Interscience Open Access Journals

Displaying 161-200 of 428 results

  • White Papers // Aug 2012

    An Ant Colony Optimization for Job Scheduling to Minimize Makespan Time

    This paper deals with the make span minimization for Job Scheduling. Research on optimization techniques of the Job Scheduling Problem (JSP) is one of the most significant and promising areas of an optimization. Instead of the traditional optimization method, this paper presents an investigation into the use of an Ant...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Network Reconfiguration in Distribution System by Software Simulation for Loss Reduction

    The main aim of the distribution companies is to reduce their operating costs to get ahead of competition. One of the most popular approach is to increase the degree of reliability of distribution system. The management of network defeats (e.g., earth fault and short circuits) offers a lot of feasibilities...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Secure Framework in Data Processing for Mobile Cloud Computing

    Generally Mobile Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users 'Physical possession of their outsourced data, which inevitably poses new...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    An Area Efficient 32-Bit Carry-Select Adder for Low Power Applications

    CSLA is used in many computational systems to alleviate the problem of carry propagation delay by independently generating multiple carries and then select a carry to generate the sum. However, the CSLA is not area efficient because it uses multiple pairs of Ripple Carry Adders (RCA) to generate partial sum...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Edge-Triggered Pulsed Sequential Elements With SoC Applications

    The System-On-Chip (SoC) design is integrating hundreds of millions of transistors on one chip, whereas packaging and cooling only have a limited ability to remove the excess heat. In this paper, various design techniques for a low power clocking system are surveyed. Among them is an effective way to reduce...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Fast and Scalable Pattern Matching for Memory Architecture

    Multi-pattern matching is known to require intensive memory accesses and is often a performance bottleneck. Hence, specialized hardware-accelerated algorithms are being developed for line-speed packet processing. While several pattern matching algorithms have already been developed for such applications, the authors find that most of them suffer from scalability issues. They...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Multiplier Design and Performance Estimation With Distributed Arithmetic Algorithm

    A new architecture of Multiplier-and-Accumulator (MAC) for high-speed arithmetic. By combining multiplication with accumulation and devising a hybrid type of Carry Save Adder (CSA), the performance was improved. Since the accumulator that has the largest delay in MAC was merged into CSA, the overall performance was elevated. The proposed CSA...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Implementation of Memory Less Based Low-Complexity CODECS

    In this paper, the authors present a CODEC design for two classes of Crosstalk Avoidance Codes (CACs), Forbidden Pattern Codes (FPCs) and Forbidden Transition Codes (FTCs). Their mapping and coding scheme is based on the Fibonacci numeral system and the mathematical analysis shows that all numbers can be represented by...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    A Novel Decode-Aware Compression Technique for Improved Compression and Decompression

    With compressed bit streams, more configuration information can be stored using the same memory. The access delay is also reduced, because less bits need to be transferred through the memory interface. To measure the efficiency of bit stream compression, Compression Ratio (CR) is widely used as a metric. It is...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Embedded Programmable Web-Based ECG Monitoring & Detection System Using a Fast Algorithm

    The physicians have to interpret this large amount of ECG data to search for only a few abnormal beats in the ECG. Physicians may overlook some abnormal cycles due to fatigue and human error in interpreting such a large amount of data. Therefore, there is an urgent need for an...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Choosing a Technique for Digital Signatures From the Customers' Perspective

    One way to secure identity over the Internet and other channels is to use digital signatures. Since this area is often used in contact with banks, the authors have during their work co-operated with Nordea IT. In order for customers to use a digital signature whenever they wish to, a...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Approaches for Improving the Performance of Snort Intrusion Detection Systems

    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection Systems (IDS). In this paper the architecture of the snort which is an open source Intrusion detection system is explained. It is a rule based...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Intrusion Detection System Using Genetic Algorithm and Data Mining: An Overview

    Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment

    Resource provisioning is important issue in cloud computing and in the environment of heterogeneous clouds. The private cloud with confidentiality data configure according to users need. But the scalability of the private cloud limited. If the resources private clouds are busy in fulfilling other requests then new request cannot be...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Security Analysis of Cloud Computing

    Cloud computing play an important role in IT industry. Cloud computing reshaping the IT industry and in software development process. Cloud computing techniques can offer many facilities like sharing of hardware, availability of software and many more resources as a basic need. Cloud computing effectively reduces the cost, maintenance. As...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Perspective Approach on Citizen Card System - Applicability and Opportunity

    Citizen card system in which every citizen of a country will have a unique 16 digit number citizen card system which would not just help the government track down individuals, but would make life far easier for citizens as they would not have to submit multiple documents each time they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Interactive Database System

