IJCSMR

Displaying 1-40 of 137 results

  • White Papers // Jan 2013

    Power Aware Approach of Live Migration for Resource Management in Cloud Data Centre

    The cost of power is going up all the time. It is now thought to be the major cost of running a data centre and data centre power efficiency can reduce IT costs significantly. Indeed, a significant data centre can consume as much power as a small city act. Virtualization...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Literature Survey on Association Rule Discovery in Data Mining

    Data mining is used for mining data from databases and finding out meaningful patterns from the database. Discovering Association Rules is a core topic of data mining. One of the challenges in developing association rules mining algorithms is the extremely large number of rules generated which makes the algorithms inefficient...

    Provided By IJCSMR

  • White Papers // Dec 2012

    Three Dimensional Authentication Mechanisms for Secured Transfer of Data in Networks

    The current authentication systems suffer from many weaknesses during the transmission of sensitive data across the clients. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have...

    Provided By IJCSMR

  • White Papers // Dec 2012

    A Distributed Mining Algorithm for Tracking of Moving Objects Efficiently in a Network

    The tracking of moving objects finds a single object or group of object with similar movement pattern in network structure. The objective of this paper is to find the movement of objects in local area network with same behavior and same category. The first phase is to mine the objects...

    Provided By IJCSMR

  • White Papers // Dec 2012

    An Innovative Procedure for Performance Appraisal in Intrusion Detection System Using Synthesis Computing Classifier

    Amid growing connectivity between computers, the protection of computer networks plays an intentional role in now a day's computer systems. Major in that, detecting intrusions in network has become one of the most significant parts to obstruct the abuse of network resource by aggressors. The securities generally divide as a...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Data Mining Using Relational Learning Techniques to Present Selection Graph

    Data mining algorithms search pattern in data. Usually data mining algorithms operate on single table. So pattern is discovered from single table. Mostly data is stored in multiple tables. These tables are related together. By this way the authors can eliminate redundancy and inconsistency. Simple Data mining techniques cannot be...

    Provided By IJCSMR

  • White Papers // Feb 2013

    MOGA-Net: A MultiObjective Genetic Algorithm-Net to Find Communities in Complex Networks

    The problem of community detection in complex networks as a Multi-Objective clustering problem, and presented an evolutionary Multi-Objective approach to uncover community structure. The algorithm optimizes two objective functions able to identify densely connected groups of nodes having sparse inter connections. The method generates a set of network divisions at...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Optimizing Update Interval of Gateways in VoIP Call Using TGREP

    Telephony Gateway REgistration Protocol [TGREP] is a route registration protocol for telephone destinations on a gateway. TGREP allows PSTN gateways or soft switches to inform a signaling server called as Location Server (LS), of routes it has to the PSTN. These advertisements include fairly dynamic information, such as the Available...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Clustering Based Certificate Revocation in Mobile Ad Hoc Networks

    In this paper, the authors build upon their previously proposed scheme, a clustering based certificate revocation scheme, which outperforms other techniques in terms of being able to quickly revoke attackers' certificates and recover falsely accused certificates. However, owing to a limitation in the schemes certificate accusation and recovery mechanism, the...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Free and Open Source Software for Strategic, Tactical, and Operational Business Alignment

    The demands for cost-effective information and communications technology solutions within the prevailing economic flux and instability calls for both new and radical approaches to cope with contemporary business challenges. The rapid pace of technology innovation notwithstanding is making technology choices even more difficult. The time to recoup return on investments...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Design of an Improved Data Mining Algorithm with Cloud for Crime Pattern Detection

    The invention of new technologies and the increase in man power due to the increase in the population undoubtedly will make the country to move towards the development in different fields and these developments also make the country to move towards the path of disasters on the other side as...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Improved Channel Aware AOMDV Routing Protocol in MANETs

    A Mobile Ad hoc NETwork (MANET) is a self configuring infrastructure-less network of mobile devices connected by wireless links. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The Primary goal of ad hoc network routing protocol is correct and efficient...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Improving the Accuracy and Efficiency of K-Means Algorithm by Using Less Similarity Based Clustering Technique for Better Initial Centroids

