Institute of Research and Journals (IRAJ)

Displaying 1-40 of 267 results

  • White Papers // Dec 2014

    Cloud Computing and Virtual Resources That Maintain and Secure Educlouds

    Cloud computing is an emerging technology that access remote servers through Internet to maintain data and applications. It incorporates the advantages of grid and utility computing. Academia has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for Software-as-a-Service (SaaS)...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Adaptive Hierarchical Leader Follower with Evolutionary Computing Algorithm for Email Classification

    Most of the existing systems categorize the document or email-corpus based on the term similarity by find the document-term relationship. It cannot identify the conceptual similarity or correlation among them. But proposed system focuses on both term wise as well as conceptual wise similarity to find the email statistics to...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Fuzzy Logic Used for Network Service Maximization

    A dispersed traffic management framework, in which routers are deployed with intelligent data rate controllers to tackle the traffic mass. Unlike other explicit traffic control protocols that have to estimate network parameters (e.g., link latency, bottleneck bandwidth, packet loss rate, or the number of flows) in order to total the...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Disruption-Based Position of Links Efficiency Maximization

    In this material are distributed using the flexibility details of individuals. Particularly, the authors' strategy utilizes a flexibility learning criteria to recognize places outside and in the house. An invisible Markov design is used to estimate an individual's future flexibility details. Assessment based on real traces indicates that with the...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Secure Connectivity in Wireless Sensor Networks by Providing a New Scalable Key Management Scheme

    An effective Position-based Opportunistic Redirecting (POR) method which uses the stateless residence of geographical routing and the transmitted characteristics of Wi-Fi method. When a information bundle is sent out, some of the next door neighbor nodes that have overheard the transmitting will provide as sending applicants, and take convert to...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Network Intrusion Node Clone Detection in Virtual Network Systems

    This is because cloud users may install in danger applications on their virtual equipment. To prevent vulnerable virtual machines from being compromise in the cloud, a multi-phase scattered vulnerability exposure, measurement, and counter measure selection mechanism called NICE, which is built on attack graph based analytical models and reconfigurable virtual...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Enhancing Access Control and Efficiency in Attribute Based Data Sharing Using JMA

    Online data sharing systems and social networks such as FB, twitter etc., provide security through the cryptographic solutions using Cipher-text Policy Attribute Based Encryption (CP-ABE). This is most suited for distributed data sharing systems since the data owner has full control in enforcing access policies and updating the policies. Despite...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    SMAC: Revolutionary Technology & Security: RIP?

    SMAC is the latest hype in the IT world and it is absolutely revolutionary. It's a technology ecosystem of social, mobility, analytics and cloud. It is creating mammoth event for those who are embarrassing it by overlooking the security pitfalls that SMAC technologies offer. As companies coin new relationships with...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Authentication Model for Cloud Computing Using Single Sign-On

    Cloud computing is a way to provide IT resources with the help of internet in a pay-on-use pattern. In spite of the various benefits of using cloud still there exist many vulnerabilities in cloud security which hinders its adoption. The security in cloud is limited to network and application securities....

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Static Detection of Unsafe Component Loadings on Windows

    Static component loading is an important mechanism for computer software development. It enables a program, to use its exported functionalities and link a Dll component. Component loading is a system by which a PC program are able to run at run-time, fill a collection into memory, recall the parameters and...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    UAMPP: Unauthorized Access Model for Peer - To - Peer System

    According to the Peer-To-Peer (P2P) sociality, an expert-driven multi-semantic unauthorized access model for peer-to-peer semantic community model is built in this paper, to introduce UAMPP to decrease malicious activity in a P2P system by establishing trust relations among peers in their proximity. No prior information or a trusted peer is...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Avionics Control Using 3D Gestures

    Gestures can communicate a whole world of a meaning in the most natural way. Unfortunately, there's still some way to go before it becomes the primary way by which the authors communicate with the computers. This paper is intended as a contribution to the emerging application of cognitive science of...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Intact Analysis with Compiler and Security Editor

    The authors argue that writing a first set of test cases is easy, and most developers do such basic testing. Their experiments showed that such test cases easily reach 60% of test quality. Improving test quality implies a particular and specific supplementary testing effort. In this paper, they investigate the...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    A Review on the Concept of Knowledge and Knowledge Sharing

