KIIT University

Displaying 1-18 of 18 results

  • White Papers // Mar 2014

    Privacy Preservation in Distributed Database

    Data mining is a new era of technology of identifying patterns and trends from large quantities of large business data sets. Mining association rule is important data mining problem for finding the association between the different attributes in the given business data sets .To solve mining association rule problem have...

    Provided By KIIT University

  • White Papers // Jun 2013

    Optimization of QoS Parameters Through Flexible Resource Scheduling in Finite Population Cloud Environment

    Cloud computing renders more ability to existing internet technologies and web cluster to fit the emerging business needs by accessing distributed computing resources. It supports processing large data utilizing clusters of commodity computers to control the next generation data centers and empowered application service providers for deploying applications depending on...

    Provided By KIIT University

  • White Papers // Apr 2013

    A Distributed Service and Business Model for Providing Cloud Computing Service

    Cloud computing model has enabled IT organizations to serve the users globally. It gives the services like Platform as a Service, Software as a Service and Infrastructure as a Service without users being much aware of the details in which the services are provided. As in File Access System Service...

    Provided By KIIT University

  • White Papers // Mar 2013

    Privacy Preserving in Distributed Database Using Data Encryption Standard (DES)

    Distributed data mining explores unknown information from data sources which are distributed among several parties. Privacy of participating parties becomes great concern and sensitive information pertaining to individual parties and needs high protection when data mining occurs among several parties. Different approaches for mining data securely in a distributed environment...

    Provided By KIIT University

  • White Papers // Jan 2013

    An Approach for Computing Dynamic Slice of Concurrent Aspect-Oriented Programs

    The authors propose a dynamic slicing algorithm to compute the slice of concurrent aspect-oriented programs. They use a dependence based intermediate program representation called Concurrent Aspect-oriented System Dependence Graph (CASDG) to represent a concurrent aspect-oriented program. The CASDG of an aspect-oriented program consists of a System Dependence Graph (SDG) for...

    Provided By KIIT University

  • White Papers // Jan 2013

    An Efficient Algorithm in WSN for Path Finding & Detecting the Tsunami

    During the last decade, operational oceanography had to face the challenge of building integrated observational systems capable of real-time recording and transmitting parameters not only from the atmosphere and the upper sea, but also from the deep sea layers. The real-time measurements are transmitted to operational centre through the existing...

    Provided By KIIT University

  • White Papers // Oct 2012

    Software Effort Estimation Approaches - A Review

    Software estimation is the process of predicting the effort & cost required to develop software. This paper provides a general overview of software estimation models and techniques. Models can be categorized as Size-Based, Function-Based, Learning-Based and Expertise-Based. Both Size-based and Function-based models can be termed as Parametric as they use...

    Provided By KIIT University

  • White Papers // May 2012

    A Novel Approach for Test Case Prioritization Using Business Criticality Test Value

    Software maintenance is an important and costly activity of the software development lifecycle. Regression testing is the process of validating modifications introduced in a system during software maintenance. It is very inefficient to re-execute every test case in regression testing for small changes. This issue of retesting of software systems...

    Provided By KIIT University

  • White Papers // Jul 2011

    A Fuzzy Approach for Reputation Management in Online Communities for Bittorrent P2P Network

    Reputation management for users in Bittorrent P2P network is very much important due to its open and anonymous nature in online forums. Users are from all over the globe register themselves in the torrent websites to download their interested content. Some malicious peers distribute low quality or fake files in...

    Provided By KIIT University

  • White Papers // May 2011

    A Survey on Test Case Generation From UML Model

    Testing is an important phase of software development, to maintain the quality control and reliability of the end products. Recent approach has been taken by the researcher to use UML models for test case generation. Various works has been done on test case generation for concurrent and non-concurrent systems. In...

    Provided By KIIT University

  • White Papers // May 2011

    Web Components as a Measure for Estimating Effort and Size of Web Applications

    Estimating size and effort is a crucial factor in application development projects and low error margins are a priority. In line with the very fast evolution of Internet technologies, all applications are quickly becoming Web Applications. Thus there is a clear need for an estimation model for these applications' development...

    Provided By KIIT University

  • White Papers // May 2011

    Mobile User's Location Management Using Bloom Filter

    Cellular networks have become so pervasive that they resulted in some undesired consequences like increase in computational cost, delays and system overloading. Various Location Management (LM) schemes such as static LM and dynamic LM have been adopted for cost reduction. Basing upon the cellular network's geographic layout, location update is...

