IJESIT

Displaying 1-40 of 89 results

  • White Papers // Mar 2014

    Reducer Load Balancing and Lazy Initialization in Map Reduce Environment

    Big data is revolutionizing 21st-century with increasingly huge amounts of data to store and be able to easily access it for a wide variety of purposes. It requires exceptional technologies to efficiently process large quantities of data within tolerable time. This kind processing and storage in the days before Hadoop...

    Provided By IJESIT

  • White Papers // Jan 2014

    Advanced Biometric Authentication System in Two Wheeler

    In this paper the authors develop an authentication system on two-wheelers based on biometric that can be used to secure the two-wheeler from theft. This paper will utilize a fingerprint scanner as the input to acquire fingerprint images and to ignite the system. When fingerprint is scan on fingerprint scanner,...

    Provided By IJESIT

  • White Papers // Jan 2014

    Preventing the Privacy Breach Using Perturbation

    Privacy-preserving is an important issue in the areas of data mining and security. The aim of privacy preserving data mining is to develop algorithms to modify the original dataset so that the privacy of confidential information remains preserved and as such, no confidential information could be revealed as a result...

    Provided By IJESIT

  • White Papers // Jan 2014

    Various Approaches for Watermarking of Relational Databases

    As a tool for storing and managing data, relational database is widely used in many information systems. It is very critical issue to protect the copyright of relational data. As an invention of information hiding the digital watermark techniques have been attracting more interests in both research and industrial fields....

    Provided By IJESIT

  • White Papers // Jan 2014

    Reducing Energy Consumption and Increasing Profit with Task Consolidation in Clouds

    Cloud computing systems rent resources on demand, pay-as-the user-go basis, and multiplex many users on the same physical infrastructure. However the revenue of cloud computing is get affected by various factors such as QoS constraints, energy consumption etc., energy aware task consolidation technique is used to allocate the tasks dynamically...

    Provided By IJESIT

  • White Papers // Jan 2014

    Mobile Services on Wi-Fi Proximity Base

    In this paper the authors describe a new model for delivering hyper-local data for mobile subscribers. Their model uses Wi-Fi proximity as a service. According to this paper, any existing or even a specially created Wi-Fi hot spot could be used as presence sensor that can trigger access for some...

    Provided By IJESIT

  • White Papers // Jan 2014

    Key Revocation for Secure Vehicular Ad Hoc Network

    Vehicular ad hoc networks are used for communication among vehicles and between vehicles and roadside equipment. The security of vehicular ad hoc networks should be considered in the field of wireless mobile networking because VANETs are exposed to cruel attacks. A number of secure authentication schemes based on asymmetric cryptography...

    Provided By IJESIT

  • White Papers // Jan 2014

    A Novel Approach for Encryption of Text Messages Using PLAY-FAIR Cipher 6 by 6 Matrix With Four Iteration Steps

    Play fair cipher algorithm has demonstrated its success for encryption of text messages over the years. This algorithm uses normally 5 by 5 matrices. The main disadvantages of this matrix are the user cannot use numeric and also have to compromise between I and J. Here the authors use this...

    Provided By IJESIT

  • White Papers // Nov 2013

    Intelligent Monitoring System - A Network Based IDS

    Network security is a crucial part for every network in every organization. With introduction of emerging technologies; new attacks and new intrusions are also emerging and network is becoming more vulnerable to attacks. Unfortunately, in this digital world it is difficult to hide themselves from the attacks and intrusions. For...

    Provided By IJESIT

  • White Papers // Nov 2013

    A Study on the Role of Affect, Technological, People and Organizational Factors in Organizational Knowledge Sharing

    Knowledge sharing factors influence sharing attitude among knowledge workers. Poor understanding on emotional, technological and organizational factors can seriously affect performance and productivity and de-motivate knowledge sharing culture in the organizations This paper is to investigate factors that influence knowledge sharing in organization. In this paper, five factors are examined,...

    Provided By IJESIT

  • White Papers // Nov 2013

    Proposing a Method to Remove Gray Hole Attack in AODV Protocol in MANET

    Ad hoc networks have some nodes that are linked together freely without any radio frequency. Their fast establishment has made them to function very remarkably in different domains including military and emergency, natural disasters, universities and cities. Mobile nodes, and wireless communications, dynamic transformation of network structure, lack of centralized...

