International Journal of Computer Science and Business Informatics

Displaying 1-28 of 28 results

  • White Papers // May 2015

    A Hybrid Algorithm for Improvement of XML Documents Clustering

    As eXtensible Markup Language (XML) documents are now widely used in the Web world, improving the speed and accuracy of search engines based on these documents is important. Clustering is a way that can be effective in improving the speed of the search engine. Clustering of XML documents can be...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2015

    A Novel Approach for Recommending Items Based on Association Rule Mining

    Currently, online shopping has become a trend. People prefer to go for online shopping rather than going out and shopping for the users as it provides an easier and quicker way to purchase items of their choice with quick transactions. Recommendation systems are widely used for recommending products to the...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jul 2014

    Present a Way to Find Frequent Tree Patterns Using Inverted Index

    Among all patterns occurring in tree database, mining frequent tree is of great importance. The frequent tree is the one that occur frequently in the tree database. Frequent subtrees not only are important themselves but are applicable in other tasks, such as tree clustering, classification, bioinformatics, etc. In this paper,...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2014

    Progression of String Matching Practices in Web Mining - A Survey

    String matching is the technique of finding strings that match a pattern approximately. The problem of approximate string matching can be classified into two sub-problems namely finding approximate substring matches inside a given string and finding dictionary strings that match the pattern approximately. The basic technique is the dictionary-based entity...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2014

    Virtualizing the Inter Communication of Clouds

    The cloud has been an attracting platform for the enterprises to deploy as well as to execute their business. However, clouds do not possess infinite storage resources and infinite computational in its infrastructure. If there is saturation then no new request will be processed. Hence, inter-cloud networking is required to...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Apr 2014

    Simultaneous Use of CPU and GPU to Real Time Inverted Index Updating in Microblogs

    Now-a-days, with attention to developing the different data networks, the wide masses of data are producing and updating continually. Managing the great data enumerate the fundamental challenges in data mining. One of the considered main subjects in this paper is how searching among the wide masses of data. Therefore, require...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Apr 2014

    A Survey on Bi-Clustering and its Applications

    Bi-clustering is the process of immediate taking apart of the set of samples and the set of their attributes into classes. Samples and attributes are classified together which is believed to have a high importance to each other. Though, the outcome of the application of classic clustering methods to genes...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Apr 2014

    A Comparative Analysis on Visualization of Microarray Gene Expression Data

    Visualization technique helps in the easy analysis of data. But, visualization of biological data is one of the most challenging processes and visualization of the computed clustered and biclustered data still remains an open issue. Clustering and biclustering techniques were the popular methods for classifying the gene expression data. There...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Apr 2014

    A New Current-Mode Geometric-Mean Structure for SRD Filters

    Companding process (compressing and expanding) as an attractive technique in analog circuit designs have drawn the attention of many researchers. A current-mode square-root domain filter based on a new geometric-mean circuit is presented. The circuit is a tunable first-order low pass filter, working in low voltage, and featuring low non-linearity....

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Feb 2014

    A Review of Literature on Cloud Brokerage Services

    Cloud computing is kinetically evolving areas which offer large potential for agencies of all sized to increase efficiency. Cloud broker acts as a mediator between cloud users and cloud service providers. The main functionality of cloud broker lies in selecting best Cloud Service Providers (CSP) from requirement set defined by...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jan 2014

    A Predictive Stock Data Analysis with SVM-PCA Model

    In this paper the properties of Support Vector Machines (SVM) on the financial time series data has been analyzed. The high dimensional stock data consists of many features or attributes. Most of the attributes of features are uninformative for classification. Detecting trends of stock market data is a difficult task...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Dec 2013

    An Efficient Connection between Statistical Software and Database Management System

    In big data era, the authors need to manipulate and analyze the big data. For the first step of big data manipulation, they can consider traditional database management system. To discover novel knowledge from the big data environment, they should analyze the big data. Many statistical methods have been applied...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Dec 2013

    An Integrated Distributed Clustering Algorithm for Large Scale WSN

    Latest researches in wireless communications and electronics has imposed the progress of low-cost wireless sensor nodes. Clustering is a thriving topology control approach, which can prolong the lifetime and increase scalability for wireless sensor networks. The admired criteria for clustering methodology are to select cluster heads with more residual energy...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Oct 2013

    Performance Evaluation of Sentiment Mining Classifiers on Balanced and Imbalanced Dataset

