International Journal Of Engineering And Computer Science

Displaying 1-40 of 658 results

  • White Papers // Jul 2015

    Web Based Spatial Query System for Decision Making

    GIS is becoming essential to understand what is happening and what will happen in geographic space. This paper web based Geographic Information System (GIS) lets them visualize, question, analyze and interpret data to understand relationships, patterns and trends online. Most of the geo-portals which are web based primarily provide display...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jul 2015

    A Feasible Approach to Design a CMOS Domino Circuit at Low Power VLSI Application Design

    Dynamic logic style is used in high performance circuit design because of its fast speed and less transistors requirement as compared to CMOS logic style. But, it is not widely accepted for all types of circuit implementations due to its less noise tolerance and charge sharing problems. A small noise...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jul 2015

    Cloud and Virtualization: Interdependency

    Cloud computing and virtualization are two booming technologies in this era. This paper is an attempt to correlate cloud with virtualization. This paper represents cloud as 'Automated virtualization' and 'How virtualization is a necessity to implement cloud' is the main concern of paper. Cloud comes with business need in any...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jul 2015

    Kindiling and Perception of QR-Images Using Raspberry-PI

    The QR codes can be detected by webcam which is connected to ARM microcontroller through USB device and the image is processed by using image processing technique. Image processing is any form of signal processing for which the input is an image, such as a photograph or video frame; the...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jul 2015

    Text Mining Using Ontology Based Similarity Measure

    In many text mining applications, the side-information contained within the text document will contribute to enhance the overall clustering process. The proposed algorithm performs clustering of data along with the side information, by combining classical partitioning algorithms with probabilistic models to boost the efficacy of the clustering approach. The clusters...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Smart Vehicle Security System Using GSM & GPS

    In this paper, the authors use the wireless technology effectively for the automotive environments by using the GSM modem used in sending SMS in case of theft intimation. This paper is to stop the engine of an automobile automatically. This can be done whenever a person trying to steal the...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Securing Hadoop Using Layered Approach

    Hadoop is a distributed system that provides a distributed file system and MapReduce batch job processing on large clusters using commodity servers. Although, Hadoop is used on private clusters behind an organization's firewalls, Hadoop is often provided as a shared multi-tenant service and is used to store sensitive data; as...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Cloud Data Center's Resource Provisioning with Secured Mining in Distributed Mechanism

    Data center have the largest consumption amounts of energy in power sharing. The public cloud workloads contain different priorities and performance requirements of various applications. Cloud data center have capable of sensing an opportunity to present the different programs. The proposed construction and the security level of self-possessed privacy leakage...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Study on Mining Weighted Infrequent Itemsets Using FP Growth

    In information mining and knowledge discovery techniques area and frequent pattern having important role, frequent patterns are patterns that come out in data set recurrently. Item sets that occur frequent are patterns or items like item sets, substructure or subsequences. Frequent weighted item set characterize associations frequently holding in information...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Cloud Architecture for Big Data

    With the advent of service computing and cloud computing, more and more services are emerging on the Internet, generating huge volume of data. The overwhelming service-generated data become too large and complex to be effectively processed by traditional approaches. How to store, manage and create values from the service-oriented big...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    FPGA Design of High Throughput STBC-OFDM System for Low Power Applications

    In this paper, the authors propose a space time block code orthogonal frequency division multiplexing downlink baseband receiver for mobile wireless metropolitan area network. The proposed baseband receiver applied in the system with two transmit antennas and one receive antenna aims to provide high performance in outdoor mobile environments. It...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Design of High Performance SRAM Cell Using 12T MTCMOS Technology

    In this paper, the authors focus on the stability analysis at different pull up ratios and power dissipation at different temperatures of a novel low power 12T MT CMOS SRAM cell. The MT CMOS technology the SRAM cell will be contains Low VT (LVT) transistors and two High VT (HVT)...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Study of Enhancing ARM Algorithms with Map Reduce Framework

    In this paper, the authors study the requirements to add efficiency in data mining. As the volume of data increases in tera-bytes and that too remains distributed in nature, the data mining algorithms need to be adoptive to this trend. Scaling is one essential issue to be considered. Cloud gives...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Design ALU Based Online BIST for Multi Word-Width RAM's

