Volume-7 ~ Issue-4
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Advanced Encryption Standard (AES), Avalanche Effect, Data encryption standard (DES), CRM, SME.
[1] NeetuSettia.―Cryptanalysis of modern Cryptography Algorithms‖.International Journal of Computer Science and Technology.
December 2010.
[2] Diaasalama, Abdul kader, Mohiy Hadhoud, ―Studying the Effect of Most Common Encryption Alg orithms‖, International Arab
Journal of e-technology, Vol 2, No.1, January 2011.
[3] Kumar, ―Customer Relationship Management‖, Wiley International Encyclopedia of Marketing , 2010: 24 –30.
[4] Yang Jialu, ―Customer Relationship Management of Smail-Medium Enterprises,‖ Fudan University Press, 2004:113–120 (In
Chinere).
[5] Russell S.Winer, ―A framework for Customer Relationship Management ‖ California Management Review, 2001, Vol 43(4).
[6] PC Verhoef, ―Understanding the effect of customer relationship management efforts on customer retention and customer share
development,‖ Journal of marketing, 2003 Vol 74(2).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Commodification of Indigenous Knowledge: It's Impact on Ethno- medicine |
Country | : | India |
Authors | : | Minaketan Bag and Rashmi Pramanik |
: | 10.9790/0661-0740815 | |
[1] Botanical Survey of India. 2003. Flora of India, Introductory volume, Part II, 350.
[2] Daes Erica-Irene A. 1994. "Preliminary report of the Special Rapporteur on the protection of the heritage of indigenous people",
Geneva: UN Sub-Commission on Prevention of Discrimination and Protection of Minorities.
[3] Devraj R. 2000. US Corporate Biopirates Still Staking Claim on Basmati Rice, Common Dreams New Center, Available at
http://www.commondreams.org/headlines/ 100900-01.htm.
[4] Dharmananda S. 2003. The Ayurvedic Medicine Industry in India, online paper. Available at:
http://www.itmonline.org/arts/ayurind.htm.
[5] EXIM Bank of India. 2003. Export Potential of Indian Medicinal Plants and Products, pp.11-12.
[6] Gollin M. 1999. New Rules for Natural Products,. Sept. Vol. (17)9:.921.922, Available at:
http://www.nature.com/cgitaf/DynaPage.taf?file=/nbt/journal/v17/n9/full/nbt 0999_921.html
[7] Grain and Kalpavriksh. 2002. "Traditional Knowledge of Biodiversity in Asia Pacific: Problems of Piracy and Protection", Genetic
Resources Action International, October, Available at: http://www.grain.org/publications/tk-asia-2002-en.cfm.
[8] Hansen S and VanFleet J. 2003. "Traditional Knowledge and Intellectual Property: A Handbook on Issues and Options for
Traditional Knowledge Holders in Protecting their Intellectual Property and Maintaining Biological Diversity", Association for the
Advancement of Science, American: Washington, DC Available at: http://shr.aaas.org/tek/handbook.
[9] Jain V. 2008. "Safeguarding the Traditional Knowledge in India" Paper Presented in the Seminar of Asia Pacific Jurist Association
(APJA): Delhi, on 28.04.2008.
[10] Ng'etich K A. 2005. Indigenous Knowledge Alternative Medicine and Intellectual Property Right Concern in Kenya. Paper
Presented at the Council for the Development of Social Science Research in Africa (CODESRIA) General Assembly, Maputo,
Mozambique, 6-10 December, 2005
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Data Mining, Classification, kNN, Imputation, Data Normalization and Scaling
[1] Roshawnna Scales, Mark Embrechts, "Computational intelligence techniques for medical diagnostics".
[2] World Health Organization. Available: http://www.who.int
[3] G. Ssali, T. Marwala. "Estimation of missing data using computational intelligence and decision trees." Proceedings of IEEE
International Joint Conference On Neural Networks, Hong Kong.
[4] R. J. Little and D. B. Rubin. "Statistical Analysis With Missing Data", Hoboken, NJ: Wiley,(1987).
