IJCER

Displaying 1-40 of 187 results

  • White Papers // Nov 2013

    Cloud Information Accountability Framework for Auditing the the Data Usage in Cloud Environment

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By IJCER

  • White Papers // Nov 2013

    Mobile Phone Based Multi-Devices Secured Control System

    In this paper, the integration or merge of technologies is presented to aid in reducing men-hands within the system as a total cost reduction especially in the industrial sectors as well as developing systems to comply with a running requirements instead of reengineering. The controlling system is regarded as a...

    Provided By IJCER

  • White Papers // Nov 2013

    Offline Signature Recognition Using Maximally Stable Extremely Regions (Mser)

    Biometrics refers to methods for uniquely recognize humans, based one or more intrinsic physical or behavioral traits. Handwritten Signature is an example of a behavioral feature and the term which has come to general acceptance for this class of biometrics is 'behavior metrics'. Signatures stand as the most accepted form...

    Provided By IJCER

  • White Papers // Nov 2013

    Fingerprint Recognition Using Genetic Algorithm and Neural Network

    Fingerprints are the most used biometric feature for the person identification. During research it has been observed that there are number of approaches has been implemented for recognition of fingerprints. Different algorithms and techniques have been used for enhancement purpose, minutiae extraction and for matching. In this paper a novel...

    Provided By IJCER

  • White Papers // Nov 2013

    Design of a Network Data Security Circuit

    To safeguard information during electronic communication and data transmission processes across unsecured networks and provide security requirements, including authentication, confidentiality, integrity and non-repudiation. To achieve this goal, this paper proposed to design of a network data security circuit using two Basic Stamp2 Microcontroller, two wireless X-Bee modules, two computer and...

    Provided By IJCER

  • White Papers // Oct 2013

    THEMIS: A Mutually Verifiable Billing Transactions for Cloud Computing Environment

    With the widespread adoption of cloud computing, the ability to record and account for the usage of cloud resources in a credible and verifiable way has become critical for cloud service providers and users alike. The success of such a billing system depends on several factors: the billing transactions must...

    Provided By IJCER

  • White Papers // Oct 2013

    XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing

    Volunteer cloud computing is based on the concept where highly distributed non-dedicated resources are harnessed to build a cloud so as to offer cloud services. By volunteer cloud computing, users and contributors can experience the impact of cloud computing by allowing users to share any type of services be it...

    Provided By IJCER

  • White Papers // Oct 2013

    Cloud Computing Along Web-Os (How Webos Uses the Concept of Cloudcomputing in Data Storage)

    With the increasing use of high-speed Internet technologies during the past few years, the concept of cloud computing has become more popular. Especially in this economy, cloud services can provide speed, efficiencies and cost savings. In cloud computing, users work with Web-based, rather than local, storage and software. These applications...

    Provided By IJCER

  • White Papers // Sep 2013

    Architectural Design of an Efficient Data Center

    This paper was to analyze different data centers from design and function perspectives and develop a prototype of a data center for maximum efficiency. Relevant data on the designs and functions of several data centers as well as their advantages were gathered from various sources and analyzed. This is compared...

    Provided By IJCER

  • White Papers // Sep 2013

    Detection and Prevantion of Black Hole Attack Over Manet

    The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection...

    Provided By IJCER

  • White Papers // Sep 2013

    Develop and Design of the ATM Banking Security System Through Image Processing and GSM Communication

    3G Technology have to be created the new generation ATM machine which can be operator without the ATM card. By using this system ATM machine is going to operate by using their SIM in the mobile phone. When the people insert their SIM in the reader unit of the ATM...

    Provided By IJCER

  • White Papers // Aug 2013

    A Review on Replica Node Detection Algorithms in Wsns

    A wireless sensor network is a collection of nodes organized in to a cooperative network. This network is prone to various attacks due to poor security. One of the attacks is clone attack in which an adversary captures some nodes and replicates them including the cryptographic in formation and deploys...

