Now showing items 21-40 of 1562

    • Privacy Preserving Data Mining Operations without Disrupting Data Quality

      B.Swapna; R.VijayaPrakash; Department of CSE, SR Engineering College Warangal, Andhra Pradesh, India; Associate Professor in Department of CSE SR Engineering College Warangal, Andhra Pradesh, India (International Journal of Computer Science and Network (IJCSN), 2012-12-01)
      Data mining operations help discover business intelligence from historical data. The extracted business intelligence or actionable knowledge helps in taking well informed decisions that leads to profit to the organization that makes use of it. While performing mining privacy of data has to be given utmost importance. To achieve this PPDM (Privacy Preserving Data Mining) came into existence by sanitizing database that prevents discovery of association rules. However, this leads to modification of data and thus disrupting the quality of data. This paper proposes a new technique and algorithms that can perform privacy preserving data mining operations while ensuring that the data quality is not lost. The empirical results revealed that the proposed technique is useful and can be used in real world applications.
    • Taking Well to Thirsty: Library Toolbar-Changing of the Users Environment into New Environment

      Ram, Shri; Rao, N Laxman; Kataria, Sanjay; Jaypee University of Information Technology, Solan, India; Jaypee Institute of Information Technology, Noida, India; Osmania University, Hyderabad (2008)
      A Well known phrase in Hindi which elucidate that the ‘Thirsty needs to go to well, well will not come to thirsty’. Toolbar has now changed the scenario in respect that it taking well to the thirsty. This paradigm shift is due to advancement in information and computer technology. The thirsts for the information are increasing day-by-day. Information wells are deepens rapidly, library resources are increasing in collection as well as characters and flowing along with the technology. Library and Information Centers adopting various methodology for collection building, from print media to digital collection, from individual subscription to consortia based collaboration in order to saving budget, library automation for resource management, Web 2.0 technology for information literacy and user education and other tools and technology such as audio visual methods, forum, emails, list-serves, and many more lists are added up during the time for ‘save the time of reader’, what S R Rangnathan’s philosophy reveal. Library services are fading out of sight for most user groups and how these users and their expectations have changed, without us realizing. It contains a strong plea for a focus shift for librarians, a focus into the environments where the users are, instead of expecting them to come to us, or our resources. Exploration of all relevant user environments for your organization, the use of new web-based technologies with Web 2.0 elements and certainly a more structural technical re-design of library information systems is required to deliver library services and resources at the place of need. A simple shortterm solution like a Quick-Search Library Toolbar is explained here as a tool for taking library to user. This paper will discuss the Technology, Methodology and Usability and1 multitasking nature of Library Toolbars for enhanced search methodology. This will also discuss how toolbar can be helpful in getting latest information about the happenings around the globe, latest availability of resources in the library, email check with single click and how the library toolbar has been adopted at authors institution for better user education and information communication. The paper concludes with the remarks for research on more tools like library toolbar for enhancing library activity for user unreached.
    • Use of e-resources in the Guru Nanak Dev Engineering College, Ludhiana : A Study.

      Singh, Manpreet (Arihant Prakashan p. Ltd., New Delhi, 2012-08-12)
      Library is a repository of resources. Adequate electronics resources facilities empower and enrich the higher education system in meeting the best academic needs. Users are use e-resources in the library or any where. The silicon age that led the computer revolution has significant changed in the libraries. The present paper examine the existing of various e-resources in GNE College, Ludhiana and its uses by students.
    • Scientific information retrieval behavior: A case study in students of Philosophy

      Tramullas, Jesús; Sánchez-Casabón, Ana I.; University of Zaragoza (Madrid: Univ. Autónoma de Madrid, 2010)
      The behavior and patterns of recovery and processing of digital information by users is a recurring theme in the literature. The study of these behaviors are carried out through observation techniques and analysis of processes, actions and decisions undertaken by users in different situations. This paper presents the data resulting from the study of patterns of recovery and management of reference information of three consecutive courses of a specialized subject. The findings obtained showed a clear difference between patterns of information retrieval and obtained prior to the end of the training process, but there has been a significant change in the ultimate goal of users or appreciable changes in their prospects for application in other environments.
    • International UDC Seminar 2011 “Classification and Ontology”: a report

      Slavic, Aida; UDC Consortium (UDC Consortium, 2011-12)
      Report on the 2011 International UDC Seminar, "Classification and Ontology: Formal Approaches and Access to Knowledge", which took place on 19-20 September 2011 in the National Library of the Netherlands (The Hague).
    • Facets in UDC: a review of current situation

