IJCER

Displaying 1-40 of 187 results

  • White Papers // Nov 2013

    Cloud Information Accountability Framework for Auditing the the Data Usage in Cloud Environment

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By IJCER

  • White Papers // Nov 2013

    Mobile Phone Based Multi-Devices Secured Control System

    In this paper, the integration or merge of technologies is presented to aid in reducing men-hands within the system as a total cost reduction especially in the industrial sectors as well as developing systems to comply with a running requirements instead of reengineering. The controlling system is regarded as a...

    Provided By IJCER

  • White Papers // Nov 2013

    Offline Signature Recognition Using Maximally Stable Extremely Regions (Mser)

    Biometrics refers to methods for uniquely recognize humans, based one or more intrinsic physical or behavioral traits. Handwritten Signature is an example of a behavioral feature and the term which has come to general acceptance for this class of biometrics is 'behavior metrics'. Signatures stand as the most accepted form...

    Provided By IJCER

  • White Papers // Nov 2013

    Fingerprint Recognition Using Genetic Algorithm and Neural Network

    Fingerprints are the most used biometric feature for the person identification. During research it has been observed that there are number of approaches has been implemented for recognition of fingerprints. Different algorithms and techniques have been used for enhancement purpose, minutiae extraction and for matching. In this paper a novel...

    Provided By IJCER

  • White Papers // Nov 2013

    Design of a Network Data Security Circuit

    To safeguard information during electronic communication and data transmission processes across unsecured networks and provide security requirements, including authentication, confidentiality, integrity and non-repudiation. To achieve this goal, this paper proposed to design of a network data security circuit using two Basic Stamp2 Microcontroller, two wireless X-Bee modules, two computer and...

    Provided By IJCER

  • White Papers // Oct 2013

    THEMIS: A Mutually Verifiable Billing Transactions for Cloud Computing Environment

    With the widespread adoption of cloud computing, the ability to record and account for the usage of cloud resources in a credible and verifiable way has become critical for cloud service providers and users alike. The success of such a billing system depends on several factors: the billing transactions must...

    Provided By IJCER

  • White Papers // Oct 2013

    XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing

    Volunteer cloud computing is based on the concept where highly distributed non-dedicated resources are harnessed to build a cloud so as to offer cloud services. By volunteer cloud computing, users and contributors can experience the impact of cloud computing by allowing users to share any type of services be it...

    Provided By IJCER

  • White Papers // Oct 2013

    Cloud Computing Along Web-Os (How Webos Uses the Concept of Cloudcomputing in Data Storage)

    With the increasing use of high-speed Internet technologies during the past few years, the concept of cloud computing has become more popular. Especially in this economy, cloud services can provide speed, efficiencies and cost savings. In cloud computing, users work with Web-based, rather than local, storage and software. These applications...

    Provided By IJCER

  • White Papers // Sep 2013

    Detection and Prevantion of Black Hole Attack Over Manet

    The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection...

    Provided By IJCER

  • White Papers // Sep 2013

    Develop and Design of the ATM Banking Security System Through Image Processing and GSM Communication

    3G Technology have to be created the new generation ATM machine which can be operator without the ATM card. By using this system ATM machine is going to operate by using their SIM in the mobile phone. When the people insert their SIM in the reader unit of the ATM...

    Provided By IJCER

  • White Papers // Sep 2013

    Architectural Design of an Efficient Data Center

    This paper was to analyze different data centers from design and function perspectives and develop a prototype of a data center for maximum efficiency. Relevant data on the designs and functions of several data centers as well as their advantages were gathered from various sources and analyzed. This is compared...

    Provided By IJCER

  • White Papers // Aug 2013

    A Review on Replica Node Detection Algorithms in Wsns

    A wireless sensor network is a collection of nodes organized in to a cooperative network. This network is prone to various attacks due to poor security. One of the attacks is clone attack in which an adversary captures some nodes and replicates them including the cryptographic in formation and deploys...

    Provided By IJCER

  • White Papers // Aug 2013

    Intrusion Detection in Manets Using Secure Leader Election

    In this paper, the authors study leader election in the presence of selfish nodes for intrusion detection in Mobile Ad hoc NETworks (MANETs). To balance the resource consumption among all nodes and prolong the lifetime of a MANET, nodes with the most remaining resources should be elected as the leaders....

