International Journal for Advance Research in Engineering and Technology (IJARET)

Displaying 1-40 of 97 results

  • White Papers // Aug 2014

    Ultimate Data Security Using LSB and Chaos Algorithm

    The information is an important for security concern while the data is to be transmitted in internet as it is prone to malicious attacks. To increase the security of the data, it is hidden inside an image. This technique is called steganography. While even the images are prone to attack,...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    Robust Multilingual Voice Biometrics Using Optimum Frames

    In this paper, a multilingual speaker identification system based on optimal energy frame selection approach is discussed. A fixed frame rate adopted in most state-of-the-art speaker identification systems can face some problems, such as suddenly meeting some noisy frames, assigning the equal importance to each and every frame, and pitch...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    Design of Compact Planar Inverted-F Antenna for Wireless Communication

    In this paper, the authors present a new form of Planar Inverted-F Antenna (PIFA) for wireless communication. Recently, the need of compact antennas has been increased. PIFA have been used in compact applications. But narrow bandwidth is the major drawback of the Conventional PIFA. In order to overcome drawback of...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    An Enhanced TCP Congestion Control Approach to Evaluate the Performance Over WiMAX Network

    WiMax (Worldwide Interoperability for Microwave access) technology is presently one of the most promising global telecommunication systems. Great hopes and important investments have been made for WiMax, which is a broadband wireless access system having many applications: fixed or last-mile wireless access, backhauling, mobile cellular network, telemetering, etc. Wimax is...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    Universal Data Collection in Wireless Sensor Networks for Mobile Users

    With the rapid proliferation of mobile devices such as PDAs, cell phones to collect and deliver sensor data are considered as a promising application in the ubiquitous computing environment. In such application scenarios, the human factor is becoming increasingly significant. In this paper, the authors study the universal data collection...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    Energy Saving in ZRP with Anycast Routing Using NS2

    The Zone Routing Protocol (ZRP) is based on the zone's concept. A routing zone is defined for each node and also defined for the zones of neighboring node overlap. Energy management in network deals with the process to manage energy resources such as controlling the battery, scheduling of power sources...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    Visual Secret Sharing Scheme to Provide Data Security and to Maintain Privacy of Information Shared Over Computer System

    Visual cryptography is one of the techniques used to encrypt the images by dividing the original image into multiple images. The multiple images can be sent to the destination though multiple paths, and at the destination, these images can be combined to get the original image. The proposed work on...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    A Novel Method for Disease Diagnosis by Plants Using Association Rule

    Data mining is the process of selecting and exploring large amounts of data. This process has become an increasingly invasive action in all areas of medical science research. Data mining has paved way for the discovery of useful unseen patterns from considerable databases. Now-a-days, many common diseases are increasing and...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    Routing Protocol to Reduce Packet Loss and Optimize Energy Consumption in Wireless Body Area Networks

    Wireless Body Area Network (WBAN) is a network designed by low-power devices that are located on, in or around the human body and are used to monitor physiological signals and motion for medical, personal entertainment and other applications and purposes In Wireless Body Area Network (WBAN), sensor nodes are typically...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2014

    Evaluation of Impact of Black Hole and Gray Hole in Mobile Ad-Hoc Networks

    Wireless networks are gaining quality to its peak these days, because the user's needs wireless connectivity no matter their geographic position. There's an increasing threat of attacks on the Mobile Ad-hoc NETworks (MANET). Unattended installation of device nodes within the surroundings causes several security threats within the Ad-hoc networks. The...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    Improved Routing Algorithm Between Nodes Enabling Ripng and OSPFV3 in IPV6 Wide Area Network

    An efficient dynamic routing protocol is necessary for the future broadband networks where a variety of quality of services is integrated. RIPng and OSPFv3 are the most frequently used dynamic routing protocols in the field of computer communication. This paper proposes an approach in which the outcome of deployment of...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    HIT and MISS: A Haphazard Zone Panel Protocol for MANETs

    In this paper, the authors address the problem of providing anonymity protection in Mobile ad hoc NETworks (MANETs) using a Haphazard Zone Panel protocol (HZP). The HZP protocol offers anonymity protection to sources, destinations, and routes. It uses the partitioning technique and chooses the Random Forwarder (RF) to forward the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    Improving/Enhancing Aggregation of Data Using Data Mining in WSN

    Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors used to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. The development of wireless sensor networks was motivated by military applications such as battlefield...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    Vehicular Ad-Hoc Network: A Review

    In this paper, the authors include VANETs that is vehicular Ad-hoc network. It is a sub class of Mobile Ad hoc NETwork (MANET). It is self-configuring network which do not have any fixed infrastructure. In this the vehicles are act as nodes to create mobile network. It is also called...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    A Framework for Software Engineering Metrics for Software Development Firms

    Software metric is a measure of some property of a piece of software or its specification. There are two types of metrics, product and process metrics. Currently in Information Technology (IT) field, many IT firms use software metrics for process and project management. The aim of this research paper is...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2014

    Vehicle Security System Using ZigBee Technology

    This system is built to help the vehicle owner to protect their car or vehicle from theft. Currently, the car is only equipped with a lock and siren system as their security features. Unfortunately, it is no longer relevant to use it now-a-days due to the limitation of sound of...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    A Survey on Available Bandwidth Estimation in Mobile Ad hoc Networks

    Available bandwidth estimation is one of the major issues in multimedia and real time communications which significantly reduces the throughput of MANETs. Calculating the bandwidth available is challenging task in 802.11 based mobile ad hoc networks due to its shared and dynamic environment. For managing and sharing the bandwidth effectively...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    Improvement of Leach Protocol for Prolonging Network Lifetime in Heterogeneous Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of hundreds or thousands of sensor nodes which have limited energy, computation and memory resources. WSNs are highly affected by the energy dissipation of the nodes. LEACH is a cluster based routing for sensor networks for efficient data collection problem where small numbers of clusters...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    Enhancement in Security by Improving Diffie-Hellman Algorithm

    Diffie Hellman permits two users to exchange a secret key through an insecure channel & without any prior secrets. So the security has become more important. So in this paper, the authors provide harder encryption with enhanced public key encryption protocol for security. Proposed Diffie Hellman is based on simple...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    Enhanced Security Technique in WAP & WEP Based Wireless (Wi-Fi) Network for the Protection Against Unauthorized Users

    Wi-Fi (Wireless Fidelity) is one of today's leading wireless technologies with Wi-Fi support being integrated into more and more devices: laptops, PDAs, mobile phones. However, one configuration aspect all too often goes unnoticed: security, let's have a closer look at the level of security of encryption method used in modern...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    Improvement of Network Lifetime by Improving Route Discovery Phase in Multi-Path DSR

    Routing as one of the cornerstones of any network including MANET, is needed when it require to send data packets over several nodes to arrive at their destinations. An ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any stand-alone infrastructure or...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    A Novel Solution to Nullify DDOS Attack in MANET

    Distributed Denial of Service (DDoS) attacks in the networks needs to be prevented or handled if it occurs, as soon as possible and before reaching the victim. Trading with DDoS attacks is difficult due to their properties such as dynamic attack rates, big scale of botnet, various kinds of goals,...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    Fuzzy Logic in Mobile Hand-off Decision

    In this paper, the authors present an implementation of fuzzy logic in mobile handoff decision. In a cellular network, the radio and fixed links required are not permanently allocated for the duration of a call. Indeed, this ability for transference is a design matter in mobile cellular system design and...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    A Review on a Novel Approach to Enhance the Lifetime of Wireless Sensor Network Using Actor Nodes

    Wireless Sensor Networks (WSNs) provide an economic approach for the deployment of the control devices and distributed monitors and avoid the expensive wired system. WSN is a self healing and self organizing. Self-healing networks allow nodes to reconfigure their link associations and find other pathways around powered-down nodes or failed...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    Mitigating Blackhole Attack in Routing AODV Protocol

    Wireless network is the network of mobile computer nodes or stations that are not physically wired. The main advantage of this wireless network is communicating with rest of the world while being mobile. The disadvantage is their limited bandwidth, memory, processing capability and open medium. Two necessary system models are...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    Disquisition of an Automated Risk Identification Tool for Software Development Process

    Today as the users are all working with the computers, it all depends upon the software which they are using for the interaction with the computers. It has become easy to develop software. The study of building software is known as Software Engineering. This is all about the production of...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2014