    Memory cores are usually the densest portion with the smallest feature size in System-on-Chip (SoC) designs. The reliability of memory cores thus has heavy impact on the reliability of SOCs. Transparent test is one of useful technique for improving the reliability of memories during life time. Transparent BIST schemes for...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    A Review on Various Techniques of Hiding Association Rules in Privacy Preservation Data Mining

    Data mining is the useful technology to extract information or knowledge from large database. However, misuse of this technology may lead to the disclosure of sensitive information. Privacy Preserving Data Mining (PPDM) is new research direction for disclosure of sensitive knowledge. There are many techniques used in PPDM to hide...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Query Recommendation Approach for Searching Database Using Search Engine

    Search engines generally provide long lists of ranked pages, finding the desired information content from which is typical on the user end and therefore, search result optimization techniques come into play. The proposed system based on learning from query logs predicts user information needs and reduces the seek time of...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Low Power Modeling of Topologically Compressed Static Flip-Flop

    The increasing market trends of extremely low power operated handy applications like laptop, electronic gadgets, etc. requires micro-electronic devices with low power consumption. It is obvious that the transistor dimensions continues to shrink and as require for more complex chips increases, power management of such deep sub-micron based chip is...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    32nm Based High-Speed Low-Power Calibrated Flash ADC Comparator with Improved ENOB

    In this paper, the authors have proposed a low power high speed CMOS comparator using Dual Mode Logic (DML) for flash type analog to digital converter, the simulation model of DML based CMOS logic simplification is to identify a system that improves the hardware utilization rate from 57.14% to 100%...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Implementation of User Define Kernel for Non-Linear Data Classification in Support Vector Machine

    Data mining is knowledge discovery process in database designed to extract data from a dataset and transforms it in to desired data. Data processing action is similarly acclimated in get of constant patterns and/or analytical relationships amid variables and a new to validate the accusation by applying the detected patterns...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2015

    Unit Level Web Databases Searching

    An increasing number of databases have become web accessible through HTML form-based search interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for human browsing. The authors present an automatic annotation approach that first aligns the data units on a result page...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    A Survey on Different Methods for Design of Sparse FIR Filter

    Sparsity has been a great issue in the design of FIR filter. The objective of a sparse FIR filter design is to reduce the implementation complexity as the number of non-zero coefficients is reduced. By increasing the number of zero-valued coefficients, the implementation of the filter becomes simple as the...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    Extended Two Phase Commit Protocal in Real Time Distributed Database System

    The Two phase commit (2pc) protocol is widely used for commit processing in Distributed DataBase System (DDBS). The blocking problem in 2pc reduces the availability of the system as the blocked transaction keeps all the resources until receive the final command from the coordinator after its recovery. To remove the...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    A Survey of Different Decoding Schemes for LDPC Block Codes

    Low-Density Parity-Check (LDPC) code a very promising near-optimal Error Correction Code (ECC), is being widely considered in next generation industry standards. In this paper, two simple iterative low complexity algorithms for decoding LDPC codes have been explained. These algorithms are implemented using real additions only and also not dependent on...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    High Speed Fused Add-Multiply Operator Design Based on SQRT-CSLA Adder

    Digital Signal Processing (DSP) applications involve various complex operations. This paper deals with the high speed operation in the design of the fused-add multiply operator for increasing the Performance. This includes the techniques to implement the direct recoding of the sum of two numbers in the Modified Booth (MB) form...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    Text Extraction From Images with Edge-Enhanced Mser and Hardware Interfacing Using Arduino

    Detecting text in natural images is an important prerequisite. Text characters and strings provide valuable information for many applications, extracting text directly from natural scene images or videos is a challenging task because of diverse text patterns and various background interferences. In this paper, an attempt is made to extract...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    Web Data Extraction Using Partial Tree Alignment

    As a huge data source the internet contains a large number of worthless information, and the data of information is usually in the form of semi-structured in HTML web pages. This paper uses a new methodology to perform the task automatically. It consists of two steps, the foremost one is...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    A Traffic Model for Routing Logic in Network on Chip

    The increased demand for on-chip communication bandwidth as a result of the multi-core trend has made packet-switched Network-on-Chips (NoCs) a more compelling choice for the communication backbone in next-generation systems. However, NoC designs have many issues like power, area and performance trade-offs in topology, buffer sizes, routing algorithms and flow...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    A 16-Bit Ripple Carry Adder Design Using High Speed Modified Feedthrough Logic

