IJCTT-International Journal of Computer Trends and Technology

Displaying 1-40 of 578 results

  • White Papers // Feb 2015

    Location Based Search Queries with Ultimate Privacy Preserving Considerations

    The location-based searching services, users with location-aware mobile devices are able to make queries about their surroundings anywhere and at any time. To efficiently compute the location based queries which are found in any uncertain range in the entire region, and provide much more possible solutions related to that queries...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    A Simple Review of Biometric Template Protection Schemes Used in Preventing Adversary Attacks on Biometric Fingerprint Templates

    In this paper, the authors base their research on biometric systems security. They begin by introducing biometrics after which they will describe how a biometric system works before they later define what a biometric template is. Thereafter, they will explore attacks on biometric systems and lay more emphasis on biometric...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2015

    An Overview of the Existing Routing Protocols and Trust Based Algorithms in Mobile Ad-hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a temporary network that can be dynamically formed to exchange information by wireless hosts which may be mobile. The network is ad hoc because it does not rely on any pre-existing network infrastructure like routers in wired networks. The devices in a MANET can communicate...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    An Improved Classification of Network Traffic Using Adaptive Nearest Cluster Based Classifier

    In modern network security and management architecture, classification of traffic plays a major role in recent years. In particular, the process of intrusion detection and QoS control is considered as a essential components in traffic classification. Recent method uses statistical feature related classification approach with machine learning techniques for traffic...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Adaptive Context-Aware Data Management Scheme for Mobile Environments

    Data sharing and delivering in mobile environments is one of the most important interest issues in such environments. Therefore, data management is one of the biggest problems in these dynamic environments. In this dynamic environment, a user's context such as user's profile, user's social situation, and user's interests may affect...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Cloud Computing for Retailing Industry: An Overview

    Cloud computing is a novel approach which is practicing by many industries in the world, specifically the small and medium scale industries. It has become a talk of the town in computing industry and in business. Its gaining popularity can provide a lot of opportunities for the retailing industry to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Service Differentiation based on Contention Window with Enhanced Collision Resolution LR-WPANs

    The IEEE 802.15.4 MAC standard defines the channel access for low-rate, low-power communication applications such as Wireless Sensor Networks but does not differentiate between high or low priority data. The authors study few priority based service differentiation mechanisms which distinguish between such data for each and every device, and also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Overview on - A Content Filter for Unwanted Messages in Online Social Network

    Data mining is a process of analyzing and extracting useful information from databases. It helps to retrieve more information in various fields. Thus, data mining techniques provide an ease of making decisions regarding their user needs. The term spam is defined as unsolicited message and the goal of spam categorization...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Analysis of Various Clustering Techniques for Wireless Sensor Networks

    Recent years have seen expanded interest with the potential utilization of Wireless Sensor Networks (WSNs) in a wide mixed bag of uses and it has changed into a hot examination range. Owing to various favorable circumstances, clustering is currently an element extension of steering innovation in WSNs. The outline of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    A Review on Effective Data Aggregation Techniques

    From the primarily based WSNs circumstance, energy as well as bandwidth on the sensors usually are valued assets and vital to consume skillfully. Data aggregation at the base section by individual nodes causes flooding on the data which consequences throughout maximum energy consumption. In this paper, the evaluation on Data...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    A Comprehensive Study of Mechanisms Dealing Credit Cards to Defy Social Engineering Crimes

    Now-a-days, credit cards have become a prerequisite in the people daily activities. The misuse of credit card is increasing day-by-day. There are several ways in which a offender performs a credit card fraud. It is always been advised to exercise and provide additional security to the credit cards in order...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Efficient Robust Interactive Personalized Mobile Search Engine

    Technology and its service based cluster mechanism plays the most important role in the building the Technology in better and smarter way to implement the best of technological advancement. In the paper of recent era where mobile plays like a PC or the users can call these days mobile more...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    An Enhanced TCP Performance Based on Dynamically Weighted HMM in Optical Burst Switching for Loss Classification

    In recent times, Optical Burst Switching (OBS) is a raising contending technology in the network performance area. Therefore, because of the in efficiency of buffers, losses exist due to contention on the concurrent burst arrival in the core nodes. In this paper, contention loss occur which doesn't indicates the congestion...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Jan 2015