      Gnoli, Claudio; UDC Consortium (UDC Consortium, 2011-12)
      The author explains some general principles in structuring classifications, in particular the facet as a basic building element of the scheme. The paper provides an overview of structural and presentational elements of facets and how these can be expressed through notational system. The author also analyses the way some broad fundamental facets of concepts are presented in UDC tables, when these are represented by special auxiliaries, and proposes a way of normalising facet presentation so that it becomes consistent and easy to recognize in UDC.
    • UDC Editorial Workshop, The Hague, 21 September 2011: a report

      Davies, Sylvie; UDC Consortium (UDC Consortium, 2011-12)
      UDC Editorial Workshop is a meeting of the UDC Editors and UDC Advisory Board and invited guests. The 2011 workshop took place on 21 September 2011, in the Koninklijke Bibliotheek in The Hague and was attended by twenty participants. The focus of the workshop was on the structural issues of the UDC scheme, in particular with respect to the ongoing faceting of the scheme and the way in which this influences the UDC content revision process.
    • UDC Biology Revision Project: Second Stage: Class 58 Botany

      Civallero, Edgardo; UDC Consortium (UDC Consortium, 2011-12)
      This text is a brief update on the progress of the revision of biological systematics in UDC that has not had an overall revision for many decades. The first stage of the project, in 2010, included the revision of the taxonomy of vertebrates, and this was completed and published in Extensions and Corrections to the UDC - E&C, 32 (2010). The next stage, completed in 2011, was class 582 Systematic botany, published as the revised table in this issue - E&C, 33 (2011). In this paper, the author of the revised tables provides a brief overview of content organization and presentation in the new schedules and specific information about the revision of Botany.
    • Duplication of concepts in UDC

      Buxton, Andrew; UDC Consortium (UDC Consortium, 2011-07)
      The paper describes a problem particular to universal knowledge classifications with a disciplinary structure. These types of classification present concepts subsumed to the disciplines in which they are studied and thus have to resolve the problem of concepts being repeated in different fields of knowledge. The author looks into how the impact the repetition of concepts in the UDC disciplinary structure may have on information retrieval. He considers advantages and disadvantages of different approaches in presenting re-used concepts in the scheme.
    • RELIABILITY ORIENTED TRANSPORT PROTOCOL IN WSN

      Bejoy, B.J.; Paramasivan, B.; Department of CSE, P.S.R Engineering College, Sivakasi, Virudhunagar dist, Tamilnadu, India; Department of CSE, National Engineering College, Kovilpatti, Thoothukudi dist, Tamilnadu, India (IJCSN Journal, 2012-06-01)
      Wireless sensor network is a special form of wireless networks dedicated to surveillance and monitoring applications Reliability in wireless sensor network is application specific. The specific form of reliability might change from application to application. Our idea is to generate reliability based transport protocol that is customizable to meet the needs of emerging reliable data applications in sensor networks and is also adaptive when the nodes are mobile. In our approach, clusters are formed for minimizing energy dissipation. The nodes maintain a neighbor list to forward data and any changes in the local topology can trigger updates to a node’s neighbor list. If a node notices that its neighbor list has changed, it can spontaneously re-advertise all of its data thus providing reliable transport in mobility conditions also. Our approach has five phases-setup, relaying, relay initiated error recovery, selective status reporting and node supervising. Our simulation results prove that the proposed approach can outperform existing related techniques and is highly responsive to the various error and mobility conditions experienced in sensor networks.
    • Real Time Health Monitoring Using GPRS Technology

      Verulkar, Shubhangi M.; Limkar, Maruti; EXTC Department, K.C. College of Engg., Nerul, Mumbai University.; Electronics Department, Terna College of Engg., Nerul, Mumbai University (IJCSN Journal, 2012-06-01)
      Advances in sensor technology, personal mobile devices, and wireless broadband communications are enabling the development of an integrated personal mobile health monitoring system that can provide patients with a useful tool to assess their own health and manage their personal health information anytime and anywhere. Personal mobile devices, such as PDAs and mobile phones, are becoming more powerful integrated information management tools and play a major role in many people's lives. Here I focus on designing a Mobile health-monitoring system for people who stay alone at home or suffering from Heart Disease. This system presents a complete unified and mobile platform based connectivity solution for unobtrusive health monitoring. Developing a hardware which will sense heart rate and temperature of a patient, using Bluetooth modem all information lively transmitted to smart phone, from smart phone all information transmitted to server using GPRS. At server the received data compared with the standard threshold minimum and maximum value. The normal range of heart rate is 60 to 135 and the temperature of the patient is said to be normal above 95^F and below 104^F. If at all the rate increases above 145 or decreases below 55,it may be fatal and if it crossed this threshold limit then SMS will be sent to the relative of patient and Doctors along with measured values. The build-in GPS further provides the position information of the monitored person. The remote server not only collects physiological measurements but also tracks the position of the monitored person in real time. For transmitting data from Smartphone to the server using GPRS, here we need to create a website on data will be continuously transmitted from Smartphone to the website and from website data will be downloaded continuously on the server. Thus the system helps in tracking down the patient without getting the patient into any sort of communication. Undue mishaps can be avoided within the golden hours after a patient is struck with a heart attack.
    • Open Courseware initiatives for e-learners in India

