International Journal of Advanced Networking and Applications (IJANA)

Displaying 1-40 of 42 results

  • White Papers // Nov 2014

    Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems

    Payment transactions initiated through a mobile device are growing and security concerns must be addressed. People coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication in open-loop card payment to closed-loop mobile financial transactions and certification of closed-loop payment product or solution against...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2014

    Application Layer Intrusion Detection with Combination of Explicit-Rule-Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program

    There have been numerous works on network intrusion detection and prevention systems, but work on application layer intrusion detection and prevention is rare and not very mature. Intrusion detection and prevention at both network and application layers are important for cyber-security and enterprise system security. Since application layer intrusion is...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2014

    Software Defined Networking: A Concept and Related Issues

    Software Defined Networking (SDN) is the networking architecture that has gained attention of researchers in recent past. It is the future of programmable networks. Traditional networks were very complex and difficult to manage. SDN is going to change this by offering a standard interface (open flow) between the control plane...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Sep 2014

    Survey on Host and Network Based Intrusion Detection System

    With the recent advances in technology, people are sharing more and more information among each other. Some organizations like medicine, military etc. are sharing data which is highly sensitive and important. For secure communication, people are using cryptography, using secret key, so that only authenticated receiver can decrypt the message...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Sep 2014

    A Novel Technique in Software Engineering for Building Scalable Large Parallel Software: Demonstration on Dynamical Core of VARSHA - A Global Circulation Model Software

    Parallel processing is the only alternative for meeting computational demand of scientific and technological advancement. Yet first few parallelized versions of a large application code-in the present case-a meteorological global circulation model-are not usually optimal or efficient. Large size and complexity of the code cause making changes for efficient parallelization...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Security Issues in Cloud Computing - A Review

    Cloud computing is the most emerging trend in information technology now days. It is attracting the organizations due to its advantages of scalability, throughput, easy and cheap access and on demand up and down grading of SaaS, PaaS and IaaS. Besides all the salient features of cloud environment, there are...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Securing Cloud from Cloud Drain

    Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Mobile Operating Systems and Application Development Platforms: A Survey

    Earlier mobile communication technologies were dominated by vertically integrated service provision which are highly bounded mainly to voice and short message services that are organized in a monopolistic competition between few mobile virtual network operators, service providers and enhanced service providers. In the recent years, however, radical change driven by...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks

    In this paper, the authors are concerned with security for Mobile Ad-hoc NETworks (MANETs) using threshold cryptography. When they are applying cryptography to MANETs, key management schemes must provide the cryptographic keys in a secure manner and storing the secret information within the nodes, thwarting the activities of malicious nodes...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques

    The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam. This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service (DoS) attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model. However, adversaries...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Higher Throughput Maintenance Using Average Time Standard for Multipath Data Delivery Ad-hoc Network System

    Wireless network has come out as one of the key enablers for reliable data delivery for different types of applications. Ad-hoc network consists of self-actuated node that collaborates in order to transfer the information. Trajectory-based Statistical Forwarding (TSF) method used optimal target point selection algorithm to forward packets in order...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Solving The Problem of Adaptive E-Learning By Using Social Networks

    Throughout the last few decades, the nature of training in numerous instructive organizations has declined prompting inadmissible low scholastic execution, large amount of useful lack of education, developing populace of unemployable graduates. Adapting never was limited to classrooms. The changing sociotechnical connection offers a guarantee of new open doors, and...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Cryptography System for Online Communication Using Polyalphabetic Substitution Method

    Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties)...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2014

    A Study on Access Point Selection Algorithms in Wireless Mesh Networks

    In IEEE 802.11 based Wireless Mesh Network (WMN), a mesh client often finds multiple Access Points (AP) to associate with. How to select the best AP is the open research problem. The traditional AP selection method defined by IEEE 802.11 standard is based on received signal strength. This method is...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Apr 2014

    Access Control in Cloud Computing Environment

    Cloud computing is a new technology which is directly connected with the internet which provide on demand self service internet infrastructure where a customer can pay and use only what is needed. Cloud computing all services are managed by third party cloud service provider. Now-a-days, majority using static password to...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Mar 2014

    CPU Scheduling Algorithms: A Survey

    Scheduling is the fundamental function of operating system. For scheduling, resources of system shared among processes which are going to be executed. CPU scheduling is a technique by which processes are allocating to the CPU for a specific time quantum. In this paper, the review of different scheduling algorithms are...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Dec 2013

    Design of Dependable and Trustworthiness Of Data Communication In WSN

    In this paper, the authors discuss a novel of the most challenging issues so far is the extension of network lifetime with regards to small battery capacity and self-sustained operation. Endeavors to save energy have been made on various frontiers, ranging from hardware improvements over medium access and routing protocols...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Dec 2013

    Enterprise Risk Management Integrated framework for Cloud Computing

    The emergence of cloud computing is a fundamental shift towards new on-demand business models together with new implementation models for the applications portfolio, the infrastructure, and the data, as they are provisioned as virtual services using the cloud. These technological and commercial changes have an impact on current working practices....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Dec 2013

    Data Retrieval Mechanisms in Mobile Environments by Using Spatial Queries

    In this paper, the authors discuss a novel hybrid replacement policy to adopt in the design of their cache. According to their hybrid caching strategy, the results of the most frequently accessed queries are maintained in a static cache of fixed size, which is completely rebuilt at fixed time intervals....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2013

    Remote Access using Remote Frame Buffer Protocol based on Virtual Network Computing Architecture in Mobile Cloud

    Mobile Cloud Computing (MCC) is the emerging area with the usage of cloud computing in mixture with mobile devices. The principle of mobile cloud computing physically splits the user interface from the application logic. Although they suffer from intrinsic resource limitations, mobile devices have become very prevalent. Mobile Cloud Computing...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2013