    Big Data Analysis: Apache Storm Perspective

    The boom in the technology has resulted in emergence of new concepts and challenges. Big data is one of those spoke about terms today. Big data is becoming a synonym for competitive advantages in business rivalries. Despite enormous benefits, big data accompanies some serious challenges and when it comes to...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Framework for Digital Forensics to Protect the Logging Information on Clouds

    Cloud computing is a rapidly developing information technology-IT occurrence. somewhat procure, manage and deploy a physical IT communications to host their organizations, software applications are progressively more deploying their communications into virtualized environments, remote, often managed and hosted by third parties. This development has considerable implications for digital forensic investigators,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Secure and Privacy-Preserving Distributed File Systems on Load Rebalancing in Cloud Computing

    Distributed file systems in cloud computing because Google File System (GFS) and Hadoop Distributed File Systems (HDFS) scheduled central servers in the direction of manage and load balancing in the metadata. Enabling technology for large-scale computation for big data originated by Google. Open source implementation by Yahoo and Facebook. Distributed...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Image Retrieval Process from Online Server with Markov-Chain Query Processing

    Here the authors are implanted a way of image based search method to get the information from server. Here searching process has done on automatic annotation image retrieval method and it have some keywords for each and every image independently, user can send their search request to the server in...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Data Transformation by Privacy Preserving with Unknown ID Obligation

    Algorithms for anonymous sharing of the private data between N parties are established. This technique is used iteratively to assign these nodes Id ranging from the number 1 to N. This assignment is anonymous in that the identities received are unknown to the other members of the group. The resistance...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    SQL Backing in Databases to Support Search on the Web

    The search as the user type system computes answers on the fly as the user type in the keyword query character by character. The authors study in the support search as the user type on the data residing in relational DBMS. They fully focus on how to the support this...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Construing Search Results from the Web Databases

    The number of databases is converted web accessible over html based search boundaries. The data parts are returned from the original database are generally encoded into the outcome pages dynamically for normal user browsing. The encoded data parts to be machine process capable which is necessary for different applications like...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Data Mining Analysis for the Direct and Indirect Discrimination Prevention

    Data mining is a progressively important technology for extracting beneficial knowledge unseen in large assortments of the data. There are, however, negative social perceptions nearby data mining, between which potential privacy attack and potential discrimination. The latter consists of unfairly considering people on the basis of their fitting to a...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Extended SQL Aggregation for Database Transformation

    Product life cycles to prepare a normalized data set from relational database for analysis require significant efforts and it is time consuming task. The main reason is that, in general the database grows with many tables and views that must be joined, aggregated and transformed in order to build the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Novel Integrated Approach for Big Data Mining

    The growing volume of digital internet of things is fuelling it even extra. The rate of data increase is surprising and this information comes at a speed, with diversity which is not necessarily structured. Ability to examine this massive amount of data is bringing a new age of productivity growth,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Enhanced Classification to Counter the Problem of Cluster Disjuncts

    In this paper, the authors preset a rigorous yet practical model dubbed as Cluster Disjunct Minority Oversampling TEchnique (CDMOTE) for learning from skewed training data. This algorithm provides a simpler and faster alternative by using cluster disjunct concept. They conduct experiments using fifteen UCI data sets from various application domains...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Statistical Survey on Imperial Data Handling in Big Data

    Big data technologies describe a new generation of technologies & architecture. Big data requires a change in computing architecture to customers so that they can handle data storage and server processing heavily. Most of the companies rely on applications for communication and to provide service to the customers, so big...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Revolutionary Profit Maximization Technique for Cloud Computing with Arranging Peak Multi Servers

    The cloud computing became most popular in now-a-days, here the generous of finances of cloud computing is censoriously significant. To escalate the profits (income), the cloud service provider has needs to realize the cost of business and charge for facility and the authors come to know how they will give...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Privacy Perspectives of Record based Approach in Social Networks

