The World

Displaying 1-40 of 403 results

  • White Papers // Dec 2014

    Analysis of Wavelet Families on Audio Steganography Using AES

    With the growing trends in wireless network in this modern era, more and more multimedia data are generated and transmitted. So the effective ways to ensure their security are increased. This can be achieved by implementing steganography techniques. Audio steganography is more challenging compared to image or video steganography. There...

    Provided By The World

  • White Papers // Dec 2014

    HEFT Based Cloud Auto-Scaling Algorithm with Budget Constraints

    Cloud computing now-a-days is playing major role in processing enterprise and personal applications. Its dynamic scalability enables users to scale up/down underlying infrastructure in response to dynamic performance behaviors. This benefit provides the basis for solving performance-resource mapping problem when deploying an application on cloud. Many researches on exploring efficient...

    Provided By The World

  • White Papers // Dec 2014

    Performance Analysis of Security Protocol for Advanced Metering Infrastructure in Smart Grid

    The smart grid is a network of computers and power infrastructures that monitor and manage energy usage. This paper aims to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security. A security protocol, Integrated Authentication...

    Provided By The World

  • White Papers // Dec 2014

    A Survey of Routing Attacks and Detection Schemes in MANET

    The insecurity of the wireless links, power and energy constraints, poor physical protection of nodes in a hostile environment, and the vulnerability of statically configured security schemes poses challenges for routing and secure data transfer in wireless networks. No part or component of the network is dedicated to support specific...

    Provided By The World

  • White Papers // Dec 2014

    Survey on Minimizing Energy Consumption in Mobile Adhoc Networks

    Mobile ad hoc network consists of nodes that move arbitrarily. It leads to dynamic topologies. Power failure of a mobile node not only affects the node itself but also its ability to forward packet on behalf of others and the overall network life time. For this reason many research efforts...

    Provided By The World

  • White Papers // Dec 2014

    Analysis on Environmental Decision in Artificial Intelligence System for Multi Disciplinary Applications

    An effective protection of the people environment is largely dependent on the quality of the available information used to make an appropriate decision. Problems dissent when the quantities of forthcoming collection are huge and non homogenous which are future from some antithetical disciplines or sources and their propertied could not...

    Provided By The World

  • White Papers // Nov 2014

    Optimal Contention Window Selection in IEEE 802.11 MAC Protocol for Better Performance of Wireless Networks

    In this paper, the authors investigate the impact of network size and contention window on the performance of the IEEE 802.11 MAC protocol. The performance of any network needs to be evaluated on certain criteria, these criteria then decide the basis of performance of any system. Study on wireless networks'...

    Provided By The World

  • White Papers // Nov 2014

    Quick Predictive Handover to Ensure Optimal QoS in Heterogeneous Mobile Network Platform

    Recently these day, mobile IPv6 based mobile networks are increasing with the widespread popularity of cutting edge wireless internet connectivity. As Internet users are moving away from fixed connections to mobile connections in dealing with their day-to-day activities. In order to remain connected to the Internet while on the go,...

    Provided By The World

  • White Papers // Nov 2014

    E-Mail Fusion with Graph Based Approach Stipulating OPass Security

    Most users are satiated with separately logging in into their multiple accounts, and hence end up spending a large amount of time in accessing them. It becomes a tedious task to remember all email id's and passwords for all their accounts. In this paper, the authors present a single framework...

    Provided By The World

  • White Papers // Oct 2014

    A Novel Classification Approach for Firewall Log Data Analysis

    Firewall log data analysis always an interesting research issue in the field of internet traffic analysis, Even though various approaches available for minimizing internet traffic over heads during network traffic, may not be optimal for all possible samples. In this paper, the authors are proposing an efficient classification approach for...

    Provided By The World

  • White Papers // Oct 2014

    An Empirical Model of Secure Data Sharing Between Multi Data Owners

    Cloud computing is one of the interesting research issue now-a-days of recent technology, due to its services, features, low-maintenance and high quality on demand service to cloud users. Multiple data owners can share the data component securely with authentication. In this paper, the authors are proposed the concept digital certificate...

