The World

Displaying 1-40 of 221 results

  • White Papers // May 2014

    Ranking Spatial Data by Quality Preferences Using Spatial Techniques

    The quality of features of an object is ranked based on the spatial preference query. For example, using a Landed property agency database of flats for lease, a customer may want to rank the flats with respect to the correctness of their location, defined after aggregating the qualities of other...

    Provided By The World

  • White Papers // May 2014

    Survey on Students' Academic Failure and Dropout using Data Mining Techniques

    Educational data mining is in the habit of learn the data available in the field of education and show up the hidden knowledge from it. Classification methods like decision trees, machine learning, rule mining, etc can be applied on the educational data for forecasting the student's behavior, performance of them...

    Provided By The World

  • White Papers // May 2014

    Testing Cloud Application System Resiliency by Wrecking the System

    When application architecture moves to the public cloud, failures and outages are inevitable. Rather than panicking when failures strike at the worst time, one should prepare for failures in good times. The best way to tackle failure is to fail often. This cycle of failing instances deliberately and then testing...

    Provided By The World

  • White Papers // Apr 2014

    A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining

    Frequent pattern (itemset) mining plays an important role in association rule mining. The apriori & FP-growth algorithms are the most famous algorithms which can be used for frequent pattern mining. This paper presents the survey of various frequent pattern mining and rule mining algorithm which can be applied to crime...

    Provided By The World

  • White Papers // Apr 2014

    The Searching of Relevant Query

    Many internet users are increasingly search complex task-oriented goals on the internet, for example making travel arrangements and administrate finances or planning purchases. They are usually breaking down the tasks into some codependent steps and issue multiple queries around these steps repeatedly after long time. To give a good support...

    Provided By The World

  • White Papers // Apr 2014

    Data Accountability in Cloud Using CIA Framework

    The major feature of cloud service is that the user's data is processed on remote machines. In this scenario data owner does not know, on which machine his data will get processed. Due to this users fears of losing control of their own data and there are chances that the...

    Provided By The World

  • White Papers // Mar 2014

    Cloud Computing: The Technology for Next Generation

    Cloud computing is increasingly becoming popular model for the next generation internet in which computational resources are made available online to the user on demand. Cloud computing is based on the concept of sharing computer resources online without worrying about owning the infrastructure, software or the service. The users can...

    Provided By The World

  • White Papers // Mar 2014

    Semantic Similarity Based Data Alignment and Best Feature Extraction using PSO for Annotating Search Results from Web Databases

    Due to the development of search engines databases through web reachable all the way through HTML based search boundary in now day's analysis of data in deep manner from database or web search engines also important to return exact information in search result web pages. In generally the data units...

    Provided By The World

  • White Papers // Mar 2014

    Analysis of Clustering Uncertain Data Based on Review Features

    Clustering uncertain data is an important task. Now-a-days for collecting information particularly reviews for a product is becoming important through web. As the number of customer reviews is increasing day by day, it is important to develop an efficient and effective technique to extract product features mentioned in customer reviews....

    Provided By The World

  • White Papers // Feb 2014

    Large Web Search Engine for Cluster filtering Processing

    Data cleaning and integration is typically the most expensive step in the KDD process. A key part, known as record linkage or de-duplication, is identifying which records in a database refer to the same entities. This problem is traditionally solved separately for each candidate record pair. The authors propose to...

    Provided By The World

  • White Papers // Feb 2014

    An Exposure Towards Fault Tolerant Memory System

    There has been a rising demand for well-organized and reliable digital storage as well as transmission systems in the recent years. Only memory cells were vulnerable to faults of transient in addition to the supporting circuitry around the memory however due to the enhance in the rate of soft error...

    Provided By The World

  • White Papers // Feb 2014

    Enhancing Cloud Resources for Implementing IPTV Services using Virtualization

    Implementation of IPTV service delivery through virtualization is of practical interest in many applications such as detecting an IPTV service delivery failure. The intrusion detection is defined as a mechanism for an IPTV service delivery through virtualization to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this...

