Institute of Research and Journals (IRAJ)

Displaying 1-40 of 83 results

  • White Papers // Jul 2014

    Fault Tolerance in Multi-Core Processors Using Flexible Redundant Threading

    In this paper, the authors make a case for incorporating fault tolerance covering both transient faults and errors due to miss-speculation into desktop multi-core processors. Fault tolerance is enforced in their method through redundant threading by verifying the commit results of speculative original thread against the non-speculative redundant thread which...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jul 2014

    Bisync-Binary XML Based Data Synchronization for Mobile Devices

    The technology rapidly expanding for mobile devices will give a communication capability for mobile users. Every device has its own database so the users can synchronize the data from anywhere and anytime. Recent improvements in mobile device for data synchronization is based on the relational databases and also used an...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jul 2014

    An Optimised Approach for Student's Academic Performance by K-Means Clustering Algorithm Using Weka Interface

    One of the significant facts in higher learning institution is the explosive growth educational database. These databases are rapidly increasing without any benefit to manage the database. The clustering techniques have a wide use and importance now-a-days and this importance tends to increase as the amount of data grows. In...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jul 2014

    An Approach for Protecting Sensitive Files at Endpoint Via Meta Data Extraction

    Each organization has sensitive data and every day employee work with sensitive data in an organization and also sharing these data among team members in an organization, there are huge chances of data vulnerability, leakage or misuse. These data are incredible for organization, so it should not be loose. This...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jul 2014

    An Efficient Approach - (KCVD) K-Means Clustering Algorithm With Voronoi Diagram

    K-means method is one of the renowned and generally used partitioning clustering techniques. However, the major problem with this method is that it cannot ensure the global optimum results due to the random selection of initial cluster center. In this paper, the authors proposed a clustering algorithm-KCVD (K-means Clustering algorithm...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jul 2014

    NLP Approach for Discrimination Prevention in Data Mining

    The data mining is an increasingly important technology for extracting useful knowledge that is hidden in large collections of data. There are however negative social realization about data mining, which consist of mainly potential privacy incursion and potential discrimination. Discrimination consists of unfairly treating people on the basis of belonging...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jun 2014

    An Approach for Applying Dynamic Voltage Scaling With Fault Tolerance in Fixed Priority Multi-Core Real Time Systems

    Multi-core processors are the processors in which there is a single computing element and two or more independent CPUs called cores. Multi-core processors are now dominating in real time systems due to energy and thermal considerations. Fixed priority scheduling with task splitting in multi-core real time system has been taken...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jun 2014

    Web Data Access Using Semantic Techniques

    Traditional web search engines perform information search based upon the keywords provided by the user. Using these search engines, users do not get satisfied results for polysemous keywords related searching. Post processing techniques are required to use to categorize the results based on different meanings associated with such keywords. Moreover,...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jun 2014

    Path Selection for Mobility Based Energy Efficient Data-Gathering in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have been proposed as powerful means for in situ observation of events and environments over long periods of time. A large number of small and simple sensor devices communicate over short-range wireless interfaces to deliver observations over multiple hops to central locations called sinks. With these...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jun 2014

    Implementation of Port Density Based Dynamic Clustering Algorithm on Honeynet Data

    Intrusion detection system which are normally deployed in an organization to protect the network are working based on pre-defined rule-sets known as signatures, thereby they will not be able to detect unknown attacks. With the consideration of unknown attack detection, intrusion detection is becoming not useful to detect these kinds...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Minimizing Storage Cost in Cloud Computing Environment

    Organizations need to handle large amount of data. The increase in data in size and number leads to increase in demand for storage space. To store bulk of data individually is impossible by various organizations. Increase in data growth is forcing organizations to look for new cost effective ways for...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Design of QoS Based Price and Time Slot Negotiation Mechanism for Cloud Service Reservations

    Cloud providers currently charge users for metered usage based on fixed and spot pricing. When making reservations for cloud services in automatic pricing mechanism, consumers and providers need to establish service-level agreements through price and time-slot negotiations. Even though these issues are essential, mechanisms to automate the negotiation of price...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Energy Conservation and Security Issues in Cloud Computing: A Review