    Provided By The World

  • White Papers // Oct 2014

    Privacy Preserving Data Storage of Intermediate Data Sets Over Cloud

    Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility over a network. Security should be provided when sharing of cloud data. In this paper, the authors are using ID3 for classification of intermediate data set to store data into cloud. Before...

    Provided By The World

  • White Papers // Oct 2014

    An Efficient Filtering Technique over Undesirable Data of OSN User Walls

    Prevention of unwanted and unauthorized data over Internet has become popular mechanism in online social networks. Authorization and control given to the users to prevent those spams either messages or images. In this paper, the authors are proposing an efficient spam filtering mechanism with Naive Bayesian classification by forwarding the...

    Provided By The World

  • White Papers // Oct 2014

    Importance of Load Balancing in Cloud Computing Environment: A Review

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and web services. A cloud consists of several elements such as clients, datacenter and distributed servers. It includes fault tolerance, high availability, scalability, flexibility, reduced overhead for users, reduced cost of ownership, on demand services etc. Central to...

    Provided By The World

  • White Papers // Oct 2014

    128-Bit Advanced Encryption Standard Algorithm Implementation on FPGA

    In any communication, data security plays a vital role and there is a need to protect data from malicious attacks. This paper presents 128 bit pipelining processing of Advanced Encryption Standard (AES). This implementation is compared with previous paper iterative looping to show better efficiency. Encryption and decryption was carried...

    Provided By The World

  • White Papers // Oct 2014

    Security Based Intrusion-Detection System for Ad Hoc Mobile Wireless Networks

    The migration to wireless network from wired network has been a worldwide trend within the past few decades. The quality and quantifiability brought by wireless network created it attainable in many applications. Among all the modern wireless networks, Mobile Ad hoc NETwork (MANET) is one among the foremost important and...

    Provided By The World

  • White Papers // Oct 2014

    Supervision Termination for Multipath Routing with Intervention Detection in Wireless Sensor Networks

    Research problems are to enhance an Intrusion Detection System (IDS) of a clustered HWSN to prolong its lifetime operation in the presence of unreliable and malicious nodes. Also, to address the energy consumption and QoS gain in reliability, delay and security with the goal to maximize the lifetime of a...

    Provided By The World

  • White Papers // Oct 2014

    An Efficient Secure Parallel Distributed Control Protocol for Content Delivery Networks

    Technology has its own way to put forward the next level of research. In the era of Fine dine of IT revolution, where the authors use the Socket layer and its encryption mechanism is a hot cake in the IT Industry, having a good competition to provide the best of...

    Provided By The World

  • White Papers // Oct 2014

    Defending Against Flood Attacks in Distraction Unbiased Networks

    Distraction Unbiased Networks (DUNs) utilize the portability of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DUNs are unprotected to flood attacks in which attackers send as many packets or packet replicas as possible...

    Provided By The World

  • White Papers // Oct 2014

    EMAP: A Novel Approach for Providing the Security in the Vehicular Ad Hoc Network (VANET)

    A Vehicular Ad-hoc NETwork (VANET) utilizes cars as mobile nodes in a MANET to generate a mobile network. In the vehicular ad hoc networks the protection is an important concern. For protection, Vehicular Ad-hoc NETworks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In the Public...

    Provided By The World

  • White Papers // Oct 2014

    Elevated Recital Communication in MIMO Adhoc Associations by Manipulating Supportive Convey

    Wireless sensor association is a compilation of sensors with limited reserves that collaborate in order to achieve a standard goal. It is susceptible to node confine attacks because sensor nodes are deployed in unattended manner. Once opponent confines sensor nodes, they can concession that node and launch various types of...

    Provided By The World

  • White Papers // Oct 2014

    An Extremely Ascendible Key Pre-Distribution Theme for Wireless Device Networks

    Given the sensitivity of the potential WSN applications and because of resource limitations, key management merges as a difficult issue for WSNs. one amongst the most issues when coming up with a key management theme is that the network scalability. Indeed, the protocol ought to support an outsized range of...