      Majumder, Apurba Jyoti; Sarma, Gautam Kumar (Vikas Publishing House (Delhi, India), 2010)
      Open Courseware is nothing but the repository of the study and learning materials in digital form in the web which is open for every user i.e. Open Access. These repositories envisage to store, index, preserve, distribute and share the digital learning resources with any time access offering interoperability. On the other hand, e-learning covers a myriad set of applications, and processes such as computer based learning, web-based learning, virtual classrooms, etc. What is most significant about the method is that it ensures faster learning at comparatively reduced cost and gives access to more learning resources. In India, a number of institutions are digitizing their course materials and a good number of open courseware have been established e.g. eGyankosh-a National Digital Repository, CEC Learning Object Repository, Indo- German eGurukul on Digital Libraries, NPTEL, NCERT Online Textbooks, UNESCOSALIS e-Learning Portal, etc. This paper presents a scenario of the Open Courseware initiatives in India that can be helpful and necessary to the e-learners.
    • A Novel Authenticity of an Image Using Visual Cryptography

      Koshta, Prashant Kumar; Thakur, Shailendra Singh; Dept of Computer Science and Engineering, M. Tech. Fourth Semester, RGPV Bhopal- 462 036,Madhya Pradesh, India; Dept of Computer Science and Engineering, GGCT Jabalpur - 482001, Madhya Pradesh, India (IJCSN, 2012-04-01)
      A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.
    • High-speed Multiplier Design Using Multi-Operand Multipliers

      Nezhad, Mohammad Reza Reshadi; Navi, Kaivan; Department of Electrical and Computer engineering, Shahid Beheshti University, G.C., Tehran, Tehran 1983963113, Iran; Faculty of Department of Computer engineering, University of Isfahan, Isfahan, Isfahan 8174673440, Iran (IJCSN, 2012-04-01)
      Multiplication is one of the major bottlenecks in most digital computing and signal processing systems, which depends on the word size to be executed. This paper presents three deferent designs for three-operand 4-bit multiplier for positive integer multiplication, and compares them in regard to timing, dynamic power, and area with classical method of multiplication performed on today architects. The three-operand 4-bit multipliers structure introduced, serves as a building block for three-operand multipliers in general
    • A Novel Method for Water irrigation System for paddy fields using ANN

      Prisilla, L.; Rooban, P. Simon Vasantha; Arockiam, L.; M.Phil scholar in Department of Computer Science, St.Joseph’s College, Tiruchirapalli-2, Tamilnadu.; Associate Professor in Department of Computer Science, St. Joseph’s College, Tiruchirapalli-2, Tamilnadu. (IJCSN, 2012-04-01)
      Water is an essential resource in the earth. It is also essential for irrigation, so irrigation technique is essential for agriculture. To irrigate large area of lands is a tedious process. In our country farmers are not following proper irrigation techniques. Currently, most of the irrigation scheduling systems and their corresponding automated tools are in fixed rate. Variable rate irrigation is very essential not only for the improvement of irrigation system but also to save water resource for future purpose. Most of the irrigation controllers are ON/OFF Model. These controllers cannot give optimal results for varying time delays and system parameters. Artificial Neural Network (ANN) based intelligent control system is used for effective irrigation scheduling in paddy fields. The input parameters like air, temperature, soil moisture, radiations and humidity are modeled. Using appropriate method, ecological conditions, Evapotranspiration, various growing stages of crops are considered and based on that the amount of water required for irrigation is estimated. Using this existing ANN based intelligent control system, the water saving procedure in paddy field can be achieved. This model will lead to avoid flood in paddy field during the rainy seasons and save that water for future purposes.
    • Analytical Scenario of Software Testing Using Simplistic Cost Model