    Provided By IJCER

  • White Papers // Aug 2013

    Intrusion Detection in Manets Using Secure Leader Election

    In this paper, the authors study leader election in the presence of selfish nodes for intrusion detection in Mobile Ad hoc NETworks (MANETs). To balance the resource consumption among all nodes and prolong the lifetime of a MANET, nodes with the most remaining resources should be elected as the leaders....

    Provided By IJCER

  • White Papers // Aug 2013

    Protecting Frequent Item sets Disclosure in Data Sets and Preserving Item Sets Mining

    The main approach to hide sensitive frequent itemsets is to reduce the support of each given sensitive itemsets. This is done by modifying transactions or items in the database. However, the modifications will generate side effects, i.e., non-sensitive frequent itemsets falsely hidden (the loss itemsets) and spurious frequent itemsets falsely...

    Provided By IJCER

  • White Papers // Aug 2013

    Search Engine Using Spatial Data

    Spatial search engines are specialized search engines primarily dedicated to retrieve geographical information through web technology. They provide capabilities to query metadata records for related spatial data, and link directly to the online content of spatial data themselves. OpenSearch-Geo extensions are developed to facilitate basic geographical data search using Open-search...

    Provided By IJCER

  • White Papers // Jul 2013

    Survey on Energy-Efficient Secure Routing in Wireless Sensor Networks

    Data security and energy aware communication are key aspects in design of modern ad-hoc networks. In this paper, the authors investigate issues associated with the development of secure IEEE 802.15.4 based Wireless Sensor Networks (WSNs) - a special type of ad hoc networks. They focus on energy aware security architectures...

    Provided By IJCER

  • White Papers // Jul 2013

    An Enhanced Localization Scheme for Mobile Sensor Networks

    Localization in mobile sensor networks is more challenging than in static sensor networks because mobility increases the uncertainty of nodes positions. The localization algorithms used in the Mobile Sensor Networks (MSN) are mainly based on Sequential Monte Carlo (SMC) method. The existing SMC based localization algorithms commonly rely on increasing...

    Provided By IJCER

  • White Papers // Jul 2013

    A Triband Slotted Bow-Tie Antenna for Wireless Applications

    This paper presents a new approach for the design of a tri-band bowtie antenna. By incorporating slots with triangular shapes on the arms of the bowtie, resonance is obtained in the 2.5 GHz, 4.4 GHz, and 6.2 GHz bands. A study of the effect of triangular slots, their size and...

    Provided By IJCER

  • White Papers // Jul 2013

    Emergence of Hop Integrity in Computer Networks with Algorithms and Description of Protocols

    A computer network is said to provide hop integrity if when any router p in the network receives a message m supposedly from an adjacent router q, then p can check that m was indeed sent by q, was not modified after it was sent, and was not a replay...

    Provided By IJCER

  • White Papers // Jul 2013

    Anomaly Detection Using Hidden Markov Model

    In this paper, the authors proposes an empirical method of Anomaly detection by analyzing the spending habit of vendee. Proposed system models the sequence of operations in credit card transaction processing using a Hidden Markov Model (HMM) and shows how it can be used for the detection of frauds. In...

    Provided By IJCER

  • White Papers // Jul 2013

    Identification of Packet Dropping and Modification in Wireless Sensor Networks

    The simplicity in wireless sensor network with resource constrained nodes makes them extremely vulnerable to variety of attacks. In a Wireless sensor networks sensor nodes monitor the environment, detect events of interest, produce data and collaborate in forwarding the data towards to a sink, which could be a gateway, base...

    Provided By IJCER

  • White Papers // Jul 2013

    Research on Cloud Computing

    This paper is an introduction to the terms, characteristics, and services associated with network-based computing, commonly referred to as cloud computing. Cloud Computing is a technology that uses the network and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation...

    Provided By IJCER

  • White Papers // Jun 2013

    A Survey of Permissive Public Auditability and Data Dynamics for Storage Security in Cloud Computing

    Cloud storage allows users to remotely store their information and revel in the on-demand top quality cloud applications while not the burden of local hardware and software management. although the advantages are clear, such a service is additionally relinquishing users physical possession of their outsourced information that inevitably poses new...