    As what the researcher concerns, knowledge has become the route to success. On account of this understanding, many organizations today are facing the problems of controlling knowledge because they need to realize which knowledge will give them a competitive benefit. They face a hard job in detaining all the knowledge...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Data Sharing for Dynamic Groups in the Cloud

    A new CP-ABE method for a data sharing system by exploits the attribute of the system preparation. The proposed method features the following achievements: the key escrow problem could be solve by escrow-free key issuing protocol, which is construct using the secure two-party computation between the key making center and...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Abundant Unspecified Profile Corresponding During Mobile Social Networks

    Utilizing the reasoning processing technology, a new cellular movie loading structure, known as AMES-cloud, which has two main parts: AMoV (Adaptive cellular MoVie streaming) and ESoV (Efficient public moVie Sharing). AMoV and ESoV build a personal broker to offer movie loading services efficiently for each cellular customer. For a given...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Development of an Educational (SAE-APP) APP for Teachers Using Smart Phones

    The educational field is one of the most important parts in the world. The traditional teaching methods were very limited and been carried out since past few decades and so on .Technology has also affected the educational field. Use of ICT in education is a must. Teachers are shifting from...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Review on Clustering Techniques in Xml Documents

    Analysis of data is a process of inspecting, cleaning, transforming, and modeling data with the goal of discovering useful information, suggesting conclusions, and supporting decision making. Data analysis has multiple facets and approaches, encompassing diverse techniques under a variety of names, in different business, science, and social science domains.XML document...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Androcliberion: An Android Cloud Based Library Management and Authentication System

    ANDROCLIBERION is a project for the interconnection of different public libraries and their automation. This system helps the users to access the details of the public libraries from website or an android application. They can view the list of available books in different library and can view their transactions. They...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Trust Based Secure Communication in Multi Agent Systems

    Multi-agent systems like peer-to-peer networks are widely used for content sharing and searching. However, privacy and security are the concerns with such networks as they are vulnerable to attacks due to open, dynamic and anonymous nature. To protect communications over such networks many models came into existence that are based...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    An Efficient Approach for Detecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Networks

    Wormhole attack is considered to be a serious security attack in multi-hop ad hoc networks. In wormhole attack, attacker makes tunnel from one end of the network to the other, nodes stay in different location on two ends of tunnel believe that they are true neighbors and makes conversation through...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2014

    Effective EV Population Seeding Technique for Vehicle Routing Problem with Time Windows Using Genetic Algorithm

    The Vehicle Routing Problem with Time Windows (VRPTW) consist of a fleet of vehicles and a set of customer/cities in which all the vehicles will start and end in the depot. The objective is to minimize the vehicle fleet and the sum of travel time. Genetic Algorithm (GA) is a...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Modified First Come First Serve (MFCFS)

    Disk scheduling requires a careful scrutinization of the requests which are pending in order to determine the most efficient way to serve the requests. There are two most common type of disk scheduling i.e. seek optimization and latency (or rotational) optimization. Each and every scheduling algorithm focuses on reducing the...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    A Non-Heuristic Approach for Minimizing the Number of Cameras Actuated in Wireless Multimedia Sensor Networks

    In current scenario, wireless multimedia sensor networks have gained much popularity in many spheres of life. Both scalar sensors and camera sensors are present in case of wireless multimedia sensor networks. Camera sensors have two basic parameters. They are depth of field and field of view. Depth of field is...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Performance Comparison of Ad Hoc Network with Ns2 Simulator

    These devices can communication with other nodes that immediately within their radio range or one that is outside their radio range. For the later, the nodes should deploy an intermediate node to be the router to route the packet from the source toward the destination. The wireless ad-hoc networks do...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Color Transformation to Sound for Blind in Wireless Network

    This system tries to identify the possibility of converting color in accordance with sound. It is an effort to deal with the psychological challenges of blind people and their emotions. This system tries to explore different colors the blind person could not see or they have lost the possibility of...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Earlier Behaviours Monitoring Dynamic Source Routing (EBM-DSR) Based Detection of Black Hole Attack in MANET