    Mainly in this paper, the authors proposed, privacy is one of the most friction point that the people can see in social networks and when they involves the communications in social networks it get the information about the tings. They can see different types of communities of computer science researchers...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Requirements, Trade-offs and Design for Safe Encounter Based Mobile Social Network

    The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. Encounter traditional social network as opposed users abuse the information's. The new access presents provocations that are basically different from those social network designs tackled by earlier....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Identification of Secured Single Sign-on Approach and to find Attackers in Distributed Systems

    Distributed systems are the huge amount of telecommunicated and adopting based network systems. So to provide the security in that large network the authors are implemented this paper, users can sign in only one time in their account. The users cannot able to login in their account many times until...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Modern Framework for P2P Integrated Systems over Trust Model for Self-Organizing Nodes

    The open nature of the peer-to-peer systems exposes them to malicious actions. Here in this paper, the authors introducing distributed algorithms that can enable peer to get the trustworthiness of other peers based on interactions of those peers in the past with other peers. The peers in the network are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Cloud Architecture for Profit Maximization Based on Efficient Multi-Server Configuration

    Cloud computing becoming a very efficient and effective technology to use resources and services together. Now-a-days, cloud computing becomes most popular, here the indulgent of economics of cloud computing is critically important. To increase the profits, the cloud service provider needs to understand the business cost and facility charge and...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Framework for Uplink Query Processing in Network-Assisted Mobile Computing

    Many mobile devices today access the data from the remote servers through the user generated queries. Processing of these queries should be done before the desired content to be delivered is identified. In this manner, when the processing is done the process will cut down the battery stand-by time there...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Secure Protocol for Maintaining Privacy & Confidentiality in Untrusted Database

    Usually once secrecy becomes an apprehension, encrypted data before outsourcing to a service provider. Now and then deployed on constructs of any software-based cryptographic, the encrypted data in for server-side query processing on, essentially limit query expressiveness. Now, the authors introduce trusted database, an outsourced database model that allows users...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Security Leakage Upper Bound Constraint to the Cloud through a Secure and Efficient Secondary Data

    Cloud computing provides considerable storage capacity to the users to deploy their applications without any modification its infrastructure details. Along with that all applications the authors have a large set of intermediate datasets it can generated by the implanted changes in the cloud computing and it is a challenging problem...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Centralizing Sensor Network in the Lush to Improve the Quality

    Major issue in wireless sensor networks is Localization and the study is done over years. With the real time experience GreenOrbs, to know about the climatic condition in the forest; they are unable to get the proper data sitting remotely with the current technique employed for knowing weather conditions at...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Prohibiting Blocking Attacks in Wireless Networks Through Aggregating Cryptanalytic Primitives

    Unlock outlook of the connection without any type of wire based medium will puts down the intentional intervention assault, usually submitted to like jamming. These type of the intentional intervention with the transmission without wire commence the pad for the purpose of growing refutation of the provide services based assault...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Designing Of Distributed Firewalls in Cooperative Domains

    Firewalls have been broadly organized on the Internet aimed at acquiring secluded systems. A firewall forms every received or departing packet towards to choose whether to receive or reject the packet grounded on its strategy. Improving firewall strategies is vital aimed at enlightening system performance. Earlier effort on firewall optimization...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Novel Approach for Enhanced Adaptive Acknowledgement based Intrusion Detection for MANETs

    The change to wireless network from wired network has been a most evolving new worldwide trend within the past few decades. The quantifiability and quality brought by wireless network create its potential in several applications. Among all the up to date wireless networks, Mobile Ad hoc NETwork (MANET) is one...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    A Secure Online Application Safeguarding Data with Stegnography based Watermarking

    Digital watermarking is the act of hiding information in multimedia data (images, audio or video), for the purposes of content protection or authentication. In digital watermarking, the secret information (usually in the form of a bit-stream), the watermark, is embedded into a multimedia data such as cover data in such...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Dec 2014

    Quality of Service with Frequent Pattern Mining on Multi Crux Chunk

    A mining frequent pattern is a first fundamental data's mining tasks with the numerous practical application i.e., the consumer markets basket examination, webs mining, and the network intrusion discovery. When the databases sizes are larger, executing the mining tasks on the personals computers is always non trivial because of the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2011