    Provided By IJCER

  • White Papers // Jun 2013

    Secure Adhoc Network

    Now-a-day, it is no longer optional to have security solutions even inevitable for every kind of organizations and individuals. There are number of generic tools which are common for organizations as well as for individual users to provide security which includes; anti-spam, anti-virus etc., and network security have become essential...

    Provided By IJCER

  • White Papers // Jun 2013

    Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing

    Cloud computing is an emerging and promising computing model that provides on-demand computing services which eliminates the need of bearing operational costs associated with deploying servers and software applications. As with any technology, cloud computing presents its adopters with security and privacy concerns that arise from exposing sensitive business information...

    Provided By IJCER

  • White Papers // Jun 2013

    A Novel Approach for Converting Relational Database to an Object Oriented Database: Data Migration and Performanace Analysis

    The object-oriented data model is predicted to be the heart of the next generation of database systems. Users want to move from old legacy databases into applying this new technology that provides extensibility and flexibility in maintenance. However, a major limitation on the wide acceptance of object-oriented databases is the...

    Provided By IJCER

  • White Papers // Jun 2013

    MANET: Black Hole Node Detection in AODV

    In today's world every user need to transfer data with one-other irrespective to individual's geographic location. Hence a Mobile Ad-hoc NETwork (MANET) has become a vital part of modern communication over wireless network. MANET helps to transfer data without fixed infrastructure and many autonomous nodes vigorously can become part of...

    Provided By IJCER

  • White Papers // Jun 2013

    Ranked Keyword Search in Cloud Computing: An Innovative Approach

    Cloud computing has become an integral part of IT industry. Amount of information available on World Wide Web is increasing at an exponential pace. In such a vast collection it becomes difficult for the user to query something out of the whole collection. Great efforts have been made for facilitating...

    Provided By IJCER

  • White Papers // Jun 2013

    A Presumable Data Retentive Framework for Multi Cloud

    Cloud storage or storage outsourcing is a rising trend where the cloud storage service provides a comparably low-cost, scalable, position-independent platform for storing client's data. This archival storage guarantees the authenticity of data on storage server, but does not guarantee for the tampering of data (modifications or deletions, to the...

    Provided By IJCER

  • White Papers // Jun 2013

    A Survey on Security in Multihop Wireless Network

    Multihop wireless networks are the type of networks which require two or more wireless hops to deliver the information from the source to destination. Thus finding an optimal and most secure path to route the data is the major challenge. There are various routing protocols proposed for Multihop wireless networks...

    Provided By IJCER

  • White Papers // Jun 2013

    An Efficient Comparison Ofmimo-Ofdm Detection Using Spatial Multiplexingtechniques

    Multiple Input Multiple Output (MIMO) systems have recently emerged as a key technology in wireless communication systems for increasing both data rates and system performance. There are many schemes that can be applied to MIMO systems such as space time block codes, space time trellis codes, and the Vertical Bell...

    Provided By IJCER

  • White Papers // Jun 2013

    Intrusion Detection in Virtualized Environment

    Server virtualization is one of the concepts driving current enterprise infrastructure design and setup. It ensures business continuity and agility through on demand resource sharing and optimum resource utilization. At the same time it has raised concerns over new trends of security breaches and attacks on virtual machines. Traditional intrusion...

    Provided By IJCER

  • White Papers // Jun 2013

    Report on Reputation Based Data Aggregation for Wireless Network

    Wireless sensor network consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. In wireless networks, malicious sensor nodes send false data reports to distort aggregation results. Existing trust...

    Provided By IJCER

  • White Papers // Jun 2013

    Local Maximum Lifetime Algorithms for Strong K-Barrier

    Barrier coverage of wireless sensor networks are been studied intensively in recent years under the assumption that sensors are deployed uniformly at random in a large area. In this paper a new network construction method of sensor nodes for Border Security Systems is proposed. This barrier coverage are known to...