    Provided By IJCER

  • White Papers // Aug 2013

    Protecting Frequent Item sets Disclosure in Data Sets and Preserving Item Sets Mining

    The main approach to hide sensitive frequent itemsets is to reduce the support of each given sensitive itemsets. This is done by modifying transactions or items in the database. However, the modifications will generate side effects, i.e., non-sensitive frequent itemsets falsely hidden (the loss itemsets) and spurious frequent itemsets falsely...

    Provided By IJCER

  • White Papers // Aug 2013

    Search Engine Using Spatial Data

    Spatial search engines are specialized search engines primarily dedicated to retrieve geographical information through web technology. They provide capabilities to query metadata records for related spatial data, and link directly to the online content of spatial data themselves. OpenSearch-Geo extensions are developed to facilitate basic geographical data search using Open-search...

    Provided By IJCER

  • White Papers // Jul 2013

    Survey on Energy-Efficient Secure Routing in Wireless Sensor Networks

    Data security and energy aware communication are key aspects in design of modern ad-hoc networks. In this paper, the authors investigate issues associated with the development of secure IEEE 802.15.4 based Wireless Sensor Networks (WSNs) - a special type of ad hoc networks. They focus on energy aware security architectures...

    Provided By IJCER

  • White Papers // Jul 2013

    An Enhanced Localization Scheme for Mobile Sensor Networks

    Localization in mobile sensor networks is more challenging than in static sensor networks because mobility increases the uncertainty of nodes positions. The localization algorithms used in the Mobile Sensor Networks (MSN) are mainly based on Sequential Monte Carlo (SMC) method. The existing SMC based localization algorithms commonly rely on increasing...

    Provided By IJCER

  • White Papers // Jul 2013

    A Triband Slotted Bow-Tie Antenna for Wireless Applications

    This paper presents a new approach for the design of a tri-band bowtie antenna. By incorporating slots with triangular shapes on the arms of the bowtie, resonance is obtained in the 2.5 GHz, 4.4 GHz, and 6.2 GHz bands. A study of the effect of triangular slots, their size and...

    Provided By IJCER

  • White Papers // Jul 2013

    Emergence of Hop Integrity in Computer Networks with Algorithms and Description of Protocols

    A computer network is said to provide hop integrity if when any router p in the network receives a message m supposedly from an adjacent router q, then p can check that m was indeed sent by q, was not modified after it was sent, and was not a replay...

    Provided By IJCER

  • White Papers // Jul 2013

    Anomaly Detection Using Hidden Markov Model

    In this paper, the authors proposes an empirical method of Anomaly detection by analyzing the spending habit of vendee. Proposed system models the sequence of operations in credit card transaction processing using a Hidden Markov Model (HMM) and shows how it can be used for the detection of frauds. In...

    Provided By IJCER

  • White Papers // Jul 2013

    Identification of Packet Dropping and Modification in Wireless Sensor Networks

    The simplicity in wireless sensor network with resource constrained nodes makes them extremely vulnerable to variety of attacks. In a Wireless sensor networks sensor nodes monitor the environment, detect events of interest, produce data and collaborate in forwarding the data towards to a sink, which could be a gateway, base...

    Provided By IJCER

  • White Papers // Jul 2013

    Research on Cloud Computing

    This paper is an introduction to the terms, characteristics, and services associated with network-based computing, commonly referred to as cloud computing. Cloud Computing is a technology that uses the network and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation...

    Provided By IJCER

  • White Papers // Jun 2013

    A Survey of Permissive Public Auditability and Data Dynamics for Storage Security in Cloud Computing

    Cloud storage allows users to remotely store their information and revel in the on-demand top quality cloud applications while not the burden of local hardware and software management. although the advantages are clear, such a service is additionally relinquishing users physical possession of their outsourced information that inevitably poses new...

    Provided By IJCER

  • White Papers // Jun 2013

    Secure Adhoc Network

    Now-a-day, it is no longer optional to have security solutions even inevitable for every kind of organizations and individuals. There are number of generic tools which are common for organizations as well as for individual users to provide security which includes; anti-spam, anti-virus etc., and network security have become essential...

