IJCSMR

Displaying 1-40 of 137 results

  • White Papers // Nov 2012

    Simulation Based Performance Evaluation of MANET Routing Protocols

    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. The routing protocol is used to discover routes between nodes. Routing is a challenging task in ad...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Throughput Analysis and Spectrum Sensing Over Nakagami Fading in Cognitive Radio

    The cognitive radio technology allows unlicensed users to utilize the licensed frequency band when it is idle. In this paper, the authors obtain a mathematical tradeoff between the number of samples used for spectrum sensing and the secondary user's throughput under different Nakagami fading conditions. This tradeoff depends upon the...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Intrusion Detection System Against Denial of Service Attack

    Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions. In this paper, the authors have presented a new technique, "Backscatter analysis," for estimating denial-of-service attack activity in the Internet. Using this technique, they observed widespread DoS...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Secure Intrusion Detection System in Mobile Ad Hoc Network

    Wireless Mobile Ad-hoc NETwork (MANET) is an emerging technology and have great strength to be applied in critical situations like battlefields and commercial applications such as building, traffic surveillance, MANET is infrastructure less, with no any centralized controller exist and also each node contain routing capability, Each device in a...

    Provided By IJCSMR

  • White Papers // Nov 2012

    E-Mail Spam Detection System with Novelty E-MAP

    Spam is defined as the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. Generally, a spam is e-mail advertising for some product sent to a mailing list or newsgroup. E-mail spam is defined as the subset of electronic spam involving nearly identical message sent to numerous recipients...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Traceback of DDoS Attacks Based on Decision Trees Model Using Intrusion Detection System

    Now-a-days, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memory less feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Finger Print Recogniton System Based on Smart Cards

    In this paper, the authors have presented a fingerprint recognizing system that uses the method of tracing backed up by a validating procedure to detect finger prints minutiae to match two sets of minutiae in order to identify a fingerprint. The experimental results show that the system is highly effective...

    Provided By IJCSMR

  • White Papers // Nov 2012

    An Efficient Web Content Extraction Using Mining Techniques

    Web mining is a class of data mining. In order to relieve a "Data Rich but Information Poor" dilemma, Data Mining emerged. Web Mining is a variation of this field that distils untapped source of abundantly available free textual information. The importance of web mining is growing along with the...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Fast Similarity Search for Moving Object Trajectories Using Distributed Mining Algorithm

    Object tracking applications focuses on finding the movement patterns of a single object or all objects. A mining algorithm called distributed mining algorithm is proposed to identify a group of objects with similar movement patterns. This information is important in some biological research domains, such as the study of animals,...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Applying Artificial Neural Network in Web Usage Mining

    Application of data mining techniques to the World Wide Web, referred to as Web mining, has been the focus of several recent research projects and papers. The term Web mining has been used in two distinct ways. The first, called Web content mining is the process of information discovery from...

    Provided By IJCSMR

  • White Papers // Nov 2012

    Intrusion Alerts Correlation Based Assessment of Network Security

    In this paper, the authors propose a novel hybrid model that efficiently selects the optimal set of features in order to detect 802.11-specific intrusions. Their model for feature selection uses the information gain ratio measure as a means to compute the relevance of each feature and the k-means classifier to...

    Provided By IJCSMR

  • White Papers // Nov 2012

    A Survey on "Intrusion Detection System"

    Intrusion detection is the process of identifying and responding to suspicious activities targeted at computing and communication resources and it has become the mainstream of information assurance as the dramatic increase in the number of attacks. Intrusion Detection System (IDS) monitors and collects data from a target system that should...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Admission Control Prototype for Real Time Databases

    The authors suggest and measure an admission control prototype for RTDBS, in which a transaction is presented to the system as a pair of procedures: a primary task, and a recovery block. The performance necessities of the main task are not known a priori, whereas those of the recovery block...

    Provided By IJCSMR

  • White Papers // Oct 2012

    A Location Guard Approach: An Overlay Network

    Serverless distributed computing has received significant attention from both the industry and the research community. Among the most popular applications are the wide-area network file systems, exemplified by CFS, Farsite, and OceanStore. These file systems store files on a large collection of untrusted nodes that form an overlay network. They...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Study of Different IP Network Recovery Mechanisms

    Internet has taken a central role in the people communication infrastructure. Hence the demand of internet availability and reliability has increased accordingly. Failure of node or link results in disruption of network traffic. This can adversely affect performance of critical applications. The recovery of the network should be fast enough...