    A Novel Approach to Prevent Black Hole Attack in Wireless Sensor Network

    In the wireless networks, radio communication is the medium of choice. A wireless network is any type of computer network that uses wireless data connections for connecting network nodes. It enables people to access and communicate to other devices without any need of wires. MANET is a collection of various...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2014

    Energy Efficient and Node Mobility based Data Replication Algorithm for MANET

    A Mobile Ad-hoc NETwork (MANET) is a self organizing, rapidly deployable network which consists of wireless nodes without infrastructure. All nodes in a MANET are capable of moving actively and can be connected dynamically. It is used in various applications like video conferencing, rescue operations, military applications, disaster management etc....

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2014

    Message Authentication Between the Nodes Using Modified El-Gamal Signature on Elliptic Curve

    Message authentication is one of the most effective way to thwart an intruder who can compromise with the nodes and can access to the data and corrupt the data in wireless sensor network, many conventional methods have been developed to solve the problem that message being corrupted such as symmetric...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2014

    Dynamic Cluster & Encrypted Data Routing Protocol for Hierarchical WSNs

    Wireless Sensor Networks (WSNs) consist of hundreds or thousands of micro sensor nodes which are small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, the energy efficiency is...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2014

    Power Efficient Routing in Wireless Sensor Networks

    The main issue in WSN is energy limited characteristic of the sensor node. So the problem is to have the routing protocol in such the manner that it should be energy efficient in order to increase the life time of the whole WSN. Hierarchical routing architecture divides the whole network...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2014

    Mobile Commerce Explorer for Personal Mobile Commerce Pattern Mining and Prediction

    Mobile commerce, also known as m-commerce is the ability to conduct commerce using a mobile device. Research is done by mining and prediction of mobile users' commerce behaviors such as their movements and purchase transactions. The problem of PMCP-Mine algorithm has been overcome by the collaborative filtering algorithm. This paper...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Development of Embedded Web Server System for Data Acquisition and Control Using ARM9

    As the world growing with rapid technology there need to be autonomous control of the machines in industries. An embedded web server system is a computer system designed for specific control functions within a larger system with real-time operating system and when the networking technology is combined with it then...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Wireless Real Time Video Surveillance System Based On Embedded Web Server and ARM9

    In this paper, wireless real time video surveillance system is designed. As technology is growing day-by-day, it's a revolutionary step towards video surveillance system by means of which one can monitor the entire system remotely on real time basis using embedded web server and ARM9 board. An USB camera is...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Surveying Fuzzy Classification and Clustering Techniques

    Data acquisition and maintenance to any industry is multiplying at an enormous speed. In any industry the produced data is not only massive but also quite complex. As a result, proper handling of data is of prime importance in order to convert the available data into useful information that leads...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Providing Privacy and Security of Wireless Sensor Network Using ACTOR Nodes

    Wireless Sensor Networks (WSN) consists of large number sensor nodes. Wireless sensor nodes are generally deployed in the far places like forests deserts and used to sense the network conditions like temperature pressure etc. In such far places it is very difficult to recharge or replace the battery of the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Bandwidth Maps Over Transmission Range in Vehicle Applications

    Wireless Wide Area Networks (WWANs) is expected to provide actual bandwidth at change of location for vehicles which frequently varies its location by travelling from place to place; it is difficult for network providers to eliminate bandwidth changes over a large service area on the road network. In this paper,...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    A Review: Centralized Routing Protocol BCDCP &SHPER for Wireless Sensor Network

    A Wireless Sensor Network (WSN) is an ad-hoc network composed of small sensor nodes deployed in large numbers, to sense the physical world. Sensor networks have the potential to radically change the way people observe and interact with their environment. Sensors are usually resource-limited and power-constrained. They suffer from restricted...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Survey Paper on Blackhole Detection Schemes in MANET

    In MANET the mobility and resource constraints of nodes may lead to network partitioning. Each node in MANET acts as router and communicates with other nodes. However some nodes may cooperate partially or selfishly. The selfish node could reduce the overall performance of the network. Routing protocols play an important...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Enhanced Data Aggregation in WSN