    In today's world, ICT (Information Communications Technology) is growing with full swing for every small or large scale businesses and this has given a boost to the technology like \"Cloud computing\". In implementation, it is a very challenging technology in itself. Out of different challenges, energy conservation and security issues...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Investigation on Energy Utilization in Cloud Data Centers

    Cloud computing has revolutioned the ICT industry by enabling on-demand provisioning of computing resources. An organization can either outsource its computational needs to the cloud avoiding high up-front investments in a private computing infrastructure and consequent maintenance costs, or implement a private cloud data center to improve the resource management...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    User Friendly Portal to Execute Complex Applications on Hybrid Compute Cloud

    Cloud is an emerging technology derived from distributed computing of past, which holds grid as its infrastructure. Trust in service delivery through multi-level authentication over the cloud is a tedious task faced by both end users and cloud providers of today. Usage of Public Key Infrastructure (PKI) and Kerberos authentication...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Application of Cloud Computing in Academic Institution

    Cloud computing is a web-based service. It is shared pool of resources over the internet. Cloud is not any single entity but set cloud services, cloud storage, cloud infrastructure and clod platforms. This paper aims to describe use of cloud computing for online compiler providing portability and storage. By making...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Integrated Security Service for on Demand Services in Iaas Cloud Author

    Security has remained a constant issue for open systems and internet, when the authors are talking about security cloud really suffers. Lack of security is the only hurdle in wide adoption of cloud computing. Cloud computing is surrounded by many security issues like securing data, and examining the utilization of...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Efficient Method for Cloud Data Storage and Security Based on Third Party Auditor

    In this paper the authors have presented the extended approach for cloud computing data security and integrity verification with dynamics data under the multiple users. Cloud computing provides more advantages for the users to create and data storing in the remote servers thereby utilizing fewer assets in client scheme. Before...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Secure Multi-Owner Data Sharing for Dynamic Clusters in the Cloud With Variable Attributes

    Cloud computing is an emerging computing premise in which consists of a virtualized pool of highly scalable computing resources and provided as an internet-based computing where many organizations store, reacquire and modify data among cloud users. Major problem in cloud computing is sharing data in a multi-owner manner, while preserving...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Secure Multi-Owner Data Storage With Enhanced TPA Auditing Scheme in Cloud Computing

    Users can store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing resources by using cloud storage, without the burden of local data storage and maintenance. The users can no longer have physical possession of the outsourced data makes the data integrity...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Improved Distribution of Workload in Cloud

    In this paper the authors propose and evaluate an approach to the parallelization, deployment and management of applications that integrates several emerging technologies for distributed computing. The proposed approach uses the MapReduce paradigm to parallelize tools and manage their execution, machine virtualization to encapsulate their execution environments and commonly used...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // May 2014

    Existing Security Measurement Model in Cloud Computing (ESMM)

    In last few years, cloud computing concept has emerged a lot which result that it has become the fastest growing business for the IT industry. In this paper, the author presents an extensive review on cloud computing with the main focus on gaps and security concerns. The authors identify the...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Superior Quality of Feature Subset Selection Using Fast Clustering

    In the high dimensional data set having features selection involves identifying a subset of the most useful features that produce compatible results as the original entire set of features. A fast algorithm may be evaluated from both the efficiency and effectiveness of the subset of features. Fast clustering based feature...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Embedded System for Data Communication Between USB and Wi-Fi

    Data communication between the devices with different mechanisms for connection is impossible. Two devices, one having USB port but do not have Wi-Fi connectivity and another device having Wi-Fi connectivity but having no USB port or the two devices having only USB ports cannot communicate with each other as they...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Clustering Class Diagram Through Mining

    A class diagram models the static view of a system. The class diagrams are widely used during construction of executable code for software application as it is the only UML diagram which can be directly mapped with object oriented language. As class diagram contains duplicacy, the redundant source code generated...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Classifying Diversified Attacks in IDS Using Data Mining Techniques

    Latest information security techniques like user authentication, antivirus, firewalls, data encryption, etc. fail to prevent intrusion in any computer network. This may be attributed to the vulnerability in computer system or computer network. There is a need to use some sophisticated security tools like Intrusion Detection System (IDS) in order...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Evaluation of Twig Pattern Queries for Streaming Xml Data Using Lineage Encoding