    In this paper, the authors present the design and simulation of high speed 16-bit ripple carry adder using a new CMOS logic family called Feed-Through Logic (FTL). FTL arithmetic circuits provides for smaller propagation time delay when compared with the standard CMOS technologies. The proposed circuit has very small propagation...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    An Efficient Design and Implementation of ALU Using Gated Diffusion Index

    In this paper, the authors implement a design of a 4-bit Arithmetic Logic Unit (ALU) using the concept of Gated Diffusion Index (GDI) technique. In central processing unit and microprocessors ALU is the most crucial component. 4x1 multiplexer, 2x1 multiplexer and full adder are used in ALU design to implement...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    A Design of Low Power Low Area High Speed Full Adder Using GDI Technique

    Full adder is the basic building block for various arithmetic circuits such as compressors, multipliers, comparators and so on. 1-bit full adder cell is the important and basic block of an arithmetic unit of a system. Hence in order to improve the performance of the digital computer system one must...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    Design and Implementation of High Efficient and Performance of Modified Adder Circuit Using 128 Bit CSLA and BEC Adder for Filter Design

    Low Power VLSI is the major area in VLSI design to develop the product in smart way. High performance is the keystone of the designer's idea. Performance depends upon the speed, reduce-in-delay, less power consumption and majorly cost. In low power VLSI design, the contribution of adder is another platform....

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    Power Reduction with FlipFlop Grouping in Data Driven Clock Gating

    In digital circuits, clock signal is one of the factors causing dynamic power consumption. Clock gating is a method applied for reducing the dynamic power dissipation in sequential circuits. Here, the redundant clock pulses in a high frequency clock signal are eliminated by performing AND operation on enable signal and...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    Non-Linear Data Perturbation Method for Privacy Preserving Data Mining

    To hold effective data from big databases and data mining methodologies are put on purpose. For recognizing the connections amid the item sets quickly, academicians and researchers are giving attention on the association rule mining amid many different data mining approaches. The subject of privacy matters when the data is...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2015

    Comparative Study and Evaluation of Various Data Classification Techniques in Data Mining

    The goal of classification algorithms is to generate more certain, precise and accurate system results. Numerous methods have been suggested for the creation of ensemble of classifiers. Classification methods are typically strong in modeling interactions. Several of the classification methods produce a set of interacting logic that best predict the...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Apr 2015

    Implementation of Hadoop Pseudo-Distributed Cluster on Android using 'Chroot'

    In this paper, the authors are discussing porting methods of Linux console based applications to Android platform and primarily concentrating on migration of Hadoop from personal computer to Android device. There are four different approaches towards porting methodology viz. recompilation of Linux binaries using bionic c library, running Android under...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Apr 2015

    Authentication at Single-Point-of-Access in Cloud Environments

    Cloud computing is a rising innovation and increase consideration in scholastic and business range. Assets are pooled and offer with clients on interest. With a specific end goal to give better execution of cloud environment, undertaking planning is a paramount issue. This paper to explore the different environments of the...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Apr 2015

    Improving Accessing Efficiency of Cloud Storage Using De- Duplication and Feedback Schemes

    File storage in cloud storage is handled by third parties. Files can be integrated, so that the users are able to access the files using the centralized management. Due to the great number of users and devices in the cloud network, the managers cannot effectively manage the efficiency of storage...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Apr 2015

    A New Approach for Distributed Data Mining based on SOA

    Distributed data mining is a data mining where computation and data is dispersed over multiple independent sites. Service-Oriented Architecture (SOA) provides integration of many services which coordinate and communicate to one another for their respective goals. Web service based SOAs are used for on-demand computing as well as for developing...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Apr 2015

    Designing of Novel Low Power Signed and Unsigned Multiplier Using 180nm CMOS Technology in CADENCE

    Power consumption is the bottle neck of system performance in VLSI design. Minimization of power consumed by the circuit tends to improve the performance and reduce the cost of the system. Power consumption is mainly due to increased number of transistors and leakage power. The reduction of transistor count and...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Apr 2015

