International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 81-120 of 757 results

  • White Papers // Feb 2014

    Algorithm for Identifying Relevant Features Using Fast Clustering

    In the high dimensional data set having features selection involves identifying a subset of the most useful features that produce compatible results as the original entire set of features. A fast algorithm may be evaluated from both the ability concerns the time required to find a subset of features and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Cloud Computing- SPI Framework, Deployment Models, Challenges

    Cloud Computing is a \"Buzz word\" encompassing a wide variety of aspects. Clouds are a large pool of easily useable and accessible virtualized resources (hardware, development platforms and/or services). Most of the people are already using cloud computing in their daily lives for personal use, and now enterprises are rapidly...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Mining to Support Decision Process in Decision Support System

    Recent alliance use a come to of types of decision support systems to make feasible decision support. In lots of gear OLAP based tools are used in the industry area enabling quite a few views on data and all the way on or after side to side that a deductive...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Mining: Various Issues and Challenges for Future A Short discussion on Data Mining issues for future work

    Generally mining of data is a well-known technique for automatically and intelligently extracting information or knowledge from a large amount of data, however, it can also disclosure sensitive information about individuals compromising the individual's right to privacy. It is a process to extract the implicit information; knowledge which is potentially...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Memory Required for Wireless Sensor Nodes on the Basis of Characteristics and Behaviour when using TinyOS

    In this paper sensor nodes are used for TinyOS. These sensor nodes behavior and working process have defined and compare with other sensor nodes that are used for other TinyOS. A large no of sensor nodes are used in current time. Each sensor node has own characteristics and properties. According...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Pool Management Scheme Applied on Cloud-Based Mobile Media Environment With Service-Populating and QoS-Aware Mechanisms

    To use current service delivery models, mobile devices moving from one geographical location to another will keep accessing those services from the local Cloud of their previous network. This might lead to moving a large volume of data over the Internet backbone over long distances. This scenario highlights the fact...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Superior Advance for Explore Results Using Web Mining

    An increasing number of databases have become web accessible through HTML form-based search interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for human browsing. In this project proposed automatic annotation results for both image and page labels from aligned groups of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Watermarking Techniques for Ownership Protection of Relational Databases

    In today's internet based application environment digitization is growing very rapidly, with that it is very difficult to secure the users own digital assets because all the data on the internet is available everywhere with free of cost and anybody can steal their data and claim its ownership. In current...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Study on Various Service Model And Service Provider of Cloud Computing For Selecting The Service Focused on Requirement

    This paper is presenting a comparative study on various service provider of cloud computing which is growing very fast in the era of internet. Cloud computing provide various services have tremendous used for IT companies. The study of this paper will help to give a better comparison between various service...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Dynamic Content Management System for Collaborative Testing Of Web Services

    Software testers are confronted with great challenges in testing WS. They must meet a wide range of test requirements. They must deal with the diversity of implementation techniques used by the other services. An automated testing technique must be developed to be capable of testing on-the-flynonintrusively and nondisruptively. The ontology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Agile Data Collection Tool for Computing Agility

    To deliver any working software at faster rate is the requirement of today's software industry. Thus, agile methods are emerging as most promising software development processes for the organizations. These methods ensure better customer collaboration, simplicity, changes at any stage with least emphasis on documentation. In this paper, the authors...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Threats of Botnet to Internet Security and Respective Defense Strategies

    Botnets are one of the most dangerous threats to internet security. The problem of Botnet is global in nature. A botnet is a network of computers infected with a malicious program that allows cybercriminals to control the infected machines remotely without the user's knowledge. Their target is to steal valuable...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey on Efficient Incremental Algorithm for Mining High Utility Itemsets in Distributed and Dynamic Database

    Data mining is the process of analyzing data from different perspectives and summarizing it into useful information. It can be defined as the activity that extracts information contained in very large database. That information can be used to increase the revenue or cut costs. Association Rule Mining (ARM) is finding...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Privacy and Security on Cloud Data Storage Using Hybrid Encryption Technique

