Interscience Open Access Journals

Displaying 41-80 of 502 results

  • White Papers // Jun 2013

    New Dynamic Query Optimization Technique in Relational Database Management Systems

    Query optimizer is an important component in the architecture of relational data base management system. This component is responsible for translating user submitted query into an efficient query evolution program which can be executed against the database. The present query evolution existing algorithm tries to find the best possible plan...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Extracting Accurate Data from Multiple Conflicting Information on Web Sources

    For the World-Wide Web has become the most important information source for most of the users. As different websites often provide conflicting information there is no guarantee for the correctness of the data. Among multiple conflict results, can the users automatically identify which one is likely the true fact?, In...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Face Recognition by Linear Discriminant Analysis

    Linear Discriminant Analysis (LDA) has been successfully applied to face recognition which is based on a linear projection from the image space to a low dimensional space by maximizing the between class scatter and minimizing the within-class scatter. LDA allows objective evaluation of the significance of visual information in different...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Fault-Prone Components Identification for Real Time Complex Systems Based on Criticality Analysis

    Generally, complexity of software affects the development and maintenance cost. The complexity of the software increases, when the number of components increase, among these components, some are more critical than others which will lead to catastrophic effects on field use. Hence, it is needed to identify such critical components after...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Aspect Mining Using UML Communication Diagram

    Aspect-Oriented Programming (AOP) focuses on precise constructs for modularization of the crosscutting concerns of a program. Crosscutting concerns can be defined as the functionalities that navigate the principal decomposition of software and therefore cannot be assigned to a single modular unit. Aspect mining attempts to find and isolate crosscutting concerns...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Blackbox Testing of Web Service

    Web services and Service Oriented Computing (SOC) paradigm have received significant attention due to its wide spread adoption and promotion by major IT vendors. As more and more service-oriented softwares are built today testing of web service have becomes crucial point. Web services are distributed, loosly coupled, autonomous, re-usuable, discoverable,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Distributed Accountability and Auditing in Cloud

    The widespread use of Cloud computing has opened up new challenges by introducing different types of trust scenario. The lack of confidence in trusting information flow (users data are usually processes remotely in unknown machines that do not owned or operated by user) in cloud has become common, as users...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    A Secure Data Forwarding Schema for Cloud Storage Systems

    Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Reliablity Control Using Loss Recovery Ratio in Wireless Sensor Network

    In Wireless Sensor Network congestion leads to the degradation of communication links that result in the decreased the reliability and waste of energy which one of the scarcest resources of sensor network. In cluster based environment, each sensor senses the information and forwarded to its cluster head and cluster head...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Optimal Route Selection Strategy for QoS Improvement

    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Ad-hoc nodes operating in a single path, single channel model might experience packet loss and high latency...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Adaptive Channel Split Ratio in Tdd Based Wi-Max Network for Link Improvement Analysis

    The last mile access for residential user is asymmetric. As a result an equal split between the uplink and downlink channel cause inefficient bandwidth utilization. Improper allocation will severely affect the traffic. In this paper, the main focus is TCP performance during improper bandwidth allocation. The TDD framing in WiMAX...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Self Adaptive Effective Aperture for Multi Antenna Set-Ups in Faded Wireless Channels

    In mobile communication, a less explored technique to mitigate fading effects is based on the physical parameter of the transmitter by varying the physical dimension of the transmitting antenna. This paper deals with a self adaptive system to eliminate severe fading effects in different multi antenna set-ups by adaptively updating...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    A Tool for Effective Detection of Fraud in Credit Card System

    Due to the rise and rapid growth of E-commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. Fraud is one of the major ethical issues in the credit card industry. As credit card becomes the most popular mode...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Comparison of Fuzzy Logic Controllers for a Multivariable Process

    The Interval Type-2 Fuzzy Logic Controller (IT2FLC) for a Quadruple Tank Process (QTP) is demonstrated in this paper. Here, the interval type-2 based fuzzy membership function is used. The QTP is made to operate in minimum phase mode. The vertices of fuzzy membership functions are tuned with IT2FLC to minimize...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Fault Tolerant System for Cellular Network

    In cellular communication networks, the geographical area is divided into smaller regions, called cells. In each cell, there is one Mobile Service Station (MSS) as well as a number of Mobile Hosts (MH). The communication between MSSs is, in general, through wired links, while the links between an MH and...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Rate Compatible Punctured Turbo-Coded Hybrid ARQ for OFDM System

