International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 321-360 of 694 results

  • White Papers // Jan 2013

    Study of Synchronization Technique in OFDM System

    The authors present an OFDM frequency synchronization scheme. This paper presents an extended solution for the carrier frequency synchronization problem of OFDM. The scheme uses number of bits, modulation level, cyclic prefix, FFT size similarly to the algorithm proposed by Tilde Fusco. The proposed scheme attains considerably higher accuracy than...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Survey on Channel Estimation for OFDM-IDMA Receivers Systems

    In this paper, various channel estimation techniques for iterative receivers are compared for OFDMIDMA system. Pilot - assisted based, semi-blind estimation, blind estimation and Decision - directed channel estimations techniques are considered and there comparisons are presented. The considered estimation techniques differ in terms of complexity, as well as performance....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Remote Data Integrity in Cloud Security Services

    Cloud structure delivers infrastructure, platform and software as a service which are made available in pay-as-you go model. Cloud storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Users interact with the cloud servers through...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Profit Maximization for SaaS Using SLA Based Spot Pricing in Cloud Computing

    Cloud Computing provides user a complete software environment. To serve resources to customers, Software as a Service providers rent resources from the Infrastructure as a Service Providers. Client applications and service providers negotiate for the sales of services by means of Service Level Agreement (SLA) that acts as a contract...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Analysing Multicast Routing Protocols With Different Mobility Models

    A Mobile Ad hoc NETwork (MANET) is a wireless network where a collection of mobile nodes may dynamically vary the topological structure. Multicast is an efficient method to implement the group communications. Mobile Ad-Hoc is a dynamic, multi-hop and autonomous networks composed by wireless mobile nodes. The mobility model represents...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Recent Secure Intrusion Detection System for MANETs

    Mobile ad hoc network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly. A new intrusion detection...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Reliable and Efficient Distributed Code Dissemination in Wireless Sensor Networks

    In wireless sensor networks, code dissemination is a process of propagating new code images or commands in the network. Since the WSN are mostly deployed in the military and hostile environments secure code dissemination is needed. Mostly code dissemination protocols are based on two approaches. First based on the centralized...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Effective Multi Keyword Search Over P2P Network Using Optimized Bloom Filter Settings

    P2P network is a popular technology used for sharing and searching files on the computers connected to the network. Current search mechanisms of Peer-To-Peer (P2P) systems can well handle a single keyword search problem. Other than single keyword search, multi keyword search is very popular and useful in many file...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Accurate Estimation of Reverberation Time and DRR Using Maximum Likelihood Estimator

    This paper presents a speech-model using the Linear Predictive (LP) residual signal and Maximum Likelihood Estimator (MLE). With this model an accuracy of the reverberation time estimation can be improved. During past decade, the reverberation time estimation was performed using only maximum likelihood detector, which resulted in excess time of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    IHONEYCOL: A Collaborative Technique for Mitigation of DDoS Attack

    Distributed denial of service is flooding of network with unrelated information by malicious node. Thus causing the authorized service deny from user. This distributed denial of service poses a major security threat. The mitigation of distributed denial of service becomes hard when they it comes to distributed environment. In general...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Overview of Data Aggregation Based Routing Protocols in Wireless Sensor Networks

    Resource-constrained is a critical issue in Wireless Sensor Networks (WSNs) applications. Data aggregation is an efficient method to conserve energy by reducing packet transmissions and extend the network lifetime in WSNs. The total lifetime of the network is a major design factor for protocols used by WSNs. Routing protocols with...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Review on Continuous Authentication Using Multimodal Biometrics

    Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources until the initial user logs out. This situation is encountered when the logged in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Performance Analysis of Different Adaptive Modulation Techniques in MIMO Systems on Basis of Ber Performance

    Spatial Modulation (SM) is a recently proposed joint coding and modulation scheme for Multiple-Input - Multiple-Output (MIMO) wireless systems, which is receiving a growing interest. SM is used in wireless systems, which can offer good data rates and error performance with a moderately low system complexity. Adaptive modulation schemes for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Adaptive Defense Strategy: Immunizing Shared Channel Network From DoS Attacks