    Provided By The World

  • White Papers // Oct 2014

    Least Outlay Jamming Obstruction in Multi Path Wireless Routing Protocols

    Key applications is the routing protocol that directs the packet in the network routing packets fully connected to wireless networks has been studied to a great extent but the assumption on full connectivity is generally not valid in a real system. A class of attacks such as network partitioning node...

    Provided By The World

  • White Papers // Oct 2014

    Efficient Distributed Profile Matching Using Multi-Party Computation in Mobile Social Networks

    The profile matching means that 2 user's scrutiny their personal profiles and is usually the primary step towards effective PMSN. It, however, conflicts with users' growing privacy considerations regarding revealing their personal profiles to finish strangers before deciding to move with them the authors protocols alter 2 users to perform...

    Provided By The World

  • White Papers // Oct 2014

    Energy-Efficient Cooperative Video Distribution with Applied Mathematics QoS Provisions Over Wireless Networks

    For period of time video broadcast wherever multiple users have an interest within the same content, mobile-to-mobile cooperation is utilized to enhance delivery potency and cut back network utilization. Below such cooperation, however, period of time video transmission needs end-to-end delay bounds. Because of the inherently random nature of wireless...

    Provided By The World

  • White Papers // Oct 2014

    Communication Networks Based on Price Differentiation

    The authors study the optimum usage-based rating downside in a resource constrained network with one increasing service supplier and multiple teams of surplus maximizing users. With the belief that the service supplier is aware of the utility perform of every user (thus complete information), they find that the whole worth...

    Provided By The World

  • White Papers // Oct 2014

    Facilitating Indirect Mutual Trust for Cloud Storage Systems

    In this digital age, organizations produce a large amount of sensitive data including personal information such as financial data. The local management of such humongous amount of data is problematic and costly due to the requirements of high storage capacity and experienced personnel. Storage-as-a-Service (SaaS) offered by Cloud Service Providers...

    Provided By The World

  • White Papers // Oct 2014

    Opportunistic MANETs: Quality Will Frame for Low Transmission Power

    Opportunistic Mobile Ad-hoc NETworks (MANETs) are a special category of thin and disconnected MANETs wherever knowledge communication exploits isolated contact opportunities among nodes. The authors tend to think about opportunist MANETs wherever nodes move independently haphazardly over a sq. of the plane. Nodes exchange data if they're at a distance...

    Provided By The World

  • White Papers // Oct 2014

    SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management System

    The problem of efficiently and securely broadcasting to a remote cooperative group occurs in many newly emerging networks. A major challenge in devising such systems is to overcome the obstacles of the potentially limited communication from the group to the sender, the unavailability of that of a fully trusted key...

    Provided By The World

  • White Papers // Oct 2014

    Cloud Based Structure Approach of Content-as-a-Service for Supplier Impartial of Mobile Gadgets

    These days, mobile gadgets have turn into a commodity, people use several gadgets for various purposes. While people carry only some of their gadgets with them, people still want to access content originating from any device. To overcome this issue, content is often uploaded into a hosting service available in...

    Provided By The World

  • White Papers // Oct 2014

    Repetition Administration of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    In this paper, the authors propose redundancy management of Heterogeneous Wireless Sensor Networks (HWSNs), to manage efficient communication in heterogeneous wireless sensor network by utilizing multipath routing to respond the user queries. This paper is to exploit the tradeoff between energy consumption vs. reliability, timeliness, and security to maximize the...

    Provided By The World

  • White Papers // Oct 2014

    Artificial Intelligence in Cyber Defense

    Day-by-day the technology is growing and in proportion to cyber crime is also growing and it becomes very difficult to track the application and to know the loopholes in the application. In order to have a mechanism build in such a way that the application will track all such changes...

    Provided By The World

  • White Papers // Oct 2014

    Novel Techniques for Transmissions to Communication Jamming Denial-of-Service Attacks

    A major challenge in securing wireless applications and services is the inherent vulnerability of radio transmissions to communication jamming Denial-of-Service (DoS) attacks. This vulnerability gains in significance the more one takes the ubiquity of these applications and services for granted and becomes a crucial factor in the context of safety-critical...

