International Journal of Computer Science and Network

Displaying 1-40 of 68 results

  • White Papers // Jun 2014

    Dynamic Data Mining Tool on Distributed Encrypted Data

    Now-a-days the security of the system matters because system gets easily hacked, so deal with this problem. Here the authors introduce the 3d key generation. It generated from RGB colors and their priority. User data distributed in smaller parts and uploaded server side database. To maintain the security of data,...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2014

    NIOS II Based Embedded Web Server Development for Networking Applications

    In this paper the authors presents design of NIOS II based embedded web server for networking applications. The altera's SOPC (System On Programmable Chip) development tool is used to implement the system, which contains NIOS II core processor. It includes development of embedded Web server application design based on the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2014

    Cloud Based Web IDE for Collaborating Programmers

    Cloud computing is a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage. It is a technology that uses the internet and central remote servers to maintain data and applications. It allows consumers...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    The Impact of Creativity on Organizational Knowledge Management Processes

    In modern economics, knowledge is the main source for economical and industrial development. Knowledge consists of subjective ideas, realities, concepts, data and techniques recorded in human memory which originates from the human brain and is based on information gathered by individual experience, beliefs and values along with their decisions and...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Evaluation of LSB Data Hiding in Various Images

    Data encryption is not the only safe way to protect data from penetration. There has emerged a set of new technologies that provides protection with or without data encryption technology such as data hiding. The word steganography (from Greek steganos, or \"Covered,\" and graphie, or \"Writing\") is the hiding of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Secured Data Storage with Enhanced TPA Auditing Scheme using Merkle Hash Tree in Cloud Computing

    In this paper, the authors proposed system provides secure cloud storage system supporting privacy-preserving public auditing. In which the data owner uploads the data in the cloud server and they are allowed to modify the data using the private key. The cloud severs stores the data and split those data...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Evaluation of Web Mining Approach

    With abundance of data on system it is complicated to accessing facts oriented information from the WWW and provided a reasonable outcome to the users. It has become mandatory to utilize some approach so that valuable information can be extracted. Web mining is most promising solution in such circumstances. The...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    Load Balancing Techniques: Major Challenges in Cloud Computing - A Systematic Review

    Cloud computing is an emerging area in the field of Information Technology (IT). Load balancing is one of the main challenges in cloud computing. It is a technique which is required to distribute the dynamic workload across multiple nodes to ensure that no single node is overloaded. Load balancing techniques...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    A Survey on Malicious Node Detection Method for Delay Tolerant Network

    Delay Tolerant Networks (DTNs) is the one of the areas in the field of wireless communication, where in delay is particularly high. They are promising technology in vehicular, disaster response, under water and satellite networks. Delay tolerant networks characterized by large end to end communication latency and the lack of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    File Management System in Multi Cloud Storage System

    Cloud computing service providers take advantage of virtualization technologies, combined with self-service capabilities, to offer cost-effective access to computing resources via the internet. But major issue in cloud computing is security. Several concerns which identify security requirements in cloud computing. In this paper, the authors have proposed to implements, the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Improvised Security for RDF Using Random Salt and Levels with Bi-Directional Translation to Relational Database

    A middleware framework is required for semantic web applications to access data from relational databases and legacy storage systems, without replication or synchronization. Resource Description Framework (RDF) is one such type of middleware framework which bridges the gap between two needs. Though, there were some efforts to publish relational data...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    A Survey on Privacy Enhancement in Cloud Computing Using Identity Management

    Cloud computing is a better way to increase the capabilities dynamically without the expenses spent in new infrastructure or licensing new software. Though cloud computing is providing better utilization of resources by virtualization techniques and taking up much of the work load from the user, it is fraught with security...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Vulnerability, Human Behaviour, Hazards and Expected Utility in the Context of Risk Management

    In this paper, the authors use four main dimensions: vulnerability, human behavior, hazards and expected utility to analyze their impact in scenario planning when cross-matched with human development adjusted, gender inequality and multidimensional poverty indexes within flood risk management strategies. They argue that the four dimensions are among the central...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    DPMAP for Abrupt Manuscript Clustering With Attribute Partition