    Denial of Service attacks is an attempt to make a machine or network resource inaccessible to intended users. This attack saturates the target machine with a lot of communications requests, in such a way that it cannot respond to traffic from legitimate requests. The Denial of service attacks is massive...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    An Effective Packet Filtering Mechanism for Reducing Complexity

    Most organizations need to control the traffic that crosses into and out of their networks to prevent attacks from both the net-work as well as organization perspective. The firewall is a crucial component in the defense mechanisms of every network connected to the internet. It is the first filtering device...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Comparative Study of the Performance of Precoded MIMO Using Trellis and STBC

    Spatial modulation is a transmission technique that uses multiple antennas. It involves mapping of a block of information bits to two information carrying units, as a symbol chosen from constellation diagram and a unique transmit antenna number. The importance of Spatial modulation is that it increases overall spectral efficiency. In...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Performance Enhancement of MIMO Systems Using Antenna Selection Algorithm

    Multiple-Input Multiple-Output (MIMO) systems are anticipated to be widely employed to address the ever increasing capacity demands for wireless communication systems. MIMO technology is one solution to attain this by transmitting multiple data streams from multiple antennas. Increasing the number of transmit and receive antennas enables to improve system performance,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Balancing Blocks for Distributed File System in Clouds by Using Load Rebalancing Algorithm

    Distributed file systems are key building blocks for cloud computing applications based on the MapReduce programming paradigm. In such file systems, nodes simultaneously serve computing and storage functions; a file is partitioned into a number of chunks allocated in distinct nodes so that MapReduce tasks can be performed in parallel...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Routing for Mesh-of-Tree in Multicluster Systems Based on Communication Networks

    It is increasingly important to understand the capabilities and potential performance of various interconnection networks. An analytical model for communication network in cluster systems have been widely reported. Several analytical models of interconnection networks of multi-cluster systems under uniform traffic pattern have been proposed in the literature. However, there has...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks Using OPR

    This paper addresses the problem of delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner. Most existing ad hoc routing protocols are susceptible to node mobility, especially for large-scale networks. Driven by this issue, the authors propose an efficient Position-based Opportunistic Petal Routing...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    An Efficient Bandwidth Utilization Mech-Anism for Consistent Routing in Wireless Mesh Networks

    A wireless mesh network has a more planned configuration, and may be deployed to provide dynamic and cost effective connectivity over a certain geographic area. In this paper, the authors use the existing methods for calculating the bandwidth of a path for wireless networks and using it they provide an...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Detecting Selfish Routing and Misbehavior of Malicious Node in Disruption Tolerant Networks

    Disruption Tolerant Networks (DTNs) exploit the intermittent connectivity between nodes to transfer data. It follows a store-carry-forward mechanism to transfer data. A node misbehave by dropping packets and acts selfish as they are unwilling to spend resources such as power and buffer on forwarding packets of other nodes. In such...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Resisting Password Based Systems From Online Guessing Attacks

    Authentication to users account to access web services online is achieved using passwords. These passwords are prone to guessing attacks namely brute force and dictionary attacks. Password guessing attack is a method of gaining unauthorized access to one's computer system. Online guessing of passwords is commonly observed in web based...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Performance Enhancement by Using Optimum Beamforming Algorithm in Cognitive Network

    Cognitive Networks are an emerging new type of networking technology that can utilize both Radio Spectrum and Wireless Station. Based on the Knowledge of the availability of such resources gathered from past experience the resources can be utilized efficiently. Signaling is the major issue in Cognitive Network. Multiple Input Multiple...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Neighbor Coverage Based Probabilistic Rebroadcast for Reducing Routing Overhead in Mobile Ad Hoc Networks

    Traditional routing protocols in Mobile Ad hoc NETwork (MANET) send periodic messages to realize the changes in topology. Sending periodic messages cause overhead. Compared to proactive routing protocols, reactive routing protocols can cause less overhead. Broadcasting can cause broadcast storm problem .To discover the route better than broadcasting methodology rebroadcast...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Detection of E-Mail Senders With SMTP Extension

    E-mail spam is one of the most common problems that the people face in their day to day life. There exists massive number of spams sent from justifiable home computers that comprises of a malware called as bot. The current scheme to identify mail senders called as Domain Keys Identified...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Comparative Study on Performance of Various Channels Modelling in MIMO Systems

