IJCSMR

Displaying 1-40 of 137 results

  • White Papers // Nov 2012

    Free and Open Source Software for Strategic, Tactical, and Operational Business Alignment

    The demands for cost-effective information and communications technology solutions within the prevailing economic flux and instability calls for both new and radical approaches to cope with contemporary business challenges. The rapid pace of technology innovation notwithstanding is making technology choices even more difficult. The time to recoup return on investments...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Design of an Improved Data Mining Algorithm with Cloud for Crime Pattern Detection

    The invention of new technologies and the increase in man power due to the increase in the population undoubtedly will make the country to move towards the development in different fields and these developments also make the country to move towards the path of disasters on the other side as...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Improved Channel Aware AOMDV Routing Protocol in MANETs

    A Mobile Ad hoc NETwork (MANET) is a self configuring infrastructure-less network of mobile devices connected by wireless links. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The Primary goal of ad hoc network routing protocol is correct and efficient...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Improving the Accuracy and Efficiency of K-Means Algorithm by Using Less Similarity Based Clustering Technique for Better Initial Centroids

    Data mining is a field at the intersection of computer science and statistics, is the process that involves, introducing patterns in large data sets. It utilizes methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Implementation of Personal Identification System Using Iris Biometrics Authentication

    Iris biometric authentication is gaining importance in recent times. In the overall processing of iris biometric in an iris authentication system, feature processing is an important task. In feature processing, the authors extract iris features, which are ultimately used in matching. Since there is a large number of iris features...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Survey on Uncertain Data & Its Clustering

    There is an increasing quantity of data with uncertainty arising from applications such as sensor network measurements, record linkage, and as output of mining algorithms. Such databases are much more complex because of the additional challenges of representing the probabilistic information. This uncertainty is typically formalized as probability density functions...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Trusted Vector Method for Black Hole Attack Prevention on MANET

    In this paper, the authors analyze the black hole attack and its prevention in Mobile Ad-hoc NETwork (MANET). In this attack, a malicious node falsely advertises good path to the destination node during the path-finding process or in the route update message. By doing this, the malicious node dropped all...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Detection of Malicious Software by Using Data Mining Tools and Other Techniques- A Survey

    Malware is currently a major threat to information and computer security, due to the huge amount of data sets which are present as variants (of variable length). This causes major problems to traditional security defenses. In order to overcome this problem anti-viral packages are typically adequate only after the malware's...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Simulation Based Performance Evaluation of MANET Routing Protocols

    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. The routing protocol is used to discover routes between nodes. Routing is a challenging task in ad...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Throughput Analysis and Spectrum Sensing Over Nakagami Fading in Cognitive Radio

    The cognitive radio technology allows unlicensed users to utilize the licensed frequency band when it is idle. In this paper, the authors obtain a mathematical tradeoff between the number of samples used for spectrum sensing and the secondary user's throughput under different Nakagami fading conditions. This tradeoff depends upon the...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Intrusion Detection System Against Denial of Service Attack

    Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions. In this paper, the authors have presented a new technique, "Backscatter analysis," for estimating denial-of-service attack activity in the Internet. Using this technique, they observed widespread DoS...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Secure Intrusion Detection System in Mobile Ad Hoc Network

    Wireless Mobile Ad-hoc NETwork (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a...

    Provided By IJCSMR

  • White Papers // Nov 2012

    E-Mail Spam Detection System with Novelty E-MAP

    Spam is defined as the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. Generally, a spam is e-mail advertising for some product sent to a mailing list or newsgroup. E-mail spam is defined as the subset of electronic spam involving nearly identical message sent to numerous recipients...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Traceback of DDoS Attacks Based on Decision Trees Model Using Intrusion Detection System

    Now-a-days, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memory less feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Finger Print Recogniton System Based on Smart Cards

    In this paper, the authors have presented a fingerprint recognizing system that uses the method of tracing backed up by a validating procedure to detect finger prints minutiae to match two sets of minutiae in order to identify a fingerprint. The experimental results show that the system is highly effective...