    Discovery the suitable quantity of huddle to which credentials should be separation is vital in manuscript huddle. In this paper, the authors suggest a fresh approach, namely DPMAP (Dirichilet Process Model Attribute Partition), to realize the embryonic huddle construction based on the DPM model lack in require the amount of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Data Warehouse Creation for Preparing an Electricity Statistics Dashboard

    The 21st century is making use of electricity so extensively that it has almost changed the face of the earth. To generate and harness electricity on a large scale means the development of machinery capable of doing so. An essential strategy for meeting the energy challenge is to concentrate on...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Data Minder Using Steganography: Technology of Data Encryption

    The internet and the World Wide Web have revolutionized the way in which digital data is distributed. The growing possibilities of modern communication need special means of security especially on computer network. In this paper a new randomized secure data hiding algorithm using file hybridization is proposed for strengthening the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Review of Various Algorithms Used in Hybrid Cryptography

    Cryptography enables the user to transmit confidential information across any insecure network so that it cannot be used by an intruder. Cryptography is the process that involves encryption and decryption of text using various mechanisms or algorithms. A cryptographic algorithm is a mathematical function that can be used in the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Taxonomy of Dummy Generation Techniques for Preserving Location Privacy

    With the advent of GIS, internet and mobile telephony, location based services are becoming the need of the day. Privacy issues arising while using location based services have the potential to become the serious apprehensions. Existing privacy techniques based on anonymity generally fails in to offer the required privacy. The...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2013

    Review on Fragment Allocation by Using Clustering Technique in Distributed Database System

    Considerable Progress has been made in the last few years in improving the performance of the distributed database systems. The development of Fragment allocation models in Distributed database is becoming difficult due to the complexity of huge number of sites and their communication considerations. Under such conditions, simulation of clustering...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2013

    Application of Data Mining In Marketing

    One of the most important problems in modern finance is finding efficient ways to summarize and visualize the stock market data to give individuals or institutions useful information about the market behavior for investment decisions. The enormous amount of valuable data generated by the stock market has attracted researchers to...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2013

    A Dynamic Performance-Based Flow Control Method for High- Speed Data Transfer

    New types of specialized network applications are being created that need to be able to transmit large amounts of data across dedicated network links. This paper develops a protocol, Performance Adaptive UDP (henceforth PA-UDP), which aims to dynamically and autonomously maximize performance under different systems. A mathematical model and related...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2013

    Performance Evaluation of Routing Protocol for Mobile Ad-Hoc Network

    MANET is the compilation of wireless portable nodes which dynamically arranges a short term network without the use of any centralized administration or network infrastructure. Routing protocols used in mobile ad hoc networks must mechanically change to environments that can vary between the extremes of low mobility with high bandwidth,...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Digital Data Security and Copyright Protection Using Cellular Automata

    Computer networks vulnerable to penetration and thus steal or modify digital data. For this the authors need the security of digital data and the means to protect the property rights of these data led to more interest in the development of new methods for watermark signs. The emergence of many...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Contribution to Securing Communications on VOIP

    The authors contribute to the study of the security of voice in IP (Internet Protocol) network, which will become in the near future, a universal standard of voice and video networks telecommunications. As with any phone call, it is a need to encrypt communication to respect the rights and privacy...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Using Unobtrusive Techniques for Detecting Leakage of Data

    While doing business, there are situations when some important information or data should be handed over to some third parties. The data important to organization must be secured but the third parties are not that careful about the data. So there is possibility that the data gets leaked. Here in...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Activity Modeling in Smart Home Using High Utility Pattern Mining Over Data Streams

    Smart home technology is a better choice for the people to care about security, comfort and power saving as well. It is required to develop technologies that recognize the Activities of Daily Living (ADLs) of the residents at home and detect the abnormal behavior in the individual's patterns. Data mining...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Algorithm and Approaches to Handle Large Data - A Survey

    Data mining environment produces a large amount of data that need to be analyzed; patterns have to be extracted from that to gain knowledge. In this new era with boom of data both structured and unstructured, in the field of genomics, meteorology, biology, environmental research and many others, it has...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Efficient Algorithms for Materialized View Selection in Data Warehousing Environment