    This paper proposes comparative study on the performance of various channel models. The channel model is also the factor which is considered in the network performance evaluation. As this channel model influences network performance their characteristic (modeling) should be well defined, but as in practical case it is not possible...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    The Relationship Between IPv7 and the Turing Machine

    Real-time technology and agents have garnered limited interest from both end-users and cyber informaticians in the last several years. Contrarily, an extensive obstacle in noisy cyber informatics is the understanding of introspective information. The notion that researchers agree with 802.11b is rarely significant. The emulation of write-ahead logging would profoundly...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Contact Dissemination Based Collaborative Watchdog Approach to Improve Selfish Node Detection in MANETs

    Mobile ad hoc networks are composed of mobile nodes connected by wireless links without any pre-existing infrastructure. MANET nodes rely on network cooperation schemes to properly work, forwarding traffic unrelated to its own use. However, in the real world, most nodes may have a selfish behavior, being unwilling to forward...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Novel Multicast Beneficiary in IEEE 802.16j WIMAX Relay Networks

    In IEEE 802.16j based Wimax multihop-relay network, in addition to a base station, multiple relay stations are used for enhancing the throughput, and improving the coverage distance of the base station. Multicasting is a more efficient method of sup-porting group communication than unicasting, as it allows transmission and routing of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Data Security and Storage in Cloud Computing

    Cloud computing is the service delivered through the network or internet by using a computer resources. Telecommunication companies initially started offering point to point data circuits but later in 1990, it started providing virtual private networks. The VPN is the technology for connecting computers to the remote isolated unaccesable computer...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Performance Enhancement of Land Mobile Satellite System

    The Quality of Service (QoS) and spectral efficiency in Land Mobile Satellite (LMS) communications drops drastically in the presence of shadowing and multipath fading. The method for increasing QoS and spectral efficiency, is done by without any increasing in total transmit power, antenna gain or bandwidth by using Multiple-Input Multiple-Output...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Requirement Elicitation Based Collborative Filtering Using Social Networks

    In software engineering activity, requirement elicitation is the first phase, in which important requirements related to the project are gathered from different stakeholders. Most projects fail due to inadequate stakeholders and requirements. To identify and prioritize stakeholders and their requirements a method called StakeRare is developed by using social networks...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Data Leakage Detection Using Cloud Computing

    In the virtual and widely distributed network, the process of handover sensitive data from the distributor to the trusted third parties always occurs regularly in this modern world. It needs to safeguard the security and durability of service based on the demand of users. The idea of modifying the data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Network Security: ATM Pin Unlocking and Avoid Skimming by UAN Techinique

    The Automatic Teller Machine (ATM) is used for immediate transaction rather visiting a bank. This technique was first introduced by john shepherd-barron. After knowing this technique many parts in the world started to use the ATM for transaction. The ATM transaction is mainly depend on the PIN. The user enter...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Secured Consistent Network for Coping Up With Fabrication Attack in MANET

    Recent advances in wireless communication along with peer - peer paradigm have led to increasing interest in P2P MANET. In mobile ad-hoc networks, mobile host move freely thereby disconnections occur frequently and result in network partition, which decreases data availability. Consequently, data replication improves data availability which maintains the consistency...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    An Adaptive Eadr Approach to Purge the Routing Attacks in DSR

    A Mobile Ad hoc NETwork (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. These types of wireless networks are more prone to vulnerabilities. The pre-existing research efforts results its inefficiency in detecting attacker's intrusion during collisions and have high routing overhead....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Service Oriented Architecture Design for Web Based Home Banking Systems With Cloud Based Service

    The aim of this paper is to design and develop Software as a Service (SaaS) for cloud environment using SOA principles. Globalization continuous to pressure the banking industries for increased collaboration within their value chains. The banking industry, a virtual backbone for all other industries, feels this pressure both within...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2012

    Enhancement Over the Variant of Public Key Cryptography (PKC) Algorithm

    In this paper, the authors have shown the development of a new public key cryptosystem which is the extension of the work of "Improvement over three prime RSA with two private keys and one public key". In many cases, the decryption generation speed is required to be enhanced, e.g.; in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2012