    In present scenario cloud network is a boon in network technology. It is providing number of services which are very difficult to summarize because each and everything on cloud is completely dependent on virtualization. Microsoft 2012, window azure, IBM...etc are few companies which are providing these services in a nominal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Review on Automatic Annotation Search from Web Database

    The internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexible Information Extraction (IE) systems that transform the web pages into program-friendly structures such as a relational database...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Investigating TCP/IP, HTTP, ARP, ICMP Packets Using Wireshark

    The effect of increasing changes in the network led to threats and security issues that has made monitoring and analysis a challenging task. A good understanding of network, type of network traffic is the good way of solving problems on the network like congestion and bandwidth. In this paper architecture...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Reducing HTTP Collapse with Usage of Pattern Methods

    Security is the major concern in today's scenario a vigorous security mechanism is needed to secure the network from unwanted traffic. There are lots of technologies developed to provide a se currently one of them is by utilizing \"Signature-based\" detection can't bare stressed traffic, where marketing value is incrementing. Signature...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Finding Frequent and Maximal Periodic Patterns in Spatiotemporal Databases Towards Big Data

    Data mining used to find hidden knowledge from large amount of databases. Periodic pattern mining is useful in weather forecasting, fraud detection and GIS Applications. In general, spatio-temporal pattern discovery process finds the partially ordered subsets of the event-types whose instances are located together and occur serially for a given...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    An RFID Mutual Authentication Protocol Using ECIES

    Security of data is a major issue in RFID environment as RFID is a wireless radio frequency devices used in the wireless network. The data reads by the tag is send to reader which is then stored at the server, but security is an important concern during the transmission of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey of Sensitive Information Hiding Techniques

    In this paper the authors gave an overview of the new and rapidly emerging research area of privacy preserving data mining. Privacy preserving in data mining has been a heart favorite topic of researchers from many years. Every organization contains sensitive data & such data is needed to be protected...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey of Different Contract Signing Protocols

    Today in the field of security there are various protocols and authentication techniques that make an application in the network more secure and free from various attacks in the network. There are various applications which require exchange of data between parties. A fair exchange is required since the chances of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    An Empirical Study of Security Issues in Grid Middleware

    With the passing of each day, grid computing and cloud computing are becoming an important integral part of various applications. More and more software professionals and corporate are focusing on these high performance computing mechanisms. These mechanisms are tremendously evolving as users are also continuously striving for smarter applications and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Lossless Data Hiding using Histogram Modification and Hash Encryption Scheme

    The security of multimedia data can be done with encryption or data hiding algorithms. This paper attempts to undertake the study of authentication creation and proprietorship checking using linear histogram and non linear equalize histogram techniques with and without hash encryption algorithm. The development of information hiding techniques provides a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    A Survey on Data Mining Algorithms on Apache Hadoop Platform

    Apache hadoop is a major innovation in the IT market place last decade. From humble beginnings apache hadoop has become a world-wide adoption in data centers. It brings parallel processing in hands of average programmer. As more data centers supports hadoop platform, it becomes imperative to migrate existing data mining...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Test Data Compression for Low Power Testing of VLSI Circuits

    The two major areas of concern in the testing of VLSI circuits are test data volume and excessive test power. Among the many different compression coding schemes proposed till now, the CCSDS (Consultative Committee for Space Data Systems) lossless data compression scheme is one of the best. This paper discusses...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Analysis and Comparison of CPU Scheduling Algorithms

    Scheduling is a fundamental operating system function, since almost all computer resources are scheduled before use. The CPU is one of the primary computer resources. Central Processing Unit (CPU) scheduling plays an important role by switching the CPU among various processes. A processor is the important resource in computer; the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2014

    Fusion of Geometrical and Statistical Techniques for Human Ear Recognition

    Biometric systems have been implemented on numerous public facilities that are able to enhance the security system. Ear is one of emerging biometric and proved to have a great potential for identifying a person. Research of ear recognition and its application is a new subject in the field of biometrics...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Centralized and Distributed Energy Efficient Routing Techniques in Wireless Sensor Networks: A Survey