    Provided By IJESIT

  • White Papers // Nov 2013

    A New Randomized Cryptographic Key Generation Using Image

    Security in the real world is an important issue to be taken care and to be encountered with various proactive and preventive measures. Securing the information is the process of identifying and restricting the access of user's information from unauthorized access. Each and every level of information should stay away...

    Provided By IJESIT

  • White Papers // Nov 2013

    Survey on Clustering Algorithms

    Image segmentation is the process that partitions the image pixels into non-overlapping regions such that each region is homogeneous. More precisely, image segmentation is the process of separating useful pixels from the rest .The objective of clustering is to determine the intrinsic group in a set of unlabeled data. Some...

    Provided By IJESIT

  • White Papers // Nov 2013

    Verification Algorithm for Data Aggregation in WSN

    In a large sensor network, in-network data aggregation significantly reduces the amount of communication and energy consumption. There is a robust aggregation framework called synopsis diffusion which combines multipath routing schemes with duplicate-insensitive algorithms to accurately compute aggregates (e.g., predicate count, sum) in spite of message losses resulting from node...

    Provided By IJESIT

  • White Papers // Nov 2013

    An Efficient and Polynomial Based Key Distribution Approach for Wireless Sensor Networks

    Wireless sensor networks are highly vulnerable to attacks because, it consists of various resources constrained devices and they communicate via wireless links. The most fundamental security problem in WSN is key management that covers the establishment, distribution, renewing and revocation of cryptographic keys. Several key management protocols were proposed in...

    Provided By IJESIT

  • White Papers // Nov 2013

    Detection and Prevention of Passive Attacks in Network Security

    In this paper the authors describe how to detect passive attack and after that provide prevention from passive attacks. For detection of passive attacks the authors use the concept of key loggers and the concept of registry files. For prevention from passive attacks here they use the concept of virtual...

    Provided By IJESIT

  • White Papers // Nov 2013

    An Efficient Enhanced Majority Logic Fault Detection with Euclidean Geometry Low Density Parity Check (EG-LDPC) Codes for Memory Applications

    In recent years, memory cells have become more susceptible to soft errors. This must be protected with effective error correction codes. Majority logic decodable codes are suitable for memory applications because of their capability to correct large number of errors. Conversely, they increase the average latency of the decoding process...

    Provided By IJESIT

  • White Papers // Nov 2013

    FPGA Realization of Multi Channel Data Acquisition System Using Softcore Embedded Processor

    To avoid threats from underwater mines and torpedoes a naval ship must produce very low acoustic and magnetic signatures. Most of these signatures are at very low frequencies; this makes designing data acquisition system for measuring the acoustic and magnetic signatures very complex. This paper describes the way of designing...

    Provided By IJESIT

  • White Papers // Sep 2013

    Analysis of Channel Coding Technique Using Pseudorandom Generator Based Public Key Cryptography

    Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a...

    Provided By IJESIT

  • White Papers // Sep 2013

    Multi-Attribute Based Access Control Policy Enforcement for File Accesses in Cloud

    Cloud computing, the imminent need of computing as a finest utility, has the latent to take a enormous leap in the IT industry, is structured and put to optimal use with regard to the current tendency. Keeping in view of high security and privacy concerns, many access control schemes have...

    Provided By IJESIT

  • White Papers // Sep 2013

    Data Partitioning and Association Rule Mining Using a Multi-Agent System

    In this paper the author explores and demonstrates (by experiment) the capabilities of Multi-Agent Data Mining (MADM) System in the context of parallel and distributed Data Mining (DM). The exploration is conducted by considering a specific parallel/distributed DM scenario, namely data (vertical/horizontal) partitioning to achieve parallel/distributed ARM. To facilitate the...

    Provided By IJESIT

  • White Papers // Sep 2013

    WUM for Browsing Behavior of a User and Subsequently to Predict Desired Pages: A Survey

    The authors propose this paper as a survey of recent paper in the field of web usage mining for the benefit of research on the web log files of web-based information services. Web usage mining is a main research area in web mining focused on learning about web users and...

