International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

Displaying 1-40 of 275 results

  • White Papers // Jun 2015

    An Automatic Transformation From Discrete-Time Matlab/ Simulink Models Using SMT Solving

    Applications of multilevel inverters have been widely accepted for high-power and high-voltage industry purposes. Their performance is highly superior to that of conventional two-level inverters due to reduced harmonic distortion and lower electromagnetic interference. In this paper, an 11-level multilevel inverter circuit with reduced number of switches and asymmetric voltage...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Jun 2015

    Secure Data Publishing With Verifiable Distance Mining Policy

    Security is the one of the reasonable property of this topic with important technological and legal facets. The authors provide mechanisms for establishing the ownership of a dataset consisting of multiple objects. The algorithms also preserve important properties of the dataset, which are important for mining operations, and so guarantee...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Jun 2015

    Virtualized Cloud and Energy Aware Scheduling Using EARH

    Cloud applications are deployed in remote Data Centers (DCs) where high capacity servers and storage systems are located. A fast growth of demand for cloud based services results into establishment of enormous data centers consuming high amount of electrical power. Energy efficient model is required for complete infrastructure to reduce...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Jun 2015

    3-D Based Sensor Networks Using Sleep Scheduling Algorithm With Energy Efficient Data Transaction

    Certificate revocation is a major security component in Mobile Ad hoc NETworks (MANETs). Owing to their wireless and dynamic nature, MANETs are vulnerable to security attacks from malicious nodes. Certificate revocation mechanisms play an important role in securing a network. When the certificate of a malicious node is revoked, it...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Jun 2015

    Area Reduction of Construct Error Correction Codes for Protecting Data Bits

    As technology scales, reliability becomes a challenge for CMOS circuits. Reliability issues appear, for example during device manufacturing, as defects that can compromise production yield. Once the devices are in the field, other reliability issues appear in the form of soft errors or age induced permanent failures. Memory devices are...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Jun 2015

    Concealed Data Aggregation For Query Processing In Database-As-A-Service (Das) Model

    Today, efficient data processing is a fundamental and vital issue for almost every scientific, academic, or business organization. The main challenge is preserving the DAS from unauthorized access and to protect the data from being accessed. Here the authors focus on second challenge. The ciphertext of each user input data...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // May 2015

    Enhanced Task Scheduling Scheme for Hadoop Map Reduce Systems

    As the authors are literally drawn in the era of big data the Hadoop and its ecosystem has become the integral part of the big data analytics. However, maps reduce which take care of the processing part. Hadoop requires the some efficient performance up gradations in order to cope up...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // May 2015

    A Scheduling in Cloud Environment for Collaborative Computing Systems in MVM

    Cloud computing remains the buzzword winner of the current technology paradigm and it is a significant advancement in the delivery of information technology and services. By providing on demand access to a shared pool of computing resources in a self-service, dynamically scaled and metered manner, cloud computing offers compelling advantages...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // May 2015

    Towards Differential Query Overhauls in Cost-Competent Clouds

    Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs. In this paper, the authors address two fundamental issues in such...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // May 2015

    An Efficient Mobile Social TV Frame Work Based on IaaS and PaaS Cloud Services

    Today Smartphone's combines the features of a mobile phone with those of another popular consumer device, such as a personal digital assistant, a digital camera, a media player and a GPS navigation unit. Modern Smartphones include all these features and as well as features of a laptop, including web browsing,...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // May 2015

    Preclusion of Locality Information Leaks and Secure Data Reclamation in Sensor Network using Homomorphic Encryption Algorithm

    Cipher-text Policy Attribute Based Encryption (CPABE) provides an encrypted access control instrument for propagation messages. Basically, a sender encrypts a message with an access control policy tree which is rationally composed of attributes; receivers are able to decrypt the message when their attributes satisfy the policy tree. A user's attributes...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Big Data Stock Analysis Using Hadoop

    The authors live in on-demand, on-command digital universe with data prolife-ring from various sectors at a very high rate. This data is categorized as "Big data" due to its volume, variety, velocity and veracity. Most of this data is unstructured or semi structured and it is heterogeneous in nature. Due...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Sentiment Analysis on Twitter Data Using: Hadoop

