Volume 4 Issue 10- October 2014
Page | Title | Full Text |
---|---|---|
250-252 | Secure Mining of the Outsourced Transaction
Databases Trupti A. Kumbhare, Santosh V. Chobe Abstract
Data mining is an analytical tool which allows users to analyze data, categories it and summaries the relationships among the data. It discovers the useful information from large amount of relational databases. Security is an important issue while performing mining task at the end of third party service provider. When data owner outsources its mining needs to third party service provider, there should be security. Third party service provider has access to the data and can learn sensitive information from it. The result is security may break. As data is an important private property of the owner, it should be secure. This paper presents the algorithms used for mining purpose as well as for securing the data while transacting between Data owner and Third party service provider. It gives secure, efficient and faster results. Keywords— Data Security, Data mining, Association rule mining, FP-Growth algorithm, AES algorithm. |
Full Text PDF |
253-255 | Survey on Unsupervised Mining Weakly Labeled
Web Facial Images for Search-Based Face
Annotation J.Chithara Abstract
Auto face annotation is playing an important role in many real-world knowledge management systems and multimedia information. Auto face annotation is important and beneficial to many real world application. Face annotation related face detection and recognition recently research interests in mining weakly-labeled images on the interest to resolve research challenge in computer vision and image processing. This paper provides various techniques or methods that are used to annotating facial images. Keywords-face annotation, web facial images, search base face annotation, weak label search based facial annotation. |
Full Text PDF |
256-259 | Survey on Energy Harvesting Techniques P.C. Krishna Devi Abstract
Environmental energy can be used as an alternative to electrochemical battery. Researches are carried out to harvest energy from solar, wind, tidal, thermal and other mechanical sources which have finite lifespan. Here, random sound is proposed as a new source of renewable energy. The transducer used to convert sound energy into electric energy is a piezoelectric crystal. Keywords – Environmental energy, energy harvesting, sound energy, piezoelectric material. |
Full Text PDF |
260-262 | A Study on Primary User Emulation Attack in
Cognitive Radio Networks C.Kiruthika,A.C.Sumathi Abstract
CR is an emerging technology in wireless communications. Based on their operating environment CRNs can dynamically reconfigure their characteristcics. So that many security issues has been an alarming fact to CRNs. One such attack is the Primary User Emulation Attack (PUEA). There are many techniques available to mitigate this attack. This paper presents a study about various defense techniques of PUEA and provide better solutions to defend against PUEA. Keywords – Cognitive Raio Networks(CRN), Primary User Emulation Attack (PUEA), PUEA defense. |
Full Text PDF |
263-265 | Review on: Nearest Neighbor Search with Keywords V.S.Madhumathi,T.Sounder rajan Abstract
In data mining, we have many nearest neighbor search algorithm .the nearest neighbor (NN) algorithm is very easy, highly well-organized and successful in the field of pattern recognition, text categorization, object recognition, location etc. Nearest Neighbor (NN) overcome the memory requirement and calculation difficulty. This paper discusses nearest neighbor (NN) methods for the analysis of spatial point patterns and the analysis of field experiments. The distance from a point to its NN, or correlated quantities, can be used to test whether the observed locations are a realization of a specific spatial point process. This paper provides the comparison of nearest neighbor search. Keywords - Nearest neighbor(NN), K nearest neighbor(KNN), Condensed nearest neighbor(CNN), Rank nearest neighbor(RNN) |
Full Text PDF |
266-271 | Expert System for Heart Problems M. Eswara Rao,Dr. S. Govinda Rao Abstract
Paper respected to written about Fuzzy Expert System for heart problems. The system has 11 input fields and one output field. This is rule based and having required data with respect to kind of chest problem, blood pressure, cholesterol, resting blood sugar, maximum heart rate, resting electrocardiography, exercise, previous peak, thallium scan, sex and age. The result will show the status (is there) of heart problem of the man. It has the index of values by starting from 0 to 4 (1, 2, 3, and 4). Outputted data (results) compared with the data which was loaded system and that ensured reliability is between in 90-93%. Key words:Fuzzy Expert System, Rule based, blood sugar |
Full Text PDF |
272-276 | Survey on CPAL: A Conditional Privacy
Preservation Authentication with Access
Linkability for Roaming Service S.Sangeetha,D.Jebakumar immnauel Abstract
Roaming service helps to enable the wireless device kept connected to a network without breaking connections.With this new emerging technology the requirement of ubiquitous accessing can be successfully achieved,for example IOT(Internet of Things).Main goal of CPAL is to provide access linkability for universal secure roaming and multilevel privacy preservation.Anonymous access linkability not only hide user identity but also authenticate link all the access information of the same user. Keywords-roaming, IOT, privacy preservation, anonymous access linkability, authentication, ubiquitous access. |
Full Text PDF |
277-281 | Android L – The Latest Android Version 5.0 Deepak Kumar, Deepika and Kritika Chadha Abstract
Lollipop is the 13th major version of Android. Android 5.0 i.e. Lollipop release on 15th October 2014. It’s the latest version of Android. It has gone through lot of enhancements and many API’s is included in it. One of the most prominent changes in the Android Lollipop is the redesigned user interface built around a responsive design language referred as "material design". Other changes include improvements to the notification system which allow notifications to be accessed from the lockscreen, and displayed within other apps as banners across the top of the screen. Internal changes were also made to the platform, with the Android Runtime (ART) officially replacing Dalvik for improved application performance, and changes intended to improve and optimize battery usage. Android Lollipop is a drastically changes operating system to its predecessors. Keywords—Android 5.0, Lollipop, Android L, Google, Latest Android, Version 5.0 |
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net