    Provided By The World

  • White Papers // Oct 2014

    Secure Mining of Affiliation Runs in Evenly Disseminated Databases

    The authors propose a convention for secure mining of affiliation runs in on a level plane appropriated databases. The current heading convention is that of Kantarcioglu and Clifton. Their convention, in the same way as theirs, is focused around the quick appropriated mining calculation of the researchers, which is an...

    Provided By The World

  • White Papers // Oct 2014

    Access Approach Union for Occasion Preparing Frameworks

    Privacy is a major concern in event processing system, Current event processing systems lack methods to maintain privacy methods on regular event streams in a chain of subsequently applied stream operations. The lack of privacy in event processing system will impact on large scale distributed applications such as logistics applications....

    Provided By The World

  • White Papers // Oct 2014

    Genetic Algorithm to the Development of Artificial Intelligence in Module System

    Artificial Intelligence (AI) is an extremely important role in new technological progress. It represents humanity's life time dream of elevating computers beyond the realm of simple machines for the calculation and processing of data. With the incorporation of artificial intelligence, computers are able to engage in behavior similar to human...

    Provided By The World

  • White Papers // Oct 2014

    A Hybrid Intrusion Detection System for Identification of Anonymous Behavior

    Various approaches available for identify the unauthorized behavior of the incoming nodes like with their trust measures like direct trust, indirect trust and reputation metric, these metrics always maintained globally so network cannot directly depend on it. Servers maintain firewall log data of in and out traffic for intrusion detection...

    Provided By The World

  • White Papers // Oct 2014

    An Empirical Model of Data Monitoring Service Over Cloud

    Auditing over cloud data is an interesting research topic in cloud computing. Data owner uploads data fragments after the segmentation of data component to cloud server and auditor monitors data component which is uploaded by the data owner, traditional approach completely depends on third party auditor. In this paper, the...

    Provided By The World

  • White Papers // Oct 2014

    An Efficient Privacy Preserving Data Clustering Over Distributed Networks

    In distributed networks or open environments nodes communicates with each other openly for transmission of data, there is a rapid research going on secure mining. Privacy preserving over data mining in distributed networks is still an important research issue in the field of knowledge and data engineering or community based...

    Provided By The World

  • White Papers // Oct 2014

    Node Stateless in Mantes Network Management by Using Statistics and Security Identifies Protocol

    Address assignment could be a key challenge in impromptu networks due to the dearth of infrastructure. Autonomous addressing protocols need a distributed and self-managed mechanism to avoid address collisions in a very dynamic network with attenuation channels, frequent partitions, and joining leaving nodes. The authors propose and analyze a light-weight...

    Provided By The World

  • White Papers // May 2014

    Ranking Spatial Data by Quality Preferences Using Spatial Techniques

    The quality of features of an object is ranked based on the spatial preference query. For example, using a Landed property agency database of flats for lease, a customer may want to rank the flats with respect to the correctness of their location, defined after aggregating the qualities of other...

    Provided By The World

  • White Papers // May 2014

    Survey on Students' Academic Failure and Dropout using Data Mining Techniques

    Educational data mining is in the habit of learn the data available in the field of education and show up the hidden knowledge from it. Classification methods like decision trees, machine learning, rule mining, etc can be applied on the educational data for forecasting the student's behavior, performance of them...

    Provided By The World

  • White Papers // May 2014

    Testing Cloud Application System Resiliency by Wrecking the System

    When application architecture moves to the public cloud, failures and outages are inevitable. Rather than panicking when failures strike at the worst time, one should prepare for failures in good times. The best way to tackle failure is to fail often. This cycle of failing instances deliberately and then testing...

    Provided By The World

  • White Papers // Apr 2014

    A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining

    Frequent pattern (itemset) mining plays an important role in association rule mining. The apriori & FP-growth algorithms are the most famous algorithms which can be used for frequent pattern mining. This paper presents the survey of various frequent pattern mining and rule mining algorithm which can be applied to crime...

    Provided By The World

  • White Papers // Feb 2014

    Cloud Mobile Social T.V for Adaptive Video Streaming

    Smartphone provides most of the application that a pc system gives. Easy maintenance is the main attraction of android smart phones. In this paper, articulate features for MObile-social tV system using Cloud computing (CloudMoV) is proposed. In common the problem while using the smart phones is the large power consumption....

