International Journal of Computer Science and Information Technologies

Displaying 1-40 of 664 results

  • White Papers // Jul 2014

    Comparative Analysis of Encrypted Video Streaming in Cloud Network

    Digital data is readily available in the form of pictures, videos, and over the internet. Therefore, the significance of increasing digital contents demands new challenges to ensure the distribution of the digital content. This dissertation addresses various encryption techniques for videos while streaming them in cloud environment. In these encryption...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Virtual Machine Placement Based on Disk I/O Load in Cloud

    In cloud virtualization allows to consolidate the services onto a lesser number of physical servers than originally required. The virtual machine is one of the most commonly used resource carriers in which business services are encapsulated. Virtual machine placement optimization, i.e., finding optimal placement schemes for virtual machines, and reconfigurations...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Secure Cloud - A Survey

    Cloud computing is an emerging technology where the data is outsourced to the cloud. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel control, cloud moves the application software and databases to the large data centers, where the management of the data and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Energy Economical Resolution for Heavy Computation Using Cloud

    In spite of the dramatic growth inside the variability of excellent phones in recent years, the challenge of restricted energy capability of these devices has not been resolved satisfactorily. However, inside the age of cloud computing, the limitation on energy capability is mitigated off in a cheap manner by offloading...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    A Study of the Issues and Security of Cloud Computing

    In this paper, the authors identify the issues and the solution to overcome these problems. Cloud computing is a subscription based service where they can obtain networked storage space and computer resources. This technology has the capacity to admittance a common collection of resources on request. It is the application...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Propagate Cooperative Caching on MANETS

    Mobile Ad-hoc NETworks (MANET) are formed by mobile devices, such as data enabled phones, electronic book readers. Generally users can share common interests in electronic interests in electronic content. As MANET become more and more crucial to everyday functioning of the people. This paper discusses cooperative caching technique for minimizing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    A Survey on Data Sharing Using Encryption Technique in Cloud Computing

    A model by which information technology services being delivered is resources are retrieved from the internet through web-based tools and applications, instead of direct connection to a server. The data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Privacy Preservation of Published Data through Record Elimination by Anonymizied Approach

    Data mining is the process of analyzing data. Data privacy is collection of data and dissemination of data. Privacy issues arise in different area such as health care, intellectual property, biological data, financial transaction etc. It is very difficult to protect the data when there is transfer of data. Sensitive...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Missing Value Imputation in Multi Attribute Data Set

    Data mining has made a great progress in recent year but the problem of missing data or value has remained great challenge for data mining. Missing data or value in a datasets can affect the performance of classifier which leads to difficulty of extracting useful information from datasets dataset taken...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    An Efficient Software Prediction on Cloud infrastructure With Self- Adaptive Classification Model

    Business information is stored in the cloud environment and offers proficient software services to the clients using internet. Cloud infrastructure delivers traditional software services among different cloud users. Decentralized self-adaptation mechanism has been implemented to maintain decentralization applicable to QoS exhibited cloud system. However, designing decentralized self-adaptation mechanism is not...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Survey on Data Mining with Privacy Preservation

    Data mining is the process to look for hidden patterns and trends in data that is not immediately apparent from summarizing the data. Due to the rapid development in technology, it needs updated techniques to provide privacy for data mining. There are various methods and techniques which have been created...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Segmentation of Mobile Customers for Improving Profitability Using Data Mining Techniques

    In this paper, the authors help in identifying the activities segmentation of mobile customers of different groups will be done based on some rules. Customers are segregated into groups under the categorization of network providers. There are different types of networks, but they used only four types of networks. These...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Storing, Querying and Validating Fuzzy XML Data in Relational Database

    Information ambiguity and uncertainty are the major issues in real real-world scenario and for resolving these issues fuzzy data management has been incorporated in different database management systems in different ways. Even though there is much literature on XML-to-relational storage, few of these have given satisfactory solutions to the given...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Studies on Clustering and Fuzzy Clustering