    Mobile Ad hoc NETworks (MANETs) have been proposed to support dynamic situations wherever no infrastructure exists. Every node within the network acts as a host similarly as a router and, forwards traffic to other nodes. Efficient and secure routing is the heart of any network and particularly difficult in an...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    A Framework for Data Mining in a Company That Uses Perforce SCM Tool

    In this paper, the authors present a framework of applications that extracts the information about the products, their development progress, and work done so far by the developers? Health of the servers, usage statistics of the servers, statistics about the various products releases, the frequency of release of products, and...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Semantic Representation to Analyze Misbehavior Approach of Nodes in MANET

    The security approach mainly involves understanding the certain misbehavior of nodes e.g. feasibility of nodes to cooperate in a network, feasibility of an attack by malicious nodes in the cluster, etc. The framework also involves detection of malicious nodes by the destination node as well as isolation of the malicious...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    A New Approach to Save Energy and Increase Scalability in Mobile Computing

    In this paper, the authors propose an energy efficient encoding technique called Lineage encoding for XML dissemination by means of a novel unit structure called G-node. Lineage encoding is a light-weighted encoding scheme which represents the parent-child relationship among the XML element by generating lineage code (V, H) and to...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Secure Multi-Possessor Quality-Based Verifiable Outsource Decryption

    A secure multi owner data sharing scheme, named Mona, for dynamic groups in the cloud. By leveraging group signature and dynamic broadcast encryption techniques, any cloud user can anonymously share data with others. Meanwhile, the storage overhead and encryption computation cost of the authors' scheme are independent with the number...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Secured Data Storage in Cloud Environment Using Time Varying Secret Key

    The key approach to secure the data stored in cloud computing environment is to store the data in encrypted manner. Whenever an authorized user wishes to store data on the cloud, the data is first encrypted and then the decryption key is distributed to other authorized users. The other authorized...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Data Security in Cloud Using Password Generation Techniques

    Cloud computing is emerging field because of its performance, high availability, least cost and many others. Besides this companies are binding there business from cloud computing because the fear of data leakage. Due to lack of proper security control policy and weakness in safeguard which lead to much vulnerability in...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Improved Backup Scheduling with Data Deduplication Techniques for SaaS in Cloud

    The cloud computing is a technology which is used to provide resources as a service. There are many services provided by cloud provider. They are Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Infrastructure-as-a-Service (IaaS), etc. The cloud computing provides the Storage-as-a-Service which is used to backup the users data into cloud. The storage-as-a-service...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Job Allocation Strategy to Avoid Further Migration in Cloud Computing

    Cloud computing is a rampant technology now-a-days because of its scalability, flexibility, availability of resources and the other features. In cloud computing resource multiplexing is done through the virtualization technology. Virtualization technology is acts as a backbone for provisioning requirements of a cloud based solution. The problems arising in cloud...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Adaptive and Efficient Video Streaming and Sharing for Mobile Users Using Cloud Assistance

    Due to the high demands of video traffics over mobile networks, the wireless link capacity fails to keep up the pace with the demand. There exists a gap between the demand and the link capacity which results in poor service quality of the video streaming over mobile networks which includes...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Effective e-Learning with Cloudcomputing

    Education on the web has become popular way for learning in education system. Now-a-days, it is needed in education system because majority of people have time and money constraint. Whatever is the reason but the users can't ignore its importance in current life. For e-learning, students need some software and/or...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Web-Based ERP System Using Cloud

    The web-based ERP system using cloud is an enterprise information system designed to integrate and optimize the business processes and transactions in a corporation. The ERP is an industry-driven concepts and systems, and is universally accepted by the industry as a practical solution to achieve integrated enterprise information systems. The...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Secured Cloud Computing with Decoy Documents

    Cloud computing is a virtualized compute power and storage delivered via platform-agnostic infrastructures of abstracted hardware and software accessed over the Internet. These shared, on-demand IT resources, are created and disposed of efficiently, are dynamically scalable through a variety of programmatic interfaces and Cloud computing is a general term for...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2014

    Promoting the Time of Crystal Set Suggestion Networks Near Efficient Power Management Technique