    Provided By IJESIT

  • White Papers // Jul 2013

    A Novel of Low Complexity Detection in OFDM System by Combining SLM Technique and Clipping and Scaling Method

    In order to increase the bandwidth efficiency and receiver robustness the wireless communication standards such as DVB-T2 or DVB-NGH are used. In order to fully exploit the Multiple-Input Multiple-Output (MIMO) channel capacity, the diversity and spatial multiplexing are combined. However, to achieve large capacity of Full-Rate Full Diversity (FRFD) space-time...

    Provided By IJESIT

  • White Papers // Jul 2013

    An Architecture for Creation of Multimedia Data Warehouse

    Increasing trend in storage of multimedia information on worldwide web servers has resulted in growing tendency of searching and capturing data on internet. Interest of scientific, academic, industrial and business communities has been growing many folds for searching multimedia information. Reciprocating to this trend various organizations are willing to make...

    Provided By IJESIT

  • White Papers // Jul 2013

    Face Recognition Using Bank of Gabor Filters

    In recent trends, face recognition is an important tool for security identification besides law enforcement, excess control and several navigation aids. The proposed algorithm applies a different 40 gabor filters bank on an image. As a result of which 40 images with different angles and orientation were received. Subsequently, maximum...

    Provided By IJESIT

  • White Papers // Jul 2013

    A Secure Hybrid Key Establishment Scheme for Wireless Sensor Network

    The authors propose this paper based on the field of augmented reality, in which 3D virtual objects are integrated into a 3D real environment in real time. What makes augmented reality so interesting is the user's ability to interact in a real-time environment around them .While augmented reality are in...

    Provided By IJESIT

  • White Papers // Jul 2013

    Petri Net Modeling and Analysis of Mobile Communication Protocols UMTS, LTE, GPRS and MANET

    It is important that the design of communication systems is free of any errors in their operational behavior. Many formal methods have been used and employed that increase one's confidence in the design and provide the confidence that the design is error free. Due to the cost of applying formal...

    Provided By IJESIT

  • White Papers // Jul 2013

    An Efficient Algorithm for Finding 1-Itemsets and their Respective Counts in Frequent Pattern Mining Using Red-Black Tree

    Data mining deals with turning data into useful information and knowledge. It relies heavily on the concept of association rule mining, which is one of the most extensively researched topics of data mining. Association rule mining, in turn leads to the concept of frequent pattern mining. Frequent pattern mining seeks...

    Provided By IJESIT

  • White Papers // Jul 2013

    Intrusion Detection Approach & Tools

    Wireless networks have become important technology in the last few years due to the rapid growth in wireless devices. Communication in wireless network takes place over an open medium that is accessible to all users. Wireless medium is available to both legitimate network users and malicious users. Because of the...

    Provided By IJESIT

  • White Papers // Jul 2013

    Assuring Secured Data Storage in Cloud Computing

    Cloud computing provides new vision to the world. The approach of cloud computing is totally different from traditional system. In traditional system for any service, the users need purchase, install, maintain, and update by own. But in cloud environment they just pay for that service according to their usage basis...

    Provided By IJESIT

  • White Papers // Jul 2013

    Implementation of RFID Tag-Reader Mutual Authentication Protocol

    Radio Frequency IDentification (RFID) is a recent technology that utilizes radio frequencies to track the object by transmitting a signal with a unique serial identity. Generally, the drawbacks of RFID technology are high cost and weak authentication systems between the reader and tag. In this paper, RFID mutual authentication protocol...

    Provided By IJESIT

  • White Papers // Jul 2013

    Development of Compression Algorithms for Remotely Sensed SAR Data

    Environmental monitoring, earth-resource mapping, and military systems require broad-area imaging at high resolutions. Applications of self-illuminating remote sensing systems and radar imagery is growing rapidly. Unique properties of Synthetic Aperture Radar (SAR) system makes it one of the most popular and applicable methods of self illuminating remote sensing techniques for...

    Provided By IJESIT

  • White Papers // Jul 2013

    Offline Handwritten Signatures Classification Using Wavelets and Support Vector Machines

    Support vector machines are a statistically sound technique which has the capability of learning well separating hyper planes in high dimensional feature spaces. One of the goals of this technique is optimizing the generalization bounds. The various optimizations related to the parameters like the maximal margin, the margin distribution, the...