    Recent technology improvements that have been developed in small size nodes, low-cost, battery power devices, which are capable of local processing and efficient wireless communication. Such nodes are called as sensor nodes. These sensor nodes are efficient in computing in various applications, such as office buildings, industrial plants, and reading...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Enabling Video Content Distribution Using the Principle of Cloud Downloads

    Due to the explosive growth of the Internet and increasing demand for multimedia information on the web, video content distribution over the Internet has received tremendous attention from academia and industry. The most common approach for such is the peer-to-peer approach. In this approach, peers who create demand for videos...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey Report on Chaos Based Public-key Cryptosystem

    In recent years, encryption technology has been developed rapidly the chaos based cryptographic algorithms. Chaos owns certain critical properties such as sensitive dependence on initial condition, random-like behavior, and continuous broadband power spectrum, which match the confusion, diffusion, and key sensitivity requirements for cryptography. Chaos based cryptographic offer sundry features...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey Report on Cryptography Based on Neural Network

    Cryptography is the ability of changing information into obvious unintelligibility in a way allowing a secret method of un-mangling. The vital idea of cryptography is the capability to send information between participants in a way that prevents others from reading it. Much cryptography methods are available which are based on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Design and Implementation of Data Sanitization Technique for Effective Filtering With Enhanced Medical Support System in Cloud Architecture Diagram

    Now-a-days cloud environments are widely used for data storage and processing. However, this environment represents a serious threat for data privacy, since document containing confidential information might be made available for unauthorized parties. Although measures to automatically remove or hide sensitive information that may disclose identities of referred entities or...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Horizontal Aggregations in SQL to Prepare Data Sets Using PIVOT Operator

    Preparing dataset is a very difficult process in cases where it has to be given as input for data mining which involves complex queries, joining tables, and aggregating columns. Existing SQL aggregations have limitations to prepare data sets because they return one column per aggregated group. The authors' project aims...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Survey on Storage Techniques in Cloud Computing

    From the past few years, there has been a rapid progress in cloud, with the increasing numbers of companies resorting number of companies resorting to use resources in the cloud, there is a necessity for protecting the data of various users using centralized resource. Cloud storage services avoid the cost...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    PC Based Intruder Detection & Alert System

    In the current world, security concerns have increased alarmingly since thieves and robbers are exploiting the rapid technical advancements to a great extent. Sophisticated surveillance techniques are the need of the hour. Video surveillance and monitoring are the current technologies that come to the authors' rescue. These techniques can help...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Detailed Comprehensive Survey Paper on Techniques for Face Recognition

    Now-a-day's Face detection approach is the best technique to find the identity of any face image. It is a 2-D problem that is used for detection. The information in a face can be efficiently analyzed among the factors like identity, gender, expression, age, race and pose. Generally, face detection technique...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    An Overview of Clustering Analysis Techniques Used in Data Mining

    Clustering is the division of data into groups containing similar objects. It is used in fields such as pattern recognition, and machine learning. Searching for clusters involves unsupervised learning. Partitioning methods work by dividing a group of n elements into k clusters such that k is less than or equal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Survey on Techniques for Third Party Auditor in Cloud Computing

    The authors present a error identify algorithm for using the MHealth Trust computing - Experiments show that their approaches has the following advantage over existing method: cloud services include no upfront investment on infrastructure and transferring responsibility of maintenance, backups and license management of cloud providers, an Optimization problem of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Delay Tolerant Network

    There is no complete network from source to destination in intermediately connected mobile networks which is also called as sparse wireless networks. Those types of networks are categorized in delay tolerant networks. Wildlife tracking sensor networks, military networks, interplanetary networks and an exotic media networks are those networks that follow...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey on Information Hiding Techniques and Analysis of Quality Assessment Parameters

    Due to the increasing demand of various internet applications such as Voice Over IP (VOIP), audio conferencing etc. it is required that the data is transmitted in a more secure and robust manner. Direct transmission of data over the communication channel is not secure as it can be easily manipulated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Efficient Query Evaluation Using Joins in Relational Database