[5] Gustavo E. A. P. A. Batista and Maria Carolina Monard, An Analysis of Four Missing Data Treatment Methods for Supervised
Learning, Applied Artificial Intelligence 17(5-6): 519-533 , 2003
[6] Alireza Farhangfar, Lukasz Kurgan, Jennifer Dy,"Impact of imputation of missing values on classification error for discrete data",
Pattern Recognition, Volume 41, Issue 12, December 2008, Pages 3692–3705
[7] Qinbo Song, Martin Shepperd."A new imputation method for small software project data sets", Journal of Systems and Software,
Volume 80, Issue 1, January 2007, Pages 51–62
[8] José M. Jerez Ignacio Molina ,, Pedro J. García-Laencina ,Emilio Alba, Nuria Ribelles, Miguel Martín, Leonardo Franco," Missing
data imputation using statistical and machine learning methods in a real breast cancer problem", Artificial Intelligence in Medicine,
Volume 50, Issue 2, October 2010, Pages 105–115
[9] Bhekisipho Twala, Michelle Cartwright,"Ensemble Imputation Methods for Missing Software Engineering Data", 11th IEEE
International Software Metrics Symposium (METRICS'05)
[10] Vidan Fathi Ghoneim, Nahed H. Solouma, Yasser M. Kadah," Evaluation of Missing Values Imputation Methods in cDNA
Microarrays Based on Classification Accuracy", 978-1-4244-7000-6/11 IEEE.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: VoIP, SIP, H323, QoS, PSTN, VPN tunnel, IPSec, Encryption, Internet, Asterisks
[1] Hallock, J. (2004) A brief history of VoIP, Evolution and Trends in Digital Media Technologies, University of Washington
[2] La Corte, A., & Sicari, S. (2006), "Assessed quality of service and voice and data integration: a case study‟, Computer
Communications, 29(11). pp. 1992-2003.
[3] Ranganathan, M. & Kilimartin, L. (2003) "Performance analysis of secure session initiation protocol based VoIP networks‟,
Computer Communications 26(6), pp. 552-565.
[4] Amarandei-Stavila, M. (2005) Voice over IP Security A layered approach, xmco partners.Amoroso, E. (1994) A book introducing
critical issues in computer security technology, Fundamentals of Computer Security Technology, Bell Laboratories.
[5] Karapantazis, S. & Pavlidou, F. (2009) "VoIP: A comprehensive survey on promising technology‟, Computer Networks, 53(12),
pp.2050-2090.
[6] Ansari,S. , Khan ,K. , Rehana,J. , Lisa,J. , & Kaisar, S. (2009) "Different Approaches of Interworking between SIP and H323 ‟
International journal of Computer Science and Network Security, 9(3),pp.232-239.
[7] Geneiatakis, D., Lambrinoudakis, C. & Kambourakis, G. (2007) "An ontology-based policy for deploying secure SIP-based VoIP
services‟, Computer & Security, 2006(27), pp.285-297.
[8] Wisely, D. (2001)‟SIP and conventional internet application‟ BT Technology journal, 19(2), pp.107-118.
[9] Stallings W., (2003) "The Session Initiation Protocol‟, The internet protocol journal, 6(1), pp.5-38.
[10] Borthick, S. (2003) SIP for the Enterprise: Work in Progress, Business Communications Review.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A comprehensive method for discovering the maximal frequent set |
Country | : | India |
Authors | : | Nivedita Pandey, Prof. Love Verma |
: | 10.9790/0661-0743139 | |
Keywords: association rules, data mining, frequent itemsets, the INCREMENTAL PINCER method
[1] A. Savasere, E. Omiecinski, and S. Navathe, "An Efficient Algorithm for Mining Association Rules in Large Databases", In
Proceedings of 21st VLDB, pp. 432-444, 1995. [2] D. Lin and Z. M. Kedem, "Pincer-Search: A New lgorithm for
Discovering the Maximum Frequent Set", In Proceedings of VI Intl. Conference on Extending Database Technology, 1998.
[2] Eui-Hong Han, George Karypis and Vipin Kumar, "Scalable Parallel Data Mining for Association Rules", IEEE Transactions on
Knowledge and Data Engineering, Vol. 12, No. 3, MAY/JUNE 2000.
[3] H.Toivonen,"Sampling Large Databases for Association Rules", VLDB, pp.134-145, 1996.
[4] IBMQuest Data Mining Project, "Quest Synthetic Data Generation Code", "http"//www.almaden.ibm. com/cs/quest/syndata.
html", 1996
[5] J. S. Park, M. S. Chen, and P. S. Yu, "An Effective Hash Based Algorithm for Mining Association Rules", Proceedings of the ACM
SIGMOD, pp. 175-186, 1995.
[6] M. Houtsma and A. Swami, "Set-Oriented Mining of Association Rules in Relational Databases," 11th Int'l Conference on Data
Engineer, 1995.
[7] M.J. Zaki, S. Parthasarathy, M. Ogihara, and W. Li, "New Algorithms for Fast Discovery of Association Rules", 3rd Int'l
Conference on Knowledge Discovery & Data Mining (KDD), Newport, CA, August 1997.
[8] MohammedJ.Zaki, "Scalable Algorithm for Association Mining", IEEE Transactions on Knowledge and Data Engineering, Vol.
12, No. 3, MAY/JUNE2000.
[9] M. S. Chen, J. Han, and P. S. Yu, "Data Mining: An Overview from a Database Perspective", IEEE Transactions on
Knowledge and Data Engineering, Vol. 8, No. 6, December 1996.