    Robust and Secure Digital Signature for Image Authentication Over Wireless Channels

    Now a days the transmission and distribution of the digital images by appending the digital signatures and content based image authentication schemes facing some triggers which are suitable for the insecure network and robust to transmission errors. The invasive distribution of digital images and the growing concern on their integrity...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    Modified LRU Algorithm to Implement Proxy Server With Caching Policies

    In order to produce and develop a software system, it is necessary to have a method of choosing a suitable algorithm which satisfies the required quality attributes and maintains a trade-off between sometimes conflicting ones. Proxy server uses caching policies to store web documents using algorithms. For this, different algorithms...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Oct 2011

    A QOS-Aware Software Selection Method Based On Service Credibility Evaluation

    Many software's that share same or similar functional properties; so it is often a challenging effort to select credible and optimal software based on their various history QoS records. In view of this challenge, a novel QoS-aware software selection method based on service credibility evaluation is put forward, based on...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Standard Ethernet Interface as an Embedded Communication Network for Controlling and Monitoring the Devices

    Web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a device web page. A web server can be embedded into...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Hardware Implementation of DWT for Image Compression Using SPIHT Algorithm

    In this paper, a DWT-based image processing system is developed on Xilinx Spartan3 Field Programmable Gate Array (FPGA) device using Embedded Development Kit (EDK) tools from Xilinx. Two different hardware architectures of Two Dimensional (2-D) DWT have been implemented as a coprocessor in an embedded system. One is direct implementation...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Protection System for VIP's With GPRS & Remote Monitoring

    In communication channel of a tele-operation control task, there always exists a time-delay problem which causes poor performance and even instability of the system. To overcome the time-delay problem, in this paper, the Smith predictor configuration is considered. The Smith predictor can stabilize the system by taking the time delay...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    Implementation of CMOS Camera Device Driver and Bluetooth Technique on S3C2440 Using Linux

    With the processing of CMOS technology, the technology of video acquisition based on CMOS is becoming a new trend. However, many CMOS camera chip is not supported by the newest Linux kernel yet. The environmented image acquirement and the Bluetooth transmission system are studied and designed. In this paper, the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Nov 2011

    A New Framework Design for IPTV

    An IPTV is a system used to deliver television services to the consumers who are registered subscribers for this system. This delivery of digital television is made possible by using Internet Protocol over a broadband connection, usually in a managed network rather than the public Internet to preserve quality of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Aug 2013

    Emphasis and Emerging Trends on Virtualization of Cloud Infrastructure with Security Challenges

    The cloud computing model is rapidly transforming the IT landscape. Cloud computing is a new computing paradigm that delivers computing resources as a set of reliable and scalable internet-based services allowing customers to remotely run and manage these services. Infrastructure-as-a-Service (IaaS) is one of the popular cloud computing services. IaaS...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Network Security Using Quantum Cryptography

    Network security and cryptography is a subject about how to protect information in digital form and to provide security services. The purpose of a digital signature is to provide a means for an entity to bind its identity to a piece of information. The common attacks on digital signature were...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Privacy Preserving Public Auditing System for Data Storage Security in Cloud Computing

    The cloud computing is the fastest upward idea in IT activity. In That IT environment have realized that the cloud computing is going to be the newest topic in the field of IT. Cloud Computing reduces cost by allocation computing and storage resources, complex with an on demand provisioning mechanism...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Nephele Algorithm Using Dynamic Resource Allocation in Cloud

    Ad-hoc parallel processing is one of the killer applications of the cloud. Most of the company's integrated into frame work for parallel data processing making essy to the customer. The processing frame work currently has been used static. Homogeneous cluster setup particularly nature of the cloud. The allocated compute resource...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    False Data Detection Using MAC pairs in Wireless Sensor Networks

    Wireless Sensor Networks are vulnerable to many types of security attacks, including false data injection, data forgery, and eavesdropping. Sensor nodes can be compromised by intruders, and the compromised nodes can distort data integrity by injecting false data. False data can be injected by compromised sensor nodes in various ways,...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Secured Data Storage in Google Cloud