      Bathla, Rajender; Kapil, Anil; Ph.D. Research Scholar Dept of Computer Science, India; Prof in Dept of Computer Sc & Eng, Hctm, Kaithal, 136027 India (IJCSN, 2012-02-15)
      Software can be tested either manually or automatically. The two approaches are complementary: automated testing can perform a huge number of tests in short time or period, whereas manual testing uses the knowledge of the testing engineer to target testing to the parts of the system that are assumed to be more error-prone. Despite this contemporary, tools for manual and automatic testing are usually different, leading to decreased productivity and reliability of the testing process. Auto Test is a testing tool that provides a “best of both worlds” strategy: it integrates developers’ test cases into an automated process of systematic contractdriven testing. This allows it to combine the benefits of both approaches while keeping a simple interface, and to treat the two types of tests in a unified fashion: evaluation of results is the same, coverage measures are added up, and both types of tests can be saved in the same format. The objective of this paper is to discuss the Importance of Automation tool with associate to software testing techniques in software engineering. In this paper we provide introduction of software testing and describe the CASE tools. The solution of this problem leads to the new approach of software development known as software testing in the IT world. Software Test Automation is the process of automating the steps of manual test cases using an automation tool or utility to shorten the testing life cycle with respect to time.
    • Hardening the Browser: Protecting Patron Privacy on the Internet

      Phetteplace, Eric; Kern, Mary Kathleen; Chesapeake College; University of Illinois at Urbana-Champaign (American Library Association, 2012)
    • Modified Cocomo Model For Maintenance cost Estimation of Real Time System Software

      Chakraverti, Sugandha; Kumar, Sheo; Agarwal, S. C.; Chakraverti, Ashish Kumar; Department of CSE, MBU Solan, HP-173229, India; Department of Mathematics, KCCEC Greater Noida UP-201308, India; Department of CSE, BBDIT Ghaziabad, UP-201002, India (IJCSN, 2012-02-15)
      Accurate cost estimation of software projects is one of the most desired capabilities in software development Process. Accurate cost estimates not only help the customer make successful investments but also assist the software project manager in coming up with appropriate plans for the project and making reasonable decisions during the project execution. Although there have been reports that software maintenance accounts for the majority of the software total cost, the software estimation research has focused considerably on new development and much less on maintenance. Now if we talk about real time software system(RTSS) development cost estimation and maintenance cost estimation is not much differ from simple software but some critical factor are considered for RTSS development and maintenance like response time of software for input and processing time to give correct output. As like simple software maintenance cost estimation existing models (i.e. Modified COCOMO-II) can be used but after inclusion of some critical parameters related to RTSS. A Hypothetical Expert input and an industry data set of eighty completed software maintenance projects were used to build the model for RTSS maintenance cost. The full model, which was derived through the Bayesian analysis, yields effort estimates within 30% of the actual 51% of the time,outperforming the original COCOMO II model when it was used to estimate theseprojects by 34%. Further performance improvement was obtained when calibrating the full model to each individual program, generating effort estimates within 30% of the actual 80% of the time.
    • Canonization, Archivalization, and the "Archival Imaginary"

      Matienzo, Mark A. (2008-07)
      In this paper, I argue that there are archival counterparts to the constructs of literary canon formation. Using Eric Ketelaar’s concept of ‘archivalization,’ which is the sociocultural process that determines whether something will be archived, I subsequently define the concept of ‘archivicity’ as the abstract set of properties of a record that determines if a record is ‘archival’ or ‘non-archival.’ We will also investigate the institutional embodiment of a holistic ‘archival paradigm,’ wherein archives and archivists recognize their role as preserving and potentially interpreting records as a form of cultural capital. However, as we will see, this paradigm also has a central role in the perpetuation of ideology. Finally, we will investigate ways in which to ‘open the archives’ by transforming and rethinking archival practice given our analysis.
    • A Statistical Analysis of Bubble Sort in terms of Serial and Parallel Computation

      Panigrahi, Sunil Kumar; Chakraborty, Soubhik; Mishra, Jibitesh; Dept of Computer Science and Engineering, APEX Institute of Technology & Management, Pahal, Bhubaneswar-752101, Orissa, India (IJCSN Journal, 2012-02-15)
      In some recent papers, the weight based statistical bounds have arguably explained time complexity better than the count based mathematical bounds. This is definitely true for average case where for an arbitrary code it is difficult to identify the pivotal operation or pivotal region in the code for taking the expectation and/or when the probability distribution, over which expectation is taken, becomes unrealistic over the problem domain. In worst case, it can certify whether a mathematical bound is conservative or not. Here we revisit the results on Bubble sort in sequential mode and make an independent study of the same algorithm in parallel mode using statistical bound