    Provided By The World

  • White Papers // Feb 2014

    Using Checkpoint For Implementing Fault- Tolerant On Desktop Grids

    Grid computing uses massive power of idle cycles of PC's. Desktop grids is nothing using the idle cycles of desktop PC's for computing large scale applications. There are many fields which requires large scale massive power such as scientific fields to handle complex and demanding problems. Desktop grids uses widely...

    Provided By The World

  • White Papers // Feb 2014

    Design of Efficient Hardware Utilization Fault Coverage Circuit

    A new fault coverage test pattern generator using a Linear Feedback Shift Register (LFSR) called FC-LFSR can perform fault analysis and reduce the power of a circuit during test by generating three intermediate patterns between the random patterns by reducing the hardware utilization. The goal of having intermediate patterns is...

    Provided By The World

  • White Papers // Feb 2014

    Maintaining Log Management to the Cloud and Providing Confidentiality

    Securely maintaining log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the log files and that of the logging process need to be ensured at all times. In addition, as log files often contain sensitive information, confidentiality and privacy of...

    Provided By The World

  • White Papers // Feb 2014

    The Major Traits of Cyber Security: Case Study on Server Hardening

    Information in and around the globe has so much to be linked up with the cyber infrastructure. This sophisticated infrastructure is said to be secure to some extent, perhaps the vulnerabilities always exists and paves way for catastrophes. The security concerns for the same have grown in recent times of...

    Provided By The World

  • White Papers // Feb 2014

    A Cloud Computing Ambiance of Progressive Source Portion Through Virtual Machine

    Today, cloud computing is on demand as it offers dynamic flexible resource allocation, for reliable and guaranteed services in pay-as-you-use manner, to cloud service users. So there must be a provision that all resources are made available to requesting users in efficient manner to satisfy customer's need. The emerging cloud...

    Provided By The World

  • White Papers // Feb 2014

    Provide Security and Data Backup For Cloud Computing using RDBS

    Today in cloud computing, generate the data in e-form are huge in amount. To sustain this data powerfully, there is an essential of data recovery services. To cater this, in this paper, the authors recommend a Remote Data Backup Server(RDBS). The Remote Data Backup Server (RDBS) is a server which...

    Provided By The World

  • White Papers // Feb 2014

    Analyzing Education Data Through Association Rules: A Case Study

    Data mining has attracted popular interest recently, due to the high demand for transforming huge amounts of data found in databases and other information repositories into useful knowledge. The rapid progress in the field owes to the joint efforts of researchers and developers in data mining, data warehousing, database systems,...

    Provided By The World

  • White Papers // Feb 2014

    Enhancing Data Privacy in Data Extraction With Big Data

    Big data concerns large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data is now rapidly expanding in all science and engineering domains, including physical, biological and bio-medical sciences. In this paper, the authors concentrate on...

    Provided By The World

  • White Papers // Feb 2014

    Efficient Attribute Selection to Stand Out in the Market

    Mining of frequent item sets is one of the most fundamental problems in data mining applications. The author proposed algorithm which guides the seller to select the best attributes of a new product to be inserted in the database so that it stands out in the existing competitive products, due...

    Provided By The World

  • White Papers // Feb 2014

    OMC Used in Clouds for Maximum Profit

    To maximize the profit, a service provider should understand both service charges and business costs, and how they are determined by the characteristics of the applications and the configuration of a multi server system. The problem of optimal multi server configuration for profit maximization in a cloud computing environment is...

    Provided By The World

  • White Papers // Feb 2014

    A Secure Cloud Storage System with Secure Data Forwarding

    Cloud computing presents a new way to enhancement the current utilize and delivery model for IT services based on the Internet, by providing for dynamically scalable and often virtualized resources as a service over the internet. To date, there are a number of notable commercial and individual cloud computing services,...

    Provided By The World

  • White Papers // Feb 2014

    Comparative Analysis of Google File System and Hadoop Distributed File System

    Cloud computing is a new technology which comes from distributed computing, parallel computing, grid computing and other computing technologies. In cloud computing, the data storage and computing are not in the local computer and server but in the amount of computers distributed in the internet. Several distributed file systems are...

