Sciweavers

Share
IAJIT
2016
79views Biometrics» more  IAJIT 2016»
3 years 6 months ago
VParC: a compression scheme for numeric data in column-oriented databases
: Compression is one of the most important techniques in data management, which is usually used to improve the query efficiency in database. However, there are some restrictions on...
Ke Yan, Hong Zhu, Kevin Lü
IAJIT
2016
46views Biometrics» more  IAJIT 2016»
3 years 6 months ago
An intelligent CRF based feature selection for effective intrusion detection
: As the internet applications are growing rapidly, the intrusions to the networking system are also becoming high. In such a scenario, it is necessary to provide security to the n...
Sannasi Ganapathy, Pandi Vijayakumar, Yogesh Palan...
IAJIT
2016
48views Biometrics» more  IAJIT 2016»
3 years 6 months ago
Binary data comparison using similarity indices and principal components analysis
: This work is a study of binary data, especially binary images sources of information widely used. In general, comparing two binary images that represent the same content is not a...
Nouhoun Kane, Khalid Aznag, Ahmed El Oirrak, Moham...
IAJIT
2016
46views Biometrics» more  IAJIT 2016»
3 years 6 months ago
Mahalanobis distance-the ultimate measure for sentiment analysis
: In this paper, Mahalanobis Distance (MD) has been proposed as a measure to classify the sentiment expressed in a review document as either positive or negative. A new method for ...
Valarmathi Balasubramanian, Srinivasa Gupta Nagara...
IAJIT
2016
40views Biometrics» more  IAJIT 2016»
3 years 6 months ago
Secure verification technique for defending IP spoofing attacks
: The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attack...
Alwar Rengarajan, Rajendran Sugumar, Chinnappan Ja...
IAJIT
2016
61views Biometrics» more  IAJIT 2016»
3 years 6 months ago
Data mining perspective: prognosis of life style on hypertension and diabetes
: In the present era, the data mining techniques are widely and deeply useful as decision support systems in the fields of health care systems. The proposed research is an interdis...
Abdullah A. Aljumah, Mohammad Khubeb Siddiqui
IAJIT
2016
49views Biometrics» more  IAJIT 2016»
3 years 6 months ago
Performance comparison of neuro-fuzzy cloud intrusion detection systems
: Cloud computing is a subscription-based service where we can obtain networked storage space and computer resources. Since access to cloud is through internet, data stored in clou...
Sivakami Raja, Saravanan Ramaiah
IAJIT
2016
53views Biometrics» more  IAJIT 2016»
3 years 6 months ago
A group based fault tolerant scheduling mechanism to improve the application turnaround time on desktop grids
: Desktop grid is an exciting discipline for high throughput applications but due to inherent resource volatility, desktop grids are not feasible for short lived applications that ...
Mohammed Khan, Syed Irfan Hyder, Ghayas Uddin Ahme...
IAJIT
2016
44views Biometrics» more  IAJIT 2016»
3 years 6 months ago
Enhancing the optimal robust watermarking algorithm to high payload
: Digital watermarking is a robust method that allows a person to attach hidden data into the digital audio, video, or image signals and documents. In this paper, we propose a wate...
Satish Todmal, Suhas Patil
IAJIT
2016
54views Biometrics» more  IAJIT 2016»
3 years 6 months ago
Empirical evaluation of syntactic and semantic defects introduced by refactoring support
: Software maintenance is a major source of expense in software projects. A proper evolution process is a critical ingredient in the cost-efficient development of high-quality soft...
Wafa Basit, Fakhar Lodhi, Usman Bhatti
books