    Provided By The World

  • White Papers // Feb 2014

    Data Security Framework for Offsite Storage of Data

    Cloud computing is a transformation in IT Industry because of its low cost, high accessibility, high performance and also other characteristics. In this technology user can access services reside in the remote servers maintained by the third party. The data reside in cloud is of great value and its loss...

    Provided By The World

  • White Papers // Feb 2014

    Design of Efficient Hardware Utilization Fault Coverage Circuit

    A new fault coverage test pattern generator using a Linear Feedback Shift Register (LFSR) called FC-LFSR can perform fault analysis and reduce the power of a circuit during test by generating three intermediate patterns between the random patterns by reducing the hardware utilization. The goal of having intermediate patterns is...

    Provided By The World

  • White Papers // Feb 2014

    Maintaining Log Management to the Cloud and Providing Confidentiality

    Securely maintaining log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the log files and that of the logging process need to be ensured at all times. In addition, as log files often contain sensitive information, confidentiality and privacy of...

    Provided By The World

  • White Papers // Feb 2014

    The Major Traits of Cyber Security: Case Study on Server Hardening

    Information in and around the globe has so much to be linked up with the cyber infrastructure. This sophisticated infrastructure is said to be secure to some extent, perhaps the vulnerabilities always exists and paves way for catastrophes. The security concerns for the same have grown in recent times of...

    Provided By The World

  • White Papers // Feb 2014

    A Cloud Computing Ambiance of Progressive Source Portion Through Virtual Machine

    Today, cloud computing is on demand as it offers dynamic flexible resource allocation, for reliable and guaranteed services in pay-as-you-use manner, to cloud service users. So there must be a provision that all resources are made available to requesting users in efficient manner to satisfy customer's need. The emerging cloud...

    Provided By The World

  • White Papers // Feb 2014

    Provide Security and Data Backup For Cloud Computing using RDBS

    Today in cloud computing, generate the data in e-form are huge in amount. To sustain this data powerfully, there is an essential of data recovery services. To cater this, in this paper, the authors recommend a Remote Data Backup Server(RDBS). The Remote Data Backup Server (RDBS) is a server which...

    Provided By The World

  • White Papers // Feb 2014

    Analyzing Education Data Through Association Rules: A Case Study

    Data mining has attracted popular interest recently, due to the high demand for transforming huge amounts of data found in databases and other information repositories into useful knowledge. The rapid progress in the field owes to the joint efforts of researchers and developers in data mining, data warehousing, database systems,...

    Provided By The World

  • White Papers // Feb 2014

    Enhancing Data Privacy in Data Extraction With Big Data

    Big data concerns large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data is now rapidly expanding in all science and engineering domains, including physical, biological and bio-medical sciences. In this paper, the authors concentrate on...

    Provided By The World

  • White Papers // Feb 2014

    Efficient Attribute Selection to Stand Out in the Market

    Mining of frequent item sets is one of the most fundamental problems in data mining applications. The author proposed algorithm which guides the seller to select the best attributes of a new product to be inserted in the database so that it stands out in the existing competitive products, due...

    Provided By The World

  • White Papers // Feb 2014

    OMC Used in Clouds for Maximum Profit

    To maximize the profit, a service provider should understand both service charges and business costs, and how they are determined by the characteristics of the applications and the configuration of a multi server system. The problem of optimal multi server configuration for profit maximization in a cloud computing environment is...

    Provided By The World

  • White Papers // Feb 2014

    A Secure Cloud Storage System with Secure Data Forwarding

    Cloud computing presents a new way to enhancement the current utilize and delivery model for IT services based on the Internet, by providing for dynamically scalable and often virtualized resources as a service over the internet. To date, there are a number of notable commercial and individual cloud computing services,...

    Provided By The World

  • White Papers // Feb 2014

    Comparative Analysis of Google File System and Hadoop Distributed File System

    Cloud computing is a new technology which comes from distributed computing, parallel computing, grid computing and other computing technologies. In cloud computing, the data storage and computing are not in the local computer and server but in the amount of computers distributed in the internet. Several distributed file systems are...

