International Journal of Advanced Networking and Applications (IJANA)

Displaying 1-40 of 59 results

  • White Papers // Nov 2014

    Analysis and Survey of Issues in Live Virtual Machine Migration Interferences

    Cloud computing is widely adopted technology in various IT infrastructure because of its virtualization facet. Virtualization is used in system management in order to deal with load balancing, efficient resource utilization etc. Live Virtual Machine (VM) migration transfers ongoing process from overloaded virtual machine to another virtual machine. Migration process...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Exploring the Challenges in MANETs

    A MANET - Mobile Ad hoc NETwork, is a wireless network which has no fixed infrastructure such as conventional wired/wireless networks have. Mobile Ad hoc NETworks (MANETs) are infrastructure less, self-configured, self-controlled and self-organized wireless networks. Because of some differences in the way MANETs work, some design issues are required...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Issues and Challenges of Security in Cloud Computing Environment

    The term cloud computing is a relatively recent vintage. In the year of 2008, this term came in popularity. Since then, this term has emerged a lot within a short span of time. As it is known fact of IT industry that every emerging technology brings some issues and challenges,...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools

    Wireless Local Area Networks frequently referred to as WLANs or Wi-Fi networks are all the passion in recent times. Wireless networks offer handiness, mobility, and can even be less expensive to put into practice than wired networks in many cases. But how far this technology is going provide a protected...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    An Overview of DDoS Attacks in Cloud Environment

    Cloud computing is one of the emerging technologies in which a huge amount of storage, data and services are available over the internet. The main advantage of cloud computing environment is the users have to pay only for what they use. Cloud services are distributed in nature so they can...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Enhancement Clustering of Cloud Datasets using Improved Agglomerative Technique

    Cloud computing is the latest technology that delivers computing resources as a service such as infrastructure, storage, application development platforms, software etc. Huge amount of data is stored in the cloud which needs to be retrieved efficiently. In cloud computing using of clustering process from heterogeneous network fetch the data...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Profile Based Location Update Strategy in Mobile Computing

    Location management is the most important and crucial task when the authors talk about mobile computing. Sometimes it is very difficult to perform some task without knowing the exact location of the user. It is very important task in mobile computing to manage location information of each and every user....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Comparative Study of Amazon EC2 and Microsoft Azure Cloud Architecture

    Cloud computing refers to a network that distributes processing power, applications, and large systems among many computers. In current era, all companies are going for computerization. It is not feasible for every startup to invest high amount of money for purchasing servers and recruiting IT staff who can handle these...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Comparison and Implementation Challenges in E-Commerce and M-Commerce (B2B) Web Sites

    In this paper, the authors discuss a bit on E-commerce and M-commerce first. Apart from that it discusses importance of both of these digital commercial techniques along with B2B E-commerce technique. The main emphasis is given on ebXML which is widely used for B2B transactions. Along with this it also...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Identification, Categorization and Weighting of Software Engineering Attributes for Quality Evaluation of Software Project Documentation

    Software project documentation is an editorial whose intention is to converse information about the software system. An elementary objective of software engineering is to construct the finest potential operational software along with the most excellent supporting documentation. This paper highlights the results of analysis of software project documentations of large...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Novel Approach for Fingerprint Recognition Using Sparse Representation

    In this paper, the authors present novel approach for fingerprint recognition using sparse representation provided by compressive sampling theory. In this paper, fingerprint feature is extracted in term of sparse measurements vector using Compressive Sampling (CS) theory framework. CS theory is provided unique solution to generation of sparse measurement vector...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Performance Analysis of Supervised Techniques for Review Spam Detection

    Now-a-days, millions of products and services are available online. Searching for the best products which targets the individuals' requirements would be difficult as the result of the existence of too many offers. One of the most useful approaches to choose a product or service is to use the reviews of...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    A Review on Dysarthric Speech Recognition