    Provided By The World

  • White Papers // Feb 2014

    Data Centric Knowledge Management System

    The purpose of the Data Centric Knowledge Management System (DCKMS) is to centralize knowledge generated by employees working within and across functional areas, and to organize that knowledge such that it can be easily accessed, searched, browsed, navigated, and curated. DCKMS is a web based application which allows employees of...

    Provided By The World

  • White Papers // Feb 2014

    An Efficient Index Based Query Handling Model for Neo4j

    Relational DataBase Management Systems (RDBMS) are a predominant technology used for storing and retrieving structured data in web and business applications since 1980. However, relational databases have started losing its importance due to strict schema reliance and costly infrastructure. It has conjointly led to the problem in upgrade relationships between...

    Provided By The World

  • White Papers // Feb 2014

    An Efficient Cloud Based Framework for Web Recommendation Systems

    In this era of online and social network revolution, to have an efficient system which recommends good web sites of interest to users is a need of the time. The proposed system accomplishes this by analyzing the user's browsing habits. The system is based on web usage mining concepts, which...

    Provided By The World

  • White Papers // Feb 2014

    Cloud Mobile Social T.V for Adaptive Video Streaming

    Smartphone provides most of the application that a pc system gives. Easy maintenance is the main attraction of android smart phones. In this paper, articulate features for MObile-social tV system using Cloud computing (CloudMoV) is proposed. In common the problem while using the smart phones is the large power consumption....

    Provided By The World

  • White Papers // Feb 2014

    Techniques Used in Decision Support System for CRM-A Review

    A Decision Support System (DSS) is a computerized application or an information system that supports business decision more easily. Customer Relationship Management (CRM) is a strategy which a company uses to handle customer interactions. CRM mainly focuses on attracting, retaining, developing and identifying customers. For Successful CRM approach there the...

    Provided By The World

  • White Papers // Feb 2014

    Survey on Mining Clusters Using New K-Mean Algorithm From Structured and Unstructured Data

    Big data is the popular term used in the current era for extracting knowledge from large datasets. Big data is the collection of large and complex dataset. The challenge in big data is Volume, Variety and Velocity (3V's).variety can be classified into structured, unstructured data and semi structured. Structured data...

    Provided By The World

  • White Papers // Feb 2014

    An Efficient Web Learning Web Text Feature Extraction With Exponential Particle Swarm Optimization

    Due to the growth of World Wide Web (WWW) the tradition of web patterns also enhanced now-a-days, extraction of information from web also important. For this reason web mining plays important role to discovery of individual user information and extract information from individual web log files with known text feature....

    Provided By The World

  • White Papers // Feb 2014

    An Approach for Ensuring Security in Cloud Environment

    Cloud computing is a pool of ample of resources for the users accessed through internet. It has emerged as a computing standard where the computing infrastructure is served as internet services and has made a great change in the way of computation and services for its customers. Such a cloud...

    Provided By The World

  • White Papers // Feb 2014

    Data Security Framework for Offsite Storage of Data

    Cloud computing is a transformation in IT Industry because of its low cost, high accessibility, high performance and also other characteristics. In this technology user can access services reside in the remote servers maintained by the third party. The data reside in cloud is of great value and its loss...

    Provided By The World

  • White Papers // Feb 2014

    A Rational Approach for Virtual Education System through Cloud Computing

    In this globe the developing countries will be survive mired in destitution unless they concerned more on stretching the technology and metamorphosis to everywhere throughout the country including metropolitan to rustic areas. Cloud computing is obviously one of today's most bewitching areas due, at least in part, to its cost...

    Provided By The World

  • White Papers // Feb 2014

    An Improved Privacy Preserving With RSA and C5.0 Decision Tree Learning for Unrealized Datasets

    PPDM methods have been observed in various areas to preserve privacy for each data. Earlier work of privacy preserving data categorized into two ways perturbation based splitting and classification of the those data. It conform effectiveness of exercise data sets for decision tree learning. This paper covers the purpose of...