    As of now, the authors know present industries and some survey companies are mainly taking decisions by data obtained from web. As they see WWW is a rich collection of data that is mainly in the form of unstructured data from which they can do analysis on those data which...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Design and Simulation of UART and Built-In-Self-Test Architecture in Verilog-HDL

    The increasing growth of nano-technology has resulted in the difficulty of testing. So, both the front-end and back-end engineers are trying to bring in a solution where there is a reduction in failure of products and missed market opportunities. BIST is a testing technique that allows a system to test...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Design of 4x4 Reversible Square Quantum Circuitry

    Reversible logic gates are very much in demand for the future computing technologies as they are known to produce zero power dissipation under ideal conditions. Quantum computation is formed by quantum circuits. Quantum circuits can be designed using reversible logic gates. The multiplier is commonly used in digital signal processing...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Comparative Study of Various VLSI Technologies for Generating 16 Bit Even Parity

    In this paper, the authors do the comparative study of various techniques for generating and 16-bit even parity. The technique that is often used for error detection is parity, which refers to the number of bits that are 1 in a code word. Parity error detection involves increasing the code...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Opinion Mining and Feature Extraction- A Survey

    In day-to-day life the textual data available in online are countless. In order to enhance the sales of a product and to improve the customer satisfaction, most of the online shopping sites provide the opportunity to customers to write reviews about products. To purchase a product by analyzing its reviews...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Single Cycle Tree 64 Bit Binary Comparator with Constant Delay Logic

    In this paper, the authors presented single cycle tree-based radix-4 structures 64-bit binary comparator with constant delay logic for reducing power it's realized in a 65nm technology 1V CMOS process. This design can be done by using Tanner tool with single cycle two comparator using priority encoder algorithm. The proposed...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Implementation of Eight Point FFT Algorithm Using Interval Arithmetic on FPGA

    Fast Fourier Transform (FFT) is one of the most basic steps in digital signal processing. The familiar methods to compute fixed point and floating point FFT are Decimation In Time (DIT) and Decimation In Frequency (DIF) algorithms. Interval arithmetic approach for computation of FFT yield more reliable results. This paper...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    FPGA Implementation of Optimized DDR SDRAM Controller

    Today, SDRAM memory is used in many applications like Smartphone and laptop because of its reduced area, speed, configurable latency and high performance and also it provides double data rate. It is important to provide the memory refresh, read, write signals and initialize the SDRAM memory by proper signals. For...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Hardware Implementation of Optimized Kogge Stone Adder

    Low power Very Large Scale Integration (VLSI) circuits are important for designing of high performance and portable devices. The high speed, small area and low cost are the main considerations of VLSI circuits. The importance of low power is increasing day-by-day because of changing trend, packaging and cooling cost, portable...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    A Survey of Techniques for Power Management in Embedded Systems

    The recent technological trends have presented significant challenge in the field of managing power in embedded system design. In this paper, the authors highlight the need of power management in embedded systems and survey the several research papers aimed at achieving the objective. They discuss the different techniques, their similarities...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Next Generation Cellular Network Technology - Femtocells

    It is known that 66% of the mobile handset initiated calls and 90% of the data service requests are generated from home premises. Hence the enormous resource utilization by indoor users encourages operators to provide satisfactory indoor coverage and a higher peak data rate for data services to home subscribers....

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Analysis and Design of Non-Isolated Single-Stage Single-Switch (S4) Converter Using Buck Topology for AC/DC Conversion

    The non-isolated single stage single switch topologies proposed so far have achieved high voltage step down and high conversion efficiency but they have failed to achieve constant input power factor, these conversion topology generally consists of PFC cell and DC-DC cell both sharing a common switch. In this paper, a...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Integration of Battery Energy Storage System Based PV Power Plant Into Grid

    With increase in the power demand, the energy generated by various renewable resources such as solar, wind, tidal energy sources is clean, cheap and has less environmental impact and requires meticulous attention. The renewable energy sources are the one of the most promising solution for today's energy crisis. Among the...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Effective Access Control and Secured Log Management Techniques for Cloud Storage

    Log management is an important service in cloud computing. In any business, maintaining the log records securely over a particular period of time is absolutely necessary for various reasons such as auditing, forensic analysis, evidence etc. In this paper, the authors introduce a secured log management technique for cloud storage...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Multiparty Private Data Publishing Using Exponential Trust Based Mechanism in Malicious Adversary Model

