IJCSMR

Displaying 1-40 of 137 results

  • White Papers // Oct 2013

    Data Mining-General Concepts

    Data mining is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts and costs. Data mining tools predict behaviors and future trends, allowing businesses to make proactive, knowledge-driven decisions. It allows users to analyze data...

    Provided By IJCSMR

  • White Papers // Oct 2013

    Induction Decision Trees for Tentative Data

    A decision tree is a tree in which each branch node represents a choice between a number of alternatives, and each leaf node represents a classification or decision. In this paper, the authors extend such classifiers to handle data with uncertain information. Classification is one of the most efficient and...

    Provided By IJCSMR

  • White Papers // Oct 2013

    Privacy Preserving Delegated Attribute Based Group Key Management Access Control in Public Clouds

    Current approaches to enforce fine-grained access control on confidential data hosted in the cloud are based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on the cloud and re-encrypting the data whenever user credentials or authorization policies...

    Provided By IJCSMR

  • White Papers // Oct 2013

    Improving Parallel Data Processing in the Cloud by Exploiting Dynamic Resources

    In recent years ad hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major Cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy...

    Provided By IJCSMR

  • White Papers // Oct 2013

    A Contract Signing Approach For Bidirectional Conformity Based Secure Communication Over Cloud

    Several trends are opening up the era of cloud computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the Software as a Service (SaaS) computing architecture, are transforming data centers into pools of computing service on a huge scale....

    Provided By IJCSMR

  • White Papers // Oct 2013

    Result Analysis and Comparison of Document Fraud Detection With the Help of Data Mining and Secure Substitution Method With Frequency Analysis

    A major problem of many organization, industry of fraud prevention, although the prevention is the west way to reduce the document fraud, several data mining algorithms have been developed that allow large amount of relevant knowledge like of data financial statement fraudulent detect. In this paper are presented on efficient...

    Provided By IJCSMR

  • White Papers // Oct 2013

    An Impend Solution to Avert Login Credentials Speculation Attacks

    Username and password are the usual credentials of an online membership accounts. Guessing those credentials is a major problem in login system. The foremost way to prevent those illegal login attempt is Automated Turing Test (ATT). ATT will ask every user to answer a set of predefined questions during every...

    Provided By IJCSMR

  • White Papers // Oct 2013

    A Survey on Node Replica Detection in Wireless Sensor Networks

    A wireless sensor network is a group of sensor nodes. Sensor senses the environment, process data and communicates wirelessly over a short distance. Wireless sensor network has been used in various critical applications. Hence security is of prime concern. The node replication attack is one in which an adversary captures...

    Provided By IJCSMR

  • White Papers // Oct 2013

    No to Fingerprint Security System

    Fingerprint recognition or fingerprint authentication refers to automated method of verifying a match between two human fingerprints. The Touch ID sensor, this is likely to be used to the new range of ipad devices and give them a whole new level of functionality. According to older technologies, it is much...

    Provided By IJCSMR

  • White Papers // Aug 2013

    Caught in a Storm-Challenges for Higher Education Clouds

    The \"Cloud computing\" trend of replacing software traditionally installed on campus computers (and the computers themselves) with applications delivered via the internet is driven by aims of reducing universities' IT complexity and cost. While today's \"Cloud powered\" higher education institutions can gain significant flexibility and agility, the corresponding migration of...

    Provided By IJCSMR

  • White Papers // Aug 2013

    A Survey on Out Sourcing Data to Provide Security for Valuable Data Sets

    Cloud computing is benign for several businesses of all sizes, it's not while not its peril. Its conference to possess a crystal reason for switch to \"The cloud\" and portrayal what the business wants to realize from such a switch. \"The cloud\" may be enforced in several forms. Cloud computing...

    Provided By IJCSMR

  • White Papers // Aug 2013

    Implementing Bottleneck Detection Algorithm in IaaS Cloud for Parallel Data Processing Using Nephele

    In recent years ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. However, the processing frameworks which are currently used have been designed for static, homogeneous cluster setups and disregard the particular nature of a cloud. In this paper, the author starts...

    Provided By IJCSMR

  • White Papers // Aug 2013

    Security Using Identity based Cryptography in Multipath DSR

    Ad hoc networks are useful for providing communication support where no fixed infrastructure exists or the deployment of a fixed infrastructure is not economically profitable, and movement of communicating parties are allowed. Due to the dynamic topology, developing better routing protocol became a challenging task. The Dynamic Source Routing (DSR)...