    Dysarthria is malfunctioning of motor speech caused by faintness in the human nervous system. It is characterized by the slurred speech along with physical impairment which restricts their communication and creates the lack of confidence and affects the lifestyle. Speech Assistive technology (SAT) developed till yet have been reviewed for...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems

    Payment transactions initiated through a mobile device are growing and security concerns must be addressed. People coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication in open-loop card payment to closed-loop mobile financial transactions and certification of closed-loop payment product or solution against...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2014

    Application Layer Intrusion Detection with Combination of Explicit-Rule-Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program

    There have been numerous works on network intrusion detection and prevention systems, but work on application layer intrusion detection and prevention is rare and not very mature. Intrusion detection and prevention at both network and application layers are important for cyber-security and enterprise system security. Since application layer intrusion is...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2014

    Software Defined Networking: A Concept and Related Issues

    Software Defined Networking (SDN) is the networking architecture that has gained attention of researchers in recent past. It is the future of programmable networks. Traditional networks were very complex and difficult to manage. SDN is going to change this by offering a standard interface (open flow) between the control plane...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Sep 2014

    Survey on Host and Network Based Intrusion Detection System

    With the recent advances in technology, people are sharing more and more information among each other. Some organizations like medicine, military etc. are sharing data which is highly sensitive and important. For secure communication, people are using cryptography, using secret key, so that only authenticated receiver can decrypt the message...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Sep 2014

    A Novel Technique in Software Engineering for Building Scalable Large Parallel Software: Demonstration on Dynamical Core of VARSHA - A Global Circulation Model Software

    Parallel processing is the only alternative for meeting computational demand of scientific and technological advancement. Yet first few parallelized versions of a large application code-in the present case-a meteorological global circulation model-are not usually optimal or efficient. Large size and complexity of the code cause making changes for efficient parallelization...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Security Issues in Cloud Computing - A Review

    Cloud computing is the most emerging trend in information technology now days. It is attracting the organizations due to its advantages of scalability, throughput, easy and cheap access and on demand up and down grading of SaaS, PaaS and IaaS. Besides all the salient features of cloud environment, there are...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Securing Cloud from Cloud Drain

    Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Mobile Operating Systems and Application Development Platforms: A Survey

    Earlier mobile communication technologies were dominated by vertically integrated service provision which are highly bounded mainly to voice and short message services that are organized in a monopolistic competition between few mobile virtual network operators, service providers and enhanced service providers. In the recent years, however, radical change driven by...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks

    In this paper, the authors are concerned with security for Mobile Ad-hoc NETworks (MANETs) using threshold cryptography. When they are applying cryptography to MANETs, key management schemes must provide the cryptographic keys in a secure manner and storing the secret information within the nodes, thwarting the activities of malicious nodes...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques

    The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam. This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service (DoS) attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model. However, adversaries...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Classifying Content-based Images using Self Organizing Map Neural Networks Based on Nonlinear Features

    Classifying similar images is one of the most interesting and essential image processing operations. Presented methods have some disadvantages like: low accuracy in analysis step and low speed in feature extraction process. In this paper, a new method for image classification is proposed in which similarity weight is revised by...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Higher Throughput Maintenance Using Average Time Standard for Multipath Data Delivery Ad-hoc Network System

    Wireless network has come out as one of the key enablers for reliable data delivery for different types of applications. Ad-hoc network consists of self-actuated node that collaborates in order to transfer the information. Trajectory-based Statistical Forwarding (TSF) method used optimal target point selection algorithm to forward packets in order...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Solving The Problem of Adaptive E-Learning By Using Social Networks

    Throughout the last few decades, the nature of training in numerous instructive organizations has declined prompting inadmissible low scholastic execution, large amount of useful lack of education, developing populace of unemployable graduates. Adapting never was limited to classrooms. The changing sociotechnical connection offers a guarantee of new open doors, and...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Cryptography System for Online Communication Using Polyalphabetic Substitution Method

    Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties)...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2014

