IJCSMR

Displaying 1-40 of 137 results

  • White Papers // May 2013

    Authenticating Protocol for Spontaneous Wireless Ad Hoc Networks

    The spontaneous ad-hoc network is defined as a type of an ad-hoc network, which is formed during certain period of time with independent central server having no interference of an expert user, for carrying out any specific task or solving a problem. This network is built by numerous independent nodes...

    Provided By IJCSMR

  • White Papers // May 2013

    Immigrants and Memory Schemes for Dynamic Shortest Path Routing Problems in Mobile Adhoc Networks Using PSO, BFO

    The advancement in wireless communications has become more and more mobile wireless networks. The most essential feature in mobile ad hoc networks is topology change i.e., the topology of the network changes over time to time since node mobility occurs often. Therefore finding the shortest path for the routing problem...

    Provided By IJCSMR

  • White Papers // May 2013

    Impact of Security Techniques on Cloud Computing

    Several trends are opening up the era of cloud computing, which is an Internet-based development and use of computer technology. The ever cheaper and more powerful processors, together with the Software as a Service computing architecture, are transforming data centers into pools of computing service on a huge scale. The...

    Provided By IJCSMR

  • White Papers // May 2013

    A NOVEL Approach for Efficient Routing in AOMDV Protocol

    A common characteristic of all popular multipath routing algorithms in mobile ad-hoc networks, such as AOMDV, is that the end to end delay is reduced by utilization of parallel paths. The competition between the neighboring nodes for obtaining a common channel in those parallel paths is the reason for end...

    Provided By IJCSMR

  • White Papers // May 2013

    Various Methods Used for the Protection, Detection and Prevention of Application Layer DDOS Attacks

    Among all the attacks that occur on a web application like SQL Injection, XSS (Cross Site Scripting) attacks, DDOS attacks, etc., DDOS are the most difficult to detect and prevent. DDOS attacks occur mainly at two levels : application layer and network layer. Application layer DDOS attacks are very difficult...

    Provided By IJCSMR

  • White Papers // May 2013

    Generating Cryptosystem for Multimodal Biometrics Based on Feature Level Fusion

    Multi-biometrics are used worldwide because there will be low error rate and large population coverage. Multi-biometric data are stored in template and these template needs to be protected. There are many attacks possible in these templates. So here, the authors transform the different biometric representation (iris, fingerprint and face) into...

    Provided By IJCSMR

  • White Papers // May 2013

    IP Assignment Strategy in Mobile Ad Hoc Networks

    A Mobile Ad Hoc NETwork (MANET) consists of a set of identical mobile nodes communicating with each other via wireless links. The network's topology may change rapidly and unpredictably. Such networks may operate in a stand-alone fashion, or may be connected to the larger Internet. In traditional networks, hosts rely...

    Provided By IJCSMR

  • White Papers // May 2013

    Genetic Algorithm With Immigrants and Memory Schemes for Dynamic Shortest Path Routing Problems in Mobile Ad Hoc Networks Using Neural Networks

    Mobile Ad hoc NETworks (MANETs) containing mobile nodes connected by wireless links. All the nodes in the network can move freely and dynamically. So the network topology is not stable and changing dynamically. MANETs are called self organized networks because they never use any infrastructure such as base station or...

    Provided By IJCSMR

  • White Papers // May 2013

    Decision Tree Based IDS Implementation: Review

    Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements - they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, data mining - based Intrusion Detection Systems (IDSs) have demonstrated high accuracy,...

    Provided By IJCSMR

  • White Papers // Apr 2013

    Authentication Using Mobile Phone Generated OTP

    In today's world of distributed data sources and Web services, remote client authentication is very important to protect customer's sensitive data over Internet. Passwords are most common type of solution used today to authenticate a User. Weak password and bad password habits represent security threats to online services. Some solutions...

    Provided By IJCSMR

  • White Papers // May 2013

    Securing Cloud Computing Environment by Means of Intrusion Detection and Prevention System (IDPS)

    Many IT industries have adopted the cloud based computing to provide vital services to others. Cloud Computing holds the potential to eliminate the requirements for setting up of high cost computing infrastructure for the IT-based solutions and services that the industry uses. So increasing number of network security related incidents...