    Differential privacy is a recent privacy definition that provides a strong privacy guarantee. It guarantees that an adversary learns not anything more about an individual, regardless of whether their record is present or absent in the data. In this paper, propose an algorithm to securely integrate person-specific sensitive information from...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Flexible AC Distributed System Using Voltage Source Inverter for a Microgrid

    The micro grid has offered consumers with increased reliability and reduction in total energy losses, and has become a promising alternative for traditional power distribution system. The connection of a micro grid to the distribution grid is the impact of Power Quality (PQ) problems on the overall power system performance....

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Design and Implementation of Micro-Controller Based New Arm Converter Topology for DC Fault Blocking in HVDC Transmission System

    In this paper, the authors explain a new converter topology intended for HVDC transmission system, is known as Alternate Arm Converter (AAC). This converter is hybrid between modular multi-level converter, this is due to the presence of H-bridge cells and the two-level converter and also the presence of director switches...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2015

    Secure Mobile Data Outsourcing using ABE in Multi-Cloud Environment

    Cloud servers provide numerous services to its users including data storage services. Mobile users often rely on these services due to mobility, security and performance. As data storage capacity of mobile devices is comparatively lesser than traditional computing systems, cellular service providers offer users to store their data remotely so...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2015

    User Personalization in Big Data

    A user personalization is for the purpose of delivering the content information that is relevant to individual user or groups of individuals in a specified time interval. Where it means to gather user information and improve user experience of service. Traditionally a web page is extracted from single web document...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2015

    A Survey on High Speed Vedic Mathematics Multiplier Using Compressors

    The performance of trending technology in VLSI field supports ongoing expectation for high speed processing and lower area consumption. Since multiplier unit forms basic part of a processor, high speed multiplication becomes a requirement. Here, a novel architecture capable of performing high speed multiplication with the help of Vedic mathematics...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2015

    Enhanced Data and Node Security Based Verifiable Top-K Query Scheme

    The authors propose the system with their contribution of adding data security and node security by adding the features of homomorphic encryption algorithm for data security and pairwise keying for node security. They propose an efficient system for preventing location leaks in sensor networks and also it ensures the privacy-preserving...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2015

    Auditing Cloud Consistency Using EIRQ in Data Aggregation

    Cloud storage services have become popular due to their advantage of service. To always on access, a Cloud Service Provider (CSP) maintains multiple replies for each piece of data on worldwide distributed servers. A problem of using the replication technique in clouds is that it is very expensive to achieve...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2015

    Automatic Rule Retrieval from Websites Using Ontologyand Text Mining

    A rule-based system like an intelligent service comparing portal may compare product prices, shipping options, refund options, etc. Such rule-based system requires an automatic knowledge acquisition procedure from the web that consists of unstructured texts. Knowledge acquisition can be carried out by ontology acquisition and rule acquisition. Obtaining information such...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2015

    Social Media Graph Mining to Improve the Computational Efficiency Using Mapreduce

    Graphs are widely used in large scale social network analysis. Graph mining increasingly important in modelling complicated structures such as circuits, images, web, biological networks and social networks. The major problems occur in this graph mining are Computational Efficiency (CE) and Frequent Sub-graph Mining (FSM). Computational efficiency describes the extent...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2015

    Performance Attribution of Ternary Input Based Carbon Nano Tube FET

    Carbon nano-tube FET has been introduced for performing more efficient operation than the CMOS technology. In this paper, instead of binary based input, a ternary input is used in the digital circuit. A comparison between the CMOS and CNTFET is made for the performance analysis. Here, in this paper some...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2015

    Accuracy Constrained Using Anonymity Access Control Mechanism for Relational Data

    In preserving data, it specifies the techniques used for storing the data and retrieves for the related datasets; in this datasets user provide the authorization for each user regarding to any multiple task that want to specify their details in database. By using the anonymity method user can access the...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2015

    Mining and Detection from Social Network Big Data Using Spectral Clustering

    In this paper, the authors propose big data processing with respect data mining perspective. Here, data comes from everywhere like sensors, media sites, social media, etc. In this useful data can be extracted from this big data using data mining technique for discovering interesting patterns. As enhancement they propose detection...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2015