    Sensors are very important for today life to monitor environment where human can't reach. These networks are used in many real world applications such as traffic control, environmental monitoring and trajectory monitoring. It is more challenging task for sensor network to sense and collect a large amount of data which...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2013

    Intrusion Detection Using Multitier Web Application Analyzer

    Web services and applications have smoothened the way of users for the faster data access. To meet the user's requirements for faster data retrieval, the web applications have moved towards multitier design wherein the back-end server contains the data base and application interface or web server acts as the front...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2013

    Enhancement in Genetic Algorithm to Prevent Brute Force Attack

    The network is much vulnerable to different type of security attacks. The attacker can sniff information from the network and trigger the attack. Among all the different type of attacks brute force attacks is most common type of attack. Genetic algorithm is much vulnerable against brute force attack. In this...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2013

    Local Reconstruction Codes in Cloud

    Cloud computing intended for providing software and hardware facilities are provided to users as a service over the internet through a web browser. Economic gains are the foremost driver for the cloud. User need not worry about the internal details of the storage and physical infrastructure. But, privacy and security...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2013

    Implementation of Genetic Algorithm on Intrusion Detection System to Enhance Result

    An Intruder is a hacker or cracker which always tries to get access to secure, system Intrusion occurs when an unauthorized person try to gain access or interrupt the normal operations of an information system. Even when such attacks are self-propagating, as in the case of worms, Trojan Horses and...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2013

    An Improved XenApp MultiFarm Architecture

    In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced application and desktop computing costs and provided greater IT and user flexibility compared to traditional application and desktop management models. Among the various virtualization products that allow users to connect to their corporate applications from...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2013

    Graphical User Authentication Using Transformation (Rotation and Resizing)

    User authentication is one of the most important elements in the field of data security. It is well known that there are basically two pillar son whom Graphical User Authentication (GUA) build is around: usability and security Text Based Password Authentication (TBPA) has several problems. In this paper, the authors...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2013

    Secure Network ID and Attack Measure Count in Virtual Systems

    In past few years, cloud computing security service is most important issue that has attracted a lot of research and development effort. Mostly, attackers can explore vulnerabilities of a cloud services and compromise virtual machines to deploy further large-scale Denial-of-Service (DoS) attacks usually involve early stage actions such as multi-step...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2013

    Implementation of Reverse Caesar Cipher Algorithm for Cloud Computing

    Cloud computing is a large pool of easily and accessible virtualized resources, such as hardware, development platforms and services. Cloud computing is a new era of the modern world. Reasons for development of cloud computing are different people and different purpose depends upon the demand. The cloud computing flexibility is...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2013

    A Review of Security of Data Using Cryptographic Algorithms in Cloud Computing

    Cloud computing is the dramatic advancement of the computer technology. During the last many decades, the network and the computer technology changes, due to which it allows the humans to share the large amount of information. Cloud computing is necessary for all that information. Cloud computing is necessary for easily...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2013

    Enhancing Security of Multibiometric Cryptosystem Using RSA

    Single biometric cryptosystems were developed to obtain security and privacy. They are seriously affected by various attacks. Binding of multiple biometric cryptosystems (e.g., Fingerprint, Iris and face) together is termed as multi-biometric cryptosystem. Now-a-days Multi-biometric systems are mostly used in many large-scale biometric applications (e.g., FBI-IAFIS) multi-biometrics have several advantages...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Oct 2013

    Secure 2-Way Authentication for SIP

    In recent years, Session Initiation Protocol (SIP) has become widely used in current internet protocols to control media communication sessions. It is a text-based application control protocol much like Hyper Text Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP) and is a strong signaling protocol on the internet for...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jun 2013

    Service Allocation in Cloud Environment: A Migration Approach

    A cloud environment is one of the most shareable environments where multiple clients are connected to the common environment to access the services and the products. A cloud environment can be public or the private cloud. In such environment, all the resources are available on an integrated environment where multiple...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2013

    Implementation of Data Cleaning/Scrubbing in Data Ware House for Efficient Data Quality

    In this paper, the authors explain about the optimized data present in data warehouse. A data warehouse can have data with several impurities such as duplicate data, incomplete data, unflustered data etc. In this paper, they have combined 3 approaches to resolve these impurities. These approaches include duplicate data detection...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2013