    Provided By IJESIT

  • White Papers // May 2013

    Bit Error Rate Reduction in Mimo Systems Using Equalization Techniques

    Wireless communication systems require different techniques of signal processing that improve the link performance in aggressive mobile environments. The mobile radio channel is dynamic due to multipath propagation and Doppler spread, these effects have a strong negative impact on the bit error rate of any modulation technique. Equalization, diversity, and...

    Provided By IJESIT

  • White Papers // May 2013

    Dynamic Auditing and Accounting Mechanism for Policy Based Data Access in Cloud

    Cloud computing is advancement in the field of information technology. The terminology cloud computing can be illustrated as pay-as-you-use model in which this framework includes collection task where they are assigned to the clients who needs it. Without the features of internet it's impossible to provide a cloud environment. Lots...

    Provided By IJESIT

  • White Papers // May 2013

    Study of Importance of IDS for Grid Environment

    Grid is a kind of distributed computing environment, which allows large scale resource sharing and system integration. Grid computing is a kind of important information technology which enables resource sharing globally to solve the large scale problem. The services and resources in Grid are heterogeneous and dynamic, and they also...

    Provided By IJESIT

  • White Papers // May 2013

    Enhancing Data Security by Using Hybrid Cryptographic Algorithm

    In this paper, the authors present an approach to develop a Hybrid Cryptographic Algorithm. At present, various types of cryptographic algorithms provide high security to information on networks, but there are also has some drawbacks. The algorithm is designed using combination of two symmetric cryptographic techniques which are AES and...

    Provided By IJESIT

  • White Papers // May 2013

    Java Program Vulnerabilities

    The Java programming language provides a lot of security features, build directly into the language and also supplied by security relevant APIs and implementations. Nevertheless, simply by choosing Java as the programming language for some program, will not guarantee that the program will be safe against secrecy attacks, integrity or...

    Provided By IJESIT

  • White Papers // May 2013

    Throughput Improved -Adaptive CSMA MAC Protocol Design With Power Optimistic for MANET

    Power conservation and throughput management is a major issue in mobile ad hoc networks. In the design of wireless ad hoc networks, various techniques are applied to efficiently allocate the scarce resources available for the communication links and the power control. Therefore the throughput management is not related to any...

    Provided By IJESIT

  • White Papers // May 2013

    Performance Comparison of AODV and DSR Routing Protocols in Mobile Ad-Hoc Networks: A Survey

    A mobile ad-hoc network is a collection of autonomous wireless nodes without any fixed infrastructure and centralized administration. This paper presents a survey with an objective to compare ad-hoc routing protocols AODV and DSR taking into consideration different network parameters performed using simulation, emulation and real world experiments. Various researchers...

    Provided By IJESIT

  • White Papers // Mar 2013

    Power Saving in Mobile Handover Networks Using Simple Protocol Architecture

    Instant Messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver. Mobile Instant Messaging (MIM) is the technology that allows instant messaging services to be accessed from a portable device, ranging from standard mobile phones. But in MIM...

    Provided By IJESIT

  • White Papers // Nov 2012

    Cloud Computing and Security Models: A Survey

    Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its multitudinous benefits. However, the security of cloud computing is always the focus of numerous potential cloud customers, and a big barrier for its widespread applications. In this paper, to facilitate people to understand the...

    Provided By IJESIT

  • White Papers // Jan 2013

    Design and Implementation of Automotive Security System Using ARM Processor

    Automotive theft has been a persisting problem around the world and greater challenge comes from professional thieves. Modern security can be deceived by professional thieves therefore a need of biometric authentication technology arises in automotive vehicles. Traditional automotive security systems rely on many sensors and cost a lot. When one...

    Provided By IJESIT

  • White Papers // Jan 2013

    Simple Hash Functions for Biometric Template Authentication

    The safety issues surrounding databases are mainly about safeguarding large and valuable collections of personally identifying information. If these databases are part of an important security system, then they are natural targets for attack, theft, compromise, and malicious or fraudulent use. When the reference information, captured during the enrollment phase,...

    Provided By IJESIT

  • White Papers // Jan 2013

    Prevention of Unauthorized Access of Social Accounts-An Approach

    The authors have many authorised websites were in there will be chances of many aliases user names and there will be chances of performing suspicious activities. In this paper, they present how to identify and extract aliases of a given entity from the Web in an automatic way and a...