    Provided By IJCSMR

  • White Papers // Oct 2012

    An Efficient Protocol With Probabilistic Approach for Traffic Control at Transport Layer in WSN

    In this paper the requirement for designing transport layer protocol for wireless sensor network is propose. As the sensor network contains sensor node which has limited power supply in the form of battery, so an important issue is saving energy at the sensor node. So the majority of the functionality...

    Provided By IJCSMR

  • White Papers // Oct 2012

    An Effective Web Document Clustering for Information Retrieval

    The size of web has increased exponentially over the past few years with thousands of documents related to a subject available to the user. In this paper, the authors introduce a combine approach to cluster the web pages which first finds the frequent sets and then clusters the documents. These...

    Provided By IJCSMR

  • White Papers // Oct 2012

    An Enhancement of Routing in Mobile Ad Hoc Networks for Increasing the Speed of Reliable Data Transformation

    A Mobile Ad-hoc NETwork (MANET) is composed of mobile nodes without any infrastructure. MANET applications such as emergency search and rescue operation, meetings or conventions are very stringent the provision of energy efficient routing protocol is much more challenging in MANETs than wired networks due to node mobility, limited power...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Survey on -Traffic Aware Distributed Channel Assignment in WLANs

    Many companies have started deploying the IEEE 802.11b WLAN in places such as airports, hotels, etc. This is mainly due to the availability of affordable Wi-Fi services and related consumer products, such as laptops PDAs, gaming devices, digital cameras, etc. The 802.11b technology is particularly attractive due to its maturity...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Web Miming Tool: A View

    Web data mining, also known as screen scraping, web scraping and data extraction is using software and tools to extract data from sources that are not formatted to be used as automated data sources. Most web information comes from web pages, often in the form of html that is formatted...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Ensuring Data Reporting Security in Wireless Sensor Networks by Using Elliptic Curve Cryptography

    In this paper, the authors propose an Elliptic Curve Cryptography that addresses both false data injection attacks and DOS attacks. Elliptic Curve Cryptography is a public key Cryptography. Elliptical Curve Cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster,...

    Provided By IJCSMR

  • White Papers // Oct 2012

    Key Management Scheme on Block Cipher

    Cryptography helps in protecting IT systems effectively. However, many do not practice it as it is complex in nature. Cryptographic algorithms could be either asymmetric or symmetric. In either case, the process of cryptography involves the distribution of keys pertaining to cryptography in order to ensure that the security assumptions...

    Provided By IJCSMR

  • White Papers // Sep 2012

    Using Data Mining Techniques for Business Intelligence in Web Mining

    The World Wide Web (WWW) is a popular and interactive medium to disseminate information today. The web is huge, diverse, and dynamic and thus raises the scalability, multimedia data, and temporal issues respectively. Web mining is the data mining techniques that automatically discovers or extracts the information from web document....

    Provided By IJCSMR

  • White Papers // Sep 2012

    Neural Network Training Based Face Detection and Recognition

    Face detection based on neural network is a challenging project now a days, which require machine intelligence through training and result analysis required for verification. As it is the basic of all the security system. This project deal with skin color segmentation which is a feature based techniques non variant...

    Provided By IJCSMR

  • White Papers // Sep 2012

    Multimodal Biometric Authentication System Using Fingerprint and Gait Signals

    Biometric authentication system has become one of the tremendous developing technologies for security based applications. But today unimodal biometrics has to face some of the unavoidable drawbacks like unacceptable error rates, noisy biometric data, and spoof attacks. Multimodal biometric systems are those which utilize, or capability of utilizing, more than...

    Provided By IJCSMR

  • White Papers // Sep 2012

    Comparative Analysis of Web Versus Mobile Portals

    In today's increasingly global, digital, network, and flexible economy, technological innovations represent a substantial investment for both organizations, which embark on implementations of technical discoveries, and individuals, who take chances on utilizing unfamiliar systems and applications. With advances in the leverage that information quest, accessibility and availability presents comes the...

    Provided By IJCSMR

  • White Papers // Sep 2012

    A Simple & Efficient Approach for Extracting Features from Blurred Fingerprints

    A blurred fingerprint is one which has very less number of minutiae ((i.e.,) ridges) in it. It is difficult to extract features from blurred fingerprints. So, the authors propose a very simple and efficient method for extracting more features from blurred fingerprints. They found some good results when extracted valleys...

    Provided By IJCSMR

  • White Papers // Sep 2012

    Multifeatured and Integrated P2P Platform for Distributed Networking Application Using Juxtapose

    In this paper, the authors present the JuXTApose (JXTA)-Overlay, which is a JXTA-based Peer-To-Peer (P2P) platform designed with the aim to leverage capabilities of Java, JXTA, and P2P technologies to support distributed and collaborative systems. The platform can be used not only for efficient and reliable distributed computing but also...