    A Study on Access Point Selection Algorithms in Wireless Mesh Networks

    In IEEE 802.11 based Wireless Mesh Network (WMN), a mesh client often finds multiple Access Points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Apr 2014

    Access Control in Cloud Computing Environment

    Cloud computing is a new technology which is directly connected with the internet which provide on demand self service internet infrastructure where a customer can pay and use only what is needed. Cloud computing all services are managed by third party cloud service provider. Now-a-days, majority using static password to...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Mar 2014

    CPU Scheduling Algorithms: A Survey

    Scheduling is the fundamental function of operating system. For scheduling, resources of system shared among processes which are going to be executed. CPU scheduling is a technique by which processes are allocating to the CPU for a specific time quantum. In this paper, the review of different scheduling algorithms are...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Dec 2013

    Design of Dependable and Trustworthiness Of Data Communication In WSN

    In this paper, the authors discuss a novel of the most challenging issues so far is the extension of network lifetime with regards to small battery capacity and self-sustained operation. Endeavors to save energy have been made on various frontiers, ranging from hardware improvements over medium access and routing protocols...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Dec 2013

    Enterprise Risk Management Integrated framework for Cloud Computing

    The emergence of cloud computing is a fundamental shift towards new on-demand business models together with new implementation models for the applications portfolio, the infrastructure, and the data, as they are provisioned as virtual services using the cloud. These technological and commercial changes have an impact on current working practices....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Dec 2013

    Data Retrieval Mechanisms in Mobile Environments by Using Spatial Queries

    In this paper, the authors discuss a novel hybrid replacement policy to adopt in the design of their cache. According to their hybrid caching strategy, the results of the most frequently accessed queries are maintained in a static cache of fixed size, which is completely rebuilt at fixed time intervals....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2013

    Remote Access using Remote Frame Buffer Protocol based on Virtual Network Computing Architecture in Mobile Cloud

    Mobile Cloud Computing (MCC) is the emerging area with the usage of cloud computing in mixture with mobile devices. The principle of mobile cloud computing physically splits the user interface from the application logic. Although they suffer from intrinsic resource limitations, mobile devices have become very prevalent. Mobile Cloud Computing...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2013

    Overview of the Side Channel Attacks

    The security of cryptographic algorithms such as block ciphers and public-key algorithms relies on the secrecy of the key. Traditionally, when cryptanalyists examine the security of a cryptographic algorithm, they try to recover the secret key by observing the inputs and outputs of the algorithm. Assuming this type of attack...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2011

    A New Algorithm to Detect the Non-Termination of Triggers in Active Databases

    Active databases are a combination of traditional static databases and active rules, meant to be automated mechanisms to maintain integrity and facilitate in providing database functionalities. Active database systems can react to the occurrence of some predefined events automatically. In many applications, active rules or triggers may interact in complex...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2011

    Wireless Sensor Network Based Fire Monitoring and Extinguishing System in Real Time Environment

    Firefighting is one of the most dangerous professions in which people are employed. The dangers associated are the result of a number of factors such as lack of information regarding the location, size and spread of the fire. The use of wireless sensor networks may be one way of reducing...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2011

    Architectural Performance of WiMAX Over WiFi with Reliable QoS Over Wireless Communication

    Due to fast development of technology, future communication and transmission are totally depends upon wireless network. Wireless networks are generally less efficient and irregular compared to wired networks, which make Quality of Service (QoS) provision a bigger challenge for wireless communications. The wireless medium has limited bandwidth, higher packet error...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2011

    Performance Analysis of Hierarchical Clustering Algorithm

    Clustering is the classification of objects into different groups, or more precisely, the partitioning of a data set into subsets (clusters), so that the data in each subset (ideally) share some common trait - often proximity according to some defined distance measure. Data clustering is a common technique for statistical...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Mar 2011