    Provided By IJCER

  • White Papers // Jun 2013

    Efficient Tree Based Structure for Mining Frequent Pattern from Transactional Databases

    Frequent pattern mining plays a very important role in data mining technique. There are many various studies about the problem of frequent pattern mining and association rule mining in large transactional databases. Frequent pattern mining technique are divided into 2 categories : a priori based algorithm and tree structure based...

    Provided By IJCER

  • White Papers // May 2013

    Neural Network Approach to Power System Security Analysis

    Contingency analysis of a power system is a major activity in power system planning and operation. In general an outage of one transmission line or transformer may lead to over loads in other branches and/or sudden system voltage rise or drop. The traditional approach of security analysis known as exhaustive...

    Provided By IJCER

  • White Papers // May 2013

    Analyzing Massive Machine Data Maintaining in a Cloud Computing

    The authors present a novel framework, Cloud View, for storage, processing and analysis of massive machine maintenance data, collected from a large number of sensors embedded in industrial machines, in a cloud computing environment. This paper describes the architecture, design, and implementation of CloudView, and how the proposed framework leverages...

    Provided By IJCER

  • White Papers // May 2013

    Literature Review: Iris Segmentation Approaches for Iris Recognition Systems

    A biometric system offers automatic identification of a human being based on the unique feature or characteristic which is being possessed by the individual. The iris segmentation has its own major applications in the field of surveillance, forensics as well as in security purposes. The performance of the iris recognition...

    Provided By IJCER

  • White Papers // May 2013

    A Novel Approach to Mine Frequent Item sets of Process Models for Dyeing Process using Association Rule Mining

    A noval approach of process mining provides a new means to improve processes in a variety of application domains these process mining techniques help organizations to uncover their actual business processes in this presented paper. Dyeing process using apriori algorithm. but apriori algorithm has some drawback like more execution time,...

    Provided By IJCER

  • White Papers // May 2013

    Priority Based Service Composition Using Multi Agent in Cloud Environment

    Cloud computing is a highly research area in the technical I.T field and economic world, and many of the software industry have entered the development of cloud services. It is the preeminent on-demand service system along with a \"Pay-as-you-go\" policy. Agent-based Cloud computing consist of the design and development of...

    Provided By IJCER

  • White Papers // Apr 2013

    Mining Temporal Patterns for Interval-Based and Point-Based Events

    Previous research on mining sequential patterns mainly focused on discovering patterns from point-based event data and interval - based event data, where a pair of time values is associated with each event. Since many areas of research includes data on a snapshot of time points as well as time intervals,...

    Provided By IJCER

  • White Papers // Apr 2013

    Enhancement of Error Detection and Correction Capability Using Orthogonal Code Convolution

    When data is stored, compressed, or communicated through a media such as cable or air, sources of noise and other parameters such as EMI, crosstalk, and distance can considerably affect the reliability of these data. Error detection and correction techniques are therefore required. Some of those techniques can only detect...

    Provided By IJCER

  • White Papers // Apr 2013

    Study of Two Different Methods for Iris Recognition Support Vector Machine and Phase Based Method

    The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition rate, and non-infringing etc. The iris recognition...

    Provided By IJCER

  • White Papers // Apr 2013

    Analysis of Lossless Data Compression Techniques

    Compression is the reduction in size of data by converting it to a format that requires fewer bits. Most often compression is used to minimize storage space (on a hard drive, for example) or for reducing transmitted data over a network. In other words, Compression is the art of representing...

    Provided By IJCER

  • White Papers // Apr 2013

    Efficient Method of Detecting Data Leakage Using Misusability Weight Measure

    Users within the organization's perimeter perform various actions on this data and may be exposed to sensitive information embodied within the data they access. In an effort to determine the extent of damage to an organization that a user can cause using the information she has obtained, the authors introduce...

    Provided By IJCER

  • White Papers // Apr 2013

    Energy Conservation in Wireless Sensor Networks Using Data Reduction Approaches: A Survey

    Wireless Sensor Networks (WSN) which are battery powered, present a challenge of long term sustainability. So power management is an import concern which can be done at two levels such as sensor subsystems and network subsystem. This paper mainly concentrates on the network subsystem aspect of the power management touching...