    In this paper, the authors propose an energy and latency efficient XML dissemination scheme for the mobile computing. It describes a novel unit structure called G-node for streaming XML data in the wireless environment. It exploits the profit of the structure indexing and attributes summarization that may integrate relevant XML...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Smart Lab Using Saas Technology

    Smart lab is an application which is designed while considering the requirements of organizations and industries. It can also be used in institutions for conducting examinations. The idea used in smart lab is that there is an online compiler which reduces the issues of storage space, time, cost, portability. Online...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Flash Memory Controller

    In this paper the authors focus on study of NOR based flash memory controller. A flash memory controller manages the data stored on flash memory and communicates with a computer or electronic device. When the system or device needs to read data from or write data to the flash memory,...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Study of High Performance AMBA AHB Reconfigurable Arbiter for On-Chip Bus Architecture

    In this paper the authors focus on study of reconfigurable arbiter that can interface with any common IP core of a system, using specification of AMBA bus protocol. The arbiter plays a very important role to manage the resource sharing on the SOC platform. The scheme involves the typical AMBA...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Study of OFDM Implementation on FPGA

    In this paper the authors focus on study of FPGA based OFDM system. An OFDM is a multicarrier modulation technique which divides the available spectrum into many subcarriers. OFDM provides high bandwidth efficiency because the carriers are orthogonal to each other and multiple carriers share the data among themselves. This...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    TDMA Strat-Up and Restart Synchronization Approach for Embedded System

    In this paper the authors focus on study of TDMA start-up and restart synchronization approaches for embedded system. TDMA (Time Division Multiple Access) is a technology for delivering digital wireless service using time division multiplexing. TDMA uses principle of dividing a radio frequency into time slots and then allocating slots...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Feb 2014

    Group Manager Revocation Based Multi-Owner Data Sharing for Dynamic Cluster in the Cloud

    The characters of cloud computing provider as low cost, low maintenance, on-demand service, resource sharing among multiple cloud user, result number of users become part of cloud system. Cloud with multi-owner still challenging issue and dynamic group member effect privacy of data, identity of data from untrusted user of cloud....

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Feb 2014

    Real Time Image Processing Based on Embedded Linux

    The continuous improvement in development of Linux for the embedded system makes it secure, stable and reliable. The embedded Linux plays an important role in the embedded field. Linux has been widely used in embedded system due to its small size kernel, stable performance, versatility and low prize. This paper...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Feb 2014

    Enhancing Security of Stored Biometric Template in Cloud Computing Using FEC

    Cloud computing is an emerging technology, where services get utilized instead of owning it. It has grown out of an amalgamation of technologies, including service oriented architecture, virtualization, Web 2.0, and utility computing. Most security problems associated with cloud computing which are viewed as problems cast stem from loss of...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    Improving Many-Task Computing in Scientific Orkflow Using Data Aware Scheduling Technique in Cloud

    Cloud computing has demonstrated applicability to a wide-range of problems in several domains, including scientific one. Many-Task Computing (MTC) is a practical paradigm for developing loosely coupled and complex scientific application. Many-task computing aims to bridge the gap between High Throughput Computing (HTC) and High Performance Computing (HPC). Cloud computing...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    An Improved Approach for Search Results Using Web Mining

    An increasing number of databases have become web accessible through HTML form-based explore interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for creature browsing. For the encoded data units to be instrument processable, which is important for many applications such as...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    Efficient Distributed Accountability and Data Sharing in the Cloud

    In cloud computing environment resources are shared among various clients and it's important for system provider to allocate the necessary resources for the clients. And IT infrastructure proceeds as the amount increases to grow, cloud computing is a new way of virtualization technologies that enable management of virtual machines over...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    Symbiotic Relationship Between Data Mining and Data Warehousing

    Now-a-days in every industry, companies are moving toward the goal of understanding each customer individually and using that understanding to make it easier for the customer to do business with them rather than with competitors. In this paper it is shown how focus is changed from broad market segments to...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2013

    Wireless Reception for Microcontroller Based Sensor Networks

    In this paper the authors present the emergence of antennas with the development in the wireless technology. Communication with sensors is becoming part of the people daily life. In this paper proposed a technique of data reception, data processing and data display. Understanding microcontroller and its use for this purpose...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Smart Lab Using Saas Technology