    Provided By IJCSMR

  • White Papers // Nov 2012

    An Efficient Web Content Extraction Using Mining Techniques

    Web mining is a class of data mining. In order to relieve a "Data Rich but Information Poor" dilemma, Data Mining emerged. Web Mining is a variation of this field that distils untapped source of abundantly available free textual information. The importance of web mining is growing along with the...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Fast Similarity Search for Moving Object Trajectories Using Distributed Mining Algorithm

    Object tracking applications focuses on finding the movement patterns of a single object or all objects. A mining algorithm called distributed mining algorithm is proposed to identify a group of objects with similar movement patterns. This information is important in some biological research domains, such as the study of animals,...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Applying Artificial Neural Network in Web Usage Mining

    Application of data mining techniques to the World Wide Web, referred to as Web mining, has been the focus of several recent research projects and papers. The term Web mining has been used in two distinct ways. The first, called Web content mining is the process of information discovery from...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Intrusion Alerts Correlation Based Assessment of Network Security

    In this paper, the authors propose a novel hybrid model that efficiently selects the optimal set of features in order to detect 802.11-specific intrusions. Their model for feature selection uses the information gain ratio measure as a means to compute the relevance of each feature and the k-means classifier to...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Survey on "Intrusion Detection System"

    Intrusion detection is the process of identifying and responding to suspicious activities targeted at computing and communication resources and it has become the mainstream of information assurance as the dramatic increase in the number of attacks. Intrusion Detection System (IDS) monitors and collects data from a target system that should...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Intelligent Transportation Systems of Security Protocols in Vehicular Ad Hoc Networks

    Security is an important part of safety communications in VANET. The secure communication protocols meet the performance requirements. Vehicular Networks are a cornerstone of the envisioned Intelligent Transportation Systems (ITS). By enabling vehicles to communicate with each other via Inter-Vehicle Communication (IVC) as well as with roadside base stations via...

    Provided By IJCSMR

  • White Papers // Jan 2013

    IDPF for IP Hacking Technique

    The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. In this paper, the authors propose an Inter Domain Packet Filter (IDPF) architecture that can reduce the level of IP spoofing on the Internet. A key feature of their scheme is that it does...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Frame Work for Understanding Supervisory Control and Data Acquisition (SCADA) Systems

    Two recent trends have raised concern about the security and stability of Supervisory Control And Data Acquisition (SCADA) systems. The first move to define standard interfaces and communication protocols in support of cross-vendor compatibility and modularity. The second is a move to connect nodes in a SCADA system to open...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Scheduling in Grid Computing

    As the technology advances and the importance and dependence on internet increases by the day, there is need of finding faster and cheaper solutions to solve computational problems. This has lead the development of a new concept called grid computing, Grid computing (or the use of a computational grid) is...

    Provided By IJCSMR

  • White Papers // Jan 2013

    An Intrusion Detection System Architecture Based on Neural Networks and Genetic Algorithms

    The Computer Security is a part of Computer Science that addresses all the problems that exists within the computer security domain. Now days, more than ever, the computer viruses, worms, hackers, crackers, electronic eavesdropping and electronic fraud, have become the new problems that the Network Computer Security Science must solve....

    Provided By IJCSMR

  • White Papers // Jan 2013

    Overview of Various Attacks in MANET and Countermeasures for Attacks

    Security is a paramount concern in Mobile Ad hoc NETwork (MANET) because of its intrinsic vulnerabilities. These vulnerabilities are nature of MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. In...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Power Aware Approach of Live Migration for Resource Management in Cloud Data Centre

    The cost of power is going up all the time. It is now thought to be the major cost of running a data centre and data centre power efficiency can reduce IT costs significantly. Indeed, a significant data centre can consume as much power as a small city act. Virtualization...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Literature Survey on Association Rule Discovery in Data Mining

    Data mining is used for mining data from databases and finding out meaningful patterns from the database. Discovering Association Rules is a core topic of data mining. One of the challenges in developing association rules mining algorithms is the extremely large number of rules generated which makes the algorithms inefficient...