    The transition from Web 2.0 to Web 3.0 has resulted in creating the dissemination of social communication without limits in space and time. Sentiment analysis has really come into its own in the past couple of years. It's been a part of text mining technology for some time, but with...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Oct 2013

    Automated Biometric Verification: A Survey on Multimodal Biometrics

    In the world of computer science & information technology security is essential and important issue. Identification and authentication techniques play an important role while dealing with security and integrity. The human physical characteristics like fingerprints, face, hand geometry, voice and iris are known as biometrics. These features are used to...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Oct 2013

    Intrusion Detection Techniques for Mobile Ad Hoc and Wireless Sensor Networks

    Mobile circumstantial networks and wireless detector networks have secure a large form of applications. However, they are usually deployed in probably adverse or perhaps hostile environments. Therefore, they cannot be without delay deployed while not first addressing security challenges. Intrusion detection systems supply a necessary layer of in-depth protection for...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Oct 2013

    An Efficient Classification Mechanism For Network Intrusion Detection System Based on Data Mining Techniques:A Survey

    In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice that can...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Sep 2013

    Parallel Ensemble Techniques for Data Mining Application

    Data mining is a powerful technique to extract hidden predictive information from large datasets. Classification is a very popular application of data mining. The goal of classification is to build a classifier with high accuracy and low cost. Since most data mining datasets are very large, using small subsets of...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Sep 2013

    High Performance Data mining by Genetic Neural Network

    Data mining in computer science is the process of discovering interesting and useful patterns and relationships in large volumes of data. Most methods for mining problems are based on artificial intelligence algorithms. Neural network optimization based on three basic parameters topology, weights and the learning rate is a powerful method....

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Aug 2013

    An Efficient Access Control Model for Wireless Sensor Network

    The sensor nodes after a time lose their energy. In this paper, to maintain network performance, new nodes can be added to the network. In the critical applications, the adversary can take advantage of this opportunity, and enter hostile node to the network. To prevent hostile node entry, an access...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Aug 2013

    Using Analytic Hierarchy Process (AHP) to Select and Rank a Strategy Based Technology

    Increasing development of used tools and equipment in industries has resulted in their various and new applications in industries. In today's competitive world, a collection of these tools are known as technology. Each organization has its own missions and goals and to this end experts and élites of organizations design...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jul 2013

    A New Design to Improve the Security Aspects of RSA Cryptosystem

    In this paper, the authors introduce a security improvement on the RSA cryptosystem, it suggests the use of randomized parameters in the encryption process to make RSA many attacks described in literature, this improvement will make the RSA semantically secure i.e., an attacker cannot distinguish two encryptions from each other...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jul 2013

    A New Protocol to Broadcast Authentication in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), Users can connect to the network and broadcast their messages within the network using broadcast authentication mechanism. Due to the nature of wireless communication in sensor networks, attackers can easily be deployed between nodes and eavesdrop the transferring data and or modify the content of...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jul 2013

    A Hybrid Model of Multimodal Approach for Multiple Biometrics Recognition

    A single biometric identifier in making a personal identification is often not able to meet the desired performance requirements. Biometric identification based on multiple biometrics represents an emerging trend. Automated biometric systems for human identification measure a \"Signature\" of the human body, compare the resulting characteristic to a database, and...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jun 2013

    Unstructured Data Integration through Automata-Driven Information Extraction

    Extracting information from plain text and restructuring them into relational databases raise a challenge as how to locate relevant information and update database records accordingly. In this paper, the authors propose a wrapper to efficiently extract information from unstructured documents, containing plain text expressed with natural-like language. Their extraction approach...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jun 2013

    A New Online XML Document Clustering Based on XCLS++

    Many methods have been proposed to XML document clustering. These methods can be divided into three categories: structure-based, content-based and hybrid methods. XCLS++ is one of the most effective and efficient algorithms to XML document clustering which fit into the structural clustering category. Because of its efficiency, XCLS++ can be...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2013

    An Efficient Rough Set Approach in Querying Covering Based Relational Databases

    Handling uncertainty and incompleteness of knowledge becomes a challenging task in information systems. Rough-set theory enhances databases by allowing it for the management of uncertainty. Roughsets, due to its versatality can be integrated into an underlying database model like relational or object oriented which can also be used in the...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2013

    Building an Internal Cloud for IT Support Organisations: A Preview

    The authors design the most of their computing environment as a centralized data centre since their organization's creation. Users of various development projects are deploying their services and connecting remotely to the data centre resources from all the stations of NIC. Currently these servers are mostly underutilized due to the...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jul 2014