    Provided By KIIT University

  • White Papers // May 2011

    An Efficient Routing Approach and Improvement of AODV Protocol in Mobile Ad-Hoc Networks

    Mobile Ad hoc NETworks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the need of fixed infrastructure or a wired backbone network. Due to limited transmission range node to exchange information with any other node in the network. Thus routing is a...

    Provided By KIIT University

  • White Papers // Apr 2011

    A Faired Quality of Service Assured MAC Protocol for Mobile Adhoc Network & Its Performance Evaluation

    The Medium Access Control (MAC) protocol for Mobile Adhoc NETwork (MANET) need to be distributed, QoS assured, fair to all flows and should work in a multihop environment. Although there are numerous MAC protocol proposed for MANET, very few of them possesses all the above properties. This paper, which proposes...

    Provided By KIIT University

  • White Papers // Feb 2011

    A Shared-Disk Database Approach Towards Securing Data in the Cloud

    The increasing popularity of cloud computing in distributed computing environment may have positive as well as negative effects on the data security of service consumers. This paper highlights some major security issues existing in current cloud computing environments. The primary issue to be dealt with when talking about security in...

    Provided By KIIT University

  • White Papers // Jan 2011

    Performance Comparison of RAODV and MRAODV Routing Protocols in Mobile Ad Hoc Networks

    In mobile ad hoc networks, mobile devices wander autonomously for the use of wireless links and dynamically varying network topology. AODV (Ad-hoc On-demand Distance Vector routing) is a representative among the most widely studied on-demand ad hoc routing protocols. AODV and most of the on demand ad hoc routing protocols...

    Provided By KIIT University

  • White Papers // Nov 2010

    An Intelligent Approach for Mining Frequent Spatial Objects in Geographic Information System

    Spatial Data Mining is based on correlation of spatial objects in space. Mining frequent pattern from spatial databases systems has always remained a challenge for researchers. In the light of the first law of geography "Everything is related to everything else but nearby things is more related than distant things"...

    Provided By KIIT University

  • White Papers // Dec 2008

    Challenge of Wireless and Mobile Technologies in Government

    E-government enables the delivery of public services in faster, more convenient and value-added ways. The move by the government to implement a comprehensive programme of on-line, real-time service delivery is based on a commitment to utilizing information and communication technologies to leap-frog development, and hence addresses service delivery inefficiencies as...

    Provided By KIIT University

  • White Papers // Jul 2011

    A Fuzzy Approach for Reputation Management in Online Communities for Bittorrent P2P Network

    Reputation management for users in Bittorrent P2P network is very much important due to its open and anonymous nature in online forums. Users are from all over the globe register themselves in the torrent websites to download their interested content. Some malicious peers distribute low quality or fake files in...

    Provided By KIIT University

  • White Papers // Feb 2011

    A Shared-Disk Database Approach Towards Securing Data in the Cloud

    The increasing popularity of cloud computing in distributed computing environment may have positive as well as negative effects on the data security of service consumers. This paper highlights some major security issues existing in current cloud computing environments. The primary issue to be dealt with when talking about security in...

    Provided By KIIT University

  • White Papers // Jan 2011

    Performance Comparison of RAODV and MRAODV Routing Protocols in Mobile Ad Hoc Networks

    In mobile ad hoc networks, mobile devices wander autonomously for the use of wireless links and dynamically varying network topology. AODV (Ad-hoc On-demand Distance Vector routing) is a representative among the most widely studied on-demand ad hoc routing protocols. AODV and most of the on demand ad hoc routing protocols...

    Provided By KIIT University

  • White Papers // May 2011

    A Survey on Test Case Generation From UML Model

    Testing is an important phase of software development, to maintain the quality control and reliability of the end products. Recent approach has been taken by the researcher to use UML models for test case generation. Various works has been done on test case generation for concurrent and non-concurrent systems. In...

    Provided By KIIT University

  • White Papers // May 2011

    Web Components as a Measure for Estimating Effort and Size of Web Applications

    Estimating size and effort is a crucial factor in application development projects and low error margins are a priority. In line with the very fast evolution of Internet technologies, all applications are quickly becoming Web Applications. Thus there is a clear need for an estimation model for these applications' development...

    Provided By KIIT University

  • White Papers // May 2011

    Mobile User's Location Management Using Bloom Filter

    Cellular networks have become so pervasive that they resulted in some undesired consequences like increase in computational cost, delays and system overloading. Various Location Management (LM) schemes such as static LM and dynamic LM have been adopted for cost reduction. Basing upon the cellular network's geographic layout, location update is...