    Provided By IJCSMR

  • White Papers // Aug 2013

    Provable Data Possession & Dynamic Audit Services for Integrity Verification in Clouds Environments

    Provable Data Possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, the authors address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which they consider the existence of multiple...

    Provided By IJCSMR

  • White Papers // Aug 2013

    Designing a Secure Configuration Management in IDPS's to Protect From DDOS Attacks

    This paper aims to study the impact of security enforcement levels on the performance and usability of an enterprise information system. The authors develop a new analytical model to investigate the relationship between the intrusion detection and prevention system performance and the rules mode selection. In particular, they analyze the...

    Provided By IJCSMR

  • White Papers // Jul 2013

    New Approach for Secure Source Routing Protocol in MANET

    Routing is one of the key issues in MANETs because of highly dynamic and distributed nature of nodes. Especially energy efficient routing is most important because all the nodes are battery powered and security because infrastructure less environment. Failure of one node may affect the entire network. On the secure...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Resource Discovery and Replication for Cost Effective and Secure Utilization in Grid Computing

    Mainly in the computational clusters, the most matter goes to communicating. To be able to reduce the communication cost and formulate its functionality researchers have been conducting research on setting of data in distribution system. In the early research, for the development of operation in transactions, the duplication of positioning...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Intrusions Detection in Threetier Web Applications Using DoubleGuard System

    A lot of importance has been achieved by internet services and application in the people daily life, they provide communication and the management of personal information from any remote location. Web services helps to accommodate this increase in application and data complexity, and have moved to a multitier design in...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Efficient Key Authentication Protocol for Dynamic Group Communication

    An important problem in secure group communication is key distribution. Most of the centralized group key management schemes employ rekeying cost. Instead of performing individual rekeying, these paper discuss an three interval based approach for updating the group key: rebuild, batch rekeying and queue batch algorithm. The authors mathematically analyze...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Random Cued Click Point Graphical Password Authentication

    An important usability goal for knowledge-based authentication system is to support users for selecting passwords of higher security, in the sense of being from an expanded effective security space. Click cued points is a click-based graphical password scheme, a cued-recall graphical password technique. Users click on one point per image...

    Provided By IJCSMR

  • White Papers // Jul 2013

    A Survey on Out Sourced Data Security in Cloud Environment Cloud Security Systems for Out Sourced Data

    Information retrieval techniques hide the user's query, e.g., the data item searched for, but not the data being queried. To outsource valuable data to an insecure server, such techniques are clearly not appropriate. The authors consider a cloud computing setting in which similarity querying of metric data is outsourced to...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Decentralized Clustering Algorithm for Authentication and Topology Control in MANET

    Fastest raising modern network which includes sensing, computation, and communication into a tiny device. Wireless sensor network which lies in the ability to deploy large numbers of tiny nodes that assemble and configure themselves. The most straightforward application of this technology is to monitor remote environments for low frequency data...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Unobservable Secure Routing Scheme with Enhanced Security Features

    The Unobservable Secure On-demand Routing protocol (USOR) offers complete unlinkability and unobservability for all types of packets where other schemes fail. This privacy preserving protocol achieves content unobservability by employing an anonymous key establishment based on group signature. In this any meaningful packet in the routing scheme is indistinguishable from...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Secured Multi-Cloud Environment Using DEPSKY Architecture

    The use of cloud computing has increased rapidly in many organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive information with cloud storage providers...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Enhancing the Link Based Clustering Using Ranking and Link Analysis

    Information retrieval from database has always been a significant issue. Data clustering is one of the techniques developed for this purpose. In clustering, logically similar information are physically stored together. Clustering ensemble combine multiple partitions by different algorithm into single clustering solution. To solve the problem of clustering categorical data...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Integrity Verification & Maintaining Distributed Accountability of Outsourced Storages in Clouds

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Survey on Item Based Collaborative Filtering Algorithm for Data Processing and Mining of Patterns in Mobile Commerce

    Mobile commerce is unfolded across numerous domains, that is extremely large and plenty of analysis studies area unit occurring. His main domains are data mining and prediction. In data mining the authors are able to divide the analysis work among Mining of association rules and mining of patterns. Comparison of...

    Provided By IJCSMR

  • White Papers // Jul 2013

    Prevention of Jamming Attacks Using Inferring Router Packet Forwarding System

    Uninterrupted handiness of the open wireless medium to interconnect collaborating nodes. However, the open nature of this medium leaves it vulnerable to multiple safety threats. any person with a transceiver will eavesdrop on wireless transmissions, introduce spurious messages, or jam justifiable ones. While eavesdropping and message injection may be prevented...