    Present a Way to Find Frequent Tree Patterns Using Inverted Index

    Among all patterns occurring in tree database, mining frequent tree is of great importance. The frequent tree is the one that occur frequently in the tree database. Frequent subtrees not only are important themselves but are applicable in other tasks, such as tree clustering, classification, bioinformatics, etc. In this paper,...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2015

    A Hybrid Algorithm for Improvement of XML Documents Clustering

    As eXtensible Markup Language (XML) documents are now widely used in the Web world, improving the speed and accuracy of search engines based on these documents is important. Clustering is a way that can be effective in improving the speed of the search engine. Clustering of XML documents can be...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2015

    A Novel Approach for Recommending Items Based on Association Rule Mining

    Currently, online shopping has become a trend. People prefer to go for online shopping rather than going out and shopping for the users as it provides an easier and quicker way to purchase items of their choice with quick transactions. Recommendation systems are widely used for recommending products to the...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Aug 2013

    Using Analytic Hierarchy Process (AHP) to Select and Rank a Strategy Based Technology

    Increasing development of used tools and equipment in industries has resulted in their various and new applications in industries. In today's competitive world, a collection of these tools are known as technology. Each organization has its own missions and goals and to this end experts and élites of organizations design...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Apr 2014

    A New Current-Mode Geometric-Mean Structure for SRD Filters

    Companding process (compressing and expanding) as an attractive technique in analog circuit designs have drawn the attention of many researchers. A current-mode square-root domain filter based on a new geometric-mean circuit is presented. The circuit is a tunable first-order low pass filter, working in low voltage, and featuring low non-linearity....

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Feb 2014

    A Review of Literature on Cloud Brokerage Services

    Cloud computing is kinetically evolving areas which offer large potential for agencies of all sized to increase efficiency. Cloud broker acts as a mediator between cloud users and cloud service providers. The main functionality of cloud broker lies in selecting best Cloud Service Providers (CSP) from requirement set defined by...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2014

    Progression of String Matching Practices in Web Mining - A Survey

    String matching is the technique of finding strings that match a pattern approximately. The problem of approximate string matching can be classified into two sub-problems namely finding approximate substring matches inside a given string and finding dictionary strings that match the pattern approximately. The basic technique is the dictionary-based entity...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2014

    Virtualizing the Inter Communication of Clouds

    The cloud has been an attracting platform for the enterprises to deploy as well as to execute their business. However, clouds do not possess infinite storage resources and infinite computational in its infrastructure. If there is saturation then no new request will be processed. Hence, inter-cloud networking is required to...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Apr 2014

    Simultaneous Use of CPU and GPU to Real Time Inverted Index Updating in Microblogs

    Now-a-days, with attention to developing the different data networks, the wide masses of data are producing and updating continually. Managing the great data enumerate the fundamental challenges in data mining. One of the considered main subjects in this paper is how searching among the wide masses of data. Therefore, require...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Apr 2014

    A Survey on Bi-Clustering and its Applications

    Bi-clustering is the process of immediate taking apart of the set of samples and the set of their attributes into classes. Samples and attributes are classified together which is believed to have a high importance to each other. Though, the outcome of the application of classic clustering methods to genes...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Apr 2014

    A Comparative Analysis on Visualization of Microarray Gene Expression Data

    Visualization technique helps in the easy analysis of data. But, visualization of biological data is one of the most challenging processes and visualization of the computed clustered and biclustered data still remains an open issue. Clustering and biclustering techniques were the popular methods for classifying the gene expression data. There...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Oct 2013

    Automated Biometric Verification: A Survey on Multimodal Biometrics

    In the world of computer science & information technology security is essential and important issue. Identification and authentication techniques play an important role while dealing with security and integrity. The human physical characteristics like fingerprints, face, hand geometry, voice and iris are known as biometrics. These features are used to...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jul 2013

    A New Design to Improve the Security Aspects of RSA Cryptosystem

    In this paper, the authors introduce a security improvement on the RSA cryptosystem, it suggests the use of randomized parameters in the encryption process to make RSA many attacks described in literature, this improvement will make the RSA semantically secure i.e., an attacker cannot distinguish two encryptions from each other...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Oct 2013

    Intrusion Detection Techniques for Mobile Ad Hoc and Wireless Sensor Networks

    Mobile circumstantial networks and wireless detector networks have secure a large form of applications. However, they are usually deployed in probably adverse or perhaps hostile environments. Therefore, they cannot be without delay deployed while not first addressing security challenges. Intrusion detection systems supply a necessary layer of in-depth protection for...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jul 2013