    In recent years, data mining is widely preferred area by researcher for discovering new knowledge and it has various concepts in that. The clustering is most popular concept in data mining and getting new knowledge from hidden data structure. Databases having lot of meaningful information and stored in unordered as...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Defend Data using ELGAMAL Digital Signature Data Decryption Algorithm

    Data security and encryption are now-a-days playing major role in Information Technology (IT) sector. Security problem generated creates exertion to the firm. They are several digital signature algorithms which are useful in providing security for the issues generated. Elgamal Digital Signature (EDS) algorithm which is used in wide applications had...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2014

    Cloud Computing: Designing Different System Architecture Depending On Real-World Examples

    The authors decided to focus on the categorization of cloud architectures by looking at the deployment and service models used to describe cloud computing. Researching which architectures are available is hard to do because cloud computing offerings are emerging at a rapid pace. It is not only hard to keep...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2014

    Design and Verification of USB 3.0 Link Layer (LTSSM)

    USB is an industry standard developed in the mid-1990s, it defines the cables, connectors and protocols used in a bus for connection and communication between computers and electronic devices. In this proposed design it mainly includes USB 3.0, LTSSM. The Link Training and Status State Machine (LTSSM) have downstream and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2014

    Categorize and Efficient: Top K Keyword Search of Spatial-Textual Data on the Road Network

    Spatio-textual information nowadays becomes so popular and mandatory for each searching application. Many organization have shown their concern regarding importance of using spatial information (\"Latitude\" & \"Longitude\") along with Textual data (i.e. Keyword Query \"Hospital\"). In parallel study, of searching trend and getting Top k result out of Spatio-Textual search...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    TBDS- A New Data Security Algorithm in Cloud Computing

    Currently many organizations and companies are facing potential threats to their data management systems and these security concerns provide a basis to conduct research in this particular area. In this paper, the authors are proposing an algorithm comprising digital signature with auto generated token ID allotted by the cloud service...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Enhancing Security and Concurrency in Distributed Database with 6 Bit Encryption Algorithm

    Distributed database is the collection of data which are distributed on different network on different computer due to which the authors eliminate single site failure. Since in previous paper RSA is used widely to provide security but in this paper discussion is based on the NTRU. NTRU is superior security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Towards Secure Cloud Infrastructure with Cloud Validation

    Cloud computing is an emerging standard with various computing ideas and technologies for the Internet, supporting cost-effective organization applications and IT infrastructure. The acceptance of cloud computing demand is gradually increasing over the years and the development of the global market is regularly rising. Security is the major issue often...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Cloud Based Managed File Transfer Services

    In today's era there is a need for managed file transfer services over trivial one's mainly due to the outsourcing done in product lifecycle management and a need to get files from source to the destination (through a chain of people) in a faster, more reliable way. By making use...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms

    Network security is one of the significant aspects of information security. Network security is involved in various business organizations, enterprises, and other types of institutions and it has become a pivotal function in building and maintaining today's modern high-growth networks. Cryptography is a technology used to provide of information security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Implementation of Enhanced Security on Vehicular Cloud Computing

    In a Vehicular Cloud (VC), underutilized vehicular resources including computing power, data storage, and internet connectivity can be shared between rented out over the Internet to various customers. If the VC concept is to see a wide adoption and to have significant societal impact, security and privacy issues need to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Look Over on Mining Sequential Patterns in Evolving Data Stream

    Data Stream is sequence of digitally encoded coherent signals (packets of data or data packets) used to send or receive information that is in the process of being transmitted. It is a continuous, rapid and time-varying streams of data elements. A growing number of applications generate the streams of data....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    An Overview on Data Mining

    In this paper, the authors present an overview of research issues in data mining. They discuss mining with respect to web data referred here as web data mining. In particular, their focus is on web data mining research in context of their web data mining project called 'A study on...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Review of QoS Based Service Populating for Cloud Based Mobile Apps