    Now-a-day's Orthogonal Frequency Division Multiplexing (OFDM) is under intense research for broadband wireless transmission because of its robustness against multipath fading. A major concern in data communication such as OFDM is to control transmission errors caused by the channel noise so that error free data can be delivered to the...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Current Reuse Active Inductor Based Wideband LNA

    In this paper, the authors present the design of an active inductor based wideband LNA using current reuse topology, which is designed and simulated in 0.18um CMOS technology. The low noise amplifier is considered to be the key block in an RF receiver. It plays a critical role in determining...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Hermitian Symmetry Based Fiber Non-Linearity Compensation in Optical OFDM Networks

    Orthogonal Frequency Division Multiplexing (OFDM) is a modulation technique which is now used in most new and emerging broadband wired and wireless communication systems such as standard 802.11a/b/g/n, Digital Video Broad casting TeleVision (DVB-TV), and Long Term Evolution (LTE) in the next mobile generation, due to its capacity in solving...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Wireless Real Time Proportional Control System

    This system provides low power consuming and low cost wireless sensor network. This system provides a real time temperature and humidity. It also gives proportional control action. This system consists of TI's MSP430 microcontroller which consumes ultra low power and improves the overall system performance. The Sensorion's SHT 11 sensor...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Efficient and Secure Authentication by Using 3-Path Transmission in Ad Hoc Networks

    Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The design and...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Maximizing the Lifetime and Security of Wireless Sensor Networks

    Recent technological advances have facilitated the widespread use of Wireless Sensor Networks in many applications such as battle field surveillance, environmental observations, biological detection and industrial diagnostics. In Wireless Sensor Networks, sensor nodes are typically power-constrained with limited lifetime, and so it's necessary to understand however long the network sustains...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Effects of a Barrier Layer in InGaAs Channel MOSFETs for Analog/ Mixed Signal System-on-Chip Applications

    Addition of a barrier layer in an InGaAs MOSFET, which shows promise for high performance logic applications due to enhanced electron mobility, further improves the electron mobility. The authors report, for the first time, a detailed investigation of the impact of different barrier layers on the analog performance of an...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    The Mathematical Analysis of Column Oriented Database

    There are two obvious ways to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Historically, database system implementations and research have focused on the row-by row data layout, since it performs best on the most common application for...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project

    Unethical e-mail senders bear little or no cost for mass distribution of messages; yet normal e-mail users are forced to spend time and effort in reading undesirable messages from their mailboxes. Due to the rapid increase of electronic mail (or e-mail), several people and companies found it an easy way...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Cloud Computing Applications and Security Issues: An Analytical Survey

    Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Data Warehousing Applications: An Analytical Tool for Decision Support System

    Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data Warehouses (DW) can provide the information required by the decision...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Photovoltaic Based Balancing Load Distribution Feeders Using Loop Power Controllers

    Balancing load of distribution feeders is significant for falling of power loss and mitigating power flow. As the loop power controller is implanting for the active power and reactive power flows by change in voltage ratio and phase shift. So, that the balancing of the load distribution feeders can be...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Design and Implementation of a High Speed Clock and Data Recovery Delay Locked Loop Using SC Filter

    In this paper, the authors present the design of a clock and data recovery circuit having a high data rate of 9.95328Gb/s by using delay locked loop with Switched Capacitor (SC) filter to improve the jitter transfer function and jitter tolerance as it has high Q and low center frequency....

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Transmission Network Expansion with Transmission Loading Relief

    Transmission planning should seek to maintain or improve system security over time and facilitate robust wholesale power markets by improving transmission capacity for bulk power transfers across wide regions It includes finding the optimal plan for the electrical system expansion, it must specify the transmission lines and/or transformers that should...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Layered Decoding Architecture for LDPC Decoder with Low Energy Consumption

    Low-Density Parity-Check (LDPC) decoder requires large amount of memory access which leads to high energy consumption. To reduce the energy consumption of the LDPC decoder, memory-bypassing scheme has been proposed for the layered decoding architecture which reduces the amount of access to the memory storing the soft posterior reliability values....