    Cloud computing is an emerging technology in today's computer revolution. It has various benefits such as resource sharing, easy to use, highly accessible, and pay-per usage, though there are some drawbacks, one of them being security. It makes the users a fear in fully accessing or using the cloud computing...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Secure and Dependable Storage in Cloud Computing

    Cloud computing has been developed by the next generation architecture of IT activity. This is an Internet-based development and use of computer technology. Cloud Computing moves the application software and databases to the large data centers, where the organization of the data and services may not be totally dependable. In...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Dependable and Secure Storage Services in Cloud Computing

    Cloud storage allows users to remotely store their information and revel in the on-demand prime quality cloud applications while not the burden of native hardware and software system management although the advantages are clear, such a service is additionally relinquishing users' physical possession of their outsourced information, that inevitably poses...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Energy Consumption Of Fault Tolarant Quality Using Multipath Routing In Wireless Networks

    A Mobile Ad-hoc NETwork is a collection of mobile devices which form a communication network with no pre-existing infrastructure. A MANETs were initially proposed for use in military and battle field, due to rapid expansion of Multimedia Technology, Mobile Technology and real time application has need to strictly support Quality...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Data Invulnerability and Data Integrity Verification of Multi Cloud Storage

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. In this paper, the authors address the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Forestalling of Flooding Attacks in Wireless Ad Hoc Networks

    In recent years, security has been the most focused area in ad Hoc networks research. Wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost. Mobile nodes contributes vital role in wireless networks. However consumer electronic devices (mobile nodes)...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Development of an Iris-Based Access Control System Using a Two-Level Segmentation Approach

    Security of lives and assets has become a very interesting issue worldwide. Ability to restrict access to unauthorized users via an identification system that cannot be compromised at a very fast rate is highly desirable because it can be very costly if not achievable. In this work, a new segmentation...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2013

    Multicasting Over Manet Through Segmp By Secure Zone Leader Election

    Now-a-day's group communications are important in Mobile Ad-hoc NETworks. Efficient method for implementing group communications is multicasting. But, due to difficulty in group membership management and multicast packet forwarding over a dynamic topology it is a challenge to implement efficient and scalable multicast with security in MANET. The authors propose...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Securing the Images Using Biometric Cryptography Technique

    A biometric authentication system operates by acquiring raw biometric data from a subject, extracting a feature set from the data and comparing the feature set against the templates stored in a database in order to identify a person or to verify a claimed identity. The template data in the database...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack

    Wireless Sensor Network provides various applications like military, healthcare etc. These types of applications required a certain level of security. WSN is exposed by various types of attacks; wormhole is one of severe attack on WSN. In wormhole attack, an attacker receives packet from one location pass them through the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Entrenched Visual Cryptography Using Secret Sharing Scheme with Public Key

    Visual Cryptography Scheme (VCS) is a cryptography technique which allow visual data i.e.: printed text, handwritten notes, and picture is encrypted in such a way that the decryption can be done by the human visual system, without the support of computers. In order to share undisclosed images VCS used as...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // May 2013

    Clustering Based Energy Efficient Routing For Heterogeneous Wireless Sensor Networks

    A Wireless Sensor Network is a kind of network and which mainly consists of sensor nodes and with basic property of sensing to other nodes in the Network. In this paper, the authors are proposing a new routing mechanism named as cluster based energy efficient routing for WSN and also...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Zigbee Based Smart Street Lighting System

    Street light, a raised source of light that is commonly used along walkways and streets when the surrounding turns dark. Currently, various street lighting control systems technology have been developed to control and maintain these systems more economically. However, most of these systems developed have contributed some drawbacks. They have...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Apr 2013

    Data-Base Security Using Different Techniques: A Survey

    In many organizations, Database Security plays an important issue for their safe & secure environment. Performance of the organization or any enterprise should depend on Database Security, i.e. Insider attack detection. In this paper, mainly three insider attack detection techniques introduced are as follows Log examining, Query clustering & Policy-based...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Data Storage in Cloud Environment Enhance Privacy