    Popularity of mobile devices network technologies increases day by day. Mobile devices always maintain network connectivity by different network providers. So if user moves around then they can access cloud services without any disadvantages. In current model when user moves from one geographical area to another he will keep accessing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    International Vulnerability Database Alliance as an Effective Vulnerability Disclosure Technique

    Vulnerability is one of the key factors that cause security incidents and has become a major international threat to network security. Vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability disclosure or the disclosure of a vulnerability is the revelation of a vulnerability to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Cloud-Based Multimedia Storage System with QoS Provision

    Recently, there are new trends in the way the authors use computers and access networks due to advanced mobile devices and network technologies. One of trend is cloud computing where resources are stored and processed on network. The other is mobile computing, where mobile devices such as smart phones and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Nymble:The Blocking System

    Unidentified systems permit users to get access to Internet services privately by utilising a series of routers to hide the client's IP address from the server. The achievement of such networks, although, has been restricted by users employing this anonymity for abusive purposes such as defacing well liked websites. Website...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Live Devices: Insider Threat to Resources

    Gray Hat hackers/Insider can use Live Linux distribution to get into the resources of primary/secondary installed Operating system. By using such devices and distributions they can access the critical point of an Operating system which make them able to control User/Critical files that cannot be accessed within the operating system...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Operating System Virtualization for Ubiquitous Computing

    The basic concept of virtualization is to provide the benefits of the services and components irrespective of its physical presence. Operating System (OS) virtualization describes the abstraction of an operating system from any underlying hardware architecture. OS virtualization is needed as it provides feature of transparent migration of applications. Ubiquitous...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Auditing Windows 7 Registry Keys to Track the Traces Left Out in Copying Files From System to External USB Device

    Today in the world of big data, information is critical and corporate professional firms are adopting the digital forensic technique for detecting the action timeline of the activities carried out. Digital forensics is an important subdivision of data and network security. With the increase in technology, attacks on data are...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Survey on Reducing Features to Improve Bug Prediction by Using Cos-Triage Algorithm

    Bugs are nothing but Software defects, present a serious challenge for system consistency and dependability. It is very difficult task to predict bugs. To detect the bugs from the software bug prediction is useful way. Machine learning classifiers have emerged newly as a way to envisage the existence of a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Survey on Opinion Mining and Summarization of User Reviews on Web

    Large amount of user generated data is present on web as blogs, reviews tweets, comments etc. This data involve user's opinion, view, attitude, sentiment towards particular product, topic, event, news etc. Opinion mining (sentiment analysis) is a process of finding users' opinion from user-generated content. Opinion summarization is useful in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Detection of Routing Misbehavior Nodes Using Improved 2-ACK in MANET'S (Simulation through NS-2)

    A MANET (Mobile Ad hoc NETwork) is a collection of individual mobile nodes which communicate with each other vis wireless link. In some cases the node which refuses to share its resources with the other for its own benefits are called selfish or misbehaving nodes. Because of these nodes in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Query Result Caching Using Dynamic Data Cache

    Backend database system is often the performance bottleneck when running applications. The need for speed is increasing rapidly so the authors must be able to handle large amount of data in small time units like seconds or even milliseconds. The main problem that affects this to be fulfilled is the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Optimization Technique in Server Virtualization

    In this paper, the earlier literature for resource optimization and virtualization has been presented. All the ideas that are developed have been understood and review has been presented for the same. Server virtualization is a key building block that enables application isolation, mobility, and partitioning of individual servers in the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Wireless Ad hoc Sensor Network for Depletion of Node Battery Life for Denial of Service

    Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. In this paper, the author have focused on resource depletion attacks at the routing protocol...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Review and Comparative Study of Clustering Techniques

    Clustering is an automatic learning technique which aims at grouping a set of objects into clusters so that objects in the same clusters should be similar as possible, whereas objects in one cluster should be as dissimilar as possible from objects in other clusters. Document clustering aims to group in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2012

    Manageable and Economical Connection of Centralized Repository Servers Using Server Ports