    Provided By IJCSMR

  • White Papers // Jun 2013

    Cloud Computing Application and Architecture

    Cloud computing is a wonderful model where users can access their applications from anywhere through their connected devices. Cloud computing is a general term that involve service over the internet. Cloud symbol represents the internet in flowcharts and diagrams. Cloud computing allows a company to pay for only those space...

    Provided By IJCSMR

  • White Papers // Jun 2013

    A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET

    Manet is a short-term network made up of movable nodes among a particular range for broadcasting data. Due to these movements the genuineness of the nodes cannot be properly detected & verified without which it might be consider as malicious node. Recognition of this behavior might be considered as a...

    Provided By IJCSMR

  • White Papers // Jun 2013

    Mining the History to Determine the Outlook: Trouble and Promise

    The large data sets are increasingly common due to the advance technology. Such data sets give the user with unequalled opportunities for modeling and predicting the likely outcome of future events. However, such data sets may also bring with them new challenges and difficulties. Due to these difficulties and the...

    Provided By IJCSMR

  • White Papers // Jun 2013

    Reducing Average Task Completion Time Using Network Aware VM Placement and Migration Approach In Cloud

    Cloud computing architectures have received an increasing attention in recent years due to their great promises. The infrastructure of cloud computing environment is usually composed of hundreds or even thousands of server nodes. There are two types of node in cloud Computing Environment - computing nodes and storage nodes. The...

    Provided By IJCSMR

  • White Papers // Jun 2013

    Design of Secure Cryptosystem Under Deception Attacks

    Information technology security can be described in terms of security objectives such as confidentiality, integrity, authentication, availability, authorization, auditability, non-repudiability and thirdparty protection, of which the first four ones suffering from deception attacks, the RNPC method based on round-trip time delays is proposed to compensate have highest priority for the...

    Provided By IJCSMR

  • White Papers // Jun 2013

    Traffic Pattern Based Performance Comparison of Manet Routing Protocols in Adhoc Networks at Different Terrian Size

    Mobile Ad Hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Mobile Ad Hoc NETworks (MANETs) have the attributes such as wireless connection, continuously changing topology, distributed operation and easy of deployment. Each...

    Provided By IJCSMR

  • White Papers // Jun 2013

    Cloud Storage With Light-Weight Communication and Computation Price

    Cloud-based outsourced storage releases the client's burden for storage management and maintenance by providing a comparably low-cost, scalable, location-independent platform. Cloud storage allows users to remotely store their information and revel in the on-demand prime quality cloud applications while not the burden of native hardware and software system management although...

    Provided By IJCSMR

  • White Papers // Jun 2013

    Multi Agent Based Intelligent Traffic Clouds

    Intelligent transportation clouds could provide Services such as autonomy, mobility, decision support and the standard development environment for traffic management strategies, and so on. With mobile agent technology, an urban-traffic management system based on Agent-Based Distributed and Adaptive Platforms for Transportation Systems (Adapts) is both feasible and effective. However, the...

    Provided By IJCSMR

  • White Papers // Jun 2013

    Availability of Grid Resources Based on Prediction and Resource Monitoring which Aggregates Heterogeneous Resources Distributed Over Internet

    The paramount aspect of any distributed system is that its resources should be monitored to provide effectual system. In the authors' paper, they depict an analogous architecture of monitoring of various resources devised for Grid. This paper consists of five diverse modules. Grid utilizes resource in a dynamic method which...

    Provided By IJCSMR

  • White Papers // Jun 2013

    Application of Mealy machine and Recurrence Matrices in cryptography

    In cryptology secret sharing (also called secret splitting) refers to method for distributing a secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number, possibly different types of shares are combined together. Individual shares...

    Provided By IJCSMR

  • White Papers // Jun 2013

    A Reputation Based Scheme for Routing Misbehavior Detection in MANETs

    Mobile Ad Hoc NETwork (MANET) is a collection of mobile nodes (hosts) which communicate with each other via wireless links either directly or relying on other nodes as routers. The operation of MANETs does not depend on preexisting infrastructure or base stations. Network nodes in MANETs are free to move...

    Provided By IJCSMR

  • White Papers // Jun 2013

    Reliable and Efficient Routing Using Genetic Algorithm in Networks

    The field of networks has gained an important part of the interest of researchers and has become very popular in the last few years. The network must operate without fixed infrastructure and can survive rapid changes in the topology. It can be studied formally as a graph in which the...