    Provided By The World

  • White Papers // Feb 2014

    Data Centric Knowledge Management System

    The purpose of the Data Centric Knowledge Management System (DCKMS) is to centralize knowledge generated by employees working within and across functional areas, and to organize that knowledge such that it can be easily accessed, searched, browsed, navigated, and curated. DCKMS is a web based application which allows employees of...

    Provided By The World

  • White Papers // Feb 2014

    An Efficient Index Based Query Handling Model for Neo4j

    Relational DataBase Management Systems (RDBMS) are a predominant technology used for storing and retrieving structured data in web and business applications since 1980. However, relational databases have started losing its importance due to strict schema reliance and costly infrastructure. It has conjointly led to the problem in upgrade relationships between...

    Provided By The World

  • White Papers // Feb 2014

    An Efficient Cloud Based Framework for Web Recommendation Systems

    In this era of online and social network revolution, to have an efficient system which recommends good web sites of interest to users is a need of the time. The proposed system accomplishes this by analyzing the user's browsing habits. The system is based on web usage mining concepts, which...

    Provided By The World

  • White Papers // Feb 2014

    A Rational Approach for Virtual Education System through Cloud Computing

    In this globe the developing countries will be survive mired in destitution unless they concerned more on stretching the technology and metamorphosis to everywhere throughout the country including metropolitan to rustic areas. Cloud computing is obviously one of today's most bewitching areas due, at least in part, to its cost...

    Provided By The World

  • White Papers // Feb 2014

    An Improved Privacy Preserving With RSA and C5.0 Decision Tree Learning for Unrealized Datasets

    PPDM methods have been observed in various areas to preserve privacy for each data. Earlier work of privacy preserving data categorized into two ways perturbation based splitting and classification of the those data. It conform effectiveness of exercise data sets for decision tree learning. This paper covers the purpose of...

    Provided By The World

  • White Papers // Feb 2014

    Techniques Used in Decision Support System for CRM-A Review

    A Decision Support System (DSS) is a computerized application or an information system that supports business decision more easily. Customer Relationship Management (CRM) is a strategy which a company uses to handle customer interactions. CRM mainly focuses on attracting, retaining, developing and identifying customers. For Successful CRM approach there the...

    Provided By The World

  • White Papers // Feb 2014

    Survey on Mining Clusters Using New K-Mean Algorithm From Structured and Unstructured Data

    Big data is the popular term used in the current era for extracting knowledge from large datasets. Big data is the collection of large and complex dataset. The challenge in big data is Volume, Variety and Velocity (3V's).variety can be classified into structured, unstructured data and semi structured. Structured data...

    Provided By The World

  • White Papers // Mar 2014

    Cloud Computing: The Technology for Next Generation

    Cloud computing is increasingly becoming popular model for the next generation internet in which computational resources are made available online to the user on demand. Cloud computing is based on the concept of sharing computer resources online without worrying about owning the infrastructure, software or the service. The users can...

    Provided By The World

  • White Papers // Mar 2014

    Semantic Similarity Based Data Alignment and Best Feature Extraction using PSO for Annotating Search Results from Web Databases

    Due to the development of search engines databases through web reachable all the way through HTML based search boundary in now day's analysis of data in deep manner from database or web search engines also important to return exact information in search result web pages. In generally the data units...

    Provided By The World

  • White Papers // Feb 2014

    An Efficient Web Learning Web Text Feature Extraction With Exponential Particle Swarm Optimization

    Due to the growth of World Wide Web (WWW) the tradition of web patterns also enhanced now-a-days, extraction of information from web also important. For this reason web mining plays important role to discovery of individual user information and extract information from individual web log files with known text feature....

    Provided By The World

  • White Papers // Mar 2014

    Analysis of Clustering Uncertain Data Based on Review Features

    Clustering uncertain data is an important task. Now-a-days for collecting information particularly reviews for a product is becoming important through web. As the number of customer reviews is increasing day by day, it is important to develop an efficient and effective technique to extract product features mentioned in customer reviews....