    Provided By IJESIT

  • White Papers // Mar 2013

    Cross Layer Energy Improvement in MANET

    Most of current routing protocols working on the congestion problem and energy drain in wireless ad hoc networks are affected, because a mobile device has a limited battery and a considerable amount of energy is consumed in wireless interfaces. Many of routing protocols use the shortest path route from source...

    Provided By IJESIT

  • White Papers // Mar 2013

    Multi Protocol Label Switching With Quality of Service in High Speed Computer Network

    Multi protocol label switching is a method that directs data from one system node to the next based on short path labels rather than long network addresses in high-performance telecommunications association. It offers high scalability, end-to-end IP services having simple configuration and management for customers and service providers. It forwards...

    Provided By IJESIT

  • White Papers // Mar 2013

    TM Fortification and Facile Approach Based on GSM and RFID

    Currently, security is becoming a prime factor in the society. It's becoming a challenge for everyday activities such as access control, cash terminals, public transport, internet, etc., where the user authentication is required prior to giving access to confidential information, RFID in conjunction with GSM technologies bring a solution to...

    Provided By IJESIT

  • White Papers // Mar 2013

    Enhancing Security of Wireless Sensor Network

    This paper shows how, the authors can enhance security of the wireless sensor networks. In order to send confidential data from sensor node to sink node and also physical threat is possible to sensor node. Security mechanism can be applied at sink node to protect various threats in OSI layers...

    Provided By IJESIT

  • White Papers // Mar 2013

    A Novel Approach for Sensory Data Collection in Wireless Sensor Networks With Mobile Sinks

    Recently, there has been a rapid growth in the wireless communication technique. Mobile sinks can be mounted upon urban vehicles with fixed trajectories provide the ideal infrastructure to effectively retrieve sensory data from such isolated WSN fields. Existing approaches uses either single-hop transfer of data from SNs that lie within...

    Provided By IJESIT

  • White Papers // Mar 2013

    Differential Power Analysis (DPA) Attack on Dual Field ECC Processor for Cryptographic Applications

    Exchange of private information over a public medium must incorporate a method for data protection against unauthorized access. Elliptic curve cryptography is one of the best public key cryptography algorithm as it provides high security at lesser bit sizes than RSA and also it operates with higher throughput, lower power...

    Provided By IJESIT

  • White Papers // Mar 2013

    A Novel Method for Storage Security in Cloud Computing

    Cloud computing is a model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as...

    Provided By IJESIT

  • White Papers // Mar 2013

    Towards a Secure Travel Assistance Device for GPS/GPRS Enabled Mobile Users to Aid Transit Riders With Special Needs

    As urban living environment is becoming more and more complex; the road condition is becoming worse because of heavy traffic, tremendous increase in accidents and most importantly the security issues that have been raised by recent incidences. To solve such problem with respect to school going children, a school bus...

    Provided By IJESIT

  • White Papers // Mar 2013

    The Secure Data Storage in Cloud Computing Using Hadamard Matrix

    Cloud computing is more popular because it can reduce the cost. It is not restricted to a particular location user can access the services from anywhere. But security becomes an important issue in the cloud computing. In this paper, the authors have focused on the storage as a service. Here,...

    Provided By IJESIT

  • White Papers // Mar 2013

    To Avoid Congestion by Using Flooding Approach in Wireless Ad Hoc Networks

    Talent of a routing algorithm to converge quickly when network topology changes frequently is a critical requirement for routing in multi-hop wireless networks, Due to its exceptional convergence performance, Link State Routing protocol is the state of art in wireless network routing. The protocol is to operate Link State Packet...

    Provided By IJESIT

  • White Papers // Mar 2013

    Detection of DDoS Attack Using Virtual Security

    Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource unavailable to its intended users. DoS attack consists of the efforts of one or more people to interrupt or suspend the service of a host connected to the Internet. The discovery of this attack is necessary to...

    Provided By IJESIT

  • White Papers // Mar 2013

    A Novel Approach to Mine Frequent Item Sets of Process Models for Cloud Computing Using Association Rule Mining

    Process mining provides a new means to improve processes in a variety of application domains. These process mining techniques help organizations to uncover their actual business processes Frequent pattern mining algorithms are applied in the dyeing process due to difficulties of doing the coloring process in an efficient way. Previous...

