The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The High-Performance Computing (HPC) users require the high-end compute, storage, and, network execution environment in a dynamic manner for testing HPC applications. The High-Performance Computing Cloud (HPCC) provides a kind of execution environment in an on-demand manner. Generally, the cloud resource management system or cloud resource broker manages the compute, storage, and network resources...
Millions of file uploads and downloads happen every minute resulting in big data creation and manual text categorization is not possible. Hence, there is a need for automatic categorization of documents that makes storage and retrieval more efficient. This research paper proposes a hybrid text categorization model that combines both Rocchio algorithm and Random Forest algorithm to perform Multi-label...
In the current engross world, traffic overflow is a common problem for the metropolises. In spite of increasing the size of transportation systems and prompting the public transportation may increase the traffic overflow. This kind of traffic overflow problem cannot be solved manually. Today the traffic data has been entered and erupted the time of huge transportation of the data. Hence it is important...
Due to fast growth of temporal databases has made temporal data mining mandatory for knowledge discovery. Temporal association rule classification, a sub-task of temporal mining, integrates association rule mining and classification. The growth and increased complexities in temporal databases have necessitated this research work to propose techniques that enhance the process of associative mining...
Cloud based data storage has become a common activity these days. The security of the data outsourced to the cloud is still challenging. The data owner should be capable of performing integrity verification as well as to perform data dynamics of his data stored in the cloud server. Various approaches like cryptographic techniques, proxy based solutions, code based analysis, homomorphic approaches...
Data mining is the practice of examining and deriving purposeful information from the data. Data mining finds its application in various fields like finance, retail, medicine, agriculture etc. Data mining in agriculture is used for analyzing the various biotic and abiotic factors. Agriculture in India plays a predominant role in economy and employment. The common problem existing among the Indian...
Online social networks (OSNs), attract millions of people and hence users are drastically increasing day by day. Thus the users of the online social network increase ultimately. OSN users existing social relationship can be generalized as 1-hop trust relationship, and further they extend their network through a multi-hop trust chain during the recommendation of authenticated users. Unfortunately,...
The aim of this paper is to design a system that has benefits equally for the client (cloud storage user) and the cloud storage provider. For the benefit of user, an improved security model for the data stored on the cloud is provided by encrypting the data even before uploading the file to the storage server. On the other side, the capacity of the cloud storage is optimally utilized by avoiding redundant...
Mobile phones are widely used in our day-to-day life. It's not only used by a common man but also used by antisocial elements and that's why it's not a surprise that today in almost every case the first step towards solving a Crime is to analyze the Call Records of the Suspects. Today in almost all the criminal cases, analysis of Mobile Phone calls of suspect's plays an important role in investigation...
The technique of collaborative filtering in recommender system suffers from data sparsity and cold start. In this paper, a cluster based approach is proposed for alleviating the problem of sparsity by transferring the knowledge from a more densely rated concomitant domain. The paper focuses on providing recommendation in a sparsely rated domain by transferring the knowledge from the highly rated domain...
Cloud computing is a growing technology that offers compute, storage and network resources as a service over the internet. It enables the individuals, clients or the enterprises to outsource their data and application software to the cloud server. The services are offered by a cloud service provider (CSP) and the users need to pay for what they use. There are many security concerns needs to be addressed...
Today, Cloud Computing provides many technological oriented applications distributed over the internet. Cloud Computing facilitate tremendous changes in the IT world, to increases the maximum profits from this new platform. In IT industry everyday new applications coming up and increases the complexity of scheduling process. For this purpose, job scheduling plays a most important responsibility in...
Recommender Systems are information filtering systems that guide the users in selecting the desired items based on the past user-item transactions. Recommender Systems have become the vital role in recent years and are utilized widely in various areas of social importance. The proposed work aims in recommending the most suitable touring facilities that include customized places recommender and formation...
Data Analytics is widely used in many industries and organization to make a better Business decision. By applying analytics to the structured and unstructured data the enterprises brings a great change in their way of planning and decision making. Sentiment analysis (or) opinion mining plays a significant role in our daily decision making process. These decisions may range from purchasing a product...
In recent times the incorporation of Wireless Sensor Network (WSN) with Internet of Things (IoT) has become more conscientious for the researchers. The collection of enormous amount of homogenous sensor nodes forms the Wireless Sensor Network. These sensor nodes have restricted battery power and memory and so the limited amount of energy is considered as the major issue. To overcome this issue several...
With banks reaching its users via mobile banking, it is becoming one of the essential feature that is demanded by almost every smartphone user. Mobile banking via a mobile browser is similar to internet banking. Browsing-based threats for smartphones are just the same as those for personal computers, elevating the need to focus on mobile security. Among the several authentication schemes, geolocation...
Wireless sensors are used to acquire the data from different environments such civilian applications, military, tracking, seismic measurements and monitoring applications in order to take necessary actions or to prevent the disasters, to do so all sensors consumes more energy. Since, the sensor is a battery operated device the lifetime of each sensor is reduced. Therefore effective cluster formation...
The major threats witnessed by mankind in recent years, demands very accurate and trustworthy personal tracking system (PTS). Using the advancement in the current technology, it becomes a promising solution to meet the above requirement. In this research, an attempt is made to integrate both GPS and GSM technologies to detect and track the position of the target (mankind). Initially, the position...
Recommender systems that work by collaborative filtering technique are prone to shilling attack. “Shilling” or “profile injection” attacks are known to occur when an individual or an organization is trying to promote an item. They aim to manipulate the working of recommender system by injecting a large number of fake profiles into it so that the output of the system becomes biased. Most of the previous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.