    The notion of data warehouse can be defined as subject-oriented, integrated, nonvolatile and time-variant collection of data in support of making management's decision effectively, for the success of data warehouse accurate and timely consolidated information as well as quick query response times is the fundamental requirement. To avoid accessing from...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Cross-site Scripting Attacks on Android WebView

    WebView is an essential component in Android and iOS. It enables applications to display content from on-line resources. It simplifies task of performing a network request, parsing the data and rendering it. WebView uses a number of APIs which can interact with the web contents inside WebView. In the current...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Wireless Networks Security Using Dispersive Routing Mechanism

    Attacks in wireless sensor networks are Compromised-Node (CN) and Denial-Of-Service (DOS). In the Compromised-Node attack (CN attack); an adversary physically compromises a subset of nodes to eavesdrop information, whereas in the denial-of-service attack, the adversary interferes with the normal operation of the network by actively disrupting, changing, or even paralyzing...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Security Threats in Prepaid Mobile

    Recent communications environment significantly expand the mobile environment. Prepaid mobile services for 3G networks enables telecommunication to sign up new users by utilizing the latest in converged billing technologies. The worldwide mobile communication market is exploding, and 50 percent of subscribers are expected to use prepaid billing. Prepaid services are...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    A Reactive Protocol for Privacy Preserving Using Location Based Routing in MANETs

    Mobile Ad-hoc NETworks (MANETs) are an infrastructure less, self configuring network. These networks can be setup easily anywhere and anytime without any base infrastructure, thus they have proved to be very efficient is rescue related areas like flood and fire. MANETs are now extended to be used in military and...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Scalable ALARM: Anonymous Location Aided Routing in Hostile MANETs

    Hostile MANETs are significant because of their applications in military and law enforcement area where the identity of the nodes cannot be revealed since there is a risk of tracing and locating them with their identities, which makes the network vulnerable to attacks. Therefore communication between nodes should be performed...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    An Approach to Authenticate User's Mobile Device and to Preserve Privacy Towards Location Proof (A2MP2LP)

    The purpose of this approach is to authenticate user's mobile device and to preserve privacy towards location proof. A person's location proof depends on the user's mobile device position. Biometric authentication technique was proposed in order to avoid malicious users from prevaricating their identity. The location proofs are generated by...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

    Visual Cryptography Scheme (VCS) is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system without the aid of computers. As network technology has been greatly advanced, much information is transmitted via the internet conveniently...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Preserving User Location Privacy with Safe Zone for Spatial Queries

    Now-a-days the use of Location Based Services (LBS) gained importance among the users. In most of the cases, users do not want to reveal their personal information to their service providers. Sometimes mobile devices are out of the specified range which cannot be processes by servers. Hence confidentiality, privacy and...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Energy Efficient VM Live Migration in Cloud Data Centers

    Server consolidation is one of the techniques to reduce the overall energy consumption in the data centers besides various hardware and software features. Virtualization Technology (VT) has made this possible with the help of various hypervisors which helps to create the Virtual Machines (VMs). During consolidation there are various parameters...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Energy-Efficient Cloud Computing: A Vision, Introduction, and Open Challenges

    Cloud computing is offering utility-oriented IT services to users worldwide. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. In recent years, energy efficiency has emerged as one of the most important design requirements for modern computing systems, such as data centers...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jan 2013

    Survey on Security Challenges in VANET

    Recent advances in development of Wireless Communication in Vehicular Ad-hoc NETwork (VANET) has provided emerging platform for industrialists and researchers. Vehicular ad-hoc networks are multi-hop networks with no fixed infrastructure. It comprises of moving vehicles communicating with each other. One of the main challenge in VANET is to route the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jan 2013

    Secure and Stable VANET Architecture Model

    Vehicular Ad-hoc NETwork (VANET) is known as an essential factor of smart Transportation systems. The key benefit of VANET communication is noticed in dynamic protection systems, which objective to enhance security of travelers by exchanging caution messages between automobiles. Other applications and personal services are also allowed in order to...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2012