    RTOS Based Fault Diagnosis and Efficient Data Transfer on Priority Basis Using CAN

    CAN protocol is a broadcast communication protocol and it is used for automotive application. CANalyzer is a software tool which is used for analysis and stimulation of bus communication. It is used to check whether and what type of communication is occurring on the bus. It is used to send...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Implementation of Cooperative Caching in Social Wireless Networks

    In this paper the authors introduced cooperative caching policies for minimizing the content provisioning cost in Social Wireless NETworks (SWNET). SWNETs are formed by mobile devices, such as data enabled phones, electronic book readers etc., sharing common interest in electronic contents, and physically gathering together in public places. Electronic object...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Re-ranking of Images using Semantic Signatures with Duplicate Images Removal & K-means clustering

    Image search engines mostly use keywords and they rely on surrounding text for searching images. Ambiguity of query images is hard to describe accurately by using keywords. Example apple is query keyword then categories can be \"Red apple\", \"Apple laptop\", etc. Another challenge is without online training low level features...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    An NLP Method for Discrimination Prevention Using both Direct and Indirect Method in Data Mining

    Today, data mining is an increasingly important technology. It is a process of extracting useful knowledge from large collections of data. There are some negative view about data mining, among which potential privacy and potential discrimination. Discrimination means is the unequal or unfairly treating people on the basis of their...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Success of Windows 8: Capturing multiple markets

    An operating system is a software program that acts as an interface between the user and computer hardware. This paper presents study on the market of Windows8. How it integrates both desktop and mobile. This paper is the study of Windows 8 for desktop, Windows 8 for mobile and business...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Integrity Check Mechanism in Cloud Using SHA-512 Algorithm

    Cloud computing is an alternative to traditional information technology due to its services. In this paper, a new theory has been introduced three way integrity algorithm. Here the authors are checking the accuracy of Cloud Service Provider (CSP) and Third Party Auditor (TPA). It gives an efficient data integrity mechanism...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Pruning the Cloud Internal Data Stealing By Treachery Attacks

    Cloud computing is internet based computing provides computing services those are data, application, software and computing, these computing services are delivered to local devices through internet. To store and share personal and business information and access cloud computing enables multiple users. Insider means, users those who have valid authority on...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Challenges in Testing of Web Applications

    Testing is one of the most important phases in software development life cycle. It actually plays a very important role in the software product success by improving its quality. There are so many challenges of testing are involved in web-based applications. But interoperability and integration are the most important testing...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Security Issues Cloud computing Storage

    Cloud computing uses the internet and central remote servers to maintain data and applications. It allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. This technology allows for much more efficient computing by centralizing data storage, processing and bandwidth....

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Delivering Of Real Time Services through Internet Protocol Using Cloud Computing

    Cloud computing is nothing but set of services and resources which are offered through internet. Using cloud computing technology services can be delivered to the user by making use of the technique called virtualization. By making use of statistical multiplexing virtualized cloud based services can yield significant cost savings across...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    A Systematic Approach to Cloud Security Using SeDas Platform

    Cloud computing is one of the cutting-edge technologies used by most of the people. Cloud users are requested to submit the personal private information to the cloud by the Internet. When users do this, they hope that Cloud Service Provider (CSPs) will provide the privacy for the data. Self-destructing data...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Fraud Detection Social Security and Social Welfare Data Mining

    The importance of social security and social welfare business has been increasingly recognized in more and more countries. It impinges on a large proportion of the population and affects government service policies and people's life quality. Typical welfare countries, such as Australia and Canada, have accumulated a huge amount of...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Survey Paper for Resisting Web Proxy Based Http Attacks by Locality Behavior

    A novel attack detection scheme is proposed to prevent web proxy based http attacks. Here the detection is carried out at server. The scheme utilizes locality behaviors such as temporal and spatial localities to obtain features of proxy-to-server traffic. A gaussian-mixture and gamma distribution hidden semi markov model is used...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Aspect Extraction & Segmentation in Opinion Mining

    Opinion mining or sentiment analysis is the computational study of people's opinions, appraisals, attitudes, and emotions towards their aspects. Opinion mining is one of the significant areas of research in Web mining and Natural Language Processing (NLP) recently. With the growth of e-commerce, web documents are increasingly being used for...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Greening the Cloud Computing