    Provided By IJCSMR

  • White Papers // May 2013

    Smartphone Attacks and Security Challenges

    Smartphones offer many more functions than traditional mobile phones. In addition to a preinstalled mobile operating system, such as iOS, Android, or Windows Mobile, most smartphones also typically support carrier networks, Wi-Fi connectivity, and Bluetooth so that users can access the Internet to download and run various third party applications....

    Provided By IJCSMR

  • White Papers // May 2013

    Authenticating Protocol for Spontaneous Wireless Ad Hoc Networks

    The spontaneous ad-hoc network is defined as a type of an ad-hoc network, which is formed during certain period of time with independent central server having no interference of an expert user, for carrying out any specific task or solving a problem. This network is built by numerous independent nodes...

    Provided By IJCSMR

  • White Papers // May 2013

    Immigrants and Memory Schemes for Dynamic Shortest Path Routing Problems in Mobile Adhoc Networks Using PSO, BFO

    The advancement in wireless communications has become more and more mobile wireless networks. The most essential feature in mobile ad hoc networks is topology change i.e., the topology of the network changes over time to time since node mobility occurs often. Therefore finding the shortest path for the routing problem...

    Provided By IJCSMR

  • White Papers // May 2013

    Impact of Security Techniques on Cloud Computing

    Several trends are opening up the era of cloud computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the Software as a Service computing architecture, are transforming data centers into pools of computing service on a huge scale. The...

    Provided By IJCSMR

  • White Papers // May 2013

    A NOVEL Approach for Efficient Routing in AOMDV Protocol

    A common characteristic of all popular multipath routing algorithms in mobile ad-hoc networks, such as AOMDV, is that the end to end delay is reduced by utilization of parallel paths. The competition between the neighboring nodes for obtaining a common channel in those parallel paths is the reason for end...

    Provided By IJCSMR

  • White Papers // May 2013

    Various Methods Used for the Protection, Detection and Prevention of Application Layer DDOS Attacks

    Among all the attacks that occur on a web application like SQL Injection, XSS (Cross Site Scripting) attacks, DDOS attacks, etc., DDOS are the most difficult to detect and prevent. DDOS attacks occur mainly at two levels : application layer and network layer. Application layer DDOS attacks are very difficult...

    Provided By IJCSMR

  • White Papers // May 2013

    Generating Cryptosystem for Multimodal Biometrics Based on Feature Level Fusion

    Multi-biometrics are used worldwide because there will be low error rate and large population coverage. Multi-biometric data are stored in template and these template needs to be protected. There are many attacks possible in these templates. So here, the authors transform the different biometric representation (iris, fingerprint and face) into...

    Provided By IJCSMR

  • White Papers // May 2013

    IP Assignment Strategy in Mobile Ad Hoc Networks

    A Mobile Ad Hoc NETwork (MANET) consists of a set of identical mobile nodes communicating with each other via wireless links. The network's topology may change rapidly and unpredictably. Such networks may operate in a stand-alone fashion, or may be connected to the larger Internet. In traditional networks, hosts rely...

    Provided By IJCSMR

  • White Papers // May 2013

    Genetic Algorithm With Immigrants and Memory Schemes for Dynamic Shortest Path Routing Problems in Mobile Ad Hoc Networks Using Neural Networks

    Mobile Ad hoc NETworks (MANETs) containing mobile nodes connected by wireless links. All the nodes in the network can move freely and dynamically. So the network topology is not stable and changing dynamically. MANETs are called self organized networks because they never use any infrastructure such as base station or...

    Provided By IJCSMR

  • White Papers // May 2013

    Decision Tree Based IDS Implementation: Review

    Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements - they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, data mining - based Intrusion Detection Systems (IDSs) have demonstrated high accuracy,...

    Provided By IJCSMR

  • White Papers // May 2013

    Association Rules Mining Technique Based on Spatial Data Classification

    Data mining is the process of extracting hidden patterns from large amounts of data and is increasingly important tool for transforming data into information. It is mostly used in a wide range of profiling practices, such as marketing, surveillance, and other practices. Association Rules mining is an important technique of...

    Provided By IJCSMR

  • White Papers // May 2013

    Cluster Ensemble for Clustering Different Categorical Datasets Using SIR

    Clustering ensembles have emerged as a powerful method for improving both the robustness and the stability of unsupervised classification solutions. it is observed that these techniques unfortunately generate a final data partition based on incomplete information. The underlying ensemble-information matrix presents only cluster-data point relations, with many entries being left...