    Provided By IJCSMR

  • White Papers // May 2013

    A New Cell Counting Based Attack Against TOR

    Network communications among parties concealing parties' identity, existence of communications. Applications like whistle blowing, privacy-preserving free expression, voting in elections, etc. and systems like Tor, I2P, Anonymizer, etc. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-sized cells. Via extensive...

    Provided By IJCSMR

  • White Papers // May 2013

    A Distibuted Cost Effective Cluster Algorithm

    The authors' node clustering has been considered in Under-Water Sensor Networks (UWSNs) to improve energy efficiency and prolong network lifetime. Network survivability is a great concern in cluster-based UWSNs. In this paper, they propose a dependable clustering protocol to provide a survivable cluster hierarchy against cluster-head failures in such networks....

    Provided By IJCSMR

  • White Papers // May 2013

    Human Identification Using Finger Print and Face Biometrics

    The objective is to compared at feature extraction level for face and fingerprint biometrics. The proposed approach is based on a compared to identify the human through, finger prints in automated manner and providing an efficient solution for very low resolution face recognition problem. It is performed by compared the...

    Provided By IJCSMR

  • White Papers // May 2013

    Game Theory : A New Approach for Video Streaming in Mobile Networks

    Mobile phones are among the most popular consumer devices, and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plans from service providers. Due to the ubiquity of mobile phones and phone-to-phone communication technologies, data-plan subscribers can redistribute the video content...

    Provided By IJCSMR

  • White Papers // May 2013

    Efficient Load Balancing Algorithm in Mobile Ad-Hoc Network

    Mobile ad hoc network is an emerging field in the communication network world which has received a tremendous amount of attentions from various researchers. The MANET is infrastructure less, unlike the traditional network. In MANET every node acts as the source or destination as well as a router. An efficient...

    Provided By IJCSMR

  • White Papers // May 2013

    Smartphone Attacks and Security Challenges

    Smartphones offer many more functions than traditional mobile phones. In addition to a preinstalled mobile operating system, such as iOS, Android, or Windows Mobile, most smartphones also typically support carrier networks, Wi-Fi connectivity, and Bluetooth so that users can access the Internet to download and run various third party applications....

    Provided By IJCSMR

  • White Papers // Jan 2013

    Power Aware Approach of Live Migration for Resource Management in Cloud Data Centre

    The cost of power is going up all the time. It is now thought to be the major cost of running a data centre and data centre power efficiency can reduce IT costs significantly. Indeed, a significant data centre can consume as much power as a small city act. Virtualization...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Literature Survey on Association Rule Discovery in Data Mining

    Data mining is used for mining data from databases and finding out meaningful patterns from the database. Discovering Association Rules is a core topic of data mining. One of the challenges in developing association rules mining algorithms is the extremely large number of rules generated which makes the algorithms inefficient...

    Provided By IJCSMR

  • White Papers // Dec 2012

    Three Dimensional Authentication Mechanisms for Secured Transfer of Data in Networks

    The current authentication systems suffer from many weaknesses during the transmission of sensitive data across the clients. Textual passwords are commonly used. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have...

    Provided By IJCSMR

  • White Papers // Dec 2012

    A Distributed Mining Algorithm for Tracking of Moving Objects Efficiently in a Network

    The tracking of moving objects finds a single object or group of object with similar movement pattern in network structure. The objective of this paper is to find the movement of objects in local area network with same behavior and same category. The first phase is to mine the objects...

    Provided By IJCSMR

  • White Papers // Dec 2012

    An Innovative Procedure for Performance Appraisal in Intrusion Detection System Using Synthesis Computing Classifier

    Amid growing connectivity between computers, the protection of computer networks plays an intentional role in now a day's computer systems. Major in that, detecting intrusions in network has become one of the most significant parts to obstruct the abuse of network resource by aggressors. The securities generally divide as a...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Free and Open Source Software for Strategic, Tactical, and Operational Business Alignment

    The demands for cost-effective information and communications technology solutions within the prevailing economic flux and instability calls for both new and radical approaches to cope with contemporary business challenges. The rapid pace of technology innovation notwithstanding is making technology choices even more difficult. The time to recoup return on investments...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Design of an Improved Data Mining Algorithm with Cloud for Crime Pattern Detection

    The invention of new technologies and the increase in man power due to the increase in the population undoubtedly will make the country to move towards the development in different fields and these developments also make the country to move towards the path of disasters on the other side as...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Improved Channel Aware AOMDV Routing Protocol in MANETs