    Cloud computing is emerging as a critical information communication technology to heavily impact the people's daily life in the future. It is an emerging trend in computing. This is happening at a time when there is increasing attention being paid to the need to manage energy consumption across the entire...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Apr 2014

    Cloud Computing: Beginning of a New Technical Era

    With the arrival of new era of technology, incremental use of gadgets such as smart phones loaded with camera, tablets, music players, hand held game consoles etc. has led to a continuous requirement to store, share and access digital data. Thus massive digital data born every day requires a huge...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    K-Means on GPU: A Review

    Graphics Processors Units (GPUs) have developed very rapidly in recent years. K-means is the most popular clustering algorithm in data mining. The size of various data sets has increased tremendously day by day. The general - purpose applications are implemented on GPU using Compute Unified Device Architecture (CUDA). Cost effectiveness...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Survey Paper for Dynamic Resource Allocation using Migration in Cloud

    Cloud computing is a rampant technology now-a-days because of its scalability, flexibility, availability of resources and the other features. In cloud computing resource multiplexing is done through the virtualization technology. Virtualization technology is acts as a backbone for provisioning requirements of a cloud based solution. The problems arising in cloud...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    A survey on text mining techniques

    Text mining is a technique to find meaningful patterns from the available text documents. The pattern discovery from the text and document organization of document is a well-known problem in data mining. Analysis of text content and categorization of the documents is a complex task of data mining. In order...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Security and Privacy in Private Cloud Storage

    Cloud storage is a new emerging technology in which users can outsource their data on cloud and access it remotely from anywhere, thus the user can be free from the burden of data storage and its maintenance. But it is true that the data outsourced on cloud storage is not...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Design of an Application Specific Microcontroller

    In embedded system design, there are four prime factors that determines the performance and quality of any embedded system i.e. cost, size, speed and power consumption. This paper is concerned with the designing of an application specific microcontroller that can be implemented on any FPGA. A SuC is a collection...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2014

    Disclosure Protection of Sensitive Attributes in Collaborative Data Mining

    In collaborative data mining, data sets from various parties are submitted to a third party where they are combined, privacy of each data sets' sensitive attributes are protected and data mining is carried out. In privacy preserving data mining, there is a need to extract knowledge from databases without disclosing...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Apr 2014

    iMobile: Remote Access for Android Phones

    Now-a-days the people are dependent on their mobile phones, if they forget the phone at home it seems they have lost a limb. That time they think that it would be good to access their mobile remotely, like the web browser. The application like iMobile, instead of accessing the computer...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2014

    Novel Cache Replacement Algorithm

    In a computer architecture cache memory have been introduced to balance performance and cost of the system. To improve the performance of a cache memory in terms of hit ratio and good response time system needs to employ efficient cache replacement policy. In this paper, the authors proposed and implemented...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2014

    Analysis of Various Data dissemination Technique in Wireless Sensor Network

    There are a few special features of Wireless Sensor Network (WSN) like restricted battery life, bound computing routing capabilities etc. for the reason that of these particular features of Wireless Sensor Networks (WSNs), routing algorithms of Mobile Ad-hoc NETworks (MANETs) are not appropriate. The current data dissemination system is not...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2014

    Effective Resource Management Based on Flexible Workload Technique in Cloud

    The resource management is the main problem in the cloud. Anchor used for fetching stable matching policies when mapping the virtual machine's to physical servers and clients and the operators are mapping virtual machine's to physical servers based on the preferences of the user request. In the proposed system, anchor...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2014

    Tamper Detection in Database using Forensic Analysis

    Tampering of database can be determined through cryptographically hash functions. Hash functions determines only the tampering of data but forensic analysis functions determines only the tampering of data but forensic analysis can help to detect when data is tampered, what data is tampered and ultimately who and why. This paper...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jun 2013

    A New f-IDPS Approach for the Intrusion Detection in High-Speed Networks

    As the networks become faster and faster, the emerging requirement is to improve the performance of the Intrusion Detection and Prevention Systems (IDPS) to keep up with the increased network throughput. In high speed networks, it is very difficult for the IDPS to process all the packets. Since the throughput...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Feb 2013