    With the revolution in the technology and lifestyle of human race, the need of easy life and faster result in the need of an hour. Due to complex life and fast growing technology it is always desired to obtain results for any query, problem or requirement with the speed of...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Various Network Used Radio Frequency Identification Techniques and its Frequency Ranges

    Now-a-days, there are various technologies used in day-to-day life; such as human computer interaction, communication engineering, various types of architectures of computer system for easy convenience of living life style of human being. However, there are various network utilized for the transmission of signal containing various data like audio, video,...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Defending Against Modern Threats in Web Applications

    Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-a-days attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities has multiplied in recent years....

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Software Performance Analysis With Parallel Programming Approaches

    The term Software Performance Engineering (SPE) is a systematic and quantitative approach for constructing software systems to meet the performance objectives such as response time, throughput, scalability and resource utilization. Optimization is major concern in achieving performance parameters. Optimization is performed during run-time, or in the design phase. This paper...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Cloud Computing in Distributed System

    Cloud Computing as an Internet-based computing; where resources, software and information are provided to computers on-demand, like a public utility; is emerging as a platform for sharing resources like infrastructure, software and various applications. The majority of cloud computing infrastructure consists of reliable services delivered through data centers and built...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Combining Server and Storage Virtualization: A New Dimension for SMB's

    The virtualization wave is quickly reaching its way down into the small-to-medium-sized business. Virtualization provides unmatched flexibility, performance, and utilization by allowing the user to move server workloads from one virtual workspace to the next, maximizing server resources on the fly based on their business needs. Server virtualization eliminates the...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Design and Modification of Circular Monpole UWB Antenna for WPAN Application

    The basic circular monopole antenna exhibits a 10 dB return loss bandwidth over the entire frequency band, the paper proposed a modified version of simple circular monopole antenna for WPAN application. The antenna offers excellent performance in the range of 2-12 GHz.. The antenna is designed on FR4 substrate and...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    The Impact of Calls to the Processor on a Server PABX

    This paper is to define the relationship between the number of calls made in an Asterisk server and use of the processor in this server as the processor is one of the major hardware resources. Subsequently, the authors derived the formulation for the generalization of this relationship or a mathematical...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Techniques for Load Balancing in Wireless LAN

    This suggests new strategies for balancing load in a wireless network connected in star topology. The loads are assigned to each processor using divisible load theory & Different techniques. Divisible load theory suggests that a load can be divided arbitrarily such that each fraction of the load can be independently...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Comparative Performance Analysis of Ad-Hoc Routing Protocol Using NS-2 Simulator

    Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. In Mobile ad hoc network, due to mobility of nodes network topology change frequently...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Comparative Study of Different Smart Parking Assist Systems Using Wireless Sensor Networks

    To deal with the parking guidance issue of the parking lots, this paper proposes a vision of improvements in parking guidance and information system based on wireless sensor system. This system consists of parking space monitoring nodes, routing nodes, parking guidance display and Central control center. The nodes transmit the...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Mobile Voting Using Global System for Mobile Communication (GSM) Technology and Authentication Using Fingerprinting Biometrics and Wireless Networks

    India is world's largest democracy. Fundamental right to vote or simply voting in elections forms the basis of Indian democracy. In India all earlier elections a voter used to cast his vote by using ballot paper. This is a long, time-consuming process and very much prone to errors. This situation...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Performance Enhancement of Reactive on Demand Routing Protocol in Wireless Ad Hoc Network

    A Mobile Adhoc NETwork (MANET) is a class of wireless mobile nodes that dynamically organize themselves in arbitrary network topologies. Due to mobility of nodes, routing plays an important role in communication and routing protocols are divided into two basic classes: proactive and reactive. AODV is an on demand routing...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Call Admission Control Scheme for Multimedia Support Over IEEE 802.11 Wireless LANs

    These days there is an increasing interest for VoIP over wireless LANs. QoS support for real-time services like voice in the IEEE 802.11 WLAN is an important issue. Since, IEEE 802.11 uses contention based MAC protocol - the distributed coordination function DCF, it is difficult to support the strict QoS...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    User Authentication Techniques for Wireless Sensor Networks : A Survey

    A Wireless Sensor Network (WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor node is communicated to the base station, which forwards the data to the end user. In wireless sensor...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System

    Queuing theory and Markov chain analysis plays vital role in analyzing real-life problems. It is applied to wired network, wireless network and mobile communication to analyze the packet traffic in packet switched network. In this simulation and analysis, integrated communication system such as voice and data is simulated with different...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services