    Web Application and its Marketing as Cloud Computing

    A web application uses two words \"Web\" and \"Application\". Where web means web browser and application means computer software. Web browser is used to search the information on the World Wide Web i.e. www or on Internet, where as application is used to solve the single or multiple tasks, depending...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Algorithm and Approaches to Handle Large Data - A Survey

    Data mining environment produces a large amount of data that need to be analyzed; patterns have to be extracted from that to gain knowledge. In this new era with boom of data both structured and unstructured, in the field of genomics, meteorology, biology, environmental research and many others, it has...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Efficient Algorithms for Materialized View Selection in Data Warehousing Environment

    The notion of data warehouse can be defined as subject-oriented, integrated, nonvolatile and time-variant collection of data in support of making management's decision effectively, for the success of data warehouse accurate and timely consolidated information as well as quick query response times is the fundamental requirement. To avoid accessing from...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Energy Efficient VM Live Migration in Cloud Data Centers

    Server consolidation is one of the techniques to reduce the overall energy consumption in the data centers besides various hardware and software features. Virtualization Technology (VT) has made this possible with the help of various hypervisors which helps to create the Virtual Machines (VMs). During consolidation there are various parameters...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Energy-Efficient Cloud Computing: A Vision, Introduction, and Open Challenges

    Cloud computing is offering utility-oriented IT services to users worldwide. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. In recent years, energy efficiency has emerged as one of the most important design requirements for modern computing systems, such as data centers...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2012

    Web Service Integration Using Cloud Data Store

    Current web users usually have their own files, work documents, communications and personal contacts distributed in the storage systems of many widely-used Internet services (e.g. Google Docs, Gmail, Face book, Zoho). Therefore, they face the challenge of being not able to have an integrated view for their related data objects...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Data Warehouse Creation for Preparing an Electricity Statistics Dashboard

    The 21st century is making use of electricity so extensively that it has almost changed the face of the earth. To generate and harness electricity on a large scale means the development of machinery capable of doing so. An essential strategy for meeting the energy challenge is to concentrate on...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Data Minder Using Steganography: Technology of Data Encryption

    The internet and the World Wide Web have revolutionized the way in which digital data is distributed. The growing possibilities of modern communication need special means of security especially on computer network. In this paper a new randomized secure data hiding algorithm using file hybridization is proposed for strengthening the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Review of Various Algorithms Used in Hybrid Cryptography

    Cryptography enables the user to transmit confidential information across any insecure network so that it cannot be used by an intruder. Cryptography is the process that involves encryption and decryption of text using various mechanisms or algorithms. A cryptographic algorithm is a mathematical function that can be used in the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Taxonomy of Dummy Generation Techniques for Preserving Location Privacy

    With the advent of GIS, internet and mobile telephony, location based services are becoming the need of the day. Privacy issues arising while using location based services have the potential to become the serious apprehensions. Existing privacy techniques based on anonymity generally fails in to offer the required privacy. The...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2013

    Application of Data Mining In Marketing

    One of the most important problems in modern finance is finding efficient ways to summarize and visualize the stock market data to give individuals or institutions useful information about the market behavior for investment decisions. The enormous amount of valuable data generated by the stock market has attracted researchers to...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2013

    A Dynamic Performance-Based Flow Control Method for High- Speed Data Transfer

    New types of specialized network applications are being created that need to be able to transmit large amounts of data across dedicated network links. This paper develops a protocol, Performance Adaptive UDP (henceforth PA-UDP), which aims to dynamically and autonomously maximize performance under different systems. A mathematical model and related...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2013

    Performance Evaluation of Routing Protocol for Mobile Ad-Hoc Network

    MANET is the compilation of wireless portable nodes which dynamically arranges a short term network without the use of any centralized administration or network infrastructure. Routing protocols used in mobile ad hoc networks must mechanically change to environments that can vary between the extremes of low mobility with high bandwidth,...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Contribution to Securing Communications on VOIP

    The authors contribute to the study of the security of voice in IP (Internet Protocol) network, which will become in the near future, a universal standard of voice and video networks telecommunications. As with any phone call, it is a need to encrypt communication to respect the rights and privacy...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Using Unobtrusive Techniques for Detecting Leakage of Data