    Provided By The World

  • White Papers // Jan 2014

    Authentication Using Private Weighted Questioning

    In this paper, the authors present a strong authentication method by examining each user with certain private information related to that user. The proposed method constructs a database for all authenticated users. Each record in this database is assigned to individual users. Some of the fields of user's record are...

    Provided By The World

  • White Papers // Jan 2014

    Analysis of K-Anonymity for Homogeneity Attack

    Now-a-days, the authors are dealing with a massive amount of data that contain person-specific information. From the person-specific data it is easy to extract the sensitive information about a person by the process of linking. The size of data is increasing exponentially day-by-day. It is as much important to provide...

    Provided By The World

  • White Papers // Jan 2014

    A Single Sign-On Based Integrated Model for E-Banking Services Through Cloud Computing

    With increasing advances in technology, there's a need to learn and use new technologies. Necessity of e-banking, and mainly internet banking and their importance and role in decreasing distances and increasing service providing speed is obvious but impose many challenges to executives. Prevailing over people's distrust to the internet is...

    Provided By The World

  • White Papers // Jan 2014

    Swarm Intelligence Based Fuzzy with Personalized Ontology Model for Web Information Gathering

    Ontology is expansively used to represent the knowledge clarification and formalization of user profiles for gathering personalized web information. For representing user profiles from both global information and local information several models have been studied in literature. Personalized user profile based ontology model revise user profiles for mutually a world...

    Provided By The World

  • White Papers // Jan 2014

    Extreme Learning Machine Algorithm to Discover New Attributes From Unseen sites

    In this paper, the authors develop a learning framework for adding the information or knowledge extraction methods based wrapper methods for new attribute discovery, it aims at automatically adapting a formerly learning wrapper beginning the source web site to an innovative unobserved site for information extraction. One exclusive distinguishing of...

    Provided By The World

  • White Papers // Apr 2014

    A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining

    Frequent pattern (itemset) mining plays an important role in association rule mining. The apriori & FP-growth algorithms are the most famous algorithms which can be used for frequent pattern mining. This paper presents the survey of various frequent pattern mining and rule mining algorithm which can be applied to crime...

    Provided By The World

  • White Papers // Feb 2014

    Cloud Mobile Social T.V for Adaptive Video Streaming

    Smartphone provides most of the application that a pc system gives. Easy maintenance is the main attraction of android smart phones. In this paper, articulate features for MObile-social tV system using Cloud computing (CloudMoV) is proposed. In common the problem while using the smart phones is the large power consumption....

    Provided By The World

  • White Papers // Feb 2014

    Techniques Used in Decision Support System for CRM-A Review

    A Decision Support System (DSS) is a computerized application or an information system that supports business decision more easily. Customer Relationship Management (CRM) is a strategy which a company uses to handle customer interactions. CRM mainly focuses on attracting, retaining, developing and identifying customers. For Successful CRM approach there the...

    Provided By The World

  • White Papers // Feb 2014

    Survey on Mining Clusters Using New K-Mean Algorithm From Structured and Unstructured Data

    Big data is the popular term used in the current era for extracting knowledge from large datasets. Big data is the collection of large and complex dataset. The challenge in big data is Volume, Variety and Velocity (3V's).variety can be classified into structured, unstructured data and semi structured. Structured data...

    Provided By The World

  • White Papers // Mar 2014

    Cloud Computing: The Technology for Next Generation

    Cloud computing is increasingly becoming popular model for the next generation internet in which computational resources are made available online to the user on demand. Cloud computing is based on the concept of sharing computer resources online without worrying about owning the infrastructure, software or the service. The users can...

    Provided By The World

  • White Papers // Mar 2014

    Semantic Similarity Based Data Alignment and Best Feature Extraction using PSO for Annotating Search Results from Web Databases

    Due to the development of search engines databases through web reachable all the way through HTML based search boundary in now day's analysis of data in deep manner from database or web search engines also important to return exact information in search result web pages. In generally the data units...