    Smart lab is an application which is designed while considering the requirements of organizations and industries. It can also be used in institutions for conducting examinations. The idea used in smart lab is that there is an online compiler which reduces the issues of storage space, time, cost, portability. Online...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Superior Quality of Feature Subset Selection Using Fast Clustering

    In the high dimensional data set having features selection involves identifying a subset of the most useful features that produce compatible results as the original entire set of features. A fast algorithm may be evaluated from both the efficiency and effectiveness of the subset of features. Fast clustering based feature...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Feb 2014

    Real Time Image Processing Based on Embedded Linux

    The continuous improvement in development of Linux for the embedded system makes it secure, stable and reliable. The embedded Linux plays an important role in the embedded field. Linux has been widely used in embedded system due to its small size kernel, stable performance, versatility and low prize. This paper...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Feb 2014

    Enhancing Security of Stored Biometric Template in Cloud Computing Using FEC

    Cloud computing is an emerging technology, where services get utilized instead of owning it. It has grown out of an amalgamation of technologies, including service oriented architecture, virtualization, Web 2.0, and utility computing. Most security problems associated with cloud computing which are viewed as problems cast stem from loss of...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    An Improved Approach for Search Results Using Web Mining

    An increasing number of databases have become web accessible through HTML form-based explore interfaces. The data units returned from the underlying database are usually encoded into the result pages dynamically for creature browsing. For the encoded data units to be instrument processable, which is important for many applications such as...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    Efficient Distributed Accountability and Data Sharing in the Cloud

    In cloud computing environment resources are shared among various clients and it's important for system provider to allocate the necessary resources for the clients. And IT infrastructure proceeds as the amount increases to grow, cloud computing is a new way of virtualization technologies that enable management of virtual machines over...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2013

    Wireless Reception for Microcontroller Based Sensor Networks

    In this paper the authors present the emergence of antennas with the development in the wireless technology. Communication with sensors is becoming part of the people daily life. In this paper proposed a technique of data reception, data processing and data display. Understanding microcontroller and its use for this purpose...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    Symbiotic Relationship Between Data Mining and Data Warehousing

    Now-a-days in every industry, companies are moving toward the goal of understanding each customer individually and using that understanding to make it easier for the customer to do business with them rather than with competitors. In this paper it is shown how focus is changed from broad market segments to...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Dec 2013

    Energy-Efficient Data Collection in Wireless Sensor Networks Using Mobile Sink

    The major issues in wireless sensor networks are data collection from sensors nodes. In WSN, data aggregation is an important process for reducing the energy consumption. The authors can reduce energy consumption by using the efficient technique for data aggregation. Also, achieving the reliability and robustness of transferring data is...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Embedded System for Data Communication Between USB and Wi-Fi

    Data communication between the devices with different mechanisms for connection is impossible. Two devices, one having USB port but do not have Wi-Fi connectivity and another device having Wi-Fi connectivity but having no USB port or the two devices having only USB ports cannot communicate with each other as they...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Flash Memory Controller

    In this paper the authors focus on study of NOR based flash memory controller. A flash memory controller manages the data stored on flash memory and communicates with a computer or electronic device. When the system or device needs to read data from or write data to the flash memory,...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Study of High Performance AMBA AHB Reconfigurable Arbiter for On-Chip Bus Architecture

    In this paper the authors focus on study of reconfigurable arbiter that can interface with any common IP core of a system, using specification of AMBA bus protocol. The arbiter plays a very important role to manage the resource sharing on the SOC platform. The scheme involves the typical AMBA...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    Study of OFDM Implementation on FPGA

    In this paper the authors focus on study of FPGA based OFDM system. An OFDM is a multicarrier modulation technique which divides the available spectrum into many subcarriers. OFDM provides high bandwidth efficiency because the carriers are orthogonal to each other and multiple carriers share the data among themselves. This...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Mar 2014

    TDMA Strat-Up and Restart Synchronization Approach for Embedded System

    In this paper the authors focus on study of TDMA start-up and restart synchronization approaches for embedded system. TDMA (Time Division Multiple Access) is a technology for delivering digital wireless service using time division multiplexing. TDMA uses principle of dividing a radio frequency into time slots and then allocating slots...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Oct 2013