    Provided By IJCSMR

  • White Papers // Sep 2012

    On Demand and Table Driven Routing Protocol Energy Efficiency Performance Evaluation in Mobile Ad Hoc Networks

    MANET (Mobile Ad-hoc NETwork) is a self organizing and self configuring network without the need of any centralized base station. It is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. MANETs are infrastructure less and can be set up anytime, anywhere. In MANETs,...

    Provided By IJCSMR

  • White Papers // Sep 2012

    A Comparative Study on Types of Functional Testing

    Software testing is the process of executing a program with the intent of finding errors. The purpose of testing can be quality assurance, verification and validation, or reliability estimation. Testing can be used as a generic metric as well. Correctness testing and reliability testing are two major areas of testing....

    Provided By IJCSMR

  • White Papers // Oct 2012

    Intelligent Transportation Systems of Security Protocols in Vehicular Ad Hoc Networks

    Security is an important part of safety communications in VANET. The secure communication protocols meet the performance requirements. Vehicular Networks are a cornerstone of the envisioned Intelligent Transportation Systems (ITS). By enabling vehicles to communicate with each other via Inter-Vehicle Communication (IVC) as well as with roadside base stations via...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Energy Efficient and Reliable Communication in Underwater Acoustic Sensor Networks for Time Critical Applications

    Normally, the communication in the earth surface is through electromagnetic or radio waves. But this is not possible in the underwater environments in an efficient way. In underwater environments radio does not work well due to its quick attenuation in water. Hence the acoustic signals are sent using the acoustic...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Enhancement of Secure Routing Attack Against in Mobile Adhoc Networks

    Mobile Adhoc NETworks (MANET) is a collection of wireless nodes that can dynamically form network to exchange information without using any preexisting fixed network infrastructure. The special features of this MANET bring these technology great opportunities together with severe challenges. MANET are known to be vulnerable to a variety of...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Comparison of Approaches of Semantic Web Service Composition

    The web has been changed a lot after the introduction of a Service Oriented Architecture (SOA). The business processes are more efficient to perform a task by composing the number of web services. But, all these things are done statically. They are not flexible in nature. Semantic web comes here...

    Provided By IJCSMR

  • White Papers // Feb 2013

    Data Mining Using Relational Learning Techniques to Present Selection Graph

    Data mining algorithms search pattern in data. Usually data mining algorithms operate on single table. So pattern is discovered from single table. Mostly data is stored in multiple tables. These tables are related together. By this way the authors can eliminate redundancy and inconsistency. Simple Data mining techniques cannot be...

    Provided By IJCSMR

  • White Papers // Feb 2013

    MOGA-Net: A MultiObjective Genetic Algorithm-Net to Find Communities in Complex Networks

    The problem of community detection in complex networks as a Multi-Objective clustering problem, and presented an evolutionary Multi-Objective approach to uncover community structure. The algorithm optimizes two objective functions able to identify densely connected groups of nodes having sparse inter connections. The method generates a set of network divisions at...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Optimizing Update Interval of Gateways in VoIP Call Using TGREP

    Telephony Gateway REgistration Protocol [TGREP] is a route registration protocol for telephone destinations on a gateway. TGREP allows PSTN gateways or soft switches to inform a signaling server called as Location Server (LS), of routes it has to the PSTN. These advertisements include fairly dynamic information, such as the Available...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Clustering Based Certificate Revocation in Mobile Ad Hoc Networks

    In this paper, the authors build upon their previously proposed scheme, a clustering based certificate revocation scheme, which outperforms other techniques in terms of being able to quickly revoke attackers' certificates and recover falsely accused certificates. However, owing to a limitation in the schemes certificate accusation and recovery mechanism, the...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Software Testing Techniques

    Software testing is a set of activities conducted with the intent of finding errors in software. It also verifies and validate whether the program is working correctly with no bugs or not. It analyzes the software for finding bugs. Software testing is not just used for finding and fixing of...

    Provided By IJCSMR

  • White Papers // Jan 2013

    Survey on Adaptive LMS Algorithm to Cancel Noise and Improve Audio Quality in VOIP

    In this paper, the authors propose a technique through which noise in the communication system of VOIP can be eliminated and the quality can be improved to a great extend. VOice over Internet Protocol commonly refers to the communication protocols, technologies and the methodologies. VOIP mainly comprises all types of...

    Provided By IJCSMR