    Provided By The World

  • White Papers // Feb 2014

    An Efficient Web Learning Web Text Feature Extraction With Exponential Particle Swarm Optimization

    Due to the growth of World Wide Web (WWW) the tradition of web patterns also enhanced now-a-days, extraction of information from web also important. For this reason web mining plays important role to discovery of individual user information and extract information from individual web log files with known text feature....

    Provided By The World

  • White Papers // Mar 2014

    Analysis of Clustering Uncertain Data Based on Review Features

    Clustering uncertain data is an important task. Now-a-days for collecting information particularly reviews for a product is becoming important through web. As the number of customer reviews is increasing day by day, it is important to develop an efficient and effective technique to extract product features mentioned in customer reviews....

    Provided By The World

  • White Papers // Feb 2014

    An Approach for Ensuring Security in Cloud Environment

    Cloud computing is a pool of ample of resources for the users accessed through internet. It has emerged as a computing standard where the computing infrastructure is served as internet services and has made a great change in the way of computation and services for its customers. Such a cloud...

    Provided By The World

  • White Papers // Feb 2014

    Large Web Search Engine for Cluster filtering Processing

    Data cleaning and integration is typically the most expensive step in the KDD process. A key part, known as record linkage or de-duplication, is identifying which records in a database refer to the same entities. This problem is traditionally solved separately for each candidate record pair. The authors propose to...

    Provided By The World

  • White Papers // Feb 2014

    An Exposure Towards Fault Tolerant Memory System

    There has been a rising demand for well-organized and reliable digital storage as well as transmission systems in the recent years. Only memory cells were vulnerable to faults of transient in addition to the supporting circuitry around the memory however due to the enhance in the rate of soft error...

    Provided By The World

  • White Papers // Feb 2014

    Enhancing Cloud Resources for Implementing IPTV Services using Virtualization

    Implementation of IPTV service delivery through virtualization is of practical interest in many applications such as detecting an IPTV service delivery failure. The intrusion detection is defined as a mechanism for an IPTV service delivery through virtualization to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this...

    Provided By The World

  • White Papers // Feb 2014

    Using Checkpoint For Implementing Fault- Tolerant On Desktop Grids

    Grid computing uses massive power of idle cycles of PC's. Desktop grids is nothing using the idle cycles of desktop PC's for computing large scale applications. There are many fields which requires large scale massive power such as scientific fields to handle complex and demanding problems. Desktop grids uses widely...

    Provided By The World

  • White Papers // Feb 2014

    Design of Efficient Hardware Utilization Fault Coverage Circuit

    A new fault coverage test pattern generator using a Linear Feedback Shift Register (LFSR) called FC-LFSR can perform fault analysis and reduce the power of a circuit during test by generating three intermediate patterns between the random patterns by reducing the hardware utilization. The goal of having intermediate patterns is...

    Provided By The World

  • White Papers // Feb 2014

    Maintaining Log Management to the Cloud and Providing Confidentiality

    Securely maintaining log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the log files and that of the logging process need to be ensured at all times. In addition, as log files often contain sensitive information, confidentiality and privacy of...

    Provided By The World

  • White Papers // Feb 2014

    The Major Traits of Cyber Security: Case Study on Server Hardening

    Information in and around the globe has so much to be linked up with the cyber infrastructure. This sophisticated infrastructure is said to be secure to some extent, perhaps the vulnerabilities always exists and paves way for catastrophes. The security concerns for the same have grown in recent times of...

    Provided By The World

  • White Papers // Feb 2014

    A Cloud Computing Ambiance of Progressive Source Portion Through Virtual Machine

    Today, cloud computing is on demand as it offers dynamic flexible resource allocation, for reliable and guaranteed services in pay-as-you-use manner, to cloud service users. So there must be a provision that all resources are made available to requesting users in efficient manner to satisfy customer's need. The emerging cloud...