    Adaptive Fault Tolerant Routing in Interconnection Networks: A Review

    A multi-processor / computer systems are connected by varieties of interconnection networks. To enable any non-faulty component (Node / Link) to communicate with any other non-faulty component in an injured interconnection network, the information on component failure is to be made available to non-faulty components, so as to route messages...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques

    The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam. This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service (DoS) attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model. However, adversaries...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2009

    Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated System Using Recurrent Neural Network

    The associative memory feature of the hopfield type recurrent neural network is used for the pattern storage and pattern authentication. This paper outlines an optimization relaxation approach for signature verification based on the Hopfield Neural Network (HNN) which is a recurrent network. The standard sample signature of the customer is...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Securing Cloud from Cloud Drain

    Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks

    In this paper, the authors are concerned with security for Mobile Ad-hoc NETworks (MANETs) using threshold cryptography. When they are applying cryptography to MANETs, key management schemes must provide the cryptographic keys in a secure manner and storing the secret information within the nodes, thwarting the activities of malicious nodes...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Sep 2014

    A Novel Technique in Software Engineering for Building Scalable Large Parallel Software: Demonstration on Dynamical Core of VARSHA - A Global Circulation Model Software

    Parallel processing is the only alternative for meeting computational demand of scientific and technological advancement. Yet first few parallelized versions of a large application code-in the present case-a meteorological global circulation model-are not usually optimal or efficient. Large size and complexity of the code cause making changes for efficient parallelization...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Security Issues in Cloud Computing - A Review

    Cloud computing is the most emerging trend in information technology now days. It is attracting the organizations due to its advantages of scalability, throughput, easy and cheap access and on demand up and down grading of SaaS, PaaS and IaaS. Besides all the salient features of cloud environment, there are...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2014

    Software Defined Networking: A Concept and Related Issues

    Software Defined Networking (SDN) is the networking architecture that has gained attention of researchers in recent past. It is the future of programmable networks. Traditional networks were very complex and difficult to manage. SDN is going to change this by offering a standard interface (open flow) between the control plane...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2009

    Network Intrusion Detection Using FP Tree Rules

    In the faceless world of the internet, online fraud is one of the greatest reasons of loss for web merchants. Advanced solutions are needed to protect e-businesses from the constant problems of fraud. Many popular fraud detection algorithms require supervised training, which needs human intervention to prepare training cases. Since...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Higher Throughput Maintenance Using Average Time Standard for Multipath Data Delivery Ad-hoc Network System

    Wireless network has come out as one of the key enablers for reliable data delivery for different types of applications. Ad-hoc network consists of self-actuated node that collaborates in order to transfer the information. Trajectory-based Statistical Forwarding (TSF) method used optimal target point selection algorithm to forward packets in order...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Solving The Problem of Adaptive E-Learning By Using Social Networks

    Throughout the last few decades, the nature of training in numerous instructive organizations has declined prompting inadmissible low scholastic execution, large amount of useful lack of education, developing populace of unemployable graduates. Adapting never was limited to classrooms. The changing sociotechnical connection offers a guarantee of new open doors, and...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Mobile Operating Systems and Application Development Platforms: A Survey

    Earlier mobile communication technologies were dominated by vertically integrated service provision which are highly bounded mainly to voice and short message services that are organized in a monopolistic competition between few mobile virtual network operators, service providers and enhanced service providers. In the recent years, however, radical change driven by...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2014

    Application Layer Intrusion Detection with Combination of Explicit-Rule-Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program

    There have been numerous works on network intrusion detection and prevention systems, but work on application layer intrusion detection and prevention is rare and not very mature. Intrusion detection and prevention at both network and application layers are important for cyber-security and enterprise system security. Since application layer intrusion is...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2009

    An Approach of MST Generation Algorithm Based on Node Weightage

    In this paper, the authors consider generation of Minimal Spanning Trees (MST) of a simple symmetric and connected graph G. They propose a new algorithm to find out minimal spanning tree of the graph G based on the weight age of nodes in graph. The time complexity of the problem...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2009

