IJCSMR

Displaying 1-40 of 137 results

  • White Papers // Jan 2013

    Power Aware Approach of Live Migration for Resource Management in Cloud Data Centre

    The cost of power is going up all the time. It is now thought to be the major cost of running a data centre and data centre power efficiency can reduce IT costs significantly. Indeed, a significant data centre can consume as much power as a small city act. Virtualization...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Literature Survey on Association Rule Discovery in Data Mining

    Data mining is used for mining data from databases and finding out meaningful patterns from the database. Discovering Association Rules is a core topic of data mining. One of the challenges in developing association rules mining algorithms is the extremely large number of rules generated which makes the algorithms inefficient...

    Provided By IJCSMR

  • White Papers // Dec 2012

    Three Dimensional Authentication Mechanisms for Secured Transfer of Data in Networks

    The current authentication systems suffer from many weaknesses during the transmission of sensitive data across the clients. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have...

    Provided By IJCSMR

  • White Papers // Dec 2012

    A Distributed Mining Algorithm for Tracking of Moving Objects Efficiently in a Network

    The tracking of moving objects finds a single object or group of object with similar movement pattern in network structure. The objective of this paper is to find the movement of objects in local area network with same behavior and same category. The first phase is to mine the objects...

    Provided By IJCSMR

  • White Papers // Dec 2012

    An Innovative Procedure for Performance Appraisal in Intrusion Detection System Using Synthesis Computing Classifier

    Amid growing connectivity between computers, the protection of computer networks plays an intentional role in now a day's computer systems. Major in that, detecting intrusions in network has become one of the most significant parts to obstruct the abuse of network resource by aggressors. The securities generally divide as a...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Free and Open Source Software for Strategic, Tactical, and Operational Business Alignment

    The demands for cost-effective information and communications technology solutions within the prevailing economic flux and instability calls for both new and radical approaches to cope with contemporary business challenges. The rapid pace of technology innovation notwithstanding is making technology choices even more difficult. The time to recoup return on investments...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Design of an Improved Data Mining Algorithm with Cloud for Crime Pattern Detection

    The invention of new technologies and the increase in man power due to the increase in the population undoubtedly will make the country to move towards the development in different fields and these developments also make the country to move towards the path of disasters on the other side as...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Improved Channel Aware AOMDV Routing Protocol in MANETs

    A Mobile Ad hoc NETwork (MANET) is a self configuring infrastructure-less network of mobile devices connected by wireless links. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The Primary goal of ad hoc network routing protocol is correct and efficient...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Improving the Accuracy and Efficiency of K-Means Algorithm by Using Less Similarity Based Clustering Technique for Better Initial Centroids

    Data mining is a field at the intersection of computer science and statistics, is the process that involves, introducing patterns in large data sets. It utilizes methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Implementation of Personal Identification System Using Iris Biometrics Authentication

    Iris biometric authentication is gaining importance in recent times. In the overall processing of iris biometric in an iris authentication system, feature processing is an important task. In feature processing, the authors extract iris features, which are ultimately used in matching. Since there is a large number of iris features...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Survey on Uncertain Data & Its Clustering

    There is an increasing quantity of data with uncertainty arising from applications such as sensor network measurements, record linkage, and as output of mining algorithms. Such databases are much more complex because of the additional challenges of representing the probabilistic information. This uncertainty is typically formalized as probability density functions...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Trusted Vector Method for Black Hole Attack Prevention on MANET

    In this paper, the authors analyze the black hole attack and its prevention in Mobile Ad-hoc NETwork (MANET). In this attack, a malicious node falsely advertises good path to the destination node during the path-finding process or in the route update message. By doing this, the malicious node dropped all...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Detection of Malicious Software by Using Data Mining Tools and Other Techniques- A Survey

    Malware is currently a major threat to information and computer security, due to the huge amount of data sets which are present as variants (of variable length). This causes major problems to traditional security defenses. In order to overcome this problem anti-viral packages are typically adequate only after the malware's...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Simulation Based Performance Evaluation of MANET Routing Protocols