    Overview of the Side Channel Attacks

    The security of cryptographic algorithms such as block ciphers and public-key algorithms relies on the secrecy of the key. Traditionally, when cryptanalyists examine the security of a cryptographic algorithm, they try to recover the secret key by observing the inputs and outputs of the algorithm. Assuming this type of attack...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2011

    A New Algorithm to Detect the Non-Termination of Triggers in Active Databases

    Active databases are a combination of traditional static databases and active rules, meant to be automated mechanisms to maintain integrity and facilitate in providing database functionalities. Active database systems can react to the occurrence of some predefined events automatically. In many applications, active rules or triggers may interact in complex...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2011

    Wireless Sensor Network Based Fire Monitoring and Extinguishing System in Real Time Environment

    Firefighting is one of the most dangerous professions in which people are employed. The dangers associated are the result of a number of factors such as lack of information regarding the location, size and spread of the fire. The use of wireless sensor networks may be one way of reducing...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2011

    Architectural Performance of WiMAX Over WiFi with Reliable QoS Over Wireless Communication

    Due to fast development of technology, future communication and transmission are totally depends upon wireless network. Wireless networks are generally less efficient and irregular compared to wired networks, which make Quality of Service (QoS) provision a bigger challenge for wireless communications. The wireless medium has limited bandwidth, higher packet error...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2011

    Performance Analysis of Hierarchical Clustering Algorithm

    Clustering is the classification of objects into different groups, or more precisely, the partitioning of a data set into subsets (clusters), so that the data in each subset (ideally) share some common trait - often proximity according to some defined distance measure. Data clustering is a common technique for statistical...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Mar 2011

    Adaptive Fault Tolerant Routing in Interconnection Networks: A Review

    A multi-processor / computer systems are connected by varieties of interconnection networks. To enable any non-faulty component (Node / Link) to communicate with any other non-faulty component in an injured interconnection network, the information on component failure is to be made available to non-faulty components, so as to route messages...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2010

    An Efficient Multi Access Protocol for Wireless Networks

    In this paper, the authors propose and evaluate an efficient multi-access protocol for cell-based wireless networks. The protocol addresses the problems in existing random-access protocols for wireless networks: long-term fairness as well as short term fairness in accessing a shared channel and the detection of hidden and exposed collisions. The...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2010

    Single-path Streaming Optimized Routing Protocol for Dense Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) have advanced to the multimedia processing and streaming applications in the recent past with the advent of higher end motes like the iMote2. The data rates available from the radios of the WSN nodes are low so that for streaming applications to be sustained in...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2010

    Towards a Complete Solution to Mobility Management for Multiple-Operability Mobile Systems

    In the Multiple-Operability Mobile Systems, Mobile Users (MUs) will be able to move across various heterogeneous networks while using their Mobile Terminals (MTs) to communicate. It has been proven that this global roaming freedom significantly increases the network-signaling traffic. Several schemes have been recently proposed to reduce such a traffic....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2010

    Performance Evaluation of Sequential and Parallel Mining of Association Rules using Apriori Algorithms

    The information age has seen most of the activities generating huge volumes of data. The explosive growth of business, scientific and government databases sizes has far outpaced the authors' ability to interpret and digest the stored data. This has created a need for new generation tools and techniques for automated...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2010

    Mobile Machine for E-payment Scheme

    The attractiveness of mobile e-trade has been growing quickly these today. This is largely due to the exponential increasing of Internet networks in the midst of citizens. In addition, during the past few years the mobile trade has also been growing mostly because of the growth in vending of mobile...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Apr 2010

    Dynamic Key-Scheduling and Authentication Scheme for Distributed Wireless Network

    A self-protection technique is suggested for ad hoc networks, as they fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11. Despite their efficiency, these standards do not provide...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Apr 2010

    Virtual Market Using Logistics Optimization

    In this paper the authors have proposed an idea called virtual marketplace that effectively utilizes the widespread and vast cellular phone infrastructure and the recent advances in sensor technology, leading to tremendous cost and time saving. This idea takes virtual markets to a new level of evolution, with unparalleled customer...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Apr 2010

    Fuzzy Based Approach for Packet Dropping in Wireless Networks

    In wireless networks, resource management is a very complicated issue because of scarcity in resources. This paper presents a fuzzy based packet dropping scheme for wireless networks in the context of future generation cellular networks. In this scheme, a buffer manager located at the base station uses a fuzzy controller...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2009

    An Approach of MST Generation Algorithm Based on Node Weightage

    In this paper, the authors consider generation of Minimal Spanning Trees (MST) of a simple symmetric and connected graph G. They propose a new algorithm to find out minimal spanning tree of the graph G based on the weight age of nodes in graph. The time complexity of the problem...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2009

    Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated System Using Recurrent Neural Network

    The associative memory feature of the hopfield type recurrent neural network is used for the pattern storage and pattern authentication. This paper outlines an optimization relaxation approach for signature verification based on the Hopfield Neural Network (HNN) which is a recurrent network. The standard sample signature of the customer is...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2009

    A Modular Approach on Statistical Randomness Study of Bit Sequences

    Randomness studies of bit sequences, created either by a ciphering algorithm or by a pseudorandom bit generator are a subject of prolonged research interest. During the recent past the 15 statistical tests of NIST turn out to be the most important as well as dependable tool for the same. For...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2009

    Information Delivery System through Bluetooth in Ubiquitous Networks

    Ubiquitous and Pervasive Computing (UPC) is a popular paradigm whose purpose is to emerge computers into the real world, to serve humans where the ubiquitous network is the underneath infrastructure. In