    Objective of centralized repository is to arrange an outsized number of server machines with little apparatus cost while providing high planning facility and bisection width. It is well understand that the present practice where servers are linked by a tree hierarchy of network switches cannot gather these necessities. In this...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2012

    Performance Analysis of Network Resources in Standard Access Protocols

    Wireless protocols resources and devices are constantly battery-powered, and hence expand the association lifetime and it is the primary concerns in the ubiquitous deployment of wireless networks. One approach is to efficiently utilize the limited energy supplies of the antenna is to have the access periodically putting resources to sleep...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2012

    Secure and Dependable Storage Services in Cloud Computing

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Automation of Data Clusters Based on Layered HMM

    One of the major problems in cluster analysis is the determination of the number of clusters in unlabeled data, which is a basic input for most clustering algorithms. Clustering is the process, where a given collection of unlabeled patterns (dataset), the data items are divided into groups (clusters) based on...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Estimation Methods for Microarray Data With Missing Values: A Review

    DNA microarrays have gained widespread uses in biological studies such as cancer classification, cancer prognosis and identifications of cell cycle-regulated genes of yeast because of their large number of genes and small size. But they often produce missing expression values due to various reasons which significantly affect the performance of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Windows Azure Platform: An Era for Cloud Computing

    Windows Azure platform is the Microsoft implementation of cloud computing. This paper covers detailed introduction to Windows Azure Platform. Windows Azure provides resources and services for consumers. The next part describes the five main components of Windows Azure: hardware is abstracted and exposed as compute resources. Physical storage is abstracted...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Cross Industry Survey on Data Mining Applications

    Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. Data mining tools predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. The automated, prospective...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Improving Software Development Process Through Data Mining Techniques Embedding Alitheia Core Tool

    Research in the fields of software quality, maintainability requires the analysis of large quantity of data, which originate from software projects. It is a challenging task in pre-processing the data and synthesizing the composite results. It is very often an error prone task. Data mining techniques are generally considered as...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    A Novel Approach for Integrating Heterogeneous Database Through XML

    This paper illustrates an interactive mapping technique based on XML technology being tested in some possible scenarios and its adaptability verified in simplifying the integration and exchange of data between different database systems. This paper is part of an effort in the development of a new technique for storing and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Role of Database in Multi Agent Resource Allocation Problem

    Multi-agent technology, a modern computer science tool, is widely used in developing intelligent systems. Agents in multi-agent system are autonomous and capable of doing tasks independently, however they share information with each other to achieve their respective goals. Information may be a result of task or a request to other...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    A New Efficient Approach Towards Steganography

    In this paper, steganography is used in a different way. Image is not transmitted over the channel rather image is used as a key between the sender and receiver means it acts as a shared key between the sender and receiver. The index array that contains the indices for their...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Adaptive MIMO-OFDM Scheme to Optimize User Data Rate Over Fading Channel

    The use of multiple antennas at both the transmitter and receiver has been proposed as one of the best way to provide both an increase in reliability and also in information transmission rate. In this paper, the importance of the quantity and quality of the channel state information available at...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Secured Agile Architecture for Context Aware Pervasive Computing

    Context refers to information such as location, time, user preferences, user emotions, environment status, computational devices and network parameters, etc. Context-aware pervasive computing utilizes the information about the physical world collected form various sensors and changes the behavior automatically considering current context, history and other user preferences. The context viewed...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    A Dynamic Fault Tolerant Routing Protocol for Prolonging the Lifetime of Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are being extensively used for various applications. WSNs consist of a large number of small nodes with sensing, computation, and wireless communication capabilities. Sensor nodes are typically resource deficient with energy being the most critical of all the resources. Efficient use of energy resources in sensor...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    A Fuzzy Approach for Reputation Management Using Voting Scheme in Bittorrent P2P Network