    Provided By IJCSMR

  • White Papers // Dec 2012

    Three Dimensional Authentication Mechanisms for Secured Transfer of Data in Networks

    The current authentication systems suffer from many weaknesses during the transmission of sensitive data across the clients. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have...

    Provided By IJCSMR

  • White Papers // Dec 2012

    A Distributed Mining Algorithm for Tracking of Moving Objects Efficiently in a Network

    The tracking of moving objects finds a single object or group of object with similar movement pattern in network structure. The objective of this paper is to find the movement of objects in local area network with same behavior and same category. The first phase is to mine the objects...

    Provided By IJCSMR

  • White Papers // Dec 2012

    An Innovative Procedure for Performance Appraisal in Intrusion Detection System Using Synthesis Computing Classifier

    Amid growing connectivity between computers, the protection of computer networks plays an intentional role in now a day's computer systems. Major in that, detecting intrusions in network has become one of the most significant parts to obstruct the abuse of network resource by aggressors. The securities generally divide as a...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Energy Efficient and Reliable Communication in Underwater Acoustic Sensor Networks for Time Critical Applications

    Normally, the communication in the earth surface is through electromagnetic or radio waves. But this is not possible in the underwater environments in an efficient way. In underwater environments radio does not work well due to its quick attenuation in water. Hence the acoustic signals are sent using the acoustic...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Enhancement of Secure Routing Attack Against in Mobile Adhoc Networks

    Mobile Adhoc NETworks (MANET) is a collection of wireless nodes that can dynamically form network to exchange information without using any preexisting fixed network infrastructure. The special features of this MANET bring these technology great opportunities together with severe challenges. MANET are known to be vulnerable to a variety of...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Comparison of Approaches of Semantic Web Service Composition

    The web has been changed a lot after the introduction of a Service Oriented Architecture (SOA). The business processes are more efficient to perform a task by composing the number of web services. But, all these things are done statically. They are not flexible in nature. Semantic web comes here...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Data Mining Using Relational Learning Techniques to Present Selection Graph

    Data mining algorithms search pattern in data. Usually data mining algorithms operate on single table. So pattern is discovered from single table. Mostly data is stored in multiple tables. These tables are related together. By this way the authors can eliminate redundancy and inconsistency. Simple Data mining techniques cannot be...

    Provided By IJCSMR

  • White Papers // Feb 2013

    MOGA-Net: A MultiObjective Genetic Algorithm-Net to Find Communities in Complex Networks

    The problem of community detection in complex networks as a Multi-Objective clustering problem, and presented an evolutionary Multi-Objective approach to uncover community structure. The algorithm optimizes two objective functions able to identify densely connected groups of nodes having sparse inter connections. The method generates a set of network divisions at...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Optimizing Update Interval of Gateways in VoIP Call Using TGREP

    Telephony Gateway REgistration Protocol [TGREP] is a route registration protocol for telephone destinations on a gateway. TGREP allows PSTN gateways or soft switches to inform a signaling server called as Location Server (LS), of routes it has to the PSTN. These advertisements include fairly dynamic information, such as the Available...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Clustering Based Certificate Revocation in Mobile Ad Hoc Networks

    In this paper, the authors build upon their previously proposed scheme, a clustering based certificate revocation scheme, which outperforms other techniques in terms of being able to quickly revoke attackers' certificates and recover falsely accused certificates. However, owing to a limitation in the schemes certificate accusation and recovery mechanism, the...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Software Testing Techniques

    Software testing is a set of activities conducted with the intent of finding errors in software. It also verifies and validate whether the program is working correctly with no bugs or not. It analyzes the software for finding bugs. Software testing is not just used for finding and fixing of...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Survey on Adaptive LMS Algorithm to Cancel Noise and Improve Audio Quality in VOIP

    In this paper, the authors propose a technique through which noise in the communication system of VOIP can be eliminated and the quality can be improved to a great extend. VOice over Internet Protocol commonly refers to the communication protocols, technologies and the methodologies. VOIP mainly comprises all types of...

    Provided By IJCSMR