    A Mobile Ad hoc NETwork (MANET) is a self configuring infrastructure-less network of mobile devices connected by wireless links. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. The Primary goal of ad hoc network routing protocol is correct and efficient...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Improving the Accuracy and Efficiency of K-Means Algorithm by Using Less Similarity Based Clustering Technique for Better Initial Centroids

    Data mining is a field at the intersection of computer science and statistics, is the process that involves, introducing patterns in large data sets. It utilizes methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Implementation of Personal Identification System Using Iris Biometrics Authentication

    Iris biometric authentication is gaining importance in recent times. In the overall processing of iris biometric in an iris authentication system, feature processing is an important task. In feature processing, the authors extract iris features, which are ultimately used in matching. Since there is a large number of iris features...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Survey on Uncertain Data & Its Clustering

    There is an increasing quantity of data with uncertainty arising from applications such as sensor network measurements, record linkage, and as output of mining algorithms. Such databases are much more complex because of the additional challenges of representing the probabilistic information. This uncertainty is typically formalized as probability density functions...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Trusted Vector Method for Black Hole Attack Prevention on MANET

    In this paper, the authors analyze the black hole attack and its prevention in Mobile Ad-hoc NETwork (MANET). In this attack, a malicious node falsely advertises good path to the destination node during the path-finding process or in the route update message. By doing this, the malicious node dropped all...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Detection of Malicious Software by Using Data Mining Tools and Other Techniques- A Survey

    Malware is currently a major threat to information and computer security, due to the huge amount of data sets which are present as variants (of variable length). This causes major problems to traditional security defenses. In order to overcome this problem anti-viral packages are typically adequate only after the malware's...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Simulation Based Performance Evaluation of MANET Routing Protocols

    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. The routing protocol is used to discover routes between nodes. Routing is a challenging task in ad...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Throughput Analysis and Spectrum Sensing Over Nakagami Fading in Cognitive Radio

    The cognitive radio technology allows unlicensed users to utilize the licensed frequency band when it is idle. In this paper, the authors obtain a mathematical tradeoff between the number of samples used for spectrum sensing and the secondary user's throughput under different Nakagami fading conditions. This tradeoff depends upon the...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Intrusion Detection System Against Denial of Service Attack

    Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions. In this paper, the authors have presented a new technique, "Backscatter analysis," for estimating denial-of-service attack activity in the Internet. Using this technique, they observed widespread DoS...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Software Testing Techniques

    Software testing is a set of activities conducted with the intent of finding errors in software. It also verifies and validate whether the program is working correctly with no bugs or not. It analyzes the software for finding bugs. Software testing is not just used for finding and fixing of...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Secure Intrusion Detection System in Mobile Ad Hoc Network

    Wireless Mobile Ad-hoc NETwork (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a...

    Provided By IJCSMR

  • White Papers // Nov 2012

    E-Mail Spam Detection System with Novelty E-MAP

    Spam is defined as the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. Generally, a spam is e-mail advertising for some product sent to a mailing list or newsgroup. E-mail spam is defined as the subset of electronic spam involving nearly identical message sent to numerous recipients...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Traceback of DDoS Attacks Based on Decision Trees Model Using Intrusion Detection System

    Now-a-days, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memory less feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Finger Print Recogniton System Based on Smart Cards

    In this paper, the authors have presented a fingerprint recognizing system that uses the method of tracing backed up by a validating procedure to detect finger prints minutiae to match two sets of minutiae in order to identify a fingerprint. The experimental results show that the system is highly effective...

    Provided By IJCSMR

  • White Papers // Nov 2012

    An Efficient Web Content Extraction Using Mining Techniques

    Web mining is a class of data mining. In order to relieve a "Data Rich but Information Poor" dilemma, Data Mining emerged. Web Mining is a variation of this field that distils untapped source of abundantly available free textual information. The importance of web mining is growing along with the...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Fast Similarity Search for Moving Object Trajectories Using Distributed Mining Algorithm

    Object tracking applications focuses on finding the movement patterns of a single object or all objects. A mining algorithm called distributed mining algorithm is proposed to identify a group of objects with similar movement patterns. This information is important in some biological research domains, such as the study of animals,...

    Provided By IJCSMR