    Transaction Based Prioritization Strategies for Email Applications

    Web applications change the state based on incoming events. The various events pose a challenge to test the functioning of e-mail applications because there are a large number of possible event sequences that users can invoke through a user interface. Many models have been developed for testing the e-mail applications,...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2013

    A Review of Scheduling Algorithms in Grid Computing

    Grid computing is aggregate power of distributed resources. Grid computing is basically used to coordinate and share the information. Grid computing is the form of distributed computing. In the grid computing the scheduling is used. In the grid computing the task scheduling is used, the main goal of grid task...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2013

    Email Filtering Based On Text Analysis and File Extension Using Improved Bayesian Algorithm

    Electronic mail (E-mail) is an electronic message system that transmits messages across computer network. Electronic mail is the easiest and most efficient communication tool for disseminating both wanted and unwanted information. There are many efforts under way to stop the increase of spam that plague almost every user on the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2013

    Node Selection in P2P Content Sharing Service in Mobile Cellular Networks with Reduction Bandwidth

    The peer-to-peer service has entered the public limelight over the last few years. Several research projects are underway on peer-to-peer technologies, but no definitive conclusion is currently available. Comparing to traditional server-client technology on the internet, the P2P technology has capabilities to realize highly scalable, extensible and efficient distributed applications....

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2013

    An Evolutionary Approach for Discovering Changing Frequent Pattern in Data Mining

    Data mining is a study which is totally based on the historical database and the collection of huge data base is called as data warehouse. In this paper, the base of historical database the authors have to predict the future expectation and according that any they can take some decision....

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jul 2013

    DRS Method for Privacy Preserving In Quantative Data

    Data mining is the process of extracting useful patterns or knowledge from large databases. However, data mining also poses a threat to privacy and information protection if not done or used properly. Association rule mining is a method to find out the correlation among huge set of data items. As...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Aug 2013

    Device Driver Wrapper Enables the Use of Microsoft Windows Drivers for USB Webcams on Linux Based Systems

    A device driver wrapper strategy for software testing integrates functions as an adapter between an operating system and a driver software test cases design methods into well planned series of steps that result in the successful construction of software. This paper provides a road map that describe the steps to...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2014

    Review of Data Hiding Techniques

    Information or data is a very important resource for any organization or individual person. Increase in the number of attack during exchange of information between the source and intended destination has generated a need for a more powerful method for securing data transfer between two entities or storage of data....

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Jan 2014

    A Novel Intrusion Detection Using Decentralized Attack Analyzer and Network Controller in Virtual Network System

    Cloud security is one of most important issues that have attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denial-of-Service (DDoS). DDoS attacks usually involve early stage actions such...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Feb 2014

    A Review on Security Issues in Internal Cloud

    The concept of cloud computing is a very vast concept. Cloud computing being an emerging technology has attracted more attention, as a result more and more enterprises have started to explore cloud computing. But besides these potential gains, the organizations are slow in accepting it due to security issues and...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2014

    A Review on Cloud Security Issues and Solutions

    In the modern era of IT if the users talk about the \"Cloud computing\" it is one of the hottest topics of the industry. A lot can be done on this topic. If they talk about the term \"Cloud\" appears to have its origins in network diagrams that represented the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Mar 2014

    A Review of XMPP based chat Servers with a vision of Security Enhancement using Cryptography

    Security has become a major issue into the development of Instant Messaging (IM). A secure chat scheme is readily accessible and very useful to communicate with people that might be anywhere in the world. In this paper, security issues related to instant messaging is discussed. In this paper, a brief...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Development of Embedded Web Server System for Data Acquisition and Control Using ARM9

    As the world growing with rapid technology there need to be autonomous control of the machines in industries. An embedded web server system is a computer system designed for specific control functions within a larger system with real-time operating system and when the networking technology is combined with it then...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Wireless Real Time Video Surveillance System Based On Embedded Web Server and ARM9

    In this paper, wireless real time video surveillance system is designed. As technology is growing day-by-day, it's a revolutionary step towards video surveillance system by means of which one can monitor the entire system remotely on real time basis using embedded web server and ARM9 board. An USB camera is...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Surveying Fuzzy Classification and Clustering Techniques

