Volume 2 Issue 6- June 2012

 

S.No Title Page
1. Query Join Processing over Uncertain Data for Decision Tree Classifiers
V. Yaswanth Kumar, G. Kalyani
Abstract

Traditional decision tree classifiers work with the data whose values are known and precise. We can also extend those classifiers to handle data with uncertain information. Value uncertainty arises in many applications during the data collection process. Example sources of uncertainty measurement/quantization errors, data staleness, and multiple repeated measurements. Rather than abstracting uncertain data by statistical derivatives, such as mean and median, the accuracy of a decision tree classifier can be improved much if the complete information of a data item is used by utilizing the Probability Density Function (PDF). In particular, an attribute value can be modelled as a range of possible values, associated with a PDF. The PDF function has only addressed simple queries such as range and nearest-neighbour queries. Queries that join multiple relations have not been addressed with PDF. Despite the significance of joins in databases, we address join queries over uncertain data. We propose semantics for the join operation, define probabilistic operators over uncertain data, and propose join algorithms that provide efficient execution of probabilistic joins especially threshold. In which we avoid the semantic complexities that deals with uncertain data. For this class of joins we develop three sets of optimization techniques: item-level, page-level, and index-level pruning. We will compare the performance of these techniques experimentally.

1249-1251
Full Text PDF
2. A New Genetic Approach to Cryptography and Steganography
G. Raja Sekhar Reddy, C. V K Reddy, Mohammed Younus
Abstract

With the development of network techniques the problem of network security becomes more and more important. The  use of Word Wide Web has grown extremely in the past few years. Furthermore, many end users can easily use tools to synthesize and edit multimedia information. Thus, security has become one of the most significant problems for  distributing new information technology. It is necessary to protect this information while communicated over insecure channels. Thus, a need exists for developing technology that will help protect the integrity of digital content and secure the intellectual property rights of owners. Cryptography and Steganography are the two major techniques for secret communication. The contents of secret message are scrambled in cryptography, where as in steganography the secret message is embedded into the cover medium. In this proposed system we developed high security model by combining cryptographic and Steganographic security. In cryptography we are using advanced encryption standard (AES) algorithm to encrypt secret message and then pixel value differencing (PVD) with K-bit least-significant-bit (LSB) substitution is used to hide encrypted message into truecolor RGB image. Our proposed model gives two tier security to secret data. Further our proposed method gives high embedding capacity and high quality stego images.

Keywords— Cryptography, Advance encryption standard (AES), Steganography, Pixel-value differencing (PVD), Least-significant-bit (LSB) substitution.

1252-1256
Full Text PDF
3. Oracle Support For User-Defined Objects Across Distributed Object-Relational Database
Clarence J M Tauro, Dr.N Ganesan, Jayakumar J, SaurabhRelan
Abstract

Thispaper gives an overview of accessing the user-defined objects across the Oracle ORDB in a distributed environment, which allows application to access the data & objects from a network of two or more homogenous ORDB that natively supports object-model.
Keywords- ORDB; Distributed database;   Object-Model; User-defined Objects;

1257-1260
Ful Text PDF
4. An e-Business Cloud Integration by an Effective Software Engineering Process Model and Cloud Computing Security Issues
Veera RaghavaRao Atukuri, Dr. R.Siva Rama Prasad
Abstract

Main objective of this paper is to discuss how to utilize the Cloud Computing (CC) Technology and its applications for mapping (or) integration of small and large e-Business applications in to a single cloud. By doing this mapping of all categories of applications the e-Business activities will comes under a single roof, that which occupies a single space in a cloud i.e., the cloud will acts as a service in terms of a software or application (SaaS).This service  will help for speed delivery and which drive down the management costs. By doing this mapping,  all e-Business applications in to a cloud and  it needs security from unauthorized users and that security has provided by cloud security models i.e., Security as a Service. Doing this it becomes more flexible and scalable to the users and which it will reduces the cost as well as less impact on systems.
This Paper provides the work related to the mapping and providing security to e-Business Cloud (e-Busi-Cloud).

Keywords – Cloud Computing, Saas, e-Business, Security as a Service, e-Busi-Cloud.

1261-1265
Full Text PDF
5. Application Layer Security Issues and Its Solutions
Raghavendra K, Sumith Nireshwalya
Abstract

Every layer of communication has its own unique security challenges. The application layer communication is a very weak link in terms of security because that the application layer Application Layer security is a growing area of concern for developers, designers, quality assurance specialist and programmers. In this paper we discuss about various security aspects at application layer and its solution.

 

1266-1269
Full Text PDF
6. Critical Risk Factors for Information System (IS) Projects
(IS) Projects between Sink and Swim

Safa’a I. Hajeer
Abstract

Risk management is very important for Information System (IS) projects. When IS professionals making the project plans, they usually assume that everything will go exactly as planned. However, surprises often arise here and there. These surprises are the factors which effect IS projects and take them between success and failure. Some questions:  what factors are associated with transition from escalation to de-escalation of IS projects in Jordan? How to avoid surprises and keep IS on track (under control) as much as possible? Which factors must select more in order to improve quality and reduce cost?
Well; some people think that surprises are unavoidable because of the creative nature of IS. Others are seeking resolutions to reduce surprises. This research is concerned with the second type of people, it analyses several factors that contribute to effects in IS projects and arranged them according to high consideration, this consideration can be: identify, control and avoid as possible to enter the risk area. In addition, the risk assessment steps must be kept on face by IS professional, this will contribute to avoid as much as possible surprises and keep IS on track, this avoidance is the most important thing to improve quality and reduce cost of Jordanian IS projects.


Keywords:Risk Management, Information System (IS), Risk Factors, Information Technology (IT), Project Management, Project Failure, Risk Assessment.

1270-1279
Full Text PDF
7. Monitoring Rail Traffic Using Wireless Sensor Network (WSN)
Ayuub zinvand lorestani 􀫚 , Seyed Ali Mousavi 􀫛, Raja Ebadaty
Abstract

Due to the fact that most rail lines located in mountainous or desert having a monitoring system to check the safety of these lines is very important. According to performance of wireless sensor networks, it is very useful in monitoring system of lines. In this paper, an algorithm (FT) is provided for . This algorithm is based on the simultaneous use of movable and fixed sensor network design that has the ability to send information as online-offline.

Keywords--- Fault tolerant, rail lines, wireless sensor networks.

 

 

.

1280-1282
Full Text PDF
8. Content Caching and Replication Schemes for Peer-to-Peer File Sharing in Wireless Mesh Networks
S. Vijaya Lakshmi , M. Sreevani
Abstract

 

.

1283-1288
Full Text PDF
9. Traditional Approaches for Image Recognition by ANF Methods
K. Shirisha
Abstract

 

 

.

1289-1291
Full Text PDF
10. Performance Evaluation of On Demand HRP in MANETS
V. Sampath Kumar , Dr. R. Rajeshwar Raoaty
Abstract

 

.

1292-1294
Full Text PDF
11. To Develop TCP Performance in MANETs by Detecting IDSS
G. Krishna Chaitanya , K. Rajitha
Abstract

 

 

.

1295-1300
Full Text PDF
12. Advanced Analysis of Internet Text Mining
Visam Praveen , Gousiya Begum
Abstract

 

 

.

1301-1304
Full Text PDF

 

 

 

 

IJCSET Menu

Downloads