    Data mining is a field at the intersection of computer science and statistics, is the process that involves, introducing patterns in large data sets. It utilizes methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Implementation of Personal Identification System Using Iris Biometrics Authentication

    Iris biometric authentication is gaining importance in recent times. In the overall processing of iris biometric in an iris authentication system, feature processing is an important task. In feature processing, the authors extract iris features, which are ultimately used in matching. Since there is a large number of iris features...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Survey on Uncertain Data & Its Clustering

    There is an increasing quantity of data with uncertainty arising from applications such as sensor network measurements, record linkage, and as output of mining algorithms. Such databases are much more complex because of the additional challenges of representing the probabilistic information. This uncertainty is typically formalized as probability density functions...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Trusted Vector Method for Black Hole Attack Prevention on MANET

    In this paper, the authors analyze the black hole attack and its prevention in Mobile Ad-hoc NETwork (MANET). In this attack, a malicious node falsely advertises good path to the destination node during the path-finding process or in the route update message. By doing this, the malicious node dropped all...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Detection of Malicious Software by Using Data Mining Tools and Other Techniques- A Survey

    Malware is currently a major threat to information and computer security, due to the huge amount of data sets which are present as variants (of variable length). This causes major problems to traditional security defenses. In order to overcome this problem anti-viral packages are typically adequate only after the malware's...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Simulation Based Performance Evaluation of MANET Routing Protocols

    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. The routing protocol is used to discover routes between nodes. Routing is a challenging task in ad...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Throughput Analysis and Spectrum Sensing Over Nakagami Fading in Cognitive Radio

    The cognitive radio technology allows unlicensed users to utilize the licensed frequency band when it is idle. In this paper, the authors obtain a mathematical tradeoff between the number of samples used for spectrum sensing and the secondary user's throughput under different Nakagami fading conditions. This tradeoff depends upon the...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Intrusion Detection System Against Denial of Service Attack

    Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions. In this paper, the authors have presented a new technique, "Backscatter analysis," for estimating denial-of-service attack activity in the Internet. Using this technique, they observed widespread DoS...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Software Testing Techniques

    Software testing is a set of activities conducted with the intent of finding errors in software. It also verifies and validate whether the program is working correctly with no bugs or not. It analyzes the software for finding bugs. Software testing is not just used for finding and fixing of...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Survey on Adaptive LMS Algorithm to Cancel Noise and Improve Audio Quality in VOIP

    In this paper, the authors propose a technique through which noise in the communication system of VOIP can be eliminated and the quality can be improved to a great extend. VOice over Internet Protocol commonly refers to the communication protocols, technologies and the methodologies. VOIP mainly comprises all types of...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Architecture and Security Functions of Cloud Computing

    The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use while providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). Cloud computing enables dynamic and flexible placement of...

    Provided By IJCSMR

  • White Papers // Jan 2013

    IDPF for IP Hacking Technique

    The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. In this paper, the authors propose an Inter Domain Packet Filter (IDPF) architecture that can reduce the level of IP spoofing on the Internet. A key feature of their scheme is that it does...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Frame Work for Understanding Supervisory Control and Data Acquisition (SCADA) Systems

    Two recent trends have raised concern about the security and stability of Supervisory Control And Data Acquisition (SCADA) systems. The first move to define standard interfaces and communication protocols in support of cross-vendor compatibility and modularity. The second is a move to connect nodes in a SCADA system to open...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Scheduling in Grid Computing

    As the technology advances and the importance and dependence on internet increases by the day, there is need of finding faster and cheaper solutions to solve computational problems. This has lead the development of a new concept called grid computing, Grid computing (or the use of a computational grid) is...

    Provided By IJCSMR

  • White Papers // Jan 2013

    An Intrusion Detection System Architecture Based on Neural Networks and Genetic Algorithms

    The Computer Security is a part of Computer Science that addresses all the problems that exists within the computer security domain. Now days, more than ever, the computer viruses, worms, hackers, crackers, electronic eavesdropping and electronic fraud, have become the new problems that the Network Computer Security Science must solve....