    Design of Carry Select Adder with Reduced Area and Power

    Adders are the most fundamental importance in a wide variety of digital systems. Among the fast adders exist, but fast adding using low area and power is still challenging. Several new adders based on the new carry select adder structure are proposed. Comparison with conventional adders demonstrates that the usage...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Aug 2013

    Multi-Cloud Storage Based Integrity Verification System Using Batch Auditing

    Cloud computing provides the increased level of scalability, availability and durability services to be easily consumed over the Internet on an as-needed basis for the customers. The more copies are asked to store by the service provider in cloud. For that more amounts has been charged from the customers. The...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Jan 2014

    Dynamic Resource Allocation in Cloud by Using Reconfiguration Technique

    Cloud computing is one of the most important service providers to the cloud users. This type of services can be access whomever and wherever it is and easily access with the help of internet. By using cloud computing services, the user can transfer or storage their personal or large amount...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Feb 2014

    Flexible Pricing Scheme for a Cloud Cache

    Cloud providers sell services for money to the users. In order to maximize the profit for cloud providers, certain techniques are needed to be followed. An information system is maintained for keeping the historical information like the time, date and the service accessed by the user. The provider comes to...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Oct 2013

    Data Mining Analysis using Query Formulation In Aggregation Recommendation

    Recommender systems are becoming increasingly important to individual users and businesses for providing personalized recommendations analyze data efficiently, data mining systems are widely using datasets with columns in horizontal tabular layout. Preparing a data set is more complex task in a data mining project, requires many QLA queries, joining tables...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Oct 2013

    Data Mining Analysis using PIVOT Method in K.Means

    The authors study the problem of privacy-preservation in social networks. They consider the distributed setting in which the network data is split between several data holders. The goal is to arrive at an anonymized view of the unified network without revealing to any of the data holders information about links...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Time-Based Proxy-encryption for Secure Erasure Code Based Cloud Storage System

    A cloud storage system, consisting of a assemblage of storage servers, supplies long-term storage services over the Internet. Saving data in a third party's cloud scheme determinants grave anxiety over facts and figures confidentiality. General encryption designs protect facts and figures confidentiality, but also limit the functionality of the storage...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2014

    Privacy Preserving Updates Using Generalization-Based and Suppression-Based K-Anonymity

    Today's globally networked society places great demand on the collection and sharing of person-specific data for many new uses. This happens at a time when more and more historically public information is also electronically available. Database is an important asset for many applications and their security is crucial. Data confidentiality...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2014

    Security - Preserving Data Mining: Watermarking of Outsourced Datasets Using Usability Constraints Model

    The knowledge driven data mining systems cannot be developed and designed until the owner of the data is willing to outsource the data with corporations or data mining experts or corporations. In the emerging field of outsourced datasets with the intended recipients, protecting ownership of the data is becoming a...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Oct 2013

    An Improving Performance of Filter Method Using Feature Subset Selection Algorithm

    To analyze data efficiently, data mining systems are widely using datasets with columns in horizontal tabular layout. Preparing a data set is more complex task in a data mining project, requires many SQL queries, joining tables and aggregating columns. Conventional RDBMS usually manage tables with vertical form. Aggregated columns in...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2014

    NoSQL Concatenated Transactions for Numerous Application in the Cloud

    NoSQL cloud data services provide scalability and high availability properties for web applications but at the same time they sacrifice data consistency and large write back time. However, many applications cannot afford data inconsistency and large transaction commits time. Transaction processing system is a scalable transaction manager to allow cloud...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2014

    Pattern Discovery Model for Effective Text Mining

    Text mining is the extraction of interesting knowledge from text documents. A vast majority of text mining methods are based on term-based approaches which extract terms from a training set for describing relevant information. However, the quality of the extracted terms in text documents may be not high because lot...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2014

    Improving Link Utilization in Data Center Network Using Near Optimal Traffic Engineering Techniques

    Data center networks are driven by intensive application like data mining, web searching and cloud computing. Now-a-days, topologies in data center networks applied multi-rooted tree like canonical tree, and fat-tree. In multipath routing Equal Cost Multiple Path (ECMP) forwarding is used in most of the current data center networks. However,...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Security and Privacy Challenges Data Leakage Detection in Cloud Computing Using Signature Generation