    Provided By IJESIT

  • White Papers // Mar 2013

    Performance Analysis of Space Time Coded MIMO Mobile Wimax (IEEE 802.16e)

    Worldwide Interoperability for Microwave ACcess (WiMAX) is the end to end technology that provides low cost applications and last mile solution for broadband wireless access in wireless Metropolitan Area Network (MAN). Mobile WiMAX is based on the standard defined by IEEE 802.16 which provides coverage of up to 30 miles...

    Provided By IJESIT

  • White Papers // Mar 2013

    A Survey: Data Storage Technologies

    Now-a-days data is increasing rapidly, so to store these data the people need data storage technologies. In this paper, the authors have calculated estimated growth over 10 years of increasing volume of data. Also have compared data storage technologies like Direct Attached Storage (DAS), Network Attached Storage (NAS) and Storage...

    Provided By IJESIT

  • White Papers // Mar 2013

    Cloud Security: PaaS Aspect

    The security demands affiliated to cloud computing are of high priority, importance and of close attention. When it comes to security cloud-based services have to be used & managed at all possible levels of enterprise system. The main issue with commercial enterprise is that they do not want to store...

    Provided By IJESIT

  • White Papers // Mar 2013

    Fault Detection Mechanism for Wireless Sensor Networks

    Due to the low cost and the possible harsh or hostile deployment environments, sensors are prone to failure. Faulty sensors are likely to report arbitrary readings that do not reflect the true state of observed physical process. These faulty sensors should be recognized timely, and should be excluded from the...

    Provided By IJESIT

  • White Papers // Apr 2013

    A Review on Intrusion Detection Systems in MANET

    Applications of Mobile Ad Hoc NETworks (MANET) are increasing rapidly. However, MANET is susceptible to attacks due to its mobile nature. The security issue is becoming a major concern and constriction in the applications of MANET; therefore, selection of intrusion detection methods is especially important for MANET applications. This paper...

    Provided By IJESIT

  • White Papers // Jan 2012

    A Comprehensive Performance Analysis of Routing Protocol for Adhoc Network

    Routing is always a challenging task in a mobile ad hoc network. Several protocols have been proposed for ad hoc network with different functionality. All the protocols have been designed to determine the routes between the communicating nodes based upon different criteria. Due to the movement of the nodes the...

    Provided By IJESIT

  • White Papers // Jan 2013

    Improving Efficiency and Security Based Data Sharing in Large Scale Network

    The Key Generation Center (KGC) could decrypt any messages addressed to specific users by generating their private keys. This is not suitable for data sharing scenarios where the data owner would like to make their private data only accessible to designated users key. To overcome this problem the authors propose...

    Provided By IJESIT

  • White Papers // Jan 2013

    GHOST - Geo Cache Hybrid On-Demand Scheme for Tracking VANET

    Several medium access control protocols have been proposed in the recent past for the vehicles for accessing radio channels and for distributing timely active safety messages for inter-vehicle communication in Vehicular Ad-hoc NETworks (VANETs). As contention period is high in Medium Access Control (MAC) for channel access, MAC in unable...

    Provided By IJESIT

  • White Papers // Jan 2013

    Authentication, Key Establishment & Cooperative Cache Maintenance in Wireless P2P Environments Using GDC & Greedy Algorithm

    Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. In this paper, the authors present their design and implementation of cooperative cache in wireless P2P networks, propose solutions to find the best place to...

    Provided By IJESIT

  • White Papers // Mar 2013

    Developed Secure Network Model Using Radius Server

    History of networks dates back to the early 1970's and due to the emerging ding demand placed on networks by administrators and users, securing the network becomes a necessity. In this paper, the authors studied the various existing methods employed in securing private networks and came up with using radius...

    Provided By IJESIT

  • White Papers // Mar 2013

    Survey on Intercarrier Interference Self-Cancellation Techniques in OFDM Systems

    Orthogonal Frequency Division Multiplexing (OFDM) is a multi-carrier modulation technique which divides the available spectrum into many carriers. Efficient spectrum usage makes it most desirable candidate for high data rate transmission. However the major drawback is its sensitivity to CFO which causes Inter Carrier Interference (ICI). This ICI causes severe...