    While doing business, there are situations when some important information or data should be handed over to some third parties. The data important to organization must be secured but the third parties are not that careful about the data. So there is possibility that the data gets leaked. Here in...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2013

    Activity Modeling in Smart Home Using High Utility Pattern Mining Over Data Streams

    Smart home technology is a better choice for the people to care about security, comfort and power saving as well. It is required to develop technologies that recognize the Activities of Daily Living (ADLs) of the residents at home and detect the abnormal behavior in the individual's patterns. Data mining...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jun 2012

    Integrating Heterogeneous Data Sources Using XML Mediator

    In the past decade, research papers in heterogeneous database integration have established a good and solid framework to alleviate this task. However, there are still works need to be accomplished to bring these achievements to be easily implemented and integrated to internet applications. This paper presents the XML mediator, a...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    A Survey on Spatio-Temporal Data Mining

    Data mining is the process of searching valuable information by analyzing large volumes of data through automatic or semiautomatic means to discover meaningful patterns and rules. The field of spatio-temporal data mining is concerned with such analysis in the case of spatial and temporal interdependencies. Many interesting techniques of spatio-temporal...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Credit Card Fraud: The Study of its Impact and Detection Techniques

    With the rise and swift growth of E-commerce, credit card uses for online purchases has increased dramatically and it caused sudden outbreak in the credit card fraud. Fraud is one of the major ethical issues in the credit card industry. With both online as well as regular purchase, credit card...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Wireless Sensor Network Architectures for Different Systems

    Recent technological advances enabled the design and proliferation of wireless sensor networks capable of autonomously monitoring and controlling environments. One of the most promising applications of sensor networks is for human health monitoring. The wireless body area networks promise to revolutionize health monitoring. Within a smart building many sensors and...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Modified Mutual Authentication and Key Agreement Protocol Based on NTRU Cryptography for Wireless Communications

    In this paper the authors implemented new methods of public keys exchange in the existing mutual authentication and key agreement protocol in wireless communication. The existing mutual authentication and key agreement protocol in wireless communications has been studied and the break points have been observed. They used \"CS attack\" to...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Construction of Extended Visual Cryptography Scheme for Secret Sharing

    Visual cryptography facilitates hiding a secret image into n number of shares distributed to n number of participants. This kind of scheme is very useful as the participants in such security systems need not know the cryptographic knowledge in order to recover the secret image from the shares. This phenomenon...

    Provided By International Journal of Computer Science and Network

  • White Papers // Aug 2012

    Energy Efficient Cooperative Mimo Communication for Uncorrelated Data Transmission at Wireless Sensor Network

    Energy efficient data transfer is one of the key factors for Wireless Sensor Network (WSN). Cooperative MIMO explores the wireless communication schemes between multiple sensors emphasizing the Multiple Input Multiple Output (MIMO) structure. An energy efficient cooperative technique is proposed for a WSN where selected numbers of sensors at the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Oct 2012

    Graphical User Authentication for E-Transaction

    The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. A graphical based password is one promising alternatives of textual passwords. According to human psychology, humans are able to remember pictures easily. Recently, E-transactions have become an important...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2012

    Privacy Preserving Data Mining Operations without Disrupting Data Quality

    Data mining operations help discover business intelligence from historical data. The extracted business intelligence or actionable knowledge helps in taking well informed decisions that leads to profit to the organization that makes use of it. While performing mining privacy of data has to be given utmost importance. To achieve this...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jan 2013

    Class Imbalance Problem in Data Mining: Review

    In last few years there are major changes and evolution has been done on classification of data. As the application area of technology is increases the size of data also increases. Classification of data becomes difficult because of unbounded size and imbalance nature of data. Class imbalance problem become greatest...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jan 2013

    Review Paper on Concept Drifting Data Stream Mining

    The data stream in dynamic and emerging environment such as e-commerce, financial data analysis, sensor systems, social networking and many more fields, that possess distribution. The term concepts refer to the whole distribution of the problem in a certain point in time and hence the concept drift represents a change...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jan 2013

    Authentication System Securing Index of Image Using SVD and ECC

    In this paper, the authors' goal is to test a new authentication system, at the same time they secure the information in a database by only storing the information representing. This paper presents a new approach to securing information stored in a database. It has three components including: an operation...