    Provided By IJCER

  • White Papers // Apr 2013

    Token Based Contract Signing Protocol Using OTPK

    In the information security field there are many of the techniques that make the application secure by exchanging data between two parties. A fair exchange is required for increasing the chances of attack. Hence a new contract signing protocol is proposed based on the OTPK (One Time Private Key) scheme....

    Provided By IJCER

  • White Papers // Apr 2013

    Association Rule Mining by Using New Approach of Propositional Logic

    In data mining the authors collecting, searching, and analyzing a large amount of data in a database, as to discover rules and patterns. In data mining field association rules are discovered according to minimum support threshold. The accuracy in setting up this threshold directly influences the number and the quality...

    Provided By IJCER

  • White Papers // Mar 2013

    Mining Association Rules From Time Series Data Using Hybrid Approaches

    Due to the frequent appearance of time series data in various fields, it has always been an essential and interesting research field. A time series analysis involves the methods for analyzing time series data, in order to mine meaningful and other relevant characteristics of the data. In most cases, time...

    Provided By IJCER

  • White Papers // Mar 2013

    Lockme - Android Security Application

    In this paper, the authors present an Android based App which is a security application. The idea behind this project is to develop an application which will help user of android to create Admin and Guest accounts like other computer based operating system. Security holes in Android operating system occur...

    Provided By IJCER

  • White Papers // Mar 2013

    Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

    In wireless sensor network one of the most security threats is the reactive jammer because of the mass destruction to the sensor communication and it is difficult to disclose. So the authors have to deactivate the reactive jammers by identifying all the trigger nodes, because the transmission invokes the jammer....

    Provided By IJCER

  • White Papers // Mar 2013

    Secure Data Forwarding in Distributed Environment Using Cloud Storage System

    A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party's cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes...

    Provided By IJCER

  • White Papers // Mar 2013

    Cloud Documentation and Centralized Compiler for Java & Php

    Cloud computing is an Internet based computing which aims at providing hardware and software resources. It enables the users to access and share information from devices like laptops, desktops, smart phones, etc. which have ability to connect to the Internet. Cloud computing caters to dynamism, abstraction and resource sharing. The...

    Provided By IJCER

  • White Papers // Mar 2013

    An Approach for Effective Use of Pattern Discovery for Detection of Fraudulent Patterns in Railway Reservation Dataset

    Data mining concepts and techniques can help in solving many problems. Useful knowledge may be hidden in the data stored. This knowledge, if extracted, may provide good support for planners, decision makers, and legal institutions or organizations. Hence Pattern discovery, as one of the powerful intelligent decision support platforms, is...

    Provided By IJCER

  • White Papers // Mar 2013

    A Study on Visualizing Semantically Similar Frequent Patterns in Dynamic Datasets

    Discovering frequent and interesting patterns is an important area of data mining. Transactional databases cannot serve the requirement of analyzing current trends in shopping; it is required to focus on analyzing dynamic data sets. Existing data mining algorithms when applied on dynamic data sets takes lot of time as they...

    Provided By IJCER

  • White Papers // Nov 2013

    Cloud Information Accountability Framework for Auditing the the Data Usage in Cloud Environment

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By IJCER

  • White Papers // Nov 2013

    Mobile Phone Based Multi-Devices Secured Control System

    In this paper, the integration or merge of technologies is presented to aid in reducing men-hands within the system as a total cost reduction especially in the industrial sectors as well as developing systems to comply with a running requirements instead of reengineering. The controlling system is regarded as a...

    Provided By IJCER

  • White Papers // Nov 2013

    Offline Signature Recognition Using Maximally Stable Extremely Regions (Mser)

    Biometrics refers to methods for uniquely recognize humans, based one or more intrinsic physical or behavioral traits. Handwritten Signature is an example of a behavioral feature and the term which has come to general acceptance for this class of biometrics is 'behavior metrics'. Signatures stand as the most accepted form...