    Cloud data have to be encrypted to protect data privacy, before outsourced to the commercial public cloud. The encryption process makes effective data utilization service a very challenging task. Traditional searchable encryption techniques allow users to securely search over encrypted data through keywords. They support only Boolean search and are...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Optimal Price Distribution Strategy for Mobile Service Providers

    Ubiquitous Multimedia Access has become a very common topic within the multimedia community during the last few years. Research centers and telecom providers address new, smart and efficient solutions for the ubiquitous access to multimedia data and in particular videos, from everywhere with mobile devices. But videos pose serious problems...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Handling Traffic Dynamics in Multipath Routing Topology

    To achieving a better quality of service and overall network performance, it is able to cope almost optimally with unpredicted traffic dynamics. Using multiple virtualized routing topologies, AMPLE (Adaptive Multi-topology traffic Engineering) system shows an effective routing performance. The proposed system consists of offline link weight optimization component that takes...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    FESCIM for Multi-Hop Cellular Network

    In multi-hop cellular networks, the mobile nodes forever advertise other's packets for fashionable the network performance and deployment. However, selfish nodes usually do not cooperate but make use of the cooperative nodes to relay their packets, which degrades network fairness and performance. Due to this, the authors propose a fair...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Feb 2013

    Routers Optimization and Minimizing Forwarding States with Explicit Multicast Forwarding

    Now-a-day's plenty of algorithms and techniques are available for optimization and multicast forwarding. But in this paper, the authors are improving the scalability (Efficiency) of IP multicast and source specific multicast and to reduce the number of routers for required storing the forwarding states. The Multicast forwarding mechanism optimizes the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Automatic Rule Extraction from Frequent Rules in Similar Network Sites

    Knowledge is an essential part of most Semantic Web applications and ontology. Ontology is the most important part of the knowledge. Ontology learning, which refers to extracting conceptual knowledge from several sources and building ontology from scratch, enriching, or adapting an existing ontology is one of the attempts at knowledge...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

    Patient Health Records (PHR) is maintained in the centralized server to maintain the patient's personal and diagnosis information. The patient records should be maintained with privacy and security. The privacy mechanism protects the sensitive attributes. The security schemes are used to protect the data from public access. Patient data can...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Unassailable Fuzzy Keyword Searching in Cloud Storages

    Cloud Computing allows users to dispense as well as access data remotely. The ongoing environment, in which the data is stored in cloud, has a security dent, which is still not yet resolved. A notable number of techniques have been developed to retrieve data using keyword searches through encrypted data....

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Cloud Information Accountability Frameworks for Data Sharing in Cloud - A Review

    The difficulty of how to provide proper security and privacy protection for cloud computing is very important, and as yet not solved. In this paper, the authors review the cloud information accountability framework for the data sharing in which procedural and technical solutions are co-designed to demonstrate accountability by the...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Security and Access Control Evaluation for Cloud Data Centers

    Cloud computing is a computing paradigm that enables highly scalable services to be consumed over the Internet on a shared basis. Cloud service providers place data in data centers which is distributed as shared data to the users. Users' data are usually processed remotely in unknown machines that users do...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Scalable Communication for Web Applications by Using Windows Azure Serive

    Cloud computing has emerged as an ideal platform for deploy scalable web applications. But at the same time they give up data consistency. However, many applications cannot give any data inconsistency scalable transaction manager which guarantee ACID properties for multi-item connections issued by Web application, even in the attendance of...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Automatic Bus Recognition Through Mobile

    In this paper, the authors present a GPS (Global Positioning System) to track the vehicle in the remote areas. Here based on the latitude and longitude values of the vehicles anywhere on the globe, a microcontroller which will process the information and switch the GSM (Global System for Mobile communication)...

    Provided By IJCTT-International Journal of Computer Trends and Technology

  • White Papers // Mar 2013

    Vaccination Strategies of a Modified SIS Model on Complex Networks

    A new susceptible-infected-susceptible model is researched in this paper, which has an infective vector. And it describes epidemics (e.g. malaria) transmitted through an infective vector (e.g. mosquitoes) on complex networks. The authors compare the modified model with the standard SIS model having an infective vector. They also study and compare...

    Provided By IJCTT-International Journal of Computer Trends and Technology