    Provided By IJCSMR

  • White Papers // May 2013

    A Comprehensive Study on RBF Kernel in Svm for Multiclsss Using OAA

    With increasing amounts of data being generated by businesses and researchers there is a need for fast, accurate and robust algorithms for data analysis. Support vector machines are a specific type of machine learning algorithm that are among the most widely-used for many statistical learning problems for linear and non...

    Provided By IJCSMR

  • White Papers // May 2013

    Identification of Physical Similarities in Source Code

    Clustering is a data mining technique that allows the grouping of data bases on their similarity with respect to multiple dimension of measurement. Clustering in software engineering is used to support the quality assessment based on the source code matrices. It can also be used for the software maintenance by...

    Provided By IJCSMR

  • White Papers // May 2013

    E-Commerce Risk Investigation Model Based on Fuzzification

    Risk investigation is the most important face in the field of E-Commerce. In the field of E-Commerce, most of the security issues and risk factors are rising from the side of user attention, and they become progressively accepted by the internet and web environment. The information exchange on the network...

    Provided By IJCSMR

  • White Papers // Oct 2013

    Data Mining-General Concepts

    Data mining is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts and costs. Data mining tools predict behaviors and future trends, allowing businesses to make proactive, knowledge-driven decisions. It allows users to analyze data...

    Provided By IJCSMR

  • White Papers // Oct 2013

    Induction Decision Trees for Tentative Data

    A decision tree is a tree in which each branch node represents a choice between a number of alternatives, and each leaf node represents a classification or decision. In this paper, the authors extend such classifiers to handle data with uncertain information. Classification is one of the most efficient and...

    Provided By IJCSMR

  • White Papers // Oct 2013

    Privacy Preserving Delegated Attribute Based Group Key Management Access Control in Public Clouds

    Current approaches to enforce fine-grained access control on confidential data hosted in the cloud are based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on the cloud and re-encrypting the data whenever user credentials or authorization policies...

    Provided By IJCSMR

  • White Papers // Oct 2013

    Improving Parallel Data Processing in the Cloud by Exploiting Dynamic Resources

    In recent years ad hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major Cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy...

    Provided By IJCSMR

  • White Papers // Oct 2013

    A Contract Signing Approach For Bidirectional Conformity Based Secure Communication Over Cloud

    Several trends are opening up the era of cloud computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the Software as a Service (SaaS) computing architecture, are transforming data centers into pools of computing service on a huge scale....

    Provided By IJCSMR

  • White Papers // Oct 2012

    Intelligent Transportation Systems of Security Protocols in Vehicular Ad Hoc Networks

    Security is an important part of safety communications in VANET. The secure communication protocols meet the performance requirements. Vehicular Networks are a cornerstone of the envisioned Intelligent Transportation Systems (ITS). By enabling vehicles to communicate with each other via Inter-Vehicle Communication (IVC) as well as with roadside base stations via...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Energy Efficient and Reliable Communication in Underwater Acoustic Sensor Networks for Time Critical Applications

    Normally, the communication in the earth surface is through electromagnetic or radio waves. But this is not possible in the underwater environments in an efficient way. In underwater environments radio does not work well due to its quick attenuation in water. Hence the acoustic signals are sent using the acoustic...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Enhancement of Secure Routing Attack Against in Mobile Adhoc Networks

    Mobile Adhoc NETworks (MANET) is a collection of wireless nodes that can dynamically form network to exchange information without using any preexisting fixed network infrastructure. The special features of this MANET bring these technology great opportunities together with severe challenges. MANET are known to be vulnerable to a variety of...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Comparison of Approaches of Semantic Web Service Composition

    The web has been changed a lot after the introduction of a Service Oriented Architecture (SOA). The business processes are more efficient to perform a task by composing the number of web services. But, all these things are done statically. They are not flexible in nature. Semantic web comes here...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Data Mining Using Relational Learning Techniques to Present Selection Graph

    Data mining algorithms search pattern in data. Usually data mining algorithms operate on single table. So pattern is discovered from single table. Mostly data is stored in multiple tables. These tables are related together. By this way the authors can eliminate redundancy and inconsistency. Simple Data mining techniques cannot be...