[10] M. S. Chen, J. S. Park, and P. S. Yu, "Efficient Data Mining for Path Traversal Patterns", IEEE Transactions on Knowledge and
Data Engineering, Vol. 10, No. 2, 1998, pp. 209-220.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Security, Intrusion Detection, Attacks, Routing.
[1] Pasquale Donadio,Antonio Cimmino and Giorgio Ventre "Enhanced Intrusion Detection Systems in Ad Hoc Networks using a Grid
Based Agnostic Middleware".
[2] S.Sen and John Andrew Clark "A Grammatical Evolution Approach to Intrusion Detection on Mobile Ad hoc Networks" March
2009, WiSec ‟09: Proceedings of the Second ACM Conference on Wireless Network Security.
[3] Sneha Kumari1, Dr. Maneesh Shrivastava Secure DSR Protocol in MANET Using Energy Efficient Int.rusion Detection System
Volume 1, No.1, July August- September 2012
[4] Prajeet Sharma Niresh Sharma And Rajdeep Singh A Secure Intrusion detection system against DDOS attack in Wireless Mobile
Ad-hoc Network Volume 41– No.21, March 2012
[5] Intrusion Detection Technique in Mobile Adhoc Network based on Quantitative Approach Volume 37– No.8, January 2012
[6] Vikas Beniwl, Ashwani Garg A Review on Security Issues of Routing Protocols in Mobile Ad-Hoc Networks, Volume 2, Issue 9,
September 2012
[7] D.Md Farid,N.HuuHoa,J.Darmount,N.Harbi, and M.ZahidurRahman, "scaling up detectionrates and reducing false positives in
intrusion detection using NBTree",ICDMKE April 2010
[8] K.KGupta,B.Nath,andK.Ramamohanarao "Conditional Random Fields for Intrusion Detection",In International Conference on
Advanced Information Networking and Applications Workshops,IEEE,2007
[9] C.Kruegel,D.Mutz,W.Robertson, and F. Valeur,"Bayesian event classification for intrusion detection",In Proc. Of the19th Annual
Computer Security Applications Conference,Las Veges,nv,2003
[10] Amrita Anand* Brajesh Patel An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering
Different Protocols Volume 2, Issue 8, August 2012
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Kernel, mapping, n-computing, thread, uniprocessor.
Journal Papers:
[1] K. Schwan and H. Zhou [Georgia Institute of Technology], "Dynamic scheduling of hard real-time tasks and real-time threads", IEEE
transactions on Software Engineering, Aug. 1992, Volume 18, Issue 8, p. 736-748.
[2] K.Debattista, K.Vella and J.Cordina, "Wait-free cache-affinity thread scheduling", IEEE Proc., Softw.-April 2003, Volume 150, Issue
2, p. 137-146.
[3] Christopher Small and Margo Seltzer, "Scheduler Activations on BSD:Sharing Thread Management Between Kernel and
Application", Harvard University.
[4] L. Mangeruca, A. Ferrari and A. L. Sangiovanni-Vincentelli, "Uniprocessor scheduling under precedence constraints", RTAS'06, p.
157-166, IEEE Computer Society, Washington DC, USA.
[5] Thomas E. Anderson, Brian N. Bershad and others, "Schedular activations: effective kernel support for the user-level management of
parallelism", ACM Transactions on Computer Systems [New York, USA], Feb. 1992, Volume 10, Issue 1, p. 53-79.
[6] Thomas Riechman, Jurgen Kleinoder, "User-Level Scheduling with Kernel Threads", Department of Computer Science, University of
Erlangen-Nurnberg, Germany.
[7] D. Kang and J.L.Gaudiot [University of California], "Speculation- aware thread scheduling for simultaneous multithreading",
Electron. Lett. 4 March 2004, Volume 40, Issue 5, p. 296-298.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Distributed software development, Complexity, Inter-disciplinary collaboration, Success factors, System architecture
[1] Apache: The Apache DB project: ObJectRelationalBridge OJB. http://db.apache.org/ojb.
[2] Apache: Struts. http://struts.apache.org.
[3] Apache: Tiles guide. http://struts.apache.org/userGuide/dev_tiles.html.
[4] Apache: What is Torque? http://db.apache.org/torque.
[5] Alexander Schatten, Marian Schedenig, Amin And jomshoa: Open Science Workplace: Building an Web-Based Open Source Tool to
Enhance Project Management, Monitoring and Collaboration in Scientific Projects.
[6] Eclipse.org. http://www.eclipse.org/.
[7] Galileo computing: Java ist auch eine Insel. http://www.galileocomputing.de/openbook/javainsel4.
[8] James Holmes: Struts console. http://www.jamesholmes.com/struts/console.
[9] Iana: Internet assigned numbers authority. http://www.iana.org. Ibim: Warum Project management.
[10] IETF: Post Office Protocol Version 3. http://www.ietf.org/rfc/rfc1939.txt.