    Performance Analysis for Different Modulation Schemes in MIMO for LTE and WLAN

    Next generation wireless systems will use a combination of large system bandwidths and multiple antennas (MIMO) to deliver very high data rate services. The efficient detection of MIMO signals at the receiver can be a challenging task. Zero-Forcing (ZF) and Minimum Mean Square Error (MMSE) detection schemes are simple and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Improved Hierarchical Clustering Using Time Series Data

    Mining time series data has a remarkable development of interest in today's world. This paper presents and evaluates an incremental clustering structure for time series data stream. The new algorithm is called Improved Hierarchical Clustering Algorithm (IHCA) is developed and applied with ECG data set. This system continuously constructs a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Implementation of Web Access Pattern Discovery

    In this era of technology about 70% of people are use internet or web services and moreover it they consume and generate more data in a fraction of small time. This data is helpful to discover new dimensions of knowledge. In this paper, the authors include the implementation of web...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Encrypting Processes and Public Key Infrastructure in Regard to Data Safety and Security in Database Systems

    The people can distinguish three basic properties of information security, which should be implemented in nearly all IT systems: confidentiality, integrity and availability. Confidentiality means to protect the information against unauthorized access. Integrity is mentioned as a warranty of authenticity of information; it is also connected with protection against unauthorized...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Skin Tone Based Face Recognition and Training Using Network Network

    Within today's environment of increased importance of security and organization, identification, and authentication methods have developed into a key technology. Face recognition is an important means of identifying facial expression, gender. Human faces provides important visual information for gender classification from face perception. Face can be recognized by many methods...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    Crypto Cloud Computing the C3 model

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network. The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2012

    A Study of Mining Web Intelligent Information

    Finding only relevant information on the Web is one of the hardest challenges faced by researchers. Two reasons are the huge size of the Web and the diversity of available heterogeneous information. Current search engines suffer from low precision rates because pages are not semantically defined and users are allowed...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Efficient Query Evaluation Using Joins in Relational Database

    In a relational database all information can be found in a series of tables. A query therefore consists of operations on tables for retrieving the data from tables. In this paper, the authors will introduce the reader to the basic concepts of query processing and query optimization in the relational...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Enhancing Security in a Distributed Examination Using Biometrics and Distributed Firewall System

    Online examination is a great opportunity for modern life and has seen exponential growth over the past decade. However, the tools used to present and administer this need to be coupled with efficient and reliable security mechanisms to ensure the medium can be established as a dependable one. Identification, authentication...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    A Survey on Location Based Routing Protocols for Wireless Sensor Network

    Wireless sensor networks are highly susceptible to attacks because of their open and distributed network structure as well as limited resource on the nodes. WSNs are used in critical monitoring and tracking applications. Therefore, routing protocols for such networks should take into consideration the trustworthiness of and the energy available...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Designing a Classifier with KFCM Algorithm to Achieve Optimization of Clustering and Classification Simultaneously

    In this paper, design a classifier with KFCM algorithm to achieve Optimization of Clustering and Classification simultaneously (KOCC) is proposed. This learning algorithm is used to solve any multiclass classification problem. In this Kernalized Fuzzy C-Means (KFCM) algorithm is used for enhance the robustness of the classifier. The training phase...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Deploying Sensor Nodes and Generating Malicious Attacks by Managing Key Management Technique of Network Test-Bed

    The WSN network was reliable and self contained unit that easily sense the networks and providing fastly data with little energy consumed. The reliability of this paper measured the performances of the all over networks with different parameters that discussed in the result section. The performance of WSN communication better...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Improved Face Recognition with Multilevel BTC Using YCbCr Colour Space

    This paper is to achieve a better efficiency in face recognition using Block Truncation Coding (BTC) using RGB and YCbCr colour space. Multilevel Block Truncation Coding is applied to image in RGB and YCbCr colour space up to four levels for face recognition. The experimental analysis has shown an improved...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Benchmarking and Analysis of NoSQL Technologies

    The social web generates terabytes of unstructured, user generated data, spread across thousands of commodity servers. The changed face of web based applications forced to invent new approaches to data management. The NoSQL databases were created as a mean to offer high performance (both in terms of speed and size)...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    SMMCOA: Maintaining Multiple Correlations Between Overlapped Attributes Using Slicing Technique