    Sensor nodes are capable of performing several tasks such as computation, prepossessing and transmission of data. This entire task uses power source which is basically battery. Thus power conservation becomes most important concept in wireless sensor network. In this paper, the author is presenting a power efficient technique Efficient Power...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Smart Lab Using Saas Technology

    Smart lab is an application which is designed while considering the requirements of organizations and industries. It can also be used in institutions for conducting examinations. The idea used in smart lab is that there is an online compiler which reduces the issues of storage space, time, cost, portability. Online...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Superior Quality of Feature Subset Selection Using Fast Clustering

    In the high dimensional data set having features selection involves identifying a subset of the most useful features that produce compatible results as the original entire set of features. A fast algorithm may be evaluated from both the efficiency and effectiveness of the subset of features. Fast clustering based feature...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Feb 2014

    Real Time Image Processing Based on Embedded Linux

    The continuous improvement in development of Linux for the embedded system makes it secure, stable and reliable. The embedded Linux plays an important role in the embedded field. Linux has been widely used in embedded system due to its small size kernel, stable performance, versatility and low prize. This paper...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Feb 2014

    Enhancing Security of Stored Biometric Template in Cloud Computing Using FEC

    Cloud computing is an emerging technology, where services get utilized instead of owning it. It has grown out of an amalgamation of technologies, including service oriented architecture, virtualization, Web 2.0, and utility computing. Most security problems associated with cloud computing which are viewed as problems cast stem from loss of...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    An Improved Approach for Search Results Using Web Mining

    An increasing number of databases have become web accessible through HTML form-based explore interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for creature browsing. For the encoded data units to be instrument processable, which is important for many applications such as...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    Efficient Distributed Accountability and Data Sharing in the Cloud

    In cloud computing environment resources are shared among various clients and it's important for system provider to allocate the necessary resources for the clients. And IT infrastructure proceeds as the amount increases to grow, cloud computing is a new way of virtualization technologies that enable management of virtual machines over...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2013

    Wireless Reception for Microcontroller Based Sensor Networks

    In this paper the authors present the emergence of antennas with the development in the wireless technology. Communication with sensors is becoming part of the people daily life. In this paper proposed a technique of data reception, data processing and data display. Understanding microcontroller and its use for this purpose...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    Symbiotic Relationship Between Data Mining and Data Warehousing

    Now-a-days in every industry, companies are moving toward the goal of understanding each customer individually and using that understanding to make it easier for the customer to do business with them rather than with competitors. In this paper it is shown how focus is changed from broad market segments to...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2013

    Energy-Efficient Data Collection in Wireless Sensor Networks Using Mobile Sink

    The major issues in wireless sensor networks are data collection from sensors nodes. In WSN, data aggregation is an important process for reducing the energy consumption. The authors can reduce energy consumption by using the efficient technique for data aggregation. Also, achieving the reliability and robustness of transferring data is...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Embedded System for Data Communication Between USB and Wi-Fi

    Data communication between the devices with different mechanisms for connection is impossible. Two devices, one having USB port but do not have Wi-Fi connectivity and another device having Wi-Fi connectivity but having no USB port or the two devices having only USB ports cannot communicate with each other as they...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Flash Memory Controller

    In this paper the authors focus on study of NOR based flash memory controller. A flash memory controller manages the data stored on flash memory and communicates with a computer or electronic device. When the system or device needs to read data from or write data to the flash memory,...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Study of High Performance AMBA AHB Reconfigurable Arbiter for On-Chip Bus Architecture

    In this paper the authors focus on study of reconfigurable arbiter that can interface with any common IP core of a system, using specification of AMBA bus protocol. The arbiter plays a very important role to manage the resource sharing on the SOC platform. The scheme involves the typical AMBA...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Study of OFDM Implementation on FPGA

    In this paper the authors focus on study of FPGA based OFDM system. An OFDM is a multicarrier modulation technique which divides the available spectrum into many subcarriers. OFDM provides high bandwidth efficiency because the carriers are orthogonal to each other and multiple carriers share the data among themselves. This...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    TDMA Strat-Up and Restart Synchronization Approach for Embedded System