    Loading of Machine Code at Run Time for Soft-Core Processor on FPGA

    Application specific customization now-a-days can be very well achieved by implementing soft-core processor on FPGA's. But if any changes are to be made to the assembly codes of the implemented processor it is required to re-implement and again download the soft-core. Here is a technique to implement a run time...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Clustering Class Diagram Through Mining

    A class diagram models the static view of a system. The class diagrams are widely used during construction of executable code for software application as it is the only UML diagram which can be directly mapped with object oriented language. As class diagram contains duplicacy, the redundant source code generated...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Classifying Diversified Attacks in IDS Using Data Mining Techniques

    Latest information security techniques like user authentication, antivirus, firewalls, data encryption, etc. fail to prevent intrusion in any computer network. This may be attributed to the vulnerability in computer system or computer network. There is a need to use some sophisticated security tools like Intrusion Detection System (IDS) in order...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Apr 2014

    Evaluation of Twig Pattern Queries for Streaming Xml Data Using Lineage Encoding

    In this paper, the authors propose an energy and latency efficient XML dissemination scheme for the mobile computing. It describes a novel unit structure called G-node for streaming XML data in the wireless environment. It exploits the profit of the structure indexing and attributes summarization that may integrate relevant XML...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jan 2014

    Improving Many-Task Computing in Scientific Orkflow Using Data Aware Scheduling Technique in Cloud

    Cloud computing has demonstrated applicability to a wide-range of problems in several domains, including scientific one. Many-Task Computing (MTC) is a practical paradigm for developing loosely coupled and complex scientific application. Many-task computing aims to bridge the gap between High Throughput Computing (HTC) and High Performance Computing (HPC). Cloud computing...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Impact of Internet Security on Human Behaviour

    Security risks associated with networked enterprise systems is a topic which has become increasingly significant in the new millennium. As corporations rely ever more on technology to run their businesses, connecting enterprise systems to each other to perform seamless business transactions in a virtually borderless world, security is becoming a...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Identification of Packet Droppers in Wireless Multi Hop Sensor Networks

    This proposed scheme provides a simple but effective way to identify misbehaving intermediate packet forwarders that drop packets. The packets are padded and encrypted in order to hide the source of the packet. Small number of extra bits called packet mark is added to each packet by the forwarder. So...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Defending the Security Attacks in ASP.NET Web Applications

    Web application has become one of the most essential communication channels between service providers and users now-a-days. The global distribution of these web applications make them prone to attacks that uncover and maliciously exploit a variety of security vulnerabilities. This papers report indicates that more than 80 percent of the...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Improving the Data Collection Rate in Wireless Sensor Networks by Using the Mobile Relays

    In Wireless Sensor Networks (WSNs), it is difficult to achieve a large data collection rate because sensors usually have limited energy and communication resources. Such an issue is becoming increasingly more challenging with the emerging of information-intensive applications that require high data collection rate. To address this issue, in this...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jun 2013

    MANET Routing Protocols: A Review on Performance Issues and its Implications

    Mobile Ad-hoc NETwork (MANET) is wireless networks in which the nodes are free to move arbitrarily (i.e.,) it does not need any infrastructure support. As the nodes are not fixed, biggest problem about routing among nodes. As large numbers of MANET protocols are there but no single protocol is used...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jun 2013

    A Secure E-Learning System and its Services

    In this paper the authors describe a system for the secure e-learning system and its services. Security is provided by elliptic curve cryptography algorithm. ECC generates key for each learner after they entered their details in the registration page. It allows only authorized user to enter into the system by...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jun 2013

    Wi-Fi Network's Password Strength Analysis Using Backtrack Tools

    Wireless networks are most common type of networks found in today's communication. Advantage of these wireless networks (IEEE 802.11) is that physical connection is not required for being a part of a network and at a same time no physical access is required to crack and penetrate such a network....