    A Modular Approach on Statistical Randomness Study of Bit Sequences

    Randomness studies of bit sequences, created either by a ciphering algorithm or by a pseudorandom bit generator are a subject of prolonged research interest. During the recent past the 15 statistical tests of NIST turn out to be the most important as well as dependable tool for the same. For...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Cryptography System for Online Communication Using Polyalphabetic Substitution Method

    Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties)...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2014

    A Study on Access Point Selection Algorithms in Wireless Mesh Networks

    In IEEE 802.11 based Wireless Mesh Network (WMN), a mesh client often finds multiple Access Points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2009

    Real Time and Energy Efficient Transport Protocol for Wireless Sensor Networks

    Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. Many applications of wireless sensor networks are useful only when connected to an external network. Previous research on transport layer protocols for sensor networks has focused on designing...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2009

    The Study State Analysis of Tandem Queue with Blocking and Feedback

    The structure of a simple two station Markovian tandem queue is as follows: tasks arrive at a buffer with zero, finite or infinite capacity, in front of the first station according to a Poisson process. Zero capacity means that no task may wait or it will be lost from the...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2009

    Information Delivery System through Bluetooth in Ubiquitous Networks

    Ubiquitous and Pervasive Computing (UPC) is a popular paradigm whose purpose is to emerge computers into the real world, to serve humans where the ubiquitous network is the underneath infrastructure. In order to provide ubiquitous Services (u-Service) which deliver useful information to service users without human intervention, this paper implements...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2009

    SPIM Architecture for MVC based Web Applications

    The model/view/controller design pattern divides an application environment into three components to handle the user-interactions, computations and output respectively. This separation greatly favors architectural reusability. The pattern works well in the case of single address space and not proven to be efficient for web applications involving multiple address spaces. Web...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems

    Payment transactions initiated through a mobile device are growing and security concerns must be addressed. People coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication in open-loop card payment to closed-loop mobile financial transactions and certification of closed-loop payment product or solution against...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Sep 2014

    Survey on Host and Network Based Intrusion Detection System

    With the recent advances in technology, people are sharing more and more information among each other. Some organizations like medicine, military etc. are sharing data which is highly sensitive and important. For secure communication, people are using cryptography, using secret key, so that only authenticated receiver can decrypt the message...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2013

    Overview of the Side Channel Attacks

    The security of cryptographic algorithms such as block ciphers and public-key algorithms relies on the secrecy of the key. Traditionally, when cryptanalyists examine the security of a cryptographic algorithm, they try to recover the secret key by observing the inputs and outputs of the algorithm. Assuming this type of attack...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Analysis and Survey of Issues in Live Virtual Machine Migration Interferences

    Cloud computing is widely adopted technology in various IT infrastructure because of its virtualization facet. Virtualization is used in system management in order to deal with load balancing, efficient resource utilization etc. Live Virtual Machine (VM) migration transfers ongoing process from overloaded virtual machine to another virtual machine. Migration process...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Exploring the Challenges in MANETs

    A MANET - Mobile Ad hoc NETwork, is a wireless network which has no fixed infrastructure such as conventional wired/wireless networks have. Mobile Ad hoc NETworks (MANETs) are infrastructure less, self-configured, self-controlled and self-organized wireless networks. Because of some differences in the way MANETs work, some design issues are required...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Issues and Challenges of Security in Cloud Computing Environment

    The term cloud computing is a relatively recent vintage. In the year of 2008, this term came in popularity. Since then, this term has emerged a lot within a short span of time. As it is known fact of IT industry that every emerging technology brings some issues and challenges,...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools

    Wireless Local Area Networks frequently referred to as WLANs or Wi-Fi networks are all the passion in recent times. Wireless networks offer handiness, mobility, and can even be less expensive to put into practice than wired networks in many cases. But how far this technology is going provide a protected...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    An Overview of DDoS Attacks in Cloud Environment