    Wireless broadcast is an effective approach to disseminate data to a number of users. To provide secure access to data in wireless broadcast services, symmetric key - based encryption is used to ensure that only users who own the valid keys can decrypt the data. Regarding various subscriptions, an efficient...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Quality of Service Based Handover Approach in a WLAN Network

    As the technology is improving so are the demands of end users and their applications increasing. A wide variety of new applications are being invented daily. These applications have different demands from the underlying network protocol suite. High bandwidth internet connectivity has become a basic requirement to the success of...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Dual-Hop OSTBC Transmissions Over Fading Channels Under Receiver Phase Noise for Regenerative Systems

    Space-time coding for fading channels is a Communication technique that realizes the diversity benefits of multiple transmit antennas. Previous work in this area has focused on the narrowband flat fading case where spatial diversity only is available. In this paper, the authors investigate the use of space-time coding in OFDM...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Route Request Flooding Attack Using Trust Based Security Scheme in Manet

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. A mobile ad hoc network is set up with a group of mobile wireless nodes...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

    The reliability of Wireless Sensor Networks (WSN) is affected by faults that may occur due to various reasons such as malfunctioning hardware, software glitches, dislocation, or environmental hazards, e.g. fire or flood. Due to inherent nature of these networks a sensor node may fail and hence the route may also...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    QoS Routing in Mobile Ad-Hoc Networks Using Agents

    Quality of Service (QoS) provisioning in a Mobile Ad-hoc NETwork (MANETs) routing for multimedia traffic is a challenging task due to dynamic topology of such networks. Fuzzy Logic (FL) was used for QoS prediction from current uncertain QoS constraints in the network for particular applications, from these uncertain constraints there...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Performance Evaluation of Extended AODV Using Different Scenarios

    The mobile ad hoc networks have become a major component of the future network development due to their ease of deployment, self configurability; flexibility and independence on any existing network infrastructure Mobile ad-hoc network have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment....

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Development of Empirical Mode Decomposition

    In this paper, one of the tasks for which empirical mode decomposition is potentially useful is nonparametric signal denoising, an area for which wavelet thresholding has been the dominant technique for many years. In this paper, the wavelet thresholding principle is used in the decomposition modes resulting from applying EMD...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Managing Redundancy and Conflicts in Distributed Firewalls

    The use of firewall has been widespread in all the emerging technologies such as service oriented architecture, web services, cloud computing and so on. The term security itself is the most important task that has to be maintained in the real-time applications. Policies are enrolled in the security of the...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2013

    Empirical Study on Selection of Team Members for Software Projects - Data Mining Approach

    One of the essential requisites of any software industry is the development of customer satisfied products. However, accomplishing the aforesaid business objective depends upon the depth of quality of product that is engineered in the organization. Thus, generation of high quality depends upon process, which is in turn depends upon...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2013

    Comparative Study of Multi User Broadcast Authentication in Wireless Sensor Network

    Wireless Sensor Network (WSN) is an emerging technology consisting of spatially distributed sensor nodes, which can cooperatively monitor physical or environmental conditions. The major resource constrain of WSN are, low processing, energy and storage capabilities. Broadcast is widely used communication method in WSN environment. In most of the sensor networks,...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    The Mathematical Analysis of Column Oriented Database

    There are two obvious ways to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Historically, database system implementations and research have focused on the row-by row data layout, since it performs best on the most common application for...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Cloud Computing Applications and Security Issues: An Analytical Survey

    Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Data Warehousing Applications: An Analytical Tool for Decision Support System

    Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data Warehouses (DW) can provide the information required by the decision...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project

    Unethical e-mail senders bear little or no cost for mass distribution of messages; yet normal e-mail users are forced to spend time and effort in reading undesirable messages from their mailboxes. Due to the rapid increase of electronic mail (or e-mail), several people and companies found it an easy way...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    A Comparative Analysis of Ecdsa V/S Rsa Algorithm

    Elliptic curve cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focuses on generation of elliptic curve and shows why...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Integration Approach for Heterogeneous Distributed Database Transaction Protocols

    Integration is commonly used for summarizing information held in very large databases which are encountered in data warehousing, large scale transaction management, and statistical databases. Such applications often involve distributed databases that have developed independently and therefore may exhibit incompatibility, heterogeneity, and data inconsistency. The authors are here concerned with...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Fuzzy Set Approaches to Data Mining of Association Rule