    Provided By IJCER

  • White Papers // Jun 2013

    Cloud Computing Security: Abuse and Nefarious Use of Cloud Computing

    Cloud computing is an emerging and promising computing model that provides on-demand computing services which eliminates the need of bearing operational costs associated with deploying servers and software applications. As with any technology, cloud computing presents its adopters with security and privacy concerns that arise from exposing sensitive business information...

    Provided By IJCER

  • White Papers // Jun 2013

    A Novel Approach for Converting Relational Database to an Object Oriented Database: Data Migration and Performanace Analysis

    The object-oriented data model is predicted to be the heart of the next generation of database systems. Users want to move from old legacy databases into applying this new technology that provides extensibility and flexibility in maintenance. However, a major limitation on the wide acceptance of object-oriented databases is the...

    Provided By IJCER

  • White Papers // Jun 2013

    MANET: Black Hole Node Detection in AODV

    In today's world every user need to transfer data with one-other irrespective to individual's geographic location. Hence a Mobile Ad-hoc NETwork (MANET) has become a vital part of modern communication over wireless network. MANET helps to transfer data without fixed infrastructure and many autonomous nodes vigorously can become part of...

    Provided By IJCER

  • White Papers // Jun 2013

    Ranked Keyword Search in Cloud Computing: An Innovative Approach

    Cloud computing has become an integral part of IT industry. Amount of information available on World Wide Web is increasing at an exponential pace. In such a vast collection it becomes difficult for the user to query something out of the whole collection. Great efforts have been made for facilitating...

    Provided By IJCER

  • White Papers // Jun 2013

    A Presumable Data Retentive Framework for Multi Cloud

    Cloud storage or storage outsourcing is a rising trend where the cloud storage service provides a comparably low-cost, scalable, position-independent platform for storing client's data. This archival storage guarantees the authenticity of data on storage server, but does not guarantee for the tampering of data (modifications or deletions, to the...

    Provided By IJCER

  • White Papers // Jun 2013

    A Survey on Security in Multihop Wireless Network

    Multihop wireless networks are the type of networks which require two or more wireless hops to deliver the information from the source to destination. Thus finding an optimal and most secure path to route the data is the major challenge. There are various routing protocols proposed for Multihop wireless networks...

    Provided By IJCER

  • White Papers // Jun 2013

    An Efficient Comparison Ofmimo-Ofdm Detection Using Spatial Multiplexingtechniques

    Multiple Input Multiple Output (MIMO) systems have recently emerged as a key technology in wireless communication systems for increasing both data rates and system performance. There are many schemes that can be applied to MIMO systems such as space time block codes, space time trellis codes, and the Vertical Bell...

    Provided By IJCER

  • White Papers // Jun 2013

    Intrusion Detection in Virtualized Environment

    Server virtualization is one of the concepts driving current enterprise infrastructure design and setup. It ensures business continuity and agility through on demand resource sharing and optimum resource utilization. At the same time it has raised concerns over new trends of security breaches and attacks on virtual machines. Traditional intrusion...

    Provided By IJCER

  • White Papers // Jun 2013

    Report on Reputation Based Data Aggregation for Wireless Network

    Wireless sensor network consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. In wireless networks, malicious sensor nodes send false data reports to distort aggregation results. Existing trust...

    Provided By IJCER

  • White Papers // Jun 2013

    Local Maximum Lifetime Algorithms for Strong K-Barrier

    Barrier coverage of wireless sensor networks are been studied intensively in recent years under the assumption that sensors are deployed uniformly at random in a large area. In this paper a new network construction method of sensor nodes for Border Security Systems is proposed. This barrier coverage are known to...

    Provided By IJCER

  • White Papers // Jun 2013

    Efficient Tree Based Structure for Mining Frequent Pattern from Transactional Databases

    Frequent pattern mining plays a very important role in data mining technique. There are many various studies about the problem of frequent pattern mining and association rule mining in large transactional databases. Frequent pattern mining technique are divided into 2 categories : a priori based algorithm and tree structure based...

    Provided By IJCER

  • White Papers // May 2013

    Analyzing Massive Machine Data Maintaining in a Cloud Computing

    The authors present a novel framework, Cloud View, for storage, processing and analysis of massive machine maintenance data, collected from a large number of sensors embedded in industrial machines, in a cloud computing environment. This paper describes the architecture, design, and implementation of CloudView, and how the proposed framework leverages...