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    CCI Cancellation Using KF in Faded MIMO Channels

    Multi Input Multi Output system (MIMO) has become a viable option to meet the demand of high data rate wireless communication. But MIMO system performance is severely affected by the presence of Co-Channel Interference (CCI). CCI cancellation in MIMO channel therefore is a challenging area of research. This paper provides...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Split MLSE Adaptive Equalization in Severely Faded Rayleigh MIMO Channels

    This paper presents an overview of adaptive equalization used in Multiple-Input-Multiple-Output (MIMO) wireless systems. In this paper, the authors consider two-user transmission over a Rayleigh frequency selective fading channel, in which the Channel State Information (CSI) is known by the receiver. Subject to an average transmit power constraint, they study...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Artificial Neural Network Aided Retina Based Biometric Identification System

    Artificial Neural Network (ANN)s are efficient means of prediction, optimization and recognition. Retina is a unique biometric pattern that can be used as a part of a verification system. An ANN can be configured and trained to handle such variations observed in the texture of the retina. The specialty of...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Performance Comparison of Spread Spectrum Modulation for Wireless Channels Using Ann - Assisted Pseudo - Noise Sequence Generator

    One of the challenging issues in Spread-Spectrum Modulation (SSM) is the design of the Pseudo - Random or Pseudo - Noise (PN) sequence generator. Though several approaches are available that deals with the PN - sequence generator, there always exists the possibility of exploring the use of innovative methods through...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Rake Receiver Design for Ultra Wide Band Application

    In this paper, the authors describe the design and implementation of a rake receiver for use with Ultra Wide Band (UWB) systems. The rake receiver uses Spread Spectrum Modulation (SSM) aided by kasami sequence generator. The combination is found to be effective in dealing with multipath fading and signal to...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    The New Adaptive Active Constellation Extension Algorithm for Par Minimization in OFDM Systems

    In this paper, the peak-to-average ratio reduction in OFDM systems is implemented by the Adaptive Active Constellation Extension (ACE) technique which is more simple and attractive for practical downlink implementation purpose. However, in normal constellation method the authors cannot achieve the minimum PAR if the target clipping level is much...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Implementation and Comparison of Wavelet Transform and Fourier Transform in Wi-Max OFDM System

    WIMAX wireless communication is based on OFDM technology which enables going towards 4G Based on IEEE 802.16d-2004. But the reliability of OFDM is limited with the problems of time varying nature of the channel. This can reduced by adding cyclic prefix or guard interval between each block of data symbols....

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Underground Wireless Communication Channel Modeling and Simulation Using 0.3GMSK Modulation Considering Penetration and Scattering Loss

    Wireless communication inside mines and tunnels is very different from that in terrestrial environment because of the strong attenuation of signals. Here, the authors are developing an empirical model for the underground wireless communication channel based on experimental data which help in predicting the average received signal strength at a...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    E-Converse an Affordable Touch Screen Solution to Intrigue Dining Experience

    Ample efforts have been taken in restaurant sector to intrigue the dining experience. Several information and communication technologies have been adopted earlier such as PDA; wireless communication technologies etc. These technologies provide a simple but powerful infrastructure. This paper highlights the limitations of the existing technologies and proposed the e-converse,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey Paper on Wifi Community on Android Phones

    With the development of wireless communication, the popularity of android phones, the increasing of social networking services, mobile social networking has become a hot research topic. Personal mobile devices have become ubiquitous and an inseparable part of the authors' daily lives. These devices have evolved rapidly from simple phones and...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    New Dynamic Query Optimization Technique in Relational Database Management Systems

    Query optimizer is an important component in the architecture of relational data base management system. This component is responsible for translating user submitted query into an efficient query evolution program which can be executed against the database. The present query evolution existing algorithm tries to find the best possible plan...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    E-Converse an Affordable Touch Screen Solution to Intrigue Dining Experience

    Ample efforts have been taken in restaurant sector to intrigue the dining experience. Several information and communication technologies have been adopted earlier such as PDA; wireless communication technologies etc. These technologies provide a simple but powerful infrastructure. This paper highlights the limitations of the existing technologies and proposed the e-converse,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey Paper on Wifi Community on Android Phones

    With the development of wireless communication, the popularity of android phones, the increasing of social networking services, mobile social networking has become a hot research topic. Personal mobile devices have become ubiquitous and an inseparable part of the authors' daily lives. These devices have evolved rapidly from simple phones and...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Counter Measures Against Evolving Search Engine Spamming Techniques

    Search engine spamming is a practice of misleading the search engine and increasing the page rank of undeserving websites. The black hat Search Engine Optimization (SEO) techniques lead to untrustworthy results for search engines. In this paper, the authors have characterized some commonly used black hat techniques, and they have...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey on Review Spam Detection

    Today due to the popularity of E-commerce sites it became a target for spammers apart from well-known email and web spam. The proliferation of E-commerce sites has made web an excellent source of gathering customer reviews about products; as there is no quality control anyone one can write anything which...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Controlling and Monitoring of Remote Host

    In today's world, the role of remote access is changing dramatically. So accessing network remotely is an important issue. The proposed system allows administrator to access network from anywhere at any time. Administrator user can control and monitor the network using RFB (Remote FreameBuffer) protocol. Administrator user can run server...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Optimized Arm Scheme for Distinct Network Data Set

