis, rough set, covering positive and rejecting inverse cases, formula found, fuzzy method, as well as visualization technology, neural network method is used for classification, clustering, feature mining, prediction and pattern recognition. With the...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jun 2012

    A Knowledge Discovery Approach in Shopping Complex Database (ASCD)

    Data mining and Knowledge Discovery (KD) has been widely accepted as a key technology for enterprises to improve their abilities in data analysis, decision support and the automatic extraction of knowledge from data. Existing method has framed the process of information extraction and also referred to as the knowledge discovery...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jun 2012

    Data Mining as a Tool to Predict Churn Behavior of Customers

    Customer is the heart and soul of any organization. The era of globalization and cut throat competition has changed the basic concept of marketing, now marketing is not confined to selling the products to the customers, but the objective is to reach to the hearts of the customers so that...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Feb 2012

    Dynamic Allocation of Proxies for Improving the Performance

    In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. In this paper, the authors propose that addresses how to improve the performance of the proxy servers. In order to improve...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2013

    Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium

    In this paper, the authors address the problem of jamming under an internal threat model. They discuss about swift jamming attacks in wireless networks, presenting a challenger model for selective jamming attacks, which may give to the high importance for packet delivery techniques in which specific messages of \"High importance\"...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2013

    Secure Keyword Based Search in Cloud Computing: A Review

    An effective search that give the better suggestion to the user so that the user can get better choices for the services is also a challenge for cloud computing. Several methods have been given to solve the problem of effective and secure ranked keyword search of cloud data. Ranked search...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2013

    Role of Association Rule Mining in String and Numerical Data

    This data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. Association rule mining discovers correlations between different item sets in a transaction database. The proposed methodology is implemented in apriori algorithm. The given string data is applied with apriori algorithm and...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2013

    Multi-Deployment and Multi-Snapshotting on Clouds

    This new model raises new challenges in the design and development of IaaS middleware. Infrastructure as a Service (IaaS) in cloud computing is major service that has provide convenient way to users for development of their own cloud computing environments. But so many difficulties are to achieve this complicated interface....

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Apr 2013

    Security Maintenance System in Data Mining Using Distance Measure Technique

    Now-a-days security is the main thing in the data bases. In this paper the authors focus on distance measures applied to ensure the security of the separate sensitive information. Protecting data security is a key issue in data distribution. Security maintains system in data mining using distance measure techniques typically...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2013

    Bankers Algorithms Used in Cloud Environment

    Cloud computing is a new benchmark towards enterprise application development that can effectively facilitate the execution of workflows in business process management system. The workflow technology can manage the business processes efficiently satisfying the requirements of modern enterprises. Moving workflows to a cloud computing environment enables the utilization of various...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2013

    Identity Security Using Authentication and Authorization in Cloud Computing

    The growth of the cloud computing invention suggests attractive and innovative computing services through resource pooling and virtualization techniques. Cloud gives delivers different types of computing services to their consumers according to their pay per usage of economic model. Anyhow this new technology introduces new immerse for enterprises and business...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // May 2013

    Indexing in Database

    Databases can store large amounts of data. Each stored entity is a complex structure, called a record. Records are indexed based on the values of certain fields. A techniques for indexing data is provide a method for compressed an index to obtain a compressed index that is easily stored and...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Oct 2013

    Identification and Analysis of Risks for Cloud Computing in IaaS, PaaS and SaaS

    Now-a-days, cloud computing has been an emerging concept in the IT industry. Cloud computing is not a new technology but is a new way of using or delivering the resources. It also enhances the efficiency of computation by providing the facility of centralized database, memory processing and on demand network...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Oct 2013

    A Survey On Security Issues in Routing In MANETS

    Mobile Ad-hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position frequently....

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Oct 2013

    A Brief Survey on Encryption Schemes in Cloud Environments

    For the last two years cloud computing is an important in the IT industry. In cloud computing data owners and service providers are not in the same trusted domain so the service providers should not be a trusted one and they are all third party. It focuses on a technique...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Aug 2013

    An Efficient Restricting of Bad Users Among Unidentified Users in a Network

    In this paper, the authors develop a new system to enable service providers, such as website operators, on the internet to restrict past abusive users of anonymizing networks (for example, tor) from further causing trouble behavior, without compromising their security, and while maintain the security of all of the uncorrupt...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jul 2013

    Trajectory Based Sybil Attacks Detection for Vehicular Ad-hoc Networks

    Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Oct 2013

    A Simulation and Analysis of Secured S-DSR Protocol in Mobile Ad Hoc Networks

    A MANET is a special kind of wireless network, which can be treated as a collection of mobile nodes co-existing with each other without the need of any fixed infrastructure. Because of the limited physical security, ad hoc topology, battery-based operation, and lack of a centralized coordinator, it is more...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Oct 2013

    HASBE: A Hierarchical Attribute Set Based Encryption for Flexible, Scalable and Fine Grained Access Control in Cloud Computing

    At present cloud computing is going to be very famous technology in IT enterprises. For a company, the data stored is huge and it is very precious. All functions are performed through networks. Thus, it becomes very important to have the secured use of data. In cloud computing, the ultimate...

    Provided By International Journal of Computer & Organization Trends(IJCOT)

  • White Papers // Jul 2013

    Replacement Policies for Improving Cache Performance

    In this paper Pivoting M-tree (PM-tree) is introduced, a metric access method combining M-tree with the pivot-based approach. While in M-tree a metric region is represented by a hyper-sphere, in PM-tree the shape of a metric region is determined as an intersection of the hyper-sphere and a set of hyper-rings....

    Provided By International Journal of Computer & Organization Trends(IJCOT)