    Provided By IJCER

  • White Papers // May 2013

    Literature Review: Iris Segmentation Approaches for Iris Recognition Systems

    A biometric system offers automatic identification of a human being based on the unique feature or characteristic which is being possessed by the individual. The iris segmentation has its own major applications in the field of surveillance, forensics as well as in security purposes. The performance of the iris recognition...

    Provided By IJCER

  • White Papers // May 2013

    A Novel Approach to Mine Frequent Item sets of Process Models for Dyeing Process using Association Rule Mining

    A noval approach of process mining provides a new means to improve processes in a variety of application domains these process mining techniques help organizations to uncover their actual business processes in this presented paper. Dyeing process using apriori algorithm. but apriori algorithm has some drawback like more execution time,...

    Provided By IJCER

  • White Papers // May 2013

    Priority Based Service Composition Using Multi Agent in Cloud Environment

    Cloud computing is a highly research area in the technical I.T field and economic world, and many of the software industry have entered the development of cloud services. It is the preeminent on-demand service system along with a \"Pay-as-you-go\" policy. Agent-based Cloud computing consist of the design and development of...

    Provided By IJCER

  • White Papers // May 2013

    A Study on Security in Sensor Networks

    Network management is one of the important functionality in network Engineering. This paper proposes a methodology for security in SNMP managed sensor networks. McAfee is the platform used for implementing the security. It is mainly based on SNMP V3 which is the enhanced version of SNMP and it includes authentication.IEEE1451.4...

    Provided By IJCER

  • White Papers // Nov 2012

    Hybridization of Neighbourhood Search Metaheuristic with Data Mining Technique to Solve P-Median Problem

    Combinatorial optimization is the most panoptic area in current research paper. The p-median problem which is a combinatorial optimization problem is NP-Hard in nature that realizes facilitators which serves the maximum locations. The p-median problem will be practical in several applications areas such as escalating marketing strategies in the sphere...

    Provided By IJCER

  • White Papers // Nov 2012

    Key Infrastructure Elements for Cloud Computing

    Cloud computing has been the most prevalent technology in the past few years. Clouds consist of a collection of virtualized resources, which include both computational and storage facilities that can be provisioned on demand, depending on the users needs. Users are charged on a pay-per-use basis. This paper gives a...

    Provided By IJCER

  • White Papers // Nov 2012

    Multiparty Secure Communication by Using Quantum Key Distribution Protocols

    By using the order rearrangement of the single photon sequence and unitary transformations, a multiparty controlled quantum communication scheme for Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is presented. In this scheme, messages can only be recovered by the receivers with the permission of all controllers. It is shown...

    Provided By IJCER

  • White Papers // Nov 2012

    Area Optimized and Pipelined FPGA Implementation of AES Encryption and Decryption

    Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), and categorized as Computer Security Standard. The AES algorithm is a block cipher that can encrypt and decrypt digital information. The AES algorithm is capable of using cryptographic keys of 128, 192, and 256 bits. The Rijndael cipher has been...

    Provided By IJCER

  • White Papers // Dec 2012

    Adopting Trusted Third Party Services for Multi-Level Authentication Accessing Cloud

    Cloud computing is an emerging, on-demand and internet-based technology. It provides variety of services over internet such as, software, hardware, data storage and infrastructure. This technology has been used by worldwide customers to improve their business performance. At present, authentication is done in several ways: such as, textual, graphical, bio-metric,...

    Provided By IJCER

  • White Papers // Dec 2012

    Optimized DES Algorithm Using X-Nor Operand Upto 4 Round on Spartan3

    In this paper, linear cryptanalysis is a known-plaintext attack that uses a linear relation between input-bits, output-bits, and key-bits of an encryption algorithm that holds with a certain probability. If enough plaintext-ciphertext pairs are provided, this approximation can be used to assign probabilities to the possible keys and to locate...

    Provided By IJCER

  • White Papers // Dec 2012

    Avoidance of Bottleneck in PCS Network

    Cellular communication has been experiencing a rapid growth in recent years. From its introduction in the early 1980s, cellular communication has been evolved from a costly service with limited availability toward an affordable alternative to wired telephone service. This paper contains the concept of Personal Communication Service (PCS) network and...