    Association Rule Mining (ARM) discovers correlations between different item sets in a transaction database. It provides important knowledge in business for decision makers. Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Post-Mining of Association Rules Using Ontologies and Rule Schemas

    Knowledge Discovery and Databases (KDD) deals with the overall process of discovering useful knowledge from data. Data mining is a particular step in this process by applying specific algorithms for extracting hidden fact in the data. Association rule mining is one of the data mining techniques that generate a large...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Efficient Algorithm for Clustering Nodes, Classifying and Replication of Content on Demand Basis for Content Distribution in P2P Overlay Networks

    In this paper the authors propose an efficient algorithm for clustering nodes, classifying and replication of content on demand basis for content distribution in p2p overlay networks. Peer-to-peer overlay networks are a good solution for distributed computing than client-server model since nodes in P2P networks act both as client and...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Study on Improvement in RSA Algorithm and its Implementation

    The network security means to protect data during their transmission over channel of networks similarly internet security also to protect data during their transmission over a collection of interconnected networks in all over the world. Cryptography is the way of hiding information during transmission over a cannel. There are lots...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Vulnerability Assessment and Penetration Testing

    In this modern world, all of the persons are using the facility of internet. Security is one of the major issues of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    The Mathematical Analysis of Column Oriented Database

    There are two obvious ways to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Historically, database system implementations and research have focused on the row-by row data layout, since it performs best on the most common application for...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Cloud Computing Applications and Security Issues: An Analytical Survey

    Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Data Warehousing Applications: An Analytical Tool for Decision Support System

    Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data Warehouses (DW) can provide the information required by the decision...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project

    Unethical e-mail senders bear little or no cost for mass distribution of messages; yet normal e-mail users are forced to spend time and effort in reading undesirable messages from their mailboxes. Due to the rapid increase of electronic mail (or e-mail), several people and companies found it an easy way...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    A Comparative Analysis of Ecdsa V/S Rsa Algorithm

    Elliptic curve cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focuses on generation of elliptic curve and shows why...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Integration Approach for Heterogeneous Distributed Database Transaction Protocols

    Integration is commonly used for summarizing information held in very large databases which are encountered in data warehousing, large scale transaction management, and statistical databases. Such applications often involve distributed databases that have developed independently and therefore may exhibit incompatibility, heterogeneity, and data inconsistency. The authors are here concerned with...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Fuzzy Set Approaches to Data Mining of Association Rule

    Data mining on large databases has been a major concern in research community due to the difficulty of analyzing huge volume of data. This paper focuses on the large set area i.e. on fuzzy sets and knowledge discovery of data. Association rules provide information in accessing significant correlations in large...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Graphical Authentication Using Region Based Graphical Password

    Password authentication is failing as an authentication since it increases the user burden to remember the passwords. Graphical authentication is proposed as an alternative for textual passwords since it may be easy for users to remember. In this paper the authors propose a new image region selection based graphical password...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Testing Process Overview Exploration for a Software Product in a Large Software Development Project

    Software testing is a process where the user have the stated requirements, pre-requisite software that is to be installed and the configuration of the machine that need to be done as per the test data for the test case and for a specific platform which when verified works perfectly. This...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    A Fuzzy Based Divide and Conquer Algorithm for Feature Selection in KDD Intrusion Detection Dataset

    In this paper the authors provide a fuzzy logic based divide and conquer algorithm for feature selection and reduction among large feature set of KDD intrusion detection data set, since a reduced feature set will help to evolve better mining rules. This algorithm introduces a fuzzy idea of dividing the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Efficient Allocation of Virtual Machine in Cloud Computing Environment

    Cloud computing is a latest new computing paradigm where applications, data and IT services are provided over the internet. Computing service is provided on demand as a utility as other utilities. Cloud computing provides dynamic provisioning of computing services. Resource scheduling is a key process for clouds such as infrastructure...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Dynamic Detection of Design Inconsistency During Software Development Using Daid Approach

    Evolution of software has lead to the fast growth of technology whose impact can be witnessed in all the domains of scientific and engineering applications. Hence engineering high quality software is one of the core challenges of all IT industries. The software models which are being used for the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Classification and Prediction in Customer Relationship Management Using Back Propagation

    Customer relationship management provides a customer classification and prediction which is used for the optimization of business process. The classification and prediction which is used for the optimization of business process. This classification and prediction in CRM will help the company to study, analyze and forecast customer's pattern of consumption,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Clustering Algorithms for High Dimensional Data - A Survey of Issues and Existing Approaches