    Comparatative Analysis of Cloud Backup in Enterprise and Small Medium Business

    Cloud computing users are growing at a rapid rate. The user data is loaded into the cloud. Therefore, the critical data protection is an important issue for any organization regardless of its size. Even though the organizations backup their data manually on a regular basis but the risks of a...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // May 2013

    A New Approach for Load Balancing in Cloud Computing

    Cloud computing is built on the base of distributed computing, grid computing and virtualization. The eminence of the place of cloud computing in future converged networks is incontestable. It is due to the obvious advantages of the cloud as a medium of storage with ubiquity of access platforms and minimal...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Aug 2013

    A Collaborative Writing Tool on Cloud Environment

    Collaborative writing describes a full length writing assignment completed in pairs or small groups. Collaborative writing (CW) transforms the usually solitary work of writing and editing college papers into a group endeavor. Instructors value such assignments because of their real world relevance. After all, in most workplaces writing is typically...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Aug 2013

    Improving High Performance Utilization of Infrastructure-as-a-Service Clouds

    An Infrastructure-as-a-Service (IaaS) cloud is provided that users on-demand access to resources. Infrastructure as a Service is a stipulation model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is conscientious for housing, running...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jan 2013

    A Secure Address Allocation Scheme for Wireless Area Distributed Communication Network

    As deployed grids increase from tens to thousands of nodes, peer-to-peer techniques and protocols can be used to implement scalable services and applications. The Address allocation model is a novel approach that helps the convergence of wireless network and Grid environments and can be used to deploy information service in...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Apr 2013

    An R-Tree Node Splitting Algorithm Using MBR Partition for Spatial Query

    The optimization of spatial indexing is an important issue considering the fact that spatial database, in such diverse areas like geographical, CAM and image applns are growing rapidly in size and often contain in the order of millions of items. To handle these multi-dimensional data, R-tree is widely used as...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Feb 2013

    Modern Approaches for Detecting Data leakage Problems

    In Organizations, detecting data leaker is facing many difficulties to find who cause for the data leakage. In previous approaches there are many techniques to find the leaker using fake objects and how much data leaked. In this paper, the authors present S-Random, S-Optimal, E-Random and E-Optimal techniques to find...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Feb 2013

    Effective Anomaly Detection Techniques for Sequential Data in Data Mining

    Anomaly detection has traditionally dealt with record or transaction type data sets. But in many real domains, data naturally occurs as sequences, and therefore the desire of studying anomaly detection techniques in sequential data sets. The problem of detecting anomalies in sequence data sets is related to but different from...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Oct 2012

    Network Security - How to Defend an Infinitely Expanding Frontier

    The increasing use of home offices and laptops has put an ever-expanding number of users, data, devices and applications beyond the security of the traditional enterprise network firewall. At the same time, organizations - and their IT administrators - are held to increasingly higher standards of accountability for breaches in...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Sep 2013

    Prevention of Selective Jamming Attacks Using Swarm Intelligence Packet-Hiding Methods

    Jamming is one of the most dangerous Pre-arranged disturbance attacks in wireless medium. This attack with wireless transmission is used as a launch pad for rising Denial-of-Service (DoS) attacks on wireless networks. Usually, electronic jamming has been reportable as an external threat model. The authors tend to take into account...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jan 2013

    Optimize Security Solution for Mobile Agent Security: A Review

    The field of agents has many diverse researchers, approaches and ideas, which has helped to create one of the more dynamic research areas in recent years. Mobile agents are enjoying a lot of popularity and are destined to influence research in distributed systems for the years to come. Thus far,...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Feb 2013

    An Effective Secure Environment Using Graphical Password Authentication Scheme

    Authentication, authorization and auditing are the most important issues of security on data communication. In particular, authentication is the life of every individual essential closest friend. The user authentication security is dependent on the strength of user password. A secure password is usually random, strange, very long and difficult to...

    Provided By International Journal Of Engineering And Computer Science

  • White Papers // Jul 2013

    Design and Construction of Door Locking Security System Using GSM

    In this paper, the authors present a prototype security door that can be remotely controlled by a GSM phone set acting as the transmitter and another GSM phone set with a Dual Tone Multi-Frequency (DTMF) connected to the door motor through a DTMF decoder interfaced with microcontroller unit and a...

    Provided By International Journal Of Engineering And Computer Science