    Provided By IJCER

  • White Papers // Dec 2012

    Implementation of an OFDM FFT Kernel for WiMAX

    In this paper, the authors focus on the OFDM Kernel which refers to the inverse fast Fourier transform and cyclic prefix insertion blocks in the downlink flow and the FFT and cyclic prefix removal blocks in the uplink flow. To support Orthogonal Frequency-Division Multiple Access (OFDMA) an extension to the...

    Provided By IJCER

  • White Papers // Dec 2012

    Study and Comparison of Various Point Based Feature Extraction Methods in Palmprint Authentication System

    Bio metrics is the word derived from Greek words "Bio" means (life) & "Metrics" means (to measure). Bio metrics is the science of measuring human characteristics for the purpose of authenticating or identifying the identity of an individual. Biometrics System is used for automated recognition of an individual. In Information...

    Provided By IJCER

  • White Papers // Dec 2012

    A Method for Hiding Secret Messages Using Minimum-Redundancy Codes

    In this paper, the authors demonstrate an effective lossless data hiding scheme using minimum Redundancy codes. The binary secret message is concurrently embedded and encoded with a cover medium such as a video file, an audio file, or even a text file. In this paper, the symbol or sequence of...

    Provided By IJCER

  • White Papers // Dec 2012

    Improving Detection Performance of Cognitive Femtocell Networks

    Femtocell is envisioned as a highly promising solution for indoor wireless communications. The spectrum allocated to femtocells is traditionally from the same licensed spectrum bands of macrocells. The capacity of femtocell networks is highly limited due to finite number of licensed spectrum bands and the interference with macrocells and other...

    Provided By IJCER

  • White Papers // Jan 2013

    Memory Efficient Bit Split Based Pattern Matching for Network Intrusion Detection System

    In recent days hardware based Network intrusion detection system is used to inspect packet contents against thousands of pre defined malicious or suspicious patterns in order to support the high speed internet download. Because traditional software alone pattern matching approaches can no longer meet the high throughput of today's networking,...

    Provided By IJCER

  • White Papers // Jan 2013

    A Novel Approach to Improve Detection Rate and Search Efficiency of NIDS

    Information is an important asset in an organization which has large amount of personal and critical data with it. Protecting that information from attacks should be the main goal when security is concerned. Signature based Network Intrusion Detection System (NIDS) applies a set of rules to identify the traffic and...

    Provided By IJCER

  • White Papers // Jan 2013

    Reengineering of Relational Databases to Object Oriented Database

    Many information systems use relational database systems for efficient sharing, storage, and retrieval of large quantities of data. On the other hand, object-oriented programming has been gaining wide acceptance in the programming community as a paradigm for developing complex applications that are easy to extend and maintain. This paper discusses...

    Provided By IJCER

  • White Papers // Jan 2013

    Hand Palm Vein Authentication by Using Junction Points with Correlation Method

    In the digital world, it is very difficult to maintain the people personal records and securing data from intruders. Today every person can easily access their information anytime and anyplace. Hand palm vein authentication is a biometric modality, which can be used to identify a person. In this paper, palm...

    Provided By IJCER

  • White Papers // Jan 2013

    A Survey on 3d Localization in Wireless Sensor Networks

    WSN is used in many recent trends in wireless application, where its nodes needed to localize him before sending any data. Nodes are defines their coordinates in localization process, through coordinates they localize himself. There are various algorithm proposed in localization based on 2D works on two plane, it provides...

    Provided By IJCER

  • White Papers // Jan 2013

    Bandwidth Enhancement of a 2?2 Triangular Microstrip Patch Antenna Using Triangular Lattice Ebgs in the Ground Plane

    Triangular lattice Electromagnetic Band-Gap (EBG) Structure in the ground plane is used in the design of a Triangular Micro-strip Patch Antenna (TMPA) Array to improve its bandwidth. The patch elements are equilateral triangular in shape. The Equilateral Triangular Micros-trip Patch Antenna (ETMPA) Array design has four patch elements in 2?2...

    Provided By IJCER

  • White Papers // Oct 2012

    Real Time Automatic Object Tracking by Pan-Tilt-Zoom Cameras in an IP-Surveillance System

    Pan-Tilt-Zoom (PTZ) cameras are one of the advanced security cameras in the market. These cameras have the ability to cover a very far field and can acquire high resolution of images. These cameras are deployed mainly for perimeter surveillance applications where the security guards have to monitor the intruders from...