    Provided By IJCSMR

  • White Papers // Jan 2013

    Overview of Various Attacks in MANET and Countermeasures for Attacks

    Security is a paramount concern in Mobile Ad hoc NETwork (MANET) because of its intrinsic vulnerabilities. These vulnerabilities are nature of MANET structure that cannot be removed. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operations. In...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Intelligent Transportation Systems of Security Protocols in Vehicular Ad Hoc Networks

    Security is an important part of safety communications in VANET. The secure communication protocols meet the performance requirements. Vehicular Networks are a cornerstone of the envisioned Intelligent Transportation Systems (ITS). By enabling vehicles to communicate with each other via Inter-Vehicle Communication (IVC) as well as with roadside base stations via...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Energy Efficient and Reliable Communication in Underwater Acoustic Sensor Networks for Time Critical Applications

    Normally, the communication in the earth surface is through electromagnetic or radio waves. But this is not possible in the underwater environments in an efficient way. In underwater environments radio does not work well due to its quick attenuation in water. Hence the acoustic signals are sent using the acoustic...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Enhancement of Secure Routing Attack Against in Mobile Adhoc Networks

    Mobile Adhoc NETworks (MANET) is a collection of wireless nodes that can dynamically form network to exchange information without using any preexisting fixed network infrastructure. The special features of this MANET bring these technology great opportunities together with severe challenges. MANET are known to be vulnerable to a variety of...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Comparison of Approaches of Semantic Web Service Composition

    The web has been changed a lot after the introduction of a Service Oriented Architecture (SOA). The business processes are more efficient to perform a task by composing the number of web services. But, all these things are done statically. They are not flexible in nature. Semantic web comes here...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Admission Control Prototype for Real Time Databases

    The authors suggest and measure an admission control prototype for RTDBS, in which a transaction is presented to the system as a pair of procedures: a primary task, and a recovery block. The performance necessities of the main task are not known a priori, whereas those of the recovery block...

    Provided By IJCSMR

  • White Papers // Oct 2012

    A Location Guard Approach: An Overlay Network

    Serverless distributed computing has received significant attention from both the industry and the research community. Among the most popular applications are the wide-area network file systems, exemplified by CFS, Farsite, and OceanStore. These file systems store files on a large collection of untrusted nodes that form an overlay network. They...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Study of Different IP Network Recovery Mechanisms

    Internet has taken a central role in the people communication infrastructure. Hence the demand of internet availability and reliability has increased accordingly. Failure of node or link results in disruption of network traffic. This can adversely affect performance of critical applications. The recovery of the network should be fast enough...

    Provided By IJCSMR

  • White Papers // Oct 2012

    An Efficient Protocol With Probabilistic Approach for Traffic Control at Transport Layer in WSN

    In this paper the requirement for designing transport layer protocol for wireless sensor network is propose. As the sensor network contains sensor node which has limited power supply in the form of battery, so an important issue is saving energy at the sensor node. So the majority of the functionality...

    Provided By IJCSMR

  • White Papers // Oct 2012

    An Effective Web Document Clustering for Information Retrieval

    The size of web has increased exponentially over the past few years with thousands of documents related to a subject available to the user. In this paper, the authors introduce a combine approach to cluster the web pages which first finds the frequent sets and then clusters the documents. These...

    Provided By IJCSMR

  • White Papers // Oct 2012

    An Enhancement of Routing in Mobile Ad Hoc Networks for Increasing the Speed of Reliable Data Transformation

    A Mobile Ad-hoc NETwork (MANET) is composed of mobile nodes without any infrastructure. MANET applications such as emergency search and rescue operation, meetings or conventions are very stringent the provision of energy efficient routing protocol is much more challenging in MANETs than wired networks due to node mobility, limited power...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Survey on -Traffic Aware Distributed Channel Assignment in WLANs

    Many companies have started deploying the IEEE 802.11b WLAN in places such as airports, hotels, etc. This is mainly due to the availability of affordable Wi-Fi services and related consumer products, such as laptops PDAs, gaming devices, digital cameras, etc. The 802.11b technology is particularly attractive due to its maturity...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Web Miming Tool: A View

    Web data mining, also known as screen scraping, web scraping and data extraction is using software and tools to extract data from sources that are not formatted to be used as automated data sources. Most web information comes from web pages, often in the form of html that is formatted...

    Provided By IJCSMR