    Provided By The World

  • White Papers // Feb 2014

    An Approach for Ensuring Security in Cloud Environment

    Cloud computing is a pool of ample of resources for the users accessed through internet. It has emerged as a computing standard where the computing infrastructure is served as internet services and has made a great change in the way of computation and services for its customers. Such a cloud...

    Provided By The World

  • White Papers // Feb 2014

    Large Web Search Engine for Cluster filtering Processing

    Data cleaning and integration is typically the most expensive step in the KDD process. A key part, known as record linkage or de-duplication, is identifying which records in a database refer to the same entities. This problem is traditionally solved separately for each candidate record pair. The authors propose to...

    Provided By The World

  • White Papers // Feb 2014

    An Exposure Towards Fault Tolerant Memory System

    There has been a rising demand for well-organized and reliable digital storage as well as transmission systems in the recent years. Only memory cells were vulnerable to faults of transient in addition to the supporting circuitry around the memory however due to the enhance in the rate of soft error...

    Provided By The World

  • White Papers // Feb 2014

    Enhancing Cloud Resources for Implementing IPTV Services using Virtualization

    Implementation of IPTV service delivery through virtualization is of practical interest in many applications such as detecting an IPTV service delivery failure. The intrusion detection is defined as a mechanism for an IPTV service delivery through virtualization to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this...

    Provided By The World

  • White Papers // Feb 2014

    Using Checkpoint For Implementing Fault- Tolerant On Desktop Grids

    Grid computing uses massive power of idle cycles of PC's. Desktop grids is nothing using the idle cycles of desktop PC's for computing large scale applications. There are many fields which requires large scale massive power such as scientific fields to handle complex and demanding problems. Desktop grids uses widely...

    Provided By The World

  • White Papers // Apr 2014

    The Searching of Relevant Query

    Many internet users are increasingly search complex task-oriented goals on the internet, for example making travel arrangements and administrate finances or planning purchases. They are usually breaking down the tasks into some codependent steps and issue multiple queries around these steps repeatedly after long time. To give a good support...

    Provided By The World

  • White Papers // Apr 2014

    Data Accountability in Cloud Using CIA Framework

    The major feature of cloud service is that the user's data is processed on remote machines. In this scenario data owner does not know, on which machine his data will get processed. Due to this users fears of losing control of their own data and there are chances that the...

    Provided By The World

  • White Papers // Feb 2014

    Robust and an Energy Efficient AOMDV Protocol for Improved Quality of Service (QoS) in MANET

    The authors focus on drawbacks of Ad hoc On-demand Multipath Distance Vector (AOMDV) protocol. This protocol has two major drawbacks: the relief routes are not maintained. Source node does not know if a given relief route is still valid when it is needed. The use of an obsolete path leads...

    Provided By The World

  • White Papers // Feb 2014

    Mobile Ad-Hoc Networks in the Battlefield with 4G Support

    Information is power, nowhere be this truer than on the battlefield, where the ability to talk clearly and rapidly pass on information spells the difference between survival and death? This technology adopts Wireless technology on the platform of permanent networks, advanced antennae technologies and more advanced wireless security technologies. Next...

    Provided By The World

  • White Papers // Feb 2014

    Content Filtering on Social Networking Sites

    A social networking service is a platform to build social networks or social relations among people. A social network service consists of a representation of each user (often a profile), the user's social links, and a variety of additional services. Most social network services are web-based and provide means for...

    Provided By The World

  • White Papers // Feb 2014

    Multi Stage Software Project Effort Estimation

    Software industries have done a lot of advancement in the development of software but the effort required to build a software project is still much difficult to estimate in advance. For the success of the project accurate effort estimation is always essential. In practice; many industries still using ad hoc...

    Provided By The World

  • White Papers // Nov 2013

    Optimized Path Selection Based on Multi Criteria in MANET

    A Mobile Ad hoc NETwork (MANET) is a dynamic wireless network with or without fixed infrastructure. Nodes may move freely and arrange themselves randomly. The contacts between nodes in the network do not occur very frequently. As a result, the network graph is rarely, if ever, connected and message delivery...

    Provided By The World