    Reputation management for peers in Bittorrent P2P network is very much important due to its open and anonymous nature. Some malicious peers distribute low quality or fake files in the network and pollute the environment. In this paper, the authors propose a fuzzy inference system to design P2P reputation management...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Energy Efficient Token Based MAC Protocol for Wireless Sensor Networks

    In this paper, the authors propose on energy efficient token based MAC protocol for WSNs, in order to reduce energy consumption of each sensor node which is one of the important issues to prolong the network lifetime. WSN consists of a large number of small and low-cost sensor nodes powered...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Performance Evaluation of UMTS-WLAN Interworking

    The main methods used to implement WLAN-3G inter working are: the mobile IP methods, the emulator method, and the gateway method. Each one of these methods enjoys some pros and suffers from some cons. In this paper, it is demonstrated to evaluate certain aspects of WLAN-3G inter working. Here, case...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2011

    Secured Proxy Blind Signature Scheme Based on DLP With Minimum Computation Cost

    Proxy blind signature is a combination 0f both the properties of proxy signature and blind signature scheme. This scheme is useful in many applications like e-voting, e-payment and mobile agent environments. This paper presents a new proxy blind signature scheme based on Discrete Logarithm Problem (DLP), which satisfies the secure...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Issues in Replicated Data for Distributed Real-Time Database Systems

    In both Distributed and Real Time Databases Systems replication are interesting areas for the new researchers. In this paper, the authors provide an overview to compare replication techniques available for these database systems. Data consistency and scalability are the issues that are considered in this paper. Those issues are maintaining...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Comparing the Efficiency of Minutia Based and Improved Fingercode Fingerprint Algorithm

    A biometric authentication system operates by acquiring bio-metric data from a user and comparing it against the template data stored in a database in order to determine the identity of an individual. Among all the biometric techniques fingerprint-based identification is the oldest method and is the most popular approach having...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Intelligent Data Analysis Using Data Mining Techniques

    The power of modern computing technology makes data gathering and storage easier. This leads to create new range of problems and challenges for data analysis. In this paper approach based on clustering techniques for outlier detection is presented. At first EM-Cluster algorithm is performed to identify the missing values through...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    A Novel Multiple Visual Secret Data Hiding Scheme

    Current advances in the technology are demanding novel secret sharing techniques. Splitting of textual information into shares is an age old process, wherein image encryption has gathered its own demand in the current technology. Visual cryptography is a technique which encrypts images into shares and has been proved to be...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    A Queuing Model for Congestion Control and Reliable Data Transfer in Cable Access Networks

    A set of simple queuing theory models which can model the average response of a network of computers to a given traffic load has been implemented. The impact of variations in traffic patterns and intensities, channel capacities, and message protocols can be assessed using them because of the lack of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Ambient Intelligence in Ubiquitous Robotics

    Ubiquitous robot is also known as ubibot, a third generation of robotics, which can give one various services at any place as well as any time in a ubiquitous space through a network. The previously ubiquitous robotics architecture is unable to remove the conflicting behavior as well as unable to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Data Security and Authentication Using Steganography

    Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication to hide the existence of a message from a third party. This proposed system deals with implementing security-using Steganography. In this technology, the end user identifies an image which is going to act as...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Minutiae Points Extraction From Iris for Biometric Cryptosystem

    Iris recognition is a proven, accurate means to identify people. An efficient method for personal identification based on the pattern of human iris is proposed in this paper. Crypto-biometrics is an emerging architecture where cryptography and biometrics are merged to achieve high level security systems. Iris recognition is a method...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    HARIALGM: Knowledge Discovery and Data Mining in Pedagogy With DNA Fingerprinting

    Knowledge Discovery and Data Mining (KDD) is a multidisciplinary area focusing upon methodologies for extracting useful knowledge from data and there are several useful KDD tools to extract the knowledge. The ongoing rapid growth of online data due to the Internet and the widespread use of databases have created an...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    A Personal Biometric Identification Technique Based on Iris Recognition