    Data mining on large databases has been a major concern in research community due to the difficulty of analyzing huge volume of data. This paper focuses on the large set area i.e. on fuzzy sets and knowledge discovery of data. Association rules provide information in accessing significant correlations in large...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Graphical Authentication Using Region Based Graphical Password

    Password authentication is failing as an authentication since it increases the user burden to remember the passwords. Graphical authentication is proposed as an alternative for textual passwords since it may be easy for users to remember. In this paper the authors propose a new image region selection based graphical password...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Testing Process Overview Exploration for a Software Product in a Large Software Development Project

    Software testing is a process where the user have the stated requirements, pre-requisite software that is to be installed and the configuration of the machine that need to be done as per the test data for the test case and for a specific platform which when verified works perfectly. This...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    A Fuzzy Based Divide and Conquer Algorithm for Feature Selection in KDD Intrusion Detection Dataset

    In this paper the authors provide a fuzzy logic based divide and conquer algorithm for feature selection and reduction among large feature set of KDD intrusion detection data set, since a reduced feature set will help to evolve better mining rules. This algorithm introduces a fuzzy idea of dividing the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Efficient Allocation of Virtual Machine in Cloud Computing Environment

    Cloud computing is a latest new computing paradigm where applications, data and IT services are provided over the internet. Computing service is provided on demand as a utility as other utilities. Cloud computing provides dynamic provisioning of computing services. Resource scheduling is a key process for clouds such as infrastructure...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Dynamic Detection of Design Inconsistency During Software Development Using Daid Approach

    Evolution of software has lead to the fast growth of technology whose impact can be witnessed in all the domains of scientific and engineering applications. Hence engineering high quality software is one of the core challenges of all IT industries. The software models which are being used for the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Classification and Prediction in Customer Relationship Management Using Back Propagation

    Customer relationship management provides a customer classification and prediction which is used for the optimization of business process. The classification and prediction which is used for the optimization of business process. This classification and prediction in CRM will help the company to study, analyze and forecast customer's pattern of consumption,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Clustering Algorithms for High Dimensional Data - A Survey of Issues and Existing Approaches

    Clustering is the most prominent data mining technique used for grouping the data into clusters based on distance measures. With the advent growth of high dimensional data such as microarray gene expression data, and grouping high dimensional data into clusters will encounter the similarity between the objects in the full...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Requisite for Web Usage Mining - A Survey

    The World Wide Web (Web) has been providing an important and indispensable platform for receiving information and disseminating information as well as interacting with society on the Internet. With its astronomical growth over the past decade, the web becomes huge, diverse and dynamic. The application of data mining techniques to...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Perspective Approach on Citizen Card System - Applicability and Opportunity

    Citizen card system in which every citizen of a country will have a unique 16 digit number citizen card system which would not just help the government track down individuals, but would make life far easier for citizens as they would not have to submit multiple documents each time they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Interactive Database System

    With the revolution in the technology and lifestyle of human race, the need of easy life and faster result in the need of an hour. Due to complex life and fast growing technology it is always desired to obtain results for any query, problem or requirement with the speed of...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Various Network Used Radio Frequency Identification Techniques and its Frequency Ranges

    Now-a-days, there are various technologies used in day-to-day life; such as human computer interaction, communication engineering, various types of architectures of computer system for easy convenience of living life style of human being. However, there are various network utilized for the transmission of signal containing various data like audio, video,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Optimization Through Bayesian Classification on the k-Anonymized Data

    Privacy preserving in data mining & publishing, plays a major role in today networked world. It is important to preserve the privacy of the vital information corresponding to a data set. This process can be achieved by k-anonymization solution for classification. Along with the privacy preserving using anonymization, yielding the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    A Mark Based Indexing Method for Well Organized Data Retrieval of Comparative Temporal Patterns

    So many numbers of algorithms have been proposed for the discovery of data from the large database. However, since the number of generated patterns can be large, selecting which patterns to analyze can be nontrivial. There is thus a need for algorithms and tools that can assist in the selection...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Hybrid Algorithm for Improving Efficiency of Keywords Based Search Engine

    Web mining is the application of data mining techniques to discover interesting patterns from the web. Web usage mining is the process of extracting useful information from server logs i.e users history. While discovering interesting patterns in multi agents the efficiency is decreased. In the authors' paper presents hybrid algorithm...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Comparison of Rule Based Classification Algorithms

    Classification based on Predictive Association Rules (CPAR) is a kind of association classification methods which combines the advantages of both associative classification and traditional rule-based classification. For rule generation, CPAR is more efficient than traditional rule-based classification because much repeated calculation is avoided and multiple literals can be selected to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Selection of Optimal Discount of Retail Assortments with Data Mining Approach