    Data acquisition and maintenance to any industry is multiplying at an enormous speed. In any industry the produced data is not only massive but also quite complex. As a result, proper handling of data is of prime importance in order to convert the available data into useful information that leads...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Nov 2013

    Disquisition of a Novel Approach to Enhance Security in Data Mining

    Data mining is a process of knowledge discovery means its use to discover important information from a large database. Generally, it's used to mine data from. Data mining techniques are the result of a long process of research and product development. Many data mining tools currently operate outside of the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Nov 2013

    A Review on Detecting Venomous Files in IDS Using Data Mining

    Data mining is an ambiguous term that has been used to refer to the process of finding interesting information in large repositories of data. IDS are known as the intrusion detection system. In reality it is not possible to prevent security breaches completely using the existing security technologies. The intrusion...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Nov 2013

    Data Separation Issues in Cloud Computing

    Cloud computing is a term for delivering hosted services over the internet. It follows a pay-as-you-go paradigm. Cloud computing is an emergency paradigm for large scale infrastructures. It has the advantages of reducing cost by sharing computing and storage resources, decrease in cost of electricity, network bandwidth, and operations. It...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Oct 2013

    To Enhance Performance of Grid Computing using Scheduling Algorithms

    Grid computing is a computer network in which each computer resources are shared with every other computer in the system. The processing power, memory and data storage are all community resources. These resources are authorized users that can tap into and leverage for specific tasks. A grid computing system can...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Oct 2013

    Workload and Performance Analysis of Data in Distributed Storage Area Network

    Storage area network is defined as s a network whose main purpose is to transfer the data from computer systems to storage elements. It consist of a communication infrastructure, this infrastructure helps to provide the physical connections. In the DSAN, there is a management layer, which helps to organize the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Oct 2013

    Harmonizing User Search Data with Efficient Adaptive Clustering

    Web based applications are at full stretch in today world. For a small piece of info the authors can easily find it on web with the help of search engine to the user on web. Arrangements of the travel oriented phenomena, financial management, online purchases respectively they are dependent on...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2013

    2A: Authorization and Authentication in Cloud Computing

    The present trend for running the application in another space is through cloud. Currently many applications have been developed and run in cloud. In order to run so many applications they require huge space and the most important thing is to how to attain and maintain data confidentiality in databases....

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Sep 2013

    Three Bit Subtraction Circuit via Field Programmable Gate Array

    In this paper, the authors explain about the design of software and hardware simulator for a three bit subtraction circuit via Field Programmable Gate Array (FPGA). The three bit subtraction circuits are involved in performing the subtraction for each bit by performs operation the arithmetic and logic unit, called the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Providing Privacy and Security of Wireless Sensor Network Using ACTOR Nodes

    Wireless Sensor Networks (WSN) consists of large number sensor nodes. Wireless sensor nodes are generally deployed in the far places like forests deserts and used to sense the network conditions like temperature pressure etc. In such far places it is very difficult to recharge or replace the battery of the...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    Bandwidth Maps Over Transmission Range in Vehicle Applications

    Wireless Wide Area Networks (WWANs) is expected to provide actual bandwidth at change of location for vehicles which frequently varies its location by travelling from place to place; it is difficult for network providers to eliminate bandwidth changes over a large service area on the road network. In this paper,...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // Apr 2014

    A Review: Centralized Routing Protocol BCDCP &SHPER for Wireless Sensor Network

    A Wireless Sensor Network (WSN) is an ad-hoc network composed of small sensor nodes deployed in large numbers, to sense the physical world. Sensor networks have the potential to radically change the way people observe and interact with their environment. Sensors are usually resource-limited and power-constrained. They suffer from restricted...

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)

  • White Papers // May 2014

    Energy Efficient and Node Mobility based Data Replication Algorithm for MANET

    A Mobile Ad-hoc NETwork (MANET) is a self organizing, rapidly deployable network which consists of wireless nodes without infrastructure. All nodes in a MANET are capable of moving actively and can be connected dynamically. It is used in various applications like video conferencing, rescue operations, military applications, disaster management etc....

    Provided By International Journal for Advance Research in Engineering and Technology (IJARET)