    The main objective of the spatial data mining is to discover hidden complex knowledge from spatial and not spatial data despite of their huge amount and the complexity of spatial relationships computing. However, the spatial data mining methods are still an extension of those used in conventional data mining. Spatial...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Spatial Data Mining: A Recent Survey and New Discussions

    The main objective of the spatial data mining is to discover hidden complex knowledge from spatial and not spatial data despite of their huge amount and the complexity of spatial relationships computing. However, the spatial data mining methods are still an extension of those used in conventional data mining. Spatial...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Estimating Maximum Confidence and Trustworthiness for Facts for Information Providers on the Web

    Web mining is the application of data mining techniques to discover patterns from the Web according to analysis targets. Data quality is the quality of data of high quality "If they are fit for their intended uses in operations, decision making and planning" or refers to the degree of excellence...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Data Management in Mobile Distributed Real Time Database Systems: Reviews and Issues

    Recent advances in wireless communication networks and portable computers have led to the emergence of a new research area called mobile computing systems. An important part of the research conducted in mobile computing systems has been done on mobile data management. What make the mobile data management different from the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    ANN Paradigms for Audio Pattern Recognition

    Pattern Recognition is the process to classify data or patterns based on either a priori knowledge or on statistical information extracted from the patterns. An audio pattern recognition problem is based on speech patterns spoken, which can be interpreted as speaker dependent or speaker independent. Artificial Neural Network (ANN) is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Secured Partial MP3 Encryption Technique

    The encryption algorithms are applied for giving security to the audio data. Many encryption algorithms have been proposed to meet the security requirements of the different applications. But, lack of application friendliness limits those algorithms from practical implementation. Encryption technique can be applied on the Moving Picture Expert Group Layer...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2012

    Computational Intelligence Aided Black-Hole Detection for Secure Data Dissemination Based on PRP Routing in WSN

    Security and Energy restriction are of most concern in pushing the success of Wireless Sensor Networks (WSNs) for their wide deployment. Despite years of much intensive research, deploying secure communication between wireless nodes remains the cumbersome setup process. Due to the deprived physical layout of sensor nodes, it is generally...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2012

    Effect of Various Attacks on Watermarked Images

    Watermarked images are affected by various attacks such as cropping, salt&pepper noise and rotation. These attacks destroy the inserted watermark, so that the copyright problem may arise. The effect of these attacks can be reduced by properly inserting the watermark with effective algorithm. In this paper, a blind transform domain...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2012

    Secure Data in Wireless Sensor Network Via AES (Advanced Encryption Standard)

    One of the main goals of sensor networks is to provide accurate information about a sensing field for an extended period of time. The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. Because sensor networks may...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2012

    Energy Conservation Techniques and Application for Wireless Sensor Networks

    This paper is to address the problem of energy conservation in wireless sensor networks. Since, wireless sensor networks typically consist of tiny sensors with a scarce energy resource, energy conservation is a critical issue to be addressed. This paper addresses the energy conservation issue by tackling two fundamental problems: network...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2012

    Survey for Generating an Ideal Password Authentication Scheme Which Results in Fortification of Transport Layer Security Protocol

    Fortification of transport layer security protocol is required because whenever there is communication between Client and Server over a public link, then proving an identity becomes quiet complex. When resources are to be accessed from remote systems through public network then identity authentication parameters are the de-facto-standard. This paper elucidates...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2012

    Attacks Due to SQL Injection & Their Prevention Method for Web-Application

    The use of web application has become increasingly popular in the people daily life as reading news paper, making online payments for shopping, etc. At the same time there is an increase in number of attacks that target them. In this paper, the authors present a detailed review on various...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2012

    Dynamic User Profiles Using Fusion of Web Structure, Web Content and Web Usage Mining

    Web mining is the application of data mining techniques to extract knowledge from Web. Web mining has been explored to a vast degree and different techniques have been proposed for a variety of applications that includes Web Search, Classification and Personalization etc. In this paper, the authors highlight the significance...

    Provided By International Journal of Computer Science and Information Technologies