    In a relational database all information can be found in a series of tables. A query therefore consists of operations on tables for retrieving the data from tables. In this paper, the authors will introduce the reader to the basic concepts of query processing and query optimization in the relational...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Enhancing Security in a Distributed Examination Using Biometrics and Distributed Firewall System

    Online examination is a great opportunity for modern life and has seen exponential growth over the past decade. However, the tools used to present and administer this need to be coupled with efficient and reliable security mechanisms to ensure the medium can be established as a dependable one. Identification, authentication...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    A Survey on Location Based Routing Protocols for Wireless Sensor Network

    Wireless sensor networks are highly susceptible to attacks because of their open and distributed network structure as well as limited resource on the nodes. WSNs are used in critical monitoring and tracking applications. Therefore, routing protocols for such networks should take into consideration the trustworthiness of and the energy available...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Designing a Classifier with KFCM Algorithm to Achieve Optimization of Clustering and Classification Simultaneously

    In this paper, design a classifier with KFCM algorithm to achieve Optimization of Clustering and Classification simultaneously (KOCC) is proposed. This learning algorithm is used to solve any multiclass classification problem. In this Kernalized Fuzzy C-Means (KFCM) algorithm is used for enhance the robustness of the classifier. The training phase...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Deploying Sensor Nodes and Generating Malicious Attacks by Managing Key Management Technique of Network Test-Bed

    The WSN network was reliable and self contained unit that easily sense the networks and providing fastly data with little energy consumed. The reliability of this paper measured the performances of the all over networks with different parameters that discussed in the result section. The performance of WSN communication better...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Improved Face Recognition with Multilevel BTC Using YCbCr Colour Space

    This paper is to achieve a better efficiency in face recognition using Block Truncation Coding (BTC) using RGB and YCbCr colour space. Multilevel Block Truncation Coding is applied to image in RGB and YCbCr colour space up to four levels for face recognition. The experimental analysis has shown an improved...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Benchmarking and Analysis of NoSQL Technologies

    The social web generates terabytes of unstructured, user generated data, spread across thousands of commodity servers. The changed face of web based applications forced to invent new approaches to data management. The NoSQL databases were created as a mean to offer high performance (both in terms of speed and size)...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Triple Security of Information Using Stegnography and Cryptography

    In today's developing age technologies have developed so much most of every person use laptop, desktop, mobile, notepad etc. in their daily life to transfer their secret information across World Wide Web. Some people are waiting for this type of secret information which they called hacker and then change their...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Review: RFM Approach on Different Data Mining Techniques

    Data mining is a well-known technique, which can be used to extract hidden information about customers' behaviors. It is used to improve the customer relationship management processes by various Organizations. Previous researches in constraint based pattern mining emphasis only on the concept of frequency. But the changes in the environment...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Finite States Optimization Using Pattern Matching Algorithm

    The pattern sequence is an expression that is a statement in a language designed specifically to represent prescribed targets in the most concise and flexible way to direct the automation of text processing of general text files, specific textual forms, or of random input strings. Regular Expressions (RE) are getting...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Detection of Fault-Injection Attacks for Cryptographic Applications

    Cryptographic applications like ATM and other commercial electronics are more susceptible to side-channel attacks in which the fault injection attacks are more crucial at today's Deep Sub Micron Technology. Hence the identification and modeling of these attacks from the intruder is critical and became a challenge for current trend of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Survey of Various Trust Models and Their Behavior in Wireless Sensor Networks

    The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to identify malicious, selfish and compromised nodes. It supports the decision making processes in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Missing Value Imputation of Mixed Attribute FCM Clustered Data Sets Using Higher Order Kernels

    Data mining is the efficient discovery of previously unknown, valid, potentially useful, understandable patterns in large datasets. There is a need for quality of data, thus the quality of data is ultimately important. The existing system provides a new setting for missing data imputation, i.e., imputing missing data in data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Dual Sentinel: Intrusion Detection and Prevention System