    Provided By IJCER

  • White Papers // Oct 2012

    Intrusion Detection System (IDS) for Secure MANETs: A Study

    Flooding-based route discovery is usually preferred in MANETs in order to set up the route with reliability between transmission pair. However, this approach may cause a serious contention in information transfer between adjacent nodes and a considerable amount of control packets. The transfer of information between nodes is made secured...

    Provided By IJCER

  • White Papers // Oct 2012

    Analysis of Node Localization in Wireless Sensor Networks

    Sensor networks are dense wireless networks of small, low-cost sensors, which collect and disseminate environmental data. Sensor nodes are very small, lightweight, and unobtrusive. The problem of localization, that is, "Determining where a given node is physically located in a network", can be mainly divided into two parts range-based (fine-grained)...

    Provided By IJCER

  • White Papers // Feb 2013

    Automatic Static Signature Verification Systems: A Review

    Handwritten signature is a distinguishing biometric feature which is the most widely employed form of secure personal authentication. Signature verification is used in a large number of fields starting from online banking, passport verification systems to even authenticating candidates in public examinations from their signatures. Even today thousands of financial...

    Provided By IJCER

  • White Papers // Feb 2013

    Throughput of Wireless Multi-Mesh Networks: An Experimental Study

    IEEE 802.11 standard provides infrastructure-less operating mode called as ad hoc mode. Absence of infrastructure and self-configuration capability makes ad hoc networks suitable for low-cost applications, but results in wireless medium instability and low connectivity. Hence WMN is proposed to increase the ad hoc connectivity because WMN extends the coverage...

    Provided By IJCER

  • White Papers // Feb 2012

    Development of an Optimal Routing Algorithm for MANET Using Neural Networks

    In this paper, the authors evaluate a self-organizing routing protocol for Ad Hoc network, called the NEUron Routing ALgorithm (NEURAL). NEURAL has been designed taking into ac-count the learning and self-organizing abilities of the brain. More precisely, it was inspired by the synapses process between neurons, when a signal is...

    Provided By IJCER

  • White Papers // Apr 2012

    Host Based Information Gathering Honeypots for Network Security

    Honeypots are an exciting new technology which is widely used in the areas of computer and Internet security that, allows the authors to turn the tables on the bad guys. It is a resource, which is intended to be attacked and computerized to gain more information about the attacker, and...

    Provided By IJCER

  • White Papers // Jun 2012

    Application Specific Quality of Service (QoS) Centric Parameters Simulation in Wireless Mobile Ad Hoc Networks

    Wireless mobile ad hoc networks are a collection of mobile nodes communicating with each other without any existing infrastructure networks via wireless links. In this paper, modelling and simulation of Ad hoc On-demand Distance Vector (AODV) Routing Protocol is performed. Study and analysis of parameters for Vehicular Communication application is...

    Provided By IJCER

  • White Papers // Jun 2012

    Design of an Intelligent SMS Based Remote Metering System for AC Power Distribution to HT and EHT Consumers

    Electrical distribution utilities are facing problems due to high energy losses that amount to 8% of the total generation. 4% of the losses are unaccounted. The problem is mainly associated with sub-transmission and distribution networks. This paper presents a unique solution to devise a unit which is tamperproof, cost effective,...

    Provided By IJCER

  • White Papers // Jun 2012

    Credit Card Fraud: Bang in E-Commerce

    Recent decades have seen a gigantic expansion in the use of credit cards as a true transactional medium. Data mining is rising as one of the chief features of many homeland securityinitiatives. Often, it is used as a means for detecting fraud, assessing risk, as well as product retailing. Data...

    Provided By IJCER

  • White Papers // Jun 2012

    Improvement in Enhanced Privacy Protection in LBS

    In order to access location-based services, mobile users have to disclose their exact location information to service providers. However, adversaries could collect the location information for purposes against mobile user's privacy, such as tracking and stalking. The most popular solutions for privacy protection are utilizing the K-anonymity model to blur...