    Provided By IJCER

  • White Papers // Nov 2013

    Fingerprint Recognition Using Genetic Algorithm and Neural Network

    Fingerprints are the most used biometric feature for the person identification. During research it has been observed that there are number of approaches has been implemented for recognition of fingerprints. Different algorithms and techniques have been used for enhancement purpose, minutiae extraction and for matching. In this paper a novel...

    Provided By IJCER

  • White Papers // Nov 2013

    Design of a Network Data Security Circuit

    To safeguard information during electronic communication and data transmission processes across unsecured networks and provide security requirements, including authentication, confidentiality, integrity and non-repudiation. To achieve this goal, this paper proposed to design of a network data security circuit using two Basic Stamp2 Microcontroller, two wireless X-Bee modules, two computer and...

    Provided By IJCER

  • White Papers // Jul 2012

    An Enhanced Energy Efficient Routing Protocol for MANETs

    Micro sensor networks are widely deployed in sensor networks typical geographical areas where human interaction is almost impossible. A WSN is a collection of several small energy limited sensors. These devices perform the job data collection and forwarding to central node called sink. Ad hoc networks are network which operates...

    Provided By IJCER

  • White Papers // Jul 2012

    Role of Feature Reduction in Intrusion Detection Systems for 802.11 Attacks

    Intrusion Detection Systems (IDSs) are a major line of defense for protecting network resources from illegal penetrations. A common approach in intrusion detection models, specifically in anomaly detection models, is to use classifiers as detectors. Selecting the best set of features is central to ensuring the performance, speed of learning,...

    Provided By IJCER

  • White Papers // Jul 2012

    Provably Protected Nested One-Time Secret Mechanisms for Rapid Mutual Certification and Key Swap in Mobile Interactions

    Many security mechanisms for mobile interactions have been introduced in the literature. Among these mechanisms, certification plays a quite important role in the entire mobile network system and acts as the first defense against attackers since it ensures the correctness of the identities of distributed interaction entities before they engage...

    Provided By IJCER

  • White Papers // Apr 2012

    Computationally Effecient Group Re-Keying for Time Sensitive Applications

    Key distribution is an important problem for secure group communications. Multicast is an efficient means of distributing data in terms of resources usage. All the designated receivers or members in a multicast group share a session key. Session keys shall change dynamically to ensure both forward secrecy and backward secrecy...

    Provided By IJCER

  • White Papers // Jun 2013

    A Survey of Permissive Public Auditability and Data Dynamics for Storage Security in Cloud Computing

    Cloud storage allows users to remotely store their information and revel in the on-demand top quality cloud applications while not the burden of local hardware and software management. although the advantages are clear, such a service is additionally relinquishing users physical possession of their outsourced information that inevitably poses new...

    Provided By IJCER

  • White Papers // Jun 2013

    Secure Adhoc Network

    Now-a-day, it is no longer optional to have security solutions even inevitable for every kind of organizations and individuals. There are number of generic tools which are common for organizations as well as for individual users to provide security which includes; anti-spam, anti-virus etc., and network security have become essential...

    Provided By IJCER

  • White Papers // Jun 2013

    Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing

    Cloud computing is an emerging and promising computing model that provides on-demand computing services which eliminates the need of bearing operational costs associated with deploying servers and software applications. As with any technology, cloud computing presents its adopters with security and privacy concerns that arise from exposing sensitive business information...

    Provided By IJCER

  • White Papers // Jun 2013

    A Novel Approach for Converting Relational Database to an Object Oriented Database: Data Migration and Performanace Analysis

    The object-oriented data model is predicted to be the heart of the next generation of database systems. Users want to move from old legacy databases into applying this new technology that provides extensibility and flexibility in maintenance. However, a major limitation on the wide acceptance of object-oriented databases is the...

    Provided By IJCER

  • White Papers // Jun 2013

    MANET: Black Hole Node Detection in AODV

    In today's world every user need to transfer data with one-other irrespective to individual's geographic location. Hence a Mobile Ad-hoc NETwork (MANET) has become a vital part of modern communication over wireless network. MANET helps to transfer data without fixed infrastructure and many autonomous nodes vigorously can become part of...

