Sciweavers

IAJIT
2016
63views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Integrated replication checkpoint fault tolerance approach of mobile agents IRCFT
: Mobile agents offer flexibility which is evident in distributed computing environments. However, agent systems are subject to failures that result from bad communication, breakdo...
Suzanne Sweiti, Amal Dweik
IAJIT
2016
49views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Texts semantic similarity detection based graph approach
: Similarity of text documents is important to analyze and extract useful information from text documents and generation of the appropriate data. Several cases of lexical matching ...
Majid Mohebbi, Alireza Talebpour
IAJIT
2016
79views Biometrics» more  IAJIT 2016»
10 years 1 months ago
VParC: a compression scheme for numeric data in column-oriented databases
: Compression is one of the most important techniques in data management, which is usually used to improve the query efficiency in database. However, there are some restrictions on...
Ke Yan, Hong Zhu, Kevin Lü
IAJIT
2016
46views Biometrics» more  IAJIT 2016»
10 years 1 months ago
An intelligent CRF based feature selection for effective intrusion detection
: As the internet applications are growing rapidly, the intrusions to the networking system are also becoming high. In such a scenario, it is necessary to provide security to the n...
Sannasi Ganapathy, Pandi Vijayakumar, Yogesh Palan...
IAJIT
2016
48views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Binary data comparison using similarity indices and principal components analysis
: This work is a study of binary data, especially binary images sources of information widely used. In general, comparing two binary images that represent the same content is not a...
Nouhoun Kane, Khalid Aznag, Ahmed El Oirrak, Moham...
IAJIT
2016
46views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Mahalanobis distance-the ultimate measure for sentiment analysis
: In this paper, Mahalanobis Distance (MD) has been proposed as a measure to classify the sentiment expressed in a review document as either positive or negative. A new method for ...
Valarmathi Balasubramanian, Srinivasa Gupta Nagara...
IAJIT
2016
40views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Secure verification technique for defending IP spoofing attacks
: The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attack...
Alwar Rengarajan, Rajendran Sugumar, Chinnappan Ja...
IAJIT
2016
61views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Data mining perspective: prognosis of life style on hypertension and diabetes
: In the present era, the data mining techniques are widely and deeply useful as decision support systems in the fields of health care systems. The proposed research is an interdis...
Abdullah A. Aljumah, Mohammad Khubeb Siddiqui
IAJIT
2016
49views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Performance comparison of neuro-fuzzy cloud intrusion detection systems
: Cloud computing is a subscription-based service where we can obtain networked storage space and computer resources. Since access to cloud is through internet, data stored in clou...
Sivakami Raja, Saravanan Ramaiah
IAJIT
2016
53views Biometrics» more  IAJIT 2016»
10 years 1 months ago
A group based fault tolerant scheduling mechanism to improve the application turnaround time on desktop grids
: Desktop grid is an exciting discipline for high throughput applications but due to inherent resource volatility, desktop grids are not feasible for short lived applications that ...
Mohammed Khan, Syed Irfan Hyder, Ghayas Uddin Ahme...