    Provided By The World

  • White Papers // Feb 2014

    Provide Security and Data Backup For Cloud Computing using RDBS

    Today in cloud computing, generate the data in e-form are huge in amount. To sustain this data powerfully, there is an essential of data recovery services. To cater this, in this paper, the authors recommend a Remote Data Backup Server(RDBS). The Remote Data Backup Server (RDBS) is a server which...

    Provided By The World

  • White Papers // Feb 2014

    Analyzing Education Data Through Association Rules: A Case Study

    Data mining has attracted popular interest recently, due to the high demand for transforming huge amounts of data found in databases and other information repositories into useful knowledge. The rapid progress in the field owes to the joint efforts of researchers and developers in data mining, data warehousing, database systems,...

    Provided By The World

  • White Papers // Feb 2014

    Enhancing Data Privacy in Data Extraction With Big Data

    Big data concerns large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data is now rapidly expanding in all science and engineering domains, including physical, biological and bio-medical sciences. In this paper, the authors concentrate on...

    Provided By The World

  • White Papers // Feb 2014

    Efficient Attribute Selection to Stand Out in the Market

    Mining of frequent item sets is one of the most fundamental problems in data mining applications. The author proposed algorithm which guides the seller to select the best attributes of a new product to be inserted in the database so that it stands out in the existing competitive products, due...

    Provided By The World

  • White Papers // Feb 2014

    OMC Used in Clouds for Maximum Profit

    To maximize the profit, a service provider should understand both service charges and business costs, and how they are determined by the characteristics of the applications and the configuration of a multi server system. The problem of optimal multi server configuration for profit maximization in a cloud computing environment is...

    Provided By The World

  • White Papers // Feb 2014

    A Secure Cloud Storage System with Secure Data Forwarding

    Cloud computing presents a new way to enhancement the current utilize and delivery model for IT services based on the Internet, by providing for dynamically scalable and often virtualized resources as a service over the internet. To date, there are a number of notable commercial and individual cloud computing services,...

    Provided By The World

  • White Papers // Feb 2014

    Comparative Analysis of Google File System and Hadoop Distributed File System

    Cloud computing is a new technology which comes from distributed computing, parallel computing, grid computing and other computing technologies. In cloud computing, the data storage and computing are not in the local computer and server but in the amount of computers distributed in the internet. Several distributed file systems are...

    Provided By The World

  • White Papers // Feb 2014

    Data Centric Knowledge Management System

    The purpose of the Data Centric Knowledge Management System (DCKMS) is to centralize knowledge generated by employees working within and across functional areas, and to organize that knowledge such that it can be easily accessed, searched, browsed, navigated, and curated. DCKMS is a web based application which allows employees of...

    Provided By The World

  • White Papers // Feb 2014

    An Efficient Index Based Query Handling Model for Neo4j

    Relational DataBase Management Systems (RDBMS) are a predominant technology used for storing and retrieving structured data in web and business applications since 1980. However, relational databases have started losing its importance due to strict schema reliance and costly infrastructure. It has conjointly led to the problem in upgrade relationships between...

    Provided By The World

  • White Papers // Feb 2014

    An Efficient Cloud Based Framework for Web Recommendation Systems

    In this era of online and social network revolution, to have an efficient system which recommends good web sites of interest to users is a need of the time. The proposed system accomplishes this by analyzing the user's browsing habits. The system is based on web usage mining concepts, which...

    Provided By The World

  • White Papers // Apr 2014

    The Searching of Relevant Query

    Many internet users are increasingly search complex task-oriented goals on the internet, for example making travel arrangements and administrate finances or planning purchases. They are usually breaking down the tasks into some codependent steps and issue multiple queries around these steps repeatedly after long time. To give a good support...

    Provided By The World

  • White Papers // Apr 2014

    Data Accountability in Cloud Using CIA Framework

    The major feature of cloud service is that the user's data is processed on remote machines. In this scenario data owner does not know, on which machine his data will get processed. Due to this users fears of losing control of their own data and there are chances that the...