    Provided By IJESIT

  • White Papers // Mar 2013

    Secure Authentication With 3D Password

    Providing authentication to any system leads to provide more security to that system. There are many authentication techniques are available, Such as textual password, graphical password, etc. but each of this individually having some limitations & drawbacks. To overcome the Drawbacks of previously existing authentication technique. A new improved authentication...

    Provided By IJESIT

  • White Papers // Mar 2013

    System Identification for MIMO System

    Most of the industrial processes are multivariable in nature. Greenhouse system is considered which the important application is in agricultural process. Greenhouse is to improve the environmental conditions in which plants are grown. In this paper, the authors have proposed identification of greenhouse system using input and output data sets...

    Provided By IJESIT

  • White Papers // Mar 2013

    Classification of Web Application Vulnerabilities

    Web applications provide access to increasing amounts of information, some of which is confidential. From an application perspective, vulnerability identification is absolutely critical and often over looked as a source of risk. The outlines of this paper is to classify the attacks and weaknesses that can lead to the compromise...

    Provided By IJESIT

  • White Papers // Mar 2013

    Outdoor Propagation Prediction in Wireless Local Area Network (WLAN)

    As a result of rapid growth in wireless telecommunications, there has been an increasing need for proper network coverage predictions. This proper network coverage predictions planning requires a good understanding of the fundamental limitations caused by various environmental condition to the propagation of the signal such as interference and multipath...

    Provided By IJESIT

  • White Papers // Jan 2013

    Network Intrusion Detection System (NIDS) Based on Data Mining

    With the tremendous growth in information technology, network security is one of the challenging issue and so as Intrusion Detection System (IDS). IDS are an essential component of the network to be secured. The traditional IDS are unable to manage various newly arising attacks. To deal with these new problems...

    Provided By IJESIT

  • White Papers // Jan 2013

    Understanding Network Latency in Thin Client Environment

    The interest in the thin clients is increasing day by day, in the modern age, mainly because of frustration with the growing total cost of ownership of personal computers. The Thin Client also consumes very less power as compared to a regular personal computer and hence supports the Green Computing....

    Provided By IJESIT

  • White Papers // Jan 2013

    Comparative Study of Various Network Processors Processing Elements Topologies

    An enormous requirement for high-speed in computer networks due to augmented number of users, servers, connections and high demands for new applications, along with the significant growth in data traffic has claimed the development and deployment of high-speed telecommunication systems. The authors use specialized processors, called Network Processors (NPs) to...

    Provided By IJESIT

  • White Papers // Jan 2013

    A Study of Cryptanalysis With Security Enhancement for a Modified Authenticated Key Agreement Protocol

    The Diffe-Hellman key agreement protocol is a method for establishing a common session key to be shared between two parties (named, Alice and Bob) over an insecure network. Then, they can use the session key to be the symmetrical key (such as DES, Rijndael) to establish a secure communication channel....

    Provided By IJESIT

  • White Papers // Jan 2013

    Algorithm and Architecture for Control of Wireless Sensor Networks

    Sensor nodes in a Wireless Sensor Network (WSN) organize themselves into a cooperative network and perform the three basic functions of sensing, computations and communications. Energy constraints of the sensors pose a major challenge and have become an extensive research in WSN. An event driven secure topology discovery algorithm for...

    Provided By IJESIT

  • White Papers // Jan 2013

    An Efficient VLSI Architecture for 3D DWT Using Lifting Scheme

    The role of the compression is to reduce bandwidth requirements for transmission & memory requirements for storage of all forms of data as it would not be practical to put images, audio, video alone on websites without compression. The medical community has many applications in image compression often involving various...

    Provided By IJESIT

  • White Papers // Jan 2013

    Design of a High Throughput Crypto Devices Based on AES

    In this project a design of high throughput crypto devices based on AES algorithm has been presented. The bus width of the architecture is 128 bit. For the 128 bit input 128 bit key is used. The plain text and the key are used as a inputs. Sub Bytes method...

    Provided By IJESIT

  • White Papers // Jan 2013

    A Survey on Routing Protocols in ZigBee Network

    The IEEE 802.15.4 is a new standard defined for LR-WPAN which provides a low cost and very less complicated solution. The targeted applications are Wireless Sensors Networks (WSN), interactive toys, home automation and remote controls. ZigBee is one of the newest technologies developed by ZigBee Alliance, enabling Wireless Personal Area...

    Provided By IJESIT