    Now-a-days, the use of internet has been increased so rapidly and on large scale which has increased the number of applications and complexity of data. In order to deal with this increase in application and data complexity, web services are designed as multitier services. In this paper, the authors present...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Privacy Preserving Data Publishing of Numerical Sensitive Data

    Breaching privacy of individual data and the measures to prevent the same from attackers has become the most interesting topic of research on the day. In this paper, the authors have made a brief survey on various anonymization principles and practices, privacy preserving techniques beyond k-anonymity. Principles designed in-order to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Packet-Hiding Methods for Preventing Selective Jamming Attacks Using Swarm Intelligence Techniques

    The selective jamming attacks can be launched by performing real time packet classification at the physical layer. To mitigate these attacks develop a scheme that prevent real-time packet classification by combining cryptographic primitives with physical layer attributes. The Swarm intelligence algorithm is proficient enough to adapt change in network topology...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Overview of Vulnerability Analysis

    In recent years most of the applications are web based and software based so it is important for these applications to communicate with other system or application in network so it increase growth of cyber-crime and associated risk are forcing most business application to be focus on information security. Vulnerability...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Mining Frequent Itemsets in Transactional Database

    Data mining refers to discovering knowledge in huge amounts of data. The idea is to seek for something called knowledge, which means regularities, rule and structure hidden in the data. Association rule mining is one of the most important data mining problems. In transactional database it depicts the purchase patterns...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Cyclic Cryptographic Technique Using Substitution and Genetic Function

    The demand for effective internet security is increasing exponentially day-by-day. So for high protection, maintaining integrity of the data a robust and secure security system is needed. Cryptography is the science of making communications unintelligible to everyone except the intended receiver(s). A cryptosystem is a set of algorithms which are...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    A Secure Data Hiding System

    Data hiding is the process of embedding data into a media form such as image, voice, and video. The Lest Significant Bit (LSB) is consider as the most widely used embedding technique. LSB embeds the secret message's bits into the least significant bit plane of the image in a sequentially...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2013

    Web Usage Mining - Its Application in e-Services

    Retrieving knowledge from World Wide Web is a tedious task because of the growth in the availability of information resources on it. So this escalates the necessity to employ an intelligent system to retrieve the knowledge from World Wide Web. The performances of Web information retrievals and Web based data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    The Key Findings of Surveys Related to Email SPAM and Methods of Combating it in Saudi Arabia

    In this paper, the authors presented the key findings of surveys of email users, businesses, and ISPs in Saudi Arabia. The surveys were to investigate the nature of email SPAM in Saudi Arabia, its effects, methods and efforts taken to combat it. They also aimed to investigate the Anti-SPAM filters...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Empirical Investigation on Certain Anonymization Strategies for Preserving Privacy of Social Network Data

    In recent years, the rapid growth of web applications developed the need for private data to be published. Most of the social network data necessitates the data to be available for easy access and conversion of data to graph structure to re-identify sensitive labels of individuals became an impeccable issue....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    Extensive Review of SQLIA's Detection and Prevention Techniques

    Security of web applications is becoming one of the major concerns today. As per the people survey 70% of web applications over the internet are vulnerable to SQL Injection Attacks (SQLIA's). SQL injection attacks pose serious security threat to these databases and web applications. Through SQLIA's attackers gain unrestricted access...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Survey on Compound Use of Cryptography and Steganoghaphy for Secure Data Hiding

    According to new era, the steganography and cryptography are the secret writing techniques are available. Steganography hides the existence of message by embedding data in some other digital media like image or audio format and Cryptography converts data in to cipher text that can be in unreadable format to normal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    An Iterative Probabilistic Approach Towards Data Anonymization

    Data mining is the process by which useful knowledge is discovered from database. Publishing various databases for research and analytic purposes may put individual privacy at risk especially if it is possible to uniquely identify the personal details of an individual. Such risks have increased considerably in today's technology-driven world....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Oct 2013