    Clustering is the most prominent data mining technique used for grouping the data into clusters based on distance measures. With the advent growth of high dimensional data such as microarray gene expression data, and grouping high dimensional data into clusters will encounter the similarity between the objects in the full...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Requisite for Web Usage Mining - A Survey

    The World Wide Web (Web) has been providing an important and indispensable platform for receiving information and disseminating information as well as interacting with society on the Internet. With its astronomical growth over the past decade, the web becomes huge, diverse and dynamic. The application of data mining techniques to...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Perspective Approach on Citizen Card System - Applicability and Opportunity

    Citizen card system in which every citizen of a country will have a unique 16 digit number citizen card system which would not just help the government track down individuals, but would make life far easier for citizens as they would not have to submit multiple documents each time they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Interactive Database System

    With the revolution in the technology and lifestyle of human race, the need of easy life and faster result in the need of an hour. Due to complex life and fast growing technology it is always desired to obtain results for any query, problem or requirement with the speed of...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Various Network Used Radio Frequency Identification Techniques and its Frequency Ranges

    Now-a-days, there are various technologies used in day-to-day life; such as human computer interaction, communication engineering, various types of architectures of computer system for easy convenience of living life style of human being. However, there are various network utilized for the transmission of signal containing various data like audio, video,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Optimization Through Bayesian Classification on the k-Anonymized Data

    Privacy preserving in data mining & publishing, plays a major role in today networked world. It is important to preserve the privacy of the vital information corresponding to a data set. This process can be achieved by k-anonymization solution for classification. Along with the privacy preserving using anonymization, yielding the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    A Mark Based Indexing Method for Well Organized Data Retrieval of Comparative Temporal Patterns

    So many numbers of algorithms have been proposed for the discovery of data from the large database. However, since the number of generated patterns can be large, selecting which patterns to analyze can be nontrivial. There is thus a need for algorithms and tools that can assist in the selection...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Hybrid Algorithm for Improving Efficiency of Keywords Based Search Engine

    Web mining is the application of data mining techniques to discover interesting patterns from the web. Web usage mining is the process of extracting useful information from server logs i.e users history. While discovering interesting patterns in multi agents the efficiency is decreased. In the authors' paper presents hybrid algorithm...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Comparison of Rule Based Classification Algorithms

    Classification based on Predictive Association Rules (CPAR) is a kind of association classification methods which combines the advantages of both associative classification and traditional rule-based classification. For rule generation, CPAR is more efficient than traditional rule-based classification because much repeated calculation is avoided and multiple literals can be selected to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Selection of Optimal Discount of Retail Assortments with Data Mining Approach

    Recently, the capabilities of generating and collecting data have been increasing rapidly. Widespread use of bar codes for most commercial products, the computerization of many business, and the advance in data collection tools have provided the users with huge amount of retail data. This explosive growth in data and databases...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A System for Outlier Detection of High Dimensional Data

    In high dimensional data large no of outliers are embedded in low dimensional subspaces known as projected outliers, but most of existing outlier detection techniques are unable to find these projected outliers, because these methods perform detection of abnormal patterns in full data space. So, outlier detection in high dimensional...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Item Set Extraction without Using Constraints

    In this paper the authors present the Item set extraction without using constraints, a general and compact structure which provides tight integration of item set extraction in a relational DBMS. Since no constraint is enforced during the index creation phase, It provides a complete representation of the original database. To...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    An Efficient Algorithm for Mining of Frequent Items Using Incremental Model

    Data mining is a part of Knowledge Discovery in Database process (KDD). As technology advances, floods of data can be produced and shared in many appliances such as wireless Sensor networks or web click streams. This calls for extracting useful information and knowledge from streams of data. In this paper,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Distributed Accountability and Auditing in Cloud

    The widespread use of Cloud computing has opened up new challenges by introducing different types of trust scenario. The lack of confidence in trusting information flow (users data are usually processes remotely in unknown machines that do not owned or operated by user) in cloud has become common, as users...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Extracting Accurate Data from Multiple Conflicting Information on Web Sources

    For the World-Wide Web has become the most important information source for most of the users. As different websites often provide conflicting information there is no guarantee for the correctness of the data. Among multiple conflict results, can the users automatically identify which one is likely the true fact?, In...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    A Tool for Effective Detection of Fraud in Credit Card System

    Due to the rise and rapid growth of E-commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. Fraud is one of the major ethical issues in the credit card industry. As credit card becomes the most popular mode...

    Provided By Interscience Open Access Journals