    In this paper the authors focus on study of TDMA start-up and restart synchronization approaches for embedded system. TDMA (Time Division Multiple Access) is a technology for delivering digital wireless service using time division multiplexing. TDMA uses principle of dividing a radio frequency into time slots and then allocating slots...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Oct 2013

    Loading of Machine Code at Run Time for Soft-Core Processor on FPGA

    Application specific customization now-a-days can be very well achieved by implementing soft-core processor on FPGA's. But if any changes are to be made to the assembly codes of the implemented processor it is required to re-implement and again download the soft-core. Here is a technique to implement a run time...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Clustering Class Diagram Through Mining

    A class diagram models the static view of a system. The class diagrams are widely used during construction of executable code for software application as it is the only UML diagram which can be directly mapped with object oriented language. As class diagram contains duplicacy, the redundant source code generated...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Classifying Diversified Attacks in IDS Using Data Mining Techniques

    Latest information security techniques like user authentication, antivirus, firewalls, data encryption, etc. fail to prevent intrusion in any computer network. This may be attributed to the vulnerability in computer system or computer network. There is a need to use some sophisticated security tools like Intrusion Detection System (IDS) in order...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Evaluation of Twig Pattern Queries for Streaming Xml Data Using Lineage Encoding

    In this paper, the authors propose an energy and latency efficient XML dissemination scheme for the mobile computing. It describes a novel unit structure called G-node for streaming XML data in the wireless environment. It exploits the profit of the structure indexing and attributes summarization that may integrate relevant XML...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    Improving Many-Task Computing in Scientific Orkflow Using Data Aware Scheduling Technique in Cloud

    Cloud computing has demonstrated applicability to a wide-range of problems in several domains, including scientific one. Many-Task Computing (MTC) is a practical paradigm for developing loosely coupled and complex scientific application. Many-task computing aims to bridge the gap between High Throughput Computing (HTC) and High Performance Computing (HPC). Cloud computing...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Impact of Internet Security on Human Behaviour

    Security risks associated with networked enterprise systems is a topic which has become increasingly significant in the new millennium. As corporations rely ever more on technology to run their businesses, connecting enterprise systems to each other to perform seamless business transactions in a virtually borderless world, security is becoming a...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Identification of Packet Droppers in Wireless Multi Hop Sensor Networks

    This proposed scheme provides a simple but effective way to identify misbehaving intermediate packet forwarders that drop packets. The packets are padded and encrypted in order to hide the source of the packet. Small number of extra bits called packet mark is added to each packet by the forwarder. So...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Defending the Security Attacks in ASP.NET Web Applications

    Web application has become one of the most essential communication channels between service providers and users now-a-days. The global distribution of these web applications make them prone to attacks that uncover and maliciously exploit a variety of security vulnerabilities. This papers report indicates that more than 80 percent of the...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Improving the Data Collection Rate in Wireless Sensor Networks by Using the Mobile Relays

    In Wireless Sensor Networks (WSNs), it is difficult to achieve a large data collection rate because sensors usually have limited energy and communication resources. Such an issue is becoming increasingly more challenging with the emerging of information-intensive applications that require high data collection rate. To address this issue, in this...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jun 2013

    MANET Routing Protocols: A Review on Performance Issues and its Implications

    Mobile Ad-hoc NETwork (MANET) is wireless networks in which the nodes are free to move arbitrarily (i.e.,) it does not need any infrastructure support. As the nodes are not fixed, biggest problem about routing among nodes. As large numbers of MANET protocols are there but no single protocol is used...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jun 2013

    A Secure E-Learning System and its Services

    In this paper the authors describe a system for the secure e-learning system and its services. Security is provided by elliptic curve cryptography algorithm. ECC generates key for each learner after they entered their details in the registration page. It allows only authorized user to enter into the system by...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jun 2013

    Wi-Fi Network's Password Strength Analysis Using Backtrack Tools

    Wireless networks are most common type of networks found in today's communication. Advantage of these wireless networks (IEEE 802.11) is that physical connection is not required for being a part of a network and at a same time no physical access is required to crack and penetrate such a network....