    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. The routing protocol is used to discover routes between nodes. Routing is a challenging task in ad...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Throughput Analysis and Spectrum Sensing Over Nakagami Fading in Cognitive Radio

    The cognitive radio technology allows unlicensed users to utilize the licensed frequency band when it is idle. In this paper, the authors obtain a mathematical tradeoff between the number of samples used for spectrum sensing and the secondary user's throughput under different Nakagami fading conditions. This tradeoff depends upon the...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Intrusion Detection System Against Denial of Service Attack

    Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions. In this paper, the authors have presented a new technique, "Backscatter analysis," for estimating denial-of-service attack activity in the Internet. Using this technique, they observed widespread DoS...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Software Testing Techniques

    Software testing is a set of activities conducted with the intent of finding errors in software. It also verifies and validate whether the program is working correctly with no bugs or not. It analyzes the software for finding bugs. Software testing is not just used for finding and fixing of...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Secure Intrusion Detection System in Mobile Ad Hoc Network

    Wireless Mobile Ad-hoc NETwork (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a...

    Provided By IJCSMR

  • White Papers // Nov 2012

    E-Mail Spam Detection System with Novelty E-MAP

    Spam is defined as the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. Generally, a spam is e-mail advertising for some product sent to a mailing list or newsgroup. E-mail spam is defined as the subset of electronic spam involving nearly identical message sent to numerous recipients...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Traceback of DDoS Attacks Based on Decision Trees Model Using Intrusion Detection System

    Now-a-days, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memory less feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Finger Print Recogniton System Based on Smart Cards

    In this paper, the authors have presented a fingerprint recognizing system that uses the method of tracing backed up by a validating procedure to detect finger prints minutiae to match two sets of minutiae in order to identify a fingerprint. The experimental results show that the system is highly effective...

    Provided By IJCSMR

  • White Papers // Nov 2012

    An Efficient Web Content Extraction Using Mining Techniques

    Web mining is a class of data mining. In order to relieve a "Data Rich but Information Poor" dilemma, Data Mining emerged. Web Mining is a variation of this field that distils untapped source of abundantly available free textual information. The importance of web mining is growing along with the...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Fast Similarity Search for Moving Object Trajectories Using Distributed Mining Algorithm

    Object tracking applications focuses on finding the movement patterns of a single object or all objects. A mining algorithm called distributed mining algorithm is proposed to identify a group of objects with similar movement patterns. This information is important in some biological research domains, such as the study of animals,...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Applying Artificial Neural Network in Web Usage Mining

    Application of data mining techniques to the World Wide Web, referred to as Web mining, has been the focus of several recent research projects and papers. The term Web mining has been used in two distinct ways. The first, called Web content mining is the process of information discovery from...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Intrusion Alerts Correlation Based Assessment of Network Security

    In this paper, the authors propose a novel hybrid model that efficiently selects the optimal set of features in order to detect 802.11-specific intrusions. Their model for feature selection uses the information gain ratio measure as a means to compute the relevance of each feature and the k-means classifier to...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Survey on "Intrusion Detection System"

    Intrusion detection is the process of identifying and responding to suspicious activities targeted at computing and communication resources and it has become the mainstream of information assurance as the dramatic increase in the number of attacks. Intrusion Detection System (IDS) monitors and collects data from a target system that should...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Survey on Adaptive LMS Algorithm to Cancel Noise and Improve Audio Quality in VOIP

    In this paper, the authors propose a technique through which noise in the communication system of VOIP can be eliminated and the quality can be improved to a great extend. VOice over Internet Protocol commonly refers to the communication protocols, technologies and the methodologies. VOIP mainly comprises all types of...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Architecture and Security Functions of Cloud Computing

    The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use while providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). Cloud computing enables dynamic and flexible placement of...