    Provided By IJCSMR

  • White Papers // Feb 2013

    MOGA-Net: A MultiObjective Genetic Algorithm-Net to Find Communities in Complex Networks

    The problem of community detection in complex networks as a Multi-Objective clustering problem, and presented an evolutionary Multi-Objective approach to uncover community structure. The algorithm optimizes two objective functions able to identify densely connected groups of nodes having sparse inter connections. The method generates a set of network divisions at...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Optimizing Update Interval of Gateways in VoIP Call Using TGREP

    Telephony Gateway REgistration Protocol [TGREP] is a route registration protocol for telephone destinations on a gateway. TGREP allows PSTN gateways or soft switches to inform a signaling server called as Location Server (LS), of routes it has to the PSTN. These advertisements include fairly dynamic information, such as the Available...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Clustering Based Certificate Revocation in Mobile Ad Hoc Networks

    In this paper, the authors build upon their previously proposed scheme, a clustering based certificate revocation scheme, which outperforms other techniques in terms of being able to quickly revoke attackers' certificates and recover falsely accused certificates. However, owing to a limitation in the schemes certificate accusation and recovery mechanism, the...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Software Testing Techniques

    Software testing is a set of activities conducted with the intent of finding errors in software. It also verifies and validate whether the program is working correctly with no bugs or not. It analyzes the software for finding bugs. Software testing is not just used for finding and fixing of...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Survey on Adaptive LMS Algorithm to Cancel Noise and Improve Audio Quality in VOIP

    In this paper, the authors propose a technique through which noise in the communication system of VOIP can be eliminated and the quality can be improved to a great extend. VOice over Internet Protocol commonly refers to the communication protocols, technologies and the methodologies. VOIP mainly comprises all types of...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Architecture and Security Functions of Cloud Computing

    The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use while providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). Cloud computing enables dynamic and flexible placement of...

    Provided By IJCSMR

  • White Papers // Jan 2013

    IDPF for IP Hacking Technique

    The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. In this paper, the authors propose an Inter Domain Packet Filter (IDPF) architecture that can reduce the level of IP spoofing on the Internet. A key feature of their scheme is that it does...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Frame Work for Understanding Supervisory Control and Data Acquisition (SCADA) Systems

    Two recent trends have raised concern about the security and stability of Supervisory Control And Data Acquisition (SCADA) systems. The first move to define standard interfaces and communication protocols in support of cross-vendor compatibility and modularity. The second is a move to connect nodes in a SCADA system to open...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Scheduling in Grid Computing

    As the technology advances and the importance and dependence on internet increases by the day, there is need of finding faster and cheaper solutions to solve computational problems. This has lead the development of a new concept called grid computing, Grid computing (or the use of a computational grid) is...

    Provided By IJCSMR

  • White Papers // Jan 2013

    An Intrusion Detection System Architecture Based on Neural Networks and Genetic Algorithms

    The Computer Security is a part of Computer Science that addresses all the problems that exists within the computer security domain. Now days, more than ever, the computer viruses, worms, hackers, crackers, electronic eavesdropping and electronic fraud, have become the new problems that the Network Computer Security Science must solve....

    Provided By IJCSMR

  • White Papers // Jan 2013

    Overview of Various Attacks in MANET and Countermeasures for Attacks

    Security is a paramount concern in Mobile Ad hoc NETwork (MANET) because of its intrinsic vulnerabilities. These vulnerabilities are nature of MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. In...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Power Aware Approach of Live Migration for Resource Management in Cloud Data Centre

    The cost of power is going up all the time. It is now thought to be the major cost of running a data centre and data centre power efficiency can reduce IT costs significantly. Indeed, a significant data centre can consume as much power as a small city act. Virtualization...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Literature Survey on Association Rule Discovery in Data Mining

    Data mining is used for mining data from databases and finding out meaningful patterns from the database. Discovering Association Rules is a core topic of data mining. One of the challenges in developing association rules mining algorithms is the extremely large number of rules generated which makes the algorithms inefficient...

    Provided By IJCSMR

  • White Papers // Dec 2012

    Three Dimensional Authentication Mechanisms for Secured Transfer of Data in Networks

    The current authentication systems suffer from many weaknesses during the transmission of sensitive data across the clients. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have...

    Provided By IJCSMR

  • White Papers // Dec 2012

    A Distributed Mining Algorithm for Tracking of Moving Objects Efficiently in a Network

    The tracking of moving objects finds a single object or group of object with similar movement pattern in network structure. The objective of this paper is to find the movement of objects in local area network with same behavior and same category. The first phase is to mine the objects...

    Provided By IJCSMR