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Spam Detection System with an E-Mail Abstraction Scheme

    Now-a-days e-mail communications are very necessary, but the email spam problems are widely spread. In order to detect each spam, a collaborative spam detection system is to be proposed using an email abstraction scheme. This email abstraction scheme considers email layout structure. E-mail abstraction is generated using the html content...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Sep 2013

    A Practitionar Approach for Node Localizability of Wireless Ad-Hoc and Sensor Networks

    The authors analyze the limitations of network of node localizability. By deriving the necessary and sufficient conditions for node localizability, they can answer the fundamental questions on localization: which node is indeed localizable i from intensive simulations, it is observed that there exists a very small portion of nodes cannot...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Oct 2013

    Back-Bone-Assisted Hop Greedy Routing in VANET

    Using advanced wireless local area network technologies, Vehicular Ad hoc NETworks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc. Multihop information dissemination in VANETs is constrained by the high mobility of vehicles and the...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Oct 2013

    An Approach to Organize User Histories Using Data Mining Techniques

    Today internet and web search engines have become an important part in ones day to day life. Where web search engines provide simple and yet user friendly interfaces, users give their queries in terms of simple words or keywords. Depending upon the keyword, the web search engine extracts a list...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Iris Recognition: Cumsum Based CPA Approach

    With increasing identity fraud and emphasis on security, there is a growing and urgent need to efficiently identify individuals. A biometric technology seems to be imminent method. Iris recognition is reliable and precise biometric system. This paper proposes an efficient iris recognition system with CUMSUM based CPA approach. The experimental...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Sep 2013

    Privarcy Preserving Access Authentication and Intrusion Detection to Secure Data in Cloud

    The trend of using cloud environments is growing for storage and data processing needs. Cloud computing is an internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. The idea is to construct a new privacy preserving access control scheme for securing data...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Sep 2013

    A Survey of Different Types of Network Security Threats and its Countermeasures

    Today, communication had become part of technology. Network plays a vital role in establishing a communication. A network is a collection of nodes interconnected by communication paths. Networks allow users to access remote files, databases, and can retrieve any important information either within the organization or from different organization. Networks...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Sep 2013

    Node Localizability with Security Using RC5 and SHA1 Algorithm in Wireless Ad Hoc and Sensor Networks

    Location awareness is highly difficult for wireless sensor networks. To localize the node using GPS, it is experimental that the network is not totally localized and also can't identify the number of nodes can be located within a network. Current localization algorithms mainly focus to localize as many nodes as...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jul 2013

    Authentication for Attacks in Graphical Passwords Pass Points Style

    Access to computer systems is often based on the use of alphanumeric passwords. However users have difficulty in remembering passwords that is long and random-appearing. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use. Using graphical passwords users click on images...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2013

    A Comparative Analysis of Temporal Data Models

    In this paper, the authors make a concerted effort for minimizing the computing cost by comparing and analyzing the different temporal data models of databases. This is a review paper. The paper begins with critical investigation of the constraints of relational model and then comparing the key concepts of various...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jul 2013

    Aspect of Cloud Computing

    Cloud computing is a powerful new abstraction for large scale data processing systems which is scalable, reliable and available. In cloud computing, there are large self-managed server pools available which reduces the overhead and eliminates management headache. Cloud computing is a new technology/concept of IT which offers various service by...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2013

    Performance Analysis of Cloud Computing Centers by Breaking-Down Response Time

    Cloud computing is the emerging field of the computer science and it is occupying the most of the areas in computers. It delivers on the emerging business essentials for agile, flexible and time-to-value performance. The performance and availability of cloud applications has a noticeable impact on user adoption and revenue...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Oct 2013

    Making Your Application Highly Available and Highly Scalable Using NoSQL Database (MongoDB)

    Databases are the \"Backbone\" of any information systems. Relational database management system is the base for many legacy databases. RDBMS are great, with SQL being a rich, declarative query language and have the advantage of enforcing referential integrity, ACID (Atomicity Consistency Isolation Durability) semantics and are well understood by developers....

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2013

    Identification of Software Metrics for a Software Project

    The central role that software development plays in today's world is beyond anyone's imagination. Software development is one of the major areas of focus for any organizations. The managers are increasingly focusing on process improvement in software development area. This demand has led to improved approaches to software development, with...

    Provided By Institute of Research and Journals (IRAJ)