    Provided By KIIT University

  • White Papers // May 2011

    An Efficient Routing Approach and Improvement of AODV Protocol in Mobile Ad-Hoc Networks

    Mobile Ad hoc NETworks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the need of fixed infrastructure or a wired backbone network. Due to limited transmission range node to exchange information with any other node in the network. Thus routing is a...

    Provided By KIIT University

  • White Papers // Oct 2012

    Software Effort Estimation Approaches - A Review

    Software estimation is the process of predicting the effort & cost required to develop software. This paper provides a general overview of software estimation models and techniques. Models can be categorized as Size-Based, Function-Based, Learning-Based and Expertise-Based. Both Size-based and Function-based models can be termed as Parametric as they use...

    Provided By KIIT University

  • White Papers // Jan 2013

    An Approach for Computing Dynamic Slice of Concurrent Aspect-Oriented Programs

    The authors propose a dynamic slicing algorithm to compute the slice of concurrent aspect-oriented programs. They use a dependence based intermediate program representation called Concurrent Aspect-oriented System Dependence Graph (CASDG) to represent a concurrent aspect-oriented program. The CASDG of an aspect-oriented program consists of a System Dependence Graph (SDG) for...

    Provided By KIIT University

  • White Papers // May 2012

    A Novel Approach for Test Case Prioritization Using Business Criticality Test Value

    Software maintenance is an important and costly activity of the software development lifecycle. Regression testing is the process of validating modifications introduced in a system during software maintenance. It is very inefficient to re-execute every test case in regression testing for small changes. This issue of retesting of software systems...

    Provided By KIIT University

  • White Papers // Jan 2013

    An Efficient Algorithm in WSN for Path Finding & Detecting the Tsunami

    During the last decade, operational oceanography had to face the challenge of building integrated observational systems capable of real-time recording and transmitting parameters not only from the atmosphere and the upper sea, but also from the deep sea layers. The real-time measurements are transmitted to operational centre through the existing...

    Provided By KIIT University

  • White Papers // Dec 2008

    Challenge of Wireless and Mobile Technologies in Government

    E-government enables the delivery of public services in faster, more convenient and value-added ways. The move by the government to implement a comprehensive programme of on-line, real-time service delivery is based on a commitment to utilizing information and communication technologies to leap-frog development, and hence addresses service delivery inefficiencies as...

    Provided By KIIT University

  • White Papers // Nov 2010

    An Intelligent Approach for Mining Frequent Spatial Objects in Geographic Information System

    Spatial Data Mining is based on correlation of spatial objects in space. Mining frequent pattern from spatial databases systems has always remained a challenge for researchers. In the light of the first law of geography "Everything is related to everything else but nearby things is more related than distant things"...

    Provided By KIIT University

  • White Papers // Apr 2011

    A Faired Quality of Service Assured MAC Protocol for Mobile Adhoc Network & Its Performance Evaluation

    The Medium Access Control (MAC) protocol for Mobile Adhoc NETwork (MANET) need to be distributed, QoS assured, fair to all flows and should work in a multihop environment. Although there are numerous MAC protocol proposed for MANET, very few of them possesses all the above properties. This paper, which proposes...

    Provided By KIIT University

  • White Papers // Jun 2013

    Optimization of QoS Parameters Through Flexible Resource Scheduling in Finite Population Cloud Environment

    Cloud computing renders more ability to existing internet technologies and web cluster to fit the emerging business needs by accessing distributed computing resources. It supports processing large data utilizing clusters of commodity computers to control the next generation data centers and empowered application service providers for deploying applications depending on...

    Provided By KIIT University

  • White Papers // Mar 2013

    Privacy Preserving in Distributed Database Using Data Encryption Standard (DES)

    Distributed data mining explores unknown information from data sources which are distributed among several parties. Privacy of participating parties becomes great concern and sensitive information pertaining to individual parties and needs high protection when data mining occurs among several parties. Different approaches for mining data securely in a distributed environment...

    Provided By KIIT University

  • White Papers // Mar 2014

    Privacy Preservation in Distributed Database

    Data mining is a new era of technology of identifying patterns and trends from large quantities of large business data sets. Mining association rule is important data mining problem for finding the association between the different attributes in the given business data sets .To solve mining association rule problem have...

    Provided By KIIT University

  • White Papers // Apr 2013

    A Distributed Service and Business Model for Providing Cloud Computing Service

    Cloud computing model has enabled IT organizations to serve the users globally. It gives the services like Platform as a Service, Software as a Service and Infrastructure as a Service without users being much aware of the details in which the services are provided. As in File Access System Service...

    Provided By KIIT University