    Knowledge discovery is the most discussed topic now a day. Data which is collected from various resources are processed through various stages and the output of this process is the knowledge which is previously hidden. Basically data mining is a technique whose outputs are previously unknown and potentially useful information...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Design and Implementation of Algorithms for Materialized View Selection and Maintenance in Data Warehousing Environment

    Data warehousing, data mining and online analytical processing represents some of the latest trends in computing environments and information technology application to large scale processing and analysis of data. Data warehousing technology is becoming essential for the effective business strategy formulation and implementation. For the success of any data warehouse,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Secured Data Transmission with Novel Parity Bit Scheme using MAES Algorithm

    In transmission and data storage of information security becomes more important in the fast evolution of data exchange. It is more important to protect the confidential data from unauthorized access. To overcome that difficulty, the authors examine the Advanced Encryption Standard (AES) and modify it, to reduce the calculation of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Synchronous Pattern Mining From Web Log Data Using Association and Correlation Rules

    In this paper, the authors introduce the concept of synchronous patterns, association and correlation rule, and search how they can be mined efficiently. The title of synchronous pattern mining is indeed rich. In this paper is dedicated to methods of synchronous item set mining. They can find synchronous item sets...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Sep 2013

    Generic Log Analyzer Using Hadoop Mapreduce Framework

    There are various applications which have a huge database. All databases maintain log files that keep records of database changes. This can include tracking various user events. Apache Hadoop can be used for log processing at scale. Log files have become a standard part of large applications and are essential...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Privacy Preserving Clustering by Hybrid Data Transformation Approach

    Numerous organizations collect and share large amounts of data due to the proliferation of information technologies and internet. The information extracted from these databases through data mining process may reveal private information of individuals. Privacy preserving data mining is a new research area, which allows sharing of privacy-sensitive data for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2013

    Mining Multi Level Association Rules Using Fuzzy Logic

    Extracting multilevel association rules in transaction databases is most commonly used tasks in data mining. This paper proposes a multilevel association rule mining using fuzzy concepts. This paper uses different fuzzy membership function to retrieve efficient association rules from multi level hierarchies that exist in a transaction dataset. In general,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    Fuzzy Logic Based Trained Fault Locating Mechanism in Power Distribution Network

    In this paper a noble method of fault locating in a radial power distribution system is discussed. Fuzzy system will ease the calculation involved. The history associated with fault occurred in power system can be effectively used as a strong database. This database will act as the trainer to the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jul 2012

    A Simulator for Analyzing Temporal Database Systems

    A temporal database is a database that deals with the aspect of 'Time', which is an important real-world phenomenon. A wide range of real-world database applications use time-dimensions to represent their varying data. Banking activities are related to temporal databases as it deals with the transaction time and valid time....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Aug 2012

    Study on Mining Emotions From Literature: A Method Using Computers to Extract Opinionated Knowledge Nuggets

    Knowledge discovery from text has emerged as a possible solution for the current information explosion. This refers to the process of extracting non-trivial previously unknown patterns from unstructured text. With the vast amount of on line resources on web and popularity of fast and rich resources lead to the requirement...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Survey on Storage Techniques in Cloud Computing

    From the past few years, there has been a rapid progress in cloud, with the increasing numbers of companies resorting number of companies resorting to use resources in the cloud, there is a necessity for protecting the data of various users using centralized resource. Cloud storage services avoid the cost...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    PC Based Intruder Detection & Alert System

    In the current world, security concerns have increased alarmingly since thieves and robbers are exploiting the rapid technical advancements to a great extent. Sophisticated surveillance techniques are the need of the hour. Video surveillance and monitoring are the current technologies that come to the authors' rescue. These techniques can help...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Detailed Comprehensive Survey Paper on Techniques for Face Recognition

    Now-a-day's Face detection approach is the best technique to find the identity of any face image. It is a 2-D problem that is used for detection. The information in a face can be efficiently analyzed among the factors like identity, gender, expression, age, race and pose. Generally, face detection technique...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    An Overview of Clustering Analysis Techniques Used in Data Mining