    Provided By IJCER

  • White Papers // Jun 2013

    Ranked Keyword Search in Cloud Computing: An Innovative Approach

    Cloud computing has become an integral part of IT industry. Amount of information available on World Wide Web is increasing at an exponential pace. In such a vast collection it becomes difficult for the user to query something out of the whole collection. Great efforts have been made for facilitating...

    Provided By IJCER

  • White Papers // Jun 2013

    A Presumable Data Retentive Framework for Multi Cloud

    Cloud storage or storage outsourcing is a rising trend where the cloud storage service provides a comparably low-cost, scalable, position-independent platform for storing client's data. This archival storage guarantees the authenticity of data on storage server, but does not guarantee for the tampering of data (modifications or deletions, to the...

    Provided By IJCER

  • White Papers // Jun 2013

    A Survey on Security in Multihop Wireless Network

    Multihop wireless networks are the type of networks which require two or more wireless hops to deliver the information from the source to destination. Thus finding an optimal and most secure path to route the data is the major challenge. There are various routing protocols proposed for Multihop wireless networks...

    Provided By IJCER

  • White Papers // Jun 2013

    An Efficient Comparison Ofmimo-Ofdm Detection Using Spatial Multiplexingtechniques

    Multiple Input Multiple Output (MIMO) systems have recently emerged as a key technology in wireless communication systems for increasing both data rates and system performance. There are many schemes that can be applied to MIMO systems such as space time block codes, space time trellis codes, and the Vertical Bell...

    Provided By IJCER

  • White Papers // Jun 2013

    Intrusion Detection in Virtualized Environment

    Server virtualization is one of the concepts driving current enterprise infrastructure design and setup. It ensures business continuity and agility through on demand resource sharing and optimum resource utilization. At the same time it has raised concerns over new trends of security breaches and attacks on virtual machines. Traditional intrusion...

    Provided By IJCER

  • White Papers // Jun 2013

    Report on Reputation Based Data Aggregation for Wireless Network

    Wireless sensor network consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. In wireless networks, malicious sensor nodes send false data reports to distort aggregation results. Existing trust...

    Provided By IJCER

  • White Papers // Jun 2013

    Local Maximum Lifetime Algorithms for Strong K-Barrier

    Barrier coverage of wireless sensor networks are been studied intensively in recent years under the assumption that sensors are deployed uniformly at random in a large area. In this paper a new network construction method of sensor nodes for Border Security Systems is proposed. This barrier coverage are known to...

    Provided By IJCER

  • White Papers // Jun 2013

    Efficient Tree Based Structure for Mining Frequent Pattern from Transactional Databases

    Frequent pattern mining plays a very important role in data mining technique. There are many various studies about the problem of frequent pattern mining and association rule mining in large transactional databases. Frequent pattern mining technique are divided into 2 categories : a priori based algorithm and tree structure based...

    Provided By IJCER

  • White Papers // Jul 2013

    Survey on Energy-Efficient Secure Routing in Wireless Sensor Networks

    Data security and energy aware communication are key aspects in design of modern ad-hoc networks. In this paper, the authors investigate issues associated with the development of secure IEEE 802.15.4 based Wireless Sensor Networks (WSNs) - a special type of ad hoc networks. They focus on energy aware security architectures...

    Provided By IJCER

  • White Papers // Jul 2013

    An Enhanced Localization Scheme for Mobile Sensor Networks

    Localization in mobile sensor networks is more challenging than in static sensor networks because mobility increases the uncertainty of nodes positions. The localization algorithms used in the Mobile Sensor Networks (MSN) are mainly based on Sequential Monte Carlo (SMC) method. The existing SMC based localization algorithms commonly rely on increasing...

    Provided By IJCER

  • White Papers // Jul 2013

    A Triband Slotted Bow-Tie Antenna for Wireless Applications

    This paper presents a new approach for the design of a tri-band bowtie antenna. By incorporating slots with triangular shapes on the arms of the bowtie, resonance is obtained in the 2.5 GHz, 4.4 GHz, and 6.2 GHz bands. A study of the effect of triangular slots, their size and...

    Provided By IJCER