    Provided By IJCSMR

  • White Papers // Jan 2013

    IDPF for IP Hacking Technique

    The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. In this paper, the authors propose an Inter Domain Packet Filter (IDPF) architecture that can reduce the level of IP spoofing on the Internet. A key feature of their scheme is that it does...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Frame Work for Understanding Supervisory Control and Data Acquisition (SCADA) Systems

    Two recent trends have raised concern about the security and stability of Supervisory Control And Data Acquisition (SCADA) systems. The first move to define standard interfaces and communication protocols in support of cross-vendor compatibility and modularity. The second is a move to connect nodes in a SCADA system to open...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Scheduling in Grid Computing

    As the technology advances and the importance and dependence on internet increases by the day, there is need of finding faster and cheaper solutions to solve computational problems. This has lead the development of a new concept called grid computing, Grid computing (or the use of a computational grid) is...

    Provided By IJCSMR

  • White Papers // Jan 2013

    An Intrusion Detection System Architecture Based on Neural Networks and Genetic Algorithms

    The Computer Security is a part of Computer Science that addresses all the problems that exists within the computer security domain. Now days, more than ever, the computer viruses, worms, hackers, crackers, electronic eavesdropping and electronic fraud, have become the new problems that the Network Computer Security Science must solve....

    Provided By IJCSMR

  • White Papers // Jan 2013

    Overview of Various Attacks in MANET and Countermeasures for Attacks

    Security is a paramount concern in Mobile Ad hoc NETwork (MANET) because of its intrinsic vulnerabilities. These vulnerabilities are nature of MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. In...

    Provided By IJCSMR

  • White Papers // Sep 2012

    Multimodal Biometric Authentication System Using Fingerprint and Gait Signals

    Biometric authentication system has become one of the tremendous developing technologies for security based applications. But today unimodal biometrics has to face some of the unavoidable drawbacks like unacceptable error rates, noisy biometric data, and spoof attacks. Multimodal biometric systems are those which utilize, or capability of utilizing, more than...

    Provided By IJCSMR

  • White Papers // Sep 2012

    Comparative Analysis of Web Versus Mobile Portals

    In today's increasingly global, digital, network, and flexible economy, technological innovations represent a substantial investment for both organizations, which embark on implementations of technical discoveries, and individuals, who take chances on utilizing unfamiliar systems and applications. With advances in the leverage that information quest, accessibility and availability presents comes the...

    Provided By IJCSMR

  • White Papers // Sep 2012

    A Simple & Efficient Approach for Extracting Features from Blurred Fingerprints

    A blurred fingerprint is one which has very less number of minutiae ((i.e.,) ridges) in it. It is difficult to extract features from blurred fingerprints. So, the authors propose a very simple and efficient method for extracting more features from blurred fingerprints. They found some good results when extracted valleys...

    Provided By IJCSMR

  • White Papers // Sep 2012

    Multifeatured and Integrated P2P Platform for Distributed Networking Application Using Juxtapose

    In this paper, the authors present the JuXTApose (JXTA)-Overlay, which is a JXTA-based Peer-To-Peer (P2P) platform designed with the aim to leverage capabilities of Java, JXTA, and P2P technologies to support distributed and collaborative systems. The platform can be used not only for efficient and reliable distributed computing but also...

    Provided By IJCSMR

  • White Papers // Sep 2012

    On Demand and Table Driven Routing Protocol Energy Efficiency Performance Evaluation in Mobile Ad Hoc Networks

    MANET (Mobile Ad-hoc NETwork) is a self organizing and self configuring network without the need of any centralized base station. It is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. MANETs are infrastructure less and can be set up anytime, anywhere. In MANETs,...

    Provided By IJCSMR

  • White Papers // Sep 2012

    A Comparative Study on Types of Functional Testing

    Software testing is the process of executing a program with the intent of finding errors. The purpose of testing can be quality assurance, verification and validation, or reliability estimation. Testing can be used as a generic metric as well. Correctness testing and reliability testing are two major areas of testing....

    Provided By IJCSMR

  • White Papers // Sep 2012

    A Partition Algorithm for Matching String Patterns in Large Text Databases

    The size of the Web as well as user bases of search systems continues to grow exponentially. Consequently, providing sub second query response times and high query throughput become quite challenging for large-scale information retrieval systems. An important subtask of the pattern discovery process is pattern matching, where the pattern...

    Provided By IJCSMR