    A New Protocol to Broadcast Authentication in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), Users can connect to the network and broadcast their messages within the network using broadcast authentication mechanism. Due to the nature of wireless communication in sensor networks, attackers can easily be deployed between nodes and eavesdrop the transferring data and or modify the content of...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jul 2013

    A Hybrid Model of Multimodal Approach for Multiple Biometrics Recognition

    A single biometric identifier in making a personal identification is often not able to meet the desired performance requirements. Biometric identification based on multiple biometrics represents an emerging trend. Automated biometric systems for human identification measure a \"Signature\" of the human body, compare the resulting characteristic to a database, and...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Oct 2013

    An Efficient Classification Mechanism For Network Intrusion Detection System Based on Data Mining Techniques:A Survey

    In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice that can...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Aug 2013

    An Efficient Access Control Model for Wireless Sensor Network

    The sensor nodes after a time lose their energy. In this paper, to maintain network performance, new nodes can be added to the network. In the critical applications, the adversary can take advantage of this opportunity, and enter hostile node to the network. To prevent hostile node entry, an access...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2013

    An Efficient Rough Set Approach in Querying Covering Based Relational Databases

    Handling uncertainty and incompleteness of knowledge becomes a challenging task in information systems. Rough-set theory enhances databases by allowing it for the management of uncertainty. Roughsets, due to its versatality can be integrated into an underlying database model like relational or object oriented which can also be used in the...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // May 2013

    Building an Internal Cloud for IT Support Organisations: A Preview

    The authors design the most of their computing environment as a centralized data centre since their organization's creation. Users of various development projects are deploying their services and connecting remotely to the data centre resources from all the stations of NIC. Currently these servers are mostly underutilized due to the...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Sep 2013

    Parallel Ensemble Techniques for Data Mining Application

    Data mining is a powerful technique to extract hidden predictive information from large datasets. Classification is a very popular application of data mining. The goal of classification is to build a classifier with high accuracy and low cost. Since most data mining datasets are very large, using small subsets of...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Sep 2013

    High Performance Data mining by Genetic Neural Network

    Data mining in computer science is the process of discovering interesting and useful patterns and relationships in large volumes of data. Most methods for mining problems are based on artificial intelligence algorithms. Neural network optimization based on three basic parameters topology, weights and the learning rate is a powerful method....

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Oct 2013

    Performance Evaluation of Sentiment Mining Classifiers on Balanced and Imbalanced Dataset

    The transition from Web 2.0 to Web 3.0 has resulted in creating the dissemination of social communication without limits in space and time. Sentiment analysis has really come into its own in the past couple of years. It's been a part of text mining technology for some time, but with...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Dec 2013

    An Efficient Connection between Statistical Software and Database Management System

    In big data era, the authors need to manipulate and analyze the big data. For the first step of big data manipulation, they can consider traditional database management system. To discover novel knowledge from the big data environment, they should analyze the big data. Many statistical methods have been applied...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Dec 2013

    An Integrated Distributed Clustering Algorithm for Large Scale WSN

    Latest researches in wireless communications and electronics has imposed the progress of low-cost wireless sensor nodes. Clustering is a thriving topology control approach, which can prolong the lifetime and increase scalability for wireless sensor networks. The admired criteria for clustering methodology are to select cluster heads with more residual energy...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jan 2014

    A Predictive Stock Data Analysis with SVM-PCA Model

    In this paper the properties of Support Vector Machines (SVM) on the financial time series data has been analyzed. The high dimensional stock data consists of many features or attributes. Most of the attributes of features are uninformative for classification. Detecting trends of stock market data is a difficult task...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jun 2013

    Unstructured Data Integration through Automata-Driven Information Extraction

    Extracting information from plain text and restructuring them into relational databases raise a challenge as how to locate relevant information and update database records accordingly. In this paper, the authors propose a wrapper to efficiently extract information from unstructured documents, containing plain text expressed with natural-like language. Their extraction approach...

    Provided By International Journal of Computer Science and Business Informatics

  • White Papers // Jun 2013

    A New Online XML Document Clustering Based on XCLS++

    Many methods have been proposed to XML document clustering. These methods can be divided into three categories: structure-based, content-based and hybrid methods. XCLS++ is one of the most effective and efficient algorithms to XML document clustering which fit into the structural clustering category. Because of its efficiency, XCLS++ can be...

    Provided By International Journal of Computer Science and Business Informatics