    Provided By International Journal of Computer Science and Network

  • White Papers // Jan 2013

    A Survey on Location Based Authentication Protocols for Mobile Devices

    As per the recent studies, the volatile growth has been seen in the use of mobile devices as the supporting technology for accessing internet based services, as well as for personal communication needs in networking. Various studies indicate that it is impossible to utilize strong cryptographic functions for implementing security...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    An Approach to Authenticate User's Mobile Device and to Preserve Privacy Towards Location Proof (A2MP2LP)

    The purpose of this approach is to authenticate user's mobile device and to preserve privacy towards location proof. A person's location proof depends on the user's mobile device position. Biometric authentication technique was proposed in order to avoid malicious users from prevaricating their identity. The location proofs are generated by...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Protection of Privacy in Visual Cryptography Scheme Using Error Diffusion Technique

    Visual Cryptography Scheme (VCS) is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system without the aid of computers. As network technology has been greatly advanced, much information is transmitted via the internet conveniently...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2013

    Preserving User Location Privacy with Safe Zone for Spatial Queries

    Now-a-days the use of Location Based Services (LBS) gained importance among the users. In most of the cases, users do not want to reveal their personal information to their service providers. Sometimes mobile devices are out of the specified range which cannot be processes by servers. Hence confidentiality, privacy and...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    Load Balancing Techniques: Major Challenges in Cloud Computing - A Systematic Review

    Cloud computing is an emerging area in the field of Information Technology (IT). Load balancing is one of the main challenges in cloud computing. It is a technique which is required to distribute the dynamic workload across multiple nodes to ensure that no single node is overloaded. Load balancing techniques...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    A Survey on Malicious Node Detection Method for Delay Tolerant Network

    Delay Tolerant Networks (DTNs) is the one of the areas in the field of wireless communication, where in delay is particularly high. They are promising technology in vehicular, disaster response, under water and satellite networks. Delay tolerant networks characterized by large end to end communication latency and the lack of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Feb 2014

    File Management System in Multi Cloud Storage System

    Cloud computing service providers take advantage of virtualization technologies, combined with self-service capabilities, to offer cost-effective access to computing resources via the internet. But major issue in cloud computing is security. Several concerns which identify security requirements in cloud computing. In this paper, the authors have proposed to implements, the...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    Vulnerability, Human Behaviour, Hazards and Expected Utility in the Context of Risk Management

    In this paper, the authors use four main dimensions: vulnerability, human behavior, hazards and expected utility to analyze their impact in scenario planning when cross-matched with human development adjusted, gender inequality and multidimensional poverty indexes within flood risk management strategies. They argue that the four dimensions are among the central...

    Provided By International Journal of Computer Science and Network

  • White Papers // Dec 2013

    DPMAP for Abrupt Manuscript Clustering With Attribute Partition

    Discovery the suitable quantity of huddle to which credentials should be separation is vital in manuscript huddle. In this paper, the authors suggest a fresh approach, namely DPMAP (Dirichilet Process Model Attribute Partition), to realize the embryonic huddle construction based on the DPM model lack in require the amount of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Evaluation of LSB Data Hiding in Various Images

    Data encryption is not the only safe way to protect data from penetration. There has emerged a set of new technologies that provides protection with or without data encryption technology such as data hiding. The word steganography (from Greek steganos, or \"Covered,\" and graphie, or \"Writing\") is the hiding of...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Secured Data Storage with Enhanced TPA Auditing Scheme using Merkle Hash Tree in Cloud Computing

    In this paper, the authors proposed system provides secure cloud storage system supporting privacy-preserving public auditing. In which the data owner uploads the data in the cloud server and they are allowed to modify the data using the private key. The cloud severs stores the data and split those data...

    Provided By International Journal of Computer Science and Network

  • White Papers // Apr 2014

    Evaluation of Web Mining Approach

    With abundance of data on system it is complicated to accessing facts oriented information from the WWW and provided a reasonable outcome to the users. It has become mandatory to utilize some approach so that valuable information can be extracted. Web mining is most promising solution in such circumstances. The...

    Provided By International Journal of Computer Science and Network