    Cloud computing is sought after its reduced infrastructure and implementation costs. Following is the cloud Infrastructure-as-a-Service (IaaS) paradigm and in order to create a flexible management framework. The rise in the usage of cloud computing also gave rise to privacy and security concerns. Concerns like data leakage are pretty common...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Nov 2013

    A Proficient Cost Reduction System for Moving Large Data to Cloud

    Cloud computing plays a very significant role in large amount data sharing and data storage from one place to another without using any infrastructure. The services provided by the cloud are greatly enjoyed by the user in different ways like to share, store and so on. The storage or transfer...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Nov 2013

    A Stride Towards Developing Efficient Approaches for Data Clustering Based on Evolutionary Programming

    Across a wide variety of fields, data are being collected and accumulated at a dramatic pace. There is an urgent need for a new generation of computational theories and tools to assist humans in extracting useful information from the rapidly growing volumes of digital data. These theories and tools are...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Dec 2013

    A Novel Approach in Green Cloud Computing

    Cloud computing is offering utility oriented IT services to users worldwide. It enables hosting of applications from consumer, scientific and business domains. However data centers hosting cloud computing applications consume huge amounts of energy, contributing to high operational costs and carbon footprints to the environment. With energy shortages and global...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Aug 2013

    Enhanced Data Storage Security and Trust Environment in Cloud Computing

    Cloud computing plays an important role in data sharing or transfer of information from one place to another. The services provides by the cloud is greatly enjoyed by the user. The storage of the user's data in the cloud provides the high standard of qualities and more enjoyable services to...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Robust Data Authenticity for Cloud Group User Security

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Unfortunately, sharing data in a multi-owner manner while preserving data and identity privacy from an untrusted cloud is still a challenging issue, due to...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Aug 2013

    A Novel Way to Discover Patterns Adopting Effective Pattern Matching Approach for Knowledge Discovery Applications

    There are many data mining techniques have been proposed for the mining useful pattern in the text documents and the quality of the extracted features is the key issue to the text mining. The quality evidence for the existing text mining schemes due to the large of terms, phrases and...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Aug 2013

    Provenance Control Based Secure Cloud System Using Jar Accessibility

    Cloud computing is one of the most important service in the internet. By using cloud computing services, the user can transfer their personal or important data's from one place to other through internet. Cloud computing provides highly valuable services to the consumers or cloud service user's on the needed basis....

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    A Novel Approach for Document Retrieval Using HAC Based on Multi-View Point Similarity Measure

    Clustering is one of the most interesting and important topics in data mining. The aim of clustering is to find relationship among the data objects, and classify them into meaningful subgroups. The effectiveness of clustering algorithms depends on the appropriateness of the similarity measure between the data in which the...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Automated Two Level Variable for Multiview Clustering

    Clustering is used to identify the relationship among different objects from large volume of data. The clustering analysis is feasible only when the groups are formed with important features. The existing k-means clustering processing time and the computation cost are high. The proposed two level variable weighting algorithm calculates weights...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Aug 2013

    Clustering the Web Documents Using the Enhanced Hierarchical Clustering Technique

    Noise gets influenced in a common distance measures in the high dimensional data. In an existing clustering algorithms implemented based on their partitioning, hierarchical, density based and grid based. Assume that some cluster relationship among the data objects that they are applied on in all clustering methods but either explicitly...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Vulnerable Taxonomy Like a Tune-Up Delegate Account Board to the Cloud

    Securely maintaining log records are over extended periods of time is very important to the proper functioning of any organization. Integrity of the log files during the logging process need to be ensured all times. In count, as log files often contain sensitive information, confidentiality and privacy of log records...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Secured Auditing System for Cloud Data Storage With Error Correction Guarantees

    Cloud computing is the process of providing computer resources like hardware and software as a service on-demand. It also provides remote services with a user's data and software cloud computing is the result of evolution and adoption of existing technologies and paradigms. The existing work presented a dynamic audit service...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Enhanced Technique for Skyline Query Processing on Robabilistic Databases

    In recent years, some databases have a lot of uncertainty with itself. And also the databases have imprecise, fuzzy and incomplete survey results. So that if a result retrieves from these databases it will be addressed with two or more results. Because the normal query process does not work with...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Secure Dynamic Auditing for Data Storage in Cloud by TPA