    Recently, the capabilities of generating and collecting data have been increasing rapidly. Widespread use of bar codes for most commercial products, the computerization of many business, and the advance in data collection tools have provided the users with huge amount of retail data. This explosive growth in data and databases...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A System for Outlier Detection of High Dimensional Data

    In high dimensional data large no of outliers are embedded in low dimensional subspaces known as projected outliers, but most of existing outlier detection techniques are unable to find these projected outliers, because these methods perform detection of abnormal patterns in full data space. So, outlier detection in high dimensional...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Item Set Extraction without Using Constraints

    In this paper the authors present the Item set extraction without using constraints, a general and compact structure which provides tight integration of item set extraction in a relational DBMS. Since no constraint is enforced during the index creation phase, It provides a complete representation of the original database. To...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    An Efficient Algorithm for Mining of Frequent Items Using Incremental Model

    Data mining is a part of Knowledge Discovery in Database process (KDD). As technology advances, floods of data can be produced and shared in many appliances such as wireless Sensor networks or web click streams. This calls for extracting useful information and knowledge from streams of data. In this paper,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Distributed Accountability and Auditing in Cloud

    The widespread use of Cloud computing has opened up new challenges by introducing different types of trust scenario. The lack of confidence in trusting information flow (users data are usually processes remotely in unknown machines that do not owned or operated by user) in cloud has become common, as users...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Insight into the Importance of Requirements Engineering

    When developing a software, one of the most important aspects for success of any software project is to get the requirements right. The success of any software project depends on the quality of the requirements. As the projects change over the time, the authors try to study the requirement process...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Authenticated Connection establishment in Web Applications using Steganography

    A web application is an application that is accessed over a network such as the Internet or an intranet. Web applications are popular due to the ubiquity of web browsers, and the convenience of using a web browser as a client, sometimes called a thin client. The ability to update...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Analysis of Complexities for finding efficient Association Rule Mining Algorithms

    Several algorithms for association rule mining, have been implemented including a variation of Apriori, an algorithm using hash functions for finding large 2-itemsets and 3-itemsets and direct search method for finding other large k-itemsets, and another variation of Eclat algorithm using perfect hash functions for 2-itemsets and 3-itemsets and the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Association Rule Mining Using Mapping on Frequent 1- itemsets

    The a priori algorithm for association rule mining is time consuming in the initial stages of the algorithm since usually large number of candidate itemsets is generated. To cope with this, several alternatives are suggested using hash functions. The authors provide a method to arrive at hash functions for 2-itemsets...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Comparatively Analysis of Fix and Dynamic Size Frequent Pattern Discovery Methods Using in Web Personalisation

    In this paper, the authors study and analysis of two methods of data mining. One is fix sized pattern discovery and second method dynamic size pattern discovery method. A fixed sized pattern discovery method is a prori method. Which is also called step by step frequent pattern mining. And variable...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    E-Converse an Affordable Touch Screen Solution to Intrigue Dining Experience

    Ample efforts have been taken in restaurant sector to intrigue the dining experience. Several information and communication technologies have been adopted earlier such as PDA; wireless communication technologies etc. These technologies provide a simple but powerful infrastructure. This paper highlights the limitations of the existing technologies and proposed the e-converse,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey Paper on Wifi Community on Android Phones

    With the development of wireless communication, the popularity of android phones, the increasing of social networking services, mobile social networking has become a hot research topic. Personal mobile devices have become ubiquitous and an inseparable part of the authors' daily lives. These devices have evolved rapidly from simple phones and...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Model Based Approach to Prevent SQL Injection Attacks on .NET Applications

    Web applications support static and dynamic queries to access the database. Dynamic queries take input from the user and use that input to form the query. A user can give malicious input to the application which results in an incorrect query or an unauthorized query and performs vulnerable action on...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Regression Testing by Computing Coverage Data for Software Evolution

    Software systems is evolve continuously during development and maintenance. After software is modified regression testing is applied to software to ensure that It behaves intended and modifications not negatively impacts its original functionality. It is time consuming to rerun test suite T of program Pi on modified program Pi+1. So,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Tree Based Aggregation and Routing in WSN: A Multi-Agent System Approach

    In WSN one of the issues is to route the data from the sensor nodes to sink node. The tree-based approach provides an efficient solution for establishing the path and in network aggregation. Tree is nonlinear structures, which have hierarchical levels in terms of parent-child combination. In this paper, the...

    Provided By Interscience Open Access Journals