    Clustering is the division of data into groups containing similar objects. It is used in fields such as pattern recognition, and machine learning. Searching for clusters involves unsupervised learning. Partitioning methods work by dividing a group of n elements into k clusters such that k is less than or equal...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Survey on Techniques for Third Party Auditor in Cloud Computing

    The authors present a error identify algorithm for using the MHealth Trust computing - Experiments show that their approaches has the following advantage over existing method: cloud services include no upfront investment on infrastructure and transferring responsibility of maintenance, backups and license management of cloud providers, an Optimization problem of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Delay Tolerant Network

    There is no complete network from source to destination in intermediately connected mobile networks which is also called as sparse wireless networks. Those types of networks are categorized in delay tolerant networks. Wildlife tracking sensor networks, military networks, interplanetary networks and an exotic media networks are those networks that follow...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey on Information Hiding Techniques and Analysis of Quality Assessment Parameters

    Due to the increasing demand of various internet applications such as Voice Over IP (VOIP), audio conferencing etc. it is required that the data is transmitted in a more secure and robust manner. Direct transmission of data over the communication channel is not secure as it can be easily manipulated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Review on Density based Clustering Algorithms for Very Large Datasets

    Data mining is widely employed in business management and engineering. The major objective of data mining is to discover helpful and accurate information among a vast quantity of data, providing a orientation basis for decision makers. Data clustering is currently a very popular and frequently applied analytical method in data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    A Simple Implementation of UML Sequence Diagram to Java Code Generation through XMI Representation

    UML is widely used in the software development, there consists of the designing and coding of the software. Designing phase is done with the help of the UML models, in which consists of the sequence diagrams, activity diagrams, use case diagrams, etc. Since the software development is time and human...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Development of a Secure XML Data Warehouse: A Practical Approach

    Data warehouses are repositories of valuable information that provides a platform to integrate data coming from various sources and thus plays a vital part in formulating future policies of an organization. Due to its importance, security is an important criterion which has to be considered right from the initial phase...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Centralized and Distributed Energy Efficient Routing Techniques in Wireless Sensor Networks: A Survey

    Recent technology improvements that have been developed in small size nodes, low-cost, battery power devices, which are capable of local processing and efficient wireless communication. Such nodes are called as sensor nodes. These sensor nodes are efficient in computing in various applications, such as office buildings, industrial plants, and reading...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Enabling Video Content Distribution Using the Principle of Cloud Downloads

    Due to the explosive growth of the Internet and increasing demand for multimedia information on the web, video content distribution over the Internet has received tremendous attention from academia and industry. The most common approach for such is the peer-to-peer approach. In this approach, peers who create demand for videos...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey Report on Chaos Based Public-key Cryptosystem

    In recent years, encryption technology has been developed rapidly the chaos based cryptographic algorithms. Chaos owns certain critical properties such as sensitive dependence on initial condition, random-like behavior, and continuous broadband power spectrum, which match the confusion, diffusion, and key sensitivity requirements for cryptography. Chaos based cryptographic offer sundry features...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Survey Report on Cryptography Based on Neural Network

    Cryptography is the ability of changing information into obvious unintelligibility in a way allowing a secret method of un-mangling. The vital idea of cryptography is the capability to send information between participants in a way that prevents others from reading it. Much cryptography methods are available which are based on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Design and Implementation of Data Sanitization Technique for Effective Filtering With Enhanced Medical Support System in Cloud Architecture Diagram

    Now-a-days cloud environments are widely used for data storage and processing. However, this environment represents a serious threat for data privacy, since document containing confidential information might be made available for unauthorized parties. Although measures to automatically remove or hide sensitive information that may disclose identities of referred entities or...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Dec 2013

    Horizontal Aggregations in SQL to Prepare Data Sets Using PIVOT Operator

    Preparing dataset is a very difficult process in cases where it has to be given as input for data mining which involves complex queries, joining tables, and aggregating columns. Existing SQL aggregations have limitations to prepare data sets because they return one column per aggregated group. The authors' project aims...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Nov 2013

    A Review of Privacy Preserving Data Mining Using KADET

    Nowadays, securing the user's information is very important for internet based business. On one hand, the companies can mine data to extract knowledgeable information through data collected from the users. On other hand, the user information that contains sensitive data should prevent from the hackers. PPDM is a popular search...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)