    A Complete Pre Processing Method for Web Usage Mining

    Web usage mining, data mining techniques applied to data from the Web usage patterns is to discover, in order to understand and better serve the needs of Web-based applications. There are several preprocessing tasks that must be performed prior to data collected from server log data mining algorithms to apply....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Survey on Storage Techniques in Cloud Computing

    From the past few years, there has been a rapid progress in cloud, with the increasing numbers of companies resorting number of companies resorting to use resources in the cloud, there is a necessity for protecting the data of various users using centralized resource. Cloud storage services avoid the cost...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    PC Based Intruder Detection & Alert System

    In the current world, security concerns have increased alarmingly since thieves and robbers are exploiting the rapid technical advancements to a great extent. Sophisticated surveillance techniques are the need of the hour. Video surveillance and monitoring are the current technologies that come to the authors' rescue. These techniques can help...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Detailed Comprehensive Survey Paper on Techniques for Face Recognition

    Now-a-day's Face detection approach is the best technique to find the identity of any face image. It is a 2-D problem that is used for detection. The information in a face can be efficiently analyzed among the factors like identity, gender, expression, age, race and pose. Generally, face detection technique...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    An Overview of Clustering Analysis Techniques Used in Data Mining

    Clustering is the division of data into groups containing similar objects. It is used in fields such as pattern recognition, and machine learning. Searching for clusters involves unsupervised learning. Partitioning methods work by dividing a group of n elements into k clusters such that k is less than or equal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Survey on Techniques for Third Party Auditor in Cloud Computing

    The authors present a error identify algorithm for using the MHealth Trust computing - Experiments show that their approaches has the following advantage over existing method: cloud services include no upfront investment on infrastructure and transferring responsibility of maintenance, backups and license management of cloud providers, an Optimization problem of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Delay Tolerant Network

    There is no complete network from source to destination in intermediately connected mobile networks which is also called as sparse wireless networks. Those types of networks are categorized in delay tolerant networks. Wildlife tracking sensor networks, military networks, interplanetary networks and an exotic media networks are those networks that follow...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey on Information Hiding Techniques and Analysis of Quality Assessment Parameters

    Due to the increasing demand of various internet applications such as Voice Over IP (VOIP), audio conferencing etc. it is required that the data is transmitted in a more secure and robust manner. Direct transmission of data over the communication channel is not secure as it can be easily manipulated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Review on Density based Clustering Algorithms for Very Large Datasets

    Data mining is widely employed in business management and engineering. The major objective of data mining is to discover helpful and accurate information among a vast quantity of data, providing a orientation basis for decision makers. Data clustering is currently a very popular and frequently applied analytical method in data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Simple Implementation of UML Sequence Diagram to Java Code Generation through XMI Representation

    UML is widely used in the software development, there consists of the designing and coding of the software. Designing phase is done with the help of the UML models, in which consists of the sequence diagrams, activity diagrams, use case diagrams, etc. Since the software development is time and human...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Development of a Secure XML Data Warehouse: A Practical Approach

    Data warehouses are repositories of valuable information that provides a platform to integrate data coming from various sources and thus plays a vital part in formulating future policies of an organization. Due to its importance, security is an important criterion which has to be considered right from the initial phase...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2013

    Clustering Algorithm for Temporal Data Mining: An Overview

    Data mining, also popularly known as Knowledge Discovery in Databases (KDD), refers to the nontrivial extraction of implicit, previously unknown and potentially useful information from data in databases. Temporal data mining is the extraction of knowledge from huge amounts of complex temporal database. Most research in this area has focused...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Multi Dimensionalised Aggregation in Horizontal Dataset Using Analysis Services

    Projecting data in different dimensions is the core concept taken for this project. Preparing a data set for analysis is generally the most time consuming task in a data mining project. In the existing system they used simple, yet powerful, methods to generate SQL (Structured Query Language) code to return...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Study of Various Normal forms and Functional Dependency

    Normalization and functional dependency are most fundamental part in relational database. The normalization rules are designed to prevent update anomalies and data inconsistencies. The normal form defines in relation database theory represent the guidelines for record design. The guidelines corresponding to first through fifth normal form are presented. Normalization process...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)