    Cloud providers ensure that applications available as a service via the cloud are secure by implementing testing and acceptance procedures for outsourced or packaged application code. It also requires application security measures are in place in the production environment. Due to the data outsourcing, however, this new paradigm of data...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Collision Free Permutation On-Chip Network by Using Vhdl for SoC Applications

    The increasing complexity of integrated circuits drives the research of new intra-chip interconnection structures. A Network-on-Chip (NoC) concept which is used in the distributed systems and computer networks subject areas to connect intellectual property cores in a structured and scalable way, this paper presents the Network-on-Chip (NoC) is used to...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Data Alignment Process Using Query Suggestion Method by Ontology Approach

    The web access users have been increasing now a day through the HTML form based search interface. The result pages that are displayed from the web database are obtained dynamically for the ease of human browsing. The result page retrieved from the deep web database is aligned and labels are...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    An Efficient Approach for Mobile Commerce Pattern and Sequential Pattern Mining

    Mobile commerce is an emerging technology in both industry and academic. Among them, one of the active topic areas is the mining and prediction of user's mobile commerce behaviors. In this paper, the authors propose a system for mining and prediction of mobile user's movements and purchase transactions under the...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Enhanced Cloud Data Security Through Verifiable Cipher Policy Based Encryption

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Handling Big Data Using NoSQL Database

    The traditional relational database is widely used in information management system for structured data is not effective. To handle the unstructured data, a kind of new technology emerged \"NoSQL\", which is non-relational database management system for unstructured data. The biggest motivation behind NoSQL is scalability. Healthcare is one of the...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2014

    Privacy Preserving Data Publishing Using Tuple Grouping Algorithm

    Privacy preserving publishing of micro data has contain records each of which contain information individual entity, Micro data anonymization techniques are partitioned into three categories: some attributes are identifiers. Some attributes are Quasi-Identifier (QI). Some attributes are Sensitive Attributes (SA). Generalization and bucketization first removes identifiers from the data and...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Towards Privacy Preserving Data Publication

    In recent years, several anonymization techniques are available for preserving the privacy of micro data. Micro data holds information about an individual along with sensitive information. Existing anonymization techniques are bucketization, generalization and slicing. Generalization loses information and does not support high dimensional data. Bucketization does not preserve identity disclosure....

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Mar 2014

    Securing Personal Information Using Data Mining in Public Networks

    Network security consists of the requirements and policies adopted by a network administrator for preventing and monitor unauthorized access, misuse, alteration, or rejection of a computer network and network accessible resources. Network security involves the authoritative access to enter into the network which is controlled by the network administrator. Users...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2014

    Privacy Preserving Public Auditing for Secured Data Storage in Cloud Using Block Authentication Code

    Using cloud storage, users can remotely store their data, on-demand high-quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. Users no longer have physical possession of the outsourced data makes the data integrity protection in cloud computing for...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Apr 2014

    Clustering of Random Cognitive Learning and Fuzzy Means Using Classification Techniques

    Clustering is the task of grouping a set of objects in such a way that objects in the same group called as cluster are more similar in some sense or another to each other than to those in other groups clusters. Including machine learning, pattern recognition, image analysis, information retrieval,...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Aug 2013

    Clustering User Search Queries Using Textual Similarity

    Internet users are using the complex task oriented works on the web is goes on increasing in recent years. The complex tasks are booking for travels, managing finances and planning for purchase the new things. The successful previous paper, they usually break down the tasks into a few co-dependent steps...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Aug 2013

    On Probe Packet Based Intrusion Detection System

    In the recent years, the wireless Mobile Ad-hoc NETwork (MANET) plays the vital role in several fields such as battlefields, commercial applications, traffic surveillance and so on. This type of the wireless networks is a rising emerging technology and having the great potential to apply in the serious situations. The...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)

  • White Papers // Jan 2015

    Cloud Computing - Service Models, Types of Clouds and Their Architectures, Challenges

    Internet has changes the computing world providing abundant resources for the user, moving from cluster to grid, grid to cloud. The cloud provides an environment where the requirements like computing power, data storage and memory are provided to the customer as utility computing. There are many deployment models and service...

    Provided By International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)