    Provided By The World

  • White Papers // May 2014

    Ranking Spatial Data by Quality Preferences Using Spatial Techniques

    The quality of features of an object is ranked based on the spatial preference query. For example, using a Landed property agency database of flats for lease, a customer may want to rank the flats with respect to the correctness of their location, defined after aggregating the qualities of other...

    Provided By The World

  • White Papers // May 2014

    Survey on Students' Academic Failure and Dropout using Data Mining Techniques

    Educational data mining is in the habit of learn the data available in the field of education and show up the hidden knowledge from it. Classification methods like decision trees, machine learning, rule mining, etc can be applied on the educational data for forecasting the student's behavior, performance of them...

    Provided By The World

  • White Papers // May 2014

    Testing Cloud Application System Resiliency by Wrecking the System

    When application architecture moves to the public cloud, failures and outages are inevitable. Rather than panicking when failures strike at the worst time, one should prepare for failures in good times. The best way to tackle failure is to fail often. This cycle of failing instances deliberately and then testing...

    Provided By The World

  • White Papers // Aug 2013

    Personalized Mobile Search Engine by Analyzing Query Travel Patterns With Association Rule Mining

    Mobile based search engine the major problem is that the interaction between mobile users and search results are managed by small numeral of factors in the mobile phones. In order to manage these problem collect user query and their relevant result to satisfy the user profile according to the interest....

    Provided By The World

  • White Papers // Oct 2013

    Weighted Fuzzy Soft Matrix Theory and its Decision Making

    In this paper, the authors use soft set theory in decision making in banking system. A new efficient solution procedure has been developed to solve fuzzy soft set based real life decision making problems involving multiple decision makers. In this paper new technique of applying threshold for selecting an optimal...

    Provided By The World

  • White Papers // Oct 2013

    Alternative Design Exploration using K-Nearest Neighbor Technique and Semantic Web Technology in an Energy Simulation Tool

    An energy simulation tool is a tool that is used to calculate energy demand of a building. The existing energy simulation tools carry out alternative design exploration using optimization method. This method works by varying its parameters to obtain better energy performance. The method needs to calculate energy performance every...

    Provided By The World

  • White Papers // Nov 2013

    Link Independent and Node Independent Algorithms for Efficient Multipath Routing

    Link-independent and node-independent DAGs satisfy the property that any path from a source to the root on one DAG is link-disjoint (node-disjoint) with any path from the source to the root on the other DAG. To achieve resilient multipath routing, first introduce the concept of Independent Directed Acyclic Graphs (IDAGs)....

    Provided By The World

  • White Papers // Nov 2013

    Modular Clusterization Product Design Support System

    Modular design approach is widely used in consumer products, machinery and software design. This paper presents the design of a software system to assist designers in clustering modules during product design. Use of scientifically justifiable means of product development which are systematic and less rigorous in a research and development...

    Provided By The World

  • White Papers // Dec 2013

    Radon Transform and Symbolic Linear Discriminant Analysis Based 3D Face Recognition Using KNN and SVM

    In spite of over two decades of intense research, illumination and pose invariance remain prohibitively challenging aspects of face recognition for most practical application. Many recent events, such as terrorist attacks, have exposed the serious weaknesses in most sophisticated security systems. Automatic face recognition has long been established as one...

    Provided By The World

  • White Papers // Dec 2013

    Extraction of Shape-Invariant Gait Features for Human Gait Recognition

    In appearance based human gait recognition, minimizing the variations of different cofactors such as viewing angles, carrying objects, clothing are the key challenging problems. To extract the shape-invariant gait features the authors have adopted a qualitative spatial and temporal reasoning based feature extraction technique. They extract the Space Time Shapes...

    Provided By The World

  • White Papers // Feb 2014

    Data Security Framework for Offsite Storage of Data

    Cloud computing is a transformation in IT Industry because of its low cost, high accessibility, high performance and also other characteristics. In this technology user can access services reside in the remote servers maintained by the third party. The data reside in cloud is of great value and its loss...

    Provided By The World