    Cloud computing is one of the emerging technologies in which a huge amount of storage, data and services are available over the internet. The main advantage of cloud computing environment is the users have to pay only for what they use. Cloud services are distributed in nature so they can...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Enhancement Clustering of Cloud Datasets using Improved Agglomerative Technique

    Cloud computing is the latest technology that delivers computing resources as a service such as infrastructure, storage, application development platforms, software etc. Huge amount of data is stored in the cloud which needs to be retrieved efficiently. In cloud computing using of clustering process from heterogeneous network fetch the data...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Profile Based Location Update Strategy in Mobile Computing

    Location management is the most important and crucial task when the authors talk about mobile computing. Sometimes it is very difficult to perform some task without knowing the exact location of the user. It is very important task in mobile computing to manage location information of each and every user....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Comparative Study of Amazon EC2 and Microsoft Azure Cloud Architecture

    Cloud computing refers to a network that distributes processing power, applications, and large systems among many computers. In current era, all companies are going for computerization. It is not feasible for every startup to invest high amount of money for purchasing servers and recruiting IT staff who can handle these...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Comparison and Implementation Challenges in E-Commerce and M-Commerce (B2B) Web Sites

    In this paper, the authors discuss a bit on E-commerce and M-commerce first. Apart from that it discusses importance of both of these digital commercial techniques along with B2B E-commerce technique. The main emphasis is given on ebXML which is widely used for B2B transactions. Along with this it also...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Identification, Categorization and Weighting of Software Engineering Attributes for Quality Evaluation of Software Project Documentation

    Software project documentation is an editorial whose intention is to converse information about the software system. An elementary objective of software engineering is to construct the finest potential operational software along with the most excellent supporting documentation. This paper highlights the results of analysis of software project documentations of large...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Novel Approach for Fingerprint Recognition Using Sparse Representation

    In this paper, the authors present novel approach for fingerprint recognition using sparse representation provided by compressive sampling theory. In this paper, fingerprint feature is extracted in term of sparse measurements vector using Compressive Sampling (CS) theory framework. CS theory is provided unique solution to generation of sparse measurement vector...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jan 2011

    Novel Mobile Network Service for Road Safety

    In most of the developing countries, mobile penetration is strongly correlated with economic growth and social benefits. New mobile devices, services and applications were developed. In this paper, the authors describe a mobile network service helps road safety purpose. A preprocessing steps reduces the search space in a safety way....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2010

    Implementation of LSB Steganography and its Evaluation for Various File Formats

    Steganography is derived from the Greek word steganos which literally means \"Covered\" and graphy means \"Writing\", i.e. covered writing. Steganography refers to the science of \"Invisible\" communication. For hiding secret information in various file formats, there exists a large variety of steganographic techniques some are more complex than others and...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Feb 2011

    Attacking Embedded Systems through Power Analysis

    Embedded systems are being used for the development and implementation of safety and mission critical systems. Malfunctions of such type of embedded systems will lead to disasters at times. The embedded systems must be fully secured from outside intervention in order to have effective functioning as well as to provide...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Classifying Content-based Images using Self Organizing Map Neural Networks Based on Nonlinear Features

    Classifying similar images is one of the most interesting and essential image processing operations. Presented methods have some disadvantages like: low accuracy in analysis step and low speed in feature extraction process. In this paper, a new method for image classification is proposed in which similarity weight is revised by...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Performance Analysis of Supervised Techniques for Review Spam Detection

    Now-a-days, millions of products and services are available online. Searching for the best products which targets the individuals' requirements would be difficult as the result of the existence of too many offers. One of the most useful approaches to choose a product or service is to use the reviews of...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    A Review on Dysarthric Speech Recognition

    Dysarthria is malfunctioning of motor speech caused by faintness in the human nervous system. It is characterized by the slurred speech along with physical impairment which restricts their communication and creates the lack of confidence and affects the lifestyle. Speech Assistive technology (SAT) developed till yet have been reviewed for...

    Provided By International Journal of Advanced Networking and Applications (IJANA)