    Provided By IJCER

  • White Papers // Jun 2012

    Simulation of Beamforming Solution of Intereference Reduction for High Altitude Systems

    Interference reduction is vital for being able to effectively communicate with mobile users in rugged terrain and mountainous regions .It is proposed to outfit a high flying airborne node with a Code Division Multiple Access (CDMA) base station in order to provide line of sight communications and continual coverage to...

    Provided By IJCER

  • White Papers // Jun 2012

    Floating Point Unit Implementation on FPGA

    As densities of FPGA are increasing day by day, the feasibility of doing floating point calculations on FPGAs has improved. Moreover, recent works in FPGA architecture have changed the design tradeoff space by providing new fixed circuit functions which may be employed in floating-point computations. By using high density multiplier...

    Provided By IJCER

  • White Papers // Jun 2012

    A New Omni-Directional Monopole Antenna for Interference Reduction

    A compact Ultra WideBand (UWB) antenna with band-notched characteristic is presented in this paper. It has compact size of 30 mm x 31mm and has ultra wide band operation. A 'C' shaped slot was introduced to achieve band notch function from 4.8 GHz to 6 GHz to avoid interference from...

    Provided By IJCER

  • White Papers // Jun 2012

    Computing Over a Multi Cloud for MTC Applications

    The single cloud will not be more effective for MTC paradigm (Many-Task Computing (MTC) paradigm embraces different types of high-performance applications involving many different tasks, and requiring large number of computational resources over short periods of time. These tasks can be of very different nature, with sizes from small to...

    Provided By IJCER

  • White Papers // Aug 2012

    A Compact Printed Antenna for Wimax, Wlan & C Band Applications

    A single feed compact micro-strip antenna is proposed in this paper. One L slit & one H slit are introduced on the right edge of the patch to study the effect of the slit on radiation behaviour with respect to a conventional micro-strip patch. An extensive analysis of the return...

    Provided By IJCER

  • White Papers // Aug 2012

    A Selective Survey and Direction on the Software of Reliability Models

    In this paper, the author has many challenges in getting wide spread use of software reliability models. He focuses on software reliability models and measurements. A software reliability model specifies the general form of the dependence of the failure process on the principal factors that affect it: fault introduction, fault...

    Provided By IJCER

  • White Papers // Aug 2012

    An Improved Self Cancellation Scheme to Reduce Non-Linearity in OFDM Spectrum

    As the wireless communication system has evolved tremendously, leading to the need for high performance and much higher capacity for the multiuser communication systems but within the constraints of limited spectrum and limited bandwidth. The main function of OFDM is to convert a frequency selective channel into a collection of...

    Provided By IJCER

  • White Papers // Aug 2012

    A Survey on Models and Test Strategies for Event-Driven Software

    A Graphical User Interface (GUI) testing tool is one to test applications user Interface and to detect the correctness of applications functionality. Event-Driven Software (EDS) can change state based on incoming events; common examples are GUI and web applications. These EDS pose a challenge to testing because there are a...

    Provided By IJCER

  • White Papers // Aug 2012

    Comparison of Power Consumption and Strict Avalanche Criteria at Encryption/Decryption Side of Different AES Standards

    The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems. Now as the world is moving towards high speed of communication (larger data rate), more secure and fast algorithms are required to keep the information...

    Provided By IJCER

  • White Papers // Sep 2012

    Institutional Knowledge to Institutional Intelligence: A Data Mining Enabled Knowledge Management Approach

    Significant amount of knowledge is created in Higher Educational Institutions (HEIs) as a result of the academic, research and administrative activities. Deployment of the knowledge generated towards performance enhancement, decision making and process improvement will yield effective results such as enhanced planning and development, better administrative services, improved teaching and...

    Provided By IJCER

  • White Papers // Sep 2012

    Query Optimization Issues for Data Retrieval in Cloud Computing

    Cloud data storage redefines the issues targeted on customer's out-sourced data (data that is not stored/retrieved from the customers own servers). In this paper, the authors observed that, from a customer's point of view, the data need to be accessed with in no time the user given the request, Even...

    Provided By IJCER

  • White Papers // Sep 2012

    Statistical Multipath Signal Detection in CDMA for Ad Hoc Network

    Mobile Ad-hoc NETworks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, ''Ad-hoc'' network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad-hoc networking concept is not a...

    Provided By IJCER