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Spam Detection System with an E-Mail Abstraction Scheme

    Now-a-days e-mail communications are very necessary, but the email spam problems are widely spread. In order to detect each spam, a collaborative spam detection system is to be proposed using an email abstraction scheme. This email abstraction scheme considers email layout structure. E-mail abstraction is generated using the html content...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Sep 2013

    A Practitionar Approach for Node Localizability of Wireless Ad-Hoc and Sensor Networks

    The authors analyze the limitations of network of node localizability. By deriving the necessary and sufficient conditions for node localizability, they can answer the fundamental questions on localization: which node is indeed localizable i from intensive simulations, it is observed that there exists a very small portion of nodes cannot...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Oct 2013

    Back-Bone-Assisted Hop Greedy Routing in VANET

    Using advanced wireless local area network technologies, Vehicular Ad hoc NETworks (VANETs) have become viable and valuable for their wide variety of novel applications, such as road safety, multimedia content sharing, commerce on wheels, etc. Multihop information dissemination in VANETs is constrained by the high mobility of vehicles and the...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Oct 2013

    An Approach to Organize User Histories Using Data Mining Techniques

    Today internet and web search engines have become an important part in ones day to day life. Where web search engines provide simple and yet user friendly interfaces, users give their queries in terms of simple words or keywords. Depending upon the keyword, the web search engine extracts a list...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Aug 2013

    Iris Recognition: Cumsum Based CPA Approach

    With increasing identity fraud and emphasis on security, there is a growing and urgent need to efficiently identify individuals. A biometric technology seems to be imminent method. Iris recognition is reliable and precise biometric system. This paper proposes an efficient iris recognition system with CUMSUM based CPA approach. The experimental...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Sep 2013

    Privarcy Preserving Access Authentication and Intrusion Detection to Secure Data in Cloud

    The trend of using cloud environments is growing for storage and data processing needs. Cloud computing is an internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand. The idea is to construct a new privacy preserving access control scheme for securing data...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Sep 2013

    A Survey of Different Types of Network Security Threats and its Countermeasures

    Today, communication had become part of technology. Network plays a vital role in establishing a communication. A network is a collection of nodes interconnected by communication paths. Networks allow users to access remote files, databases, and can retrieve any important information either within the organization or from different organization. Networks...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Sep 2013

    Node Localizability with Security Using RC5 and SHA1 Algorithm in Wireless Ad Hoc and Sensor Networks

    Location awareness is highly difficult for wireless sensor networks. To localize the node using GPS, it is experimental that the network is not totally localized and also can't identify the number of nodes can be located within a network. Current localization algorithms mainly focus to localize as many nodes as...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jul 2013

    Authentication for Attacks in Graphical Passwords Pass Points Style

    Access to computer systems is often based on the use of alphanumeric passwords. However users have difficulty in remembering passwords that is long and random-appearing. Graphical passwords have been designed to try to make passwords more memorable and easier for people to use. Using graphical passwords users click on images...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2013

    A Comparative Analysis of Temporal Data Models

    In this paper, the authors make a concerted effort for minimizing the computing cost by comparing and analyzing the different temporal data models of databases. This is a review paper. The paper begins with critical investigation of the constraints of relational model and then comparing the key concepts of various...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Jul 2013

    Aspect of Cloud Computing

    Cloud computing is a powerful new abstraction for large scale data processing systems which is scalable, reliable and available. In cloud computing, there are large self-managed server pools available which reduces the overhead and eliminates management headache. Cloud computing is a new technology/concept of IT which offers various service by...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2013

    Performance Analysis of Cloud Computing Centers by Breaking-Down Response Time

    Cloud computing is the emerging field of the computer science and it is occupying the most of the areas in computers. It delivers on the emerging business essentials for agile, flexible and time-to-value performance. The performance and availability of cloud applications has a noticeable impact on user adoption and revenue...

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Oct 2013

    Making Your Application Highly Available and Highly Scalable Using NoSQL Database (MongoDB)

    Databases are the \"Backbone\" of any information systems. Relational database management system is the base for many legacy databases. RDBMS are great, with SQL being a rich, declarative query language and have the advantage of enforcing referential integrity, ACID (Atomicity Consistency Isolation Durability) semantics and are well understood by developers....

    Provided By Institute of Research and Journals (IRAJ)

  • White Papers // Nov 2013

    Identification of Software Metrics for a Software Project

    The central role that software development plays in today's world is beyond anyone's imagination. Software development is one of the major areas of focus for any organizations. The managers are increasingly focusing on process improvement in software development area. This demand has led to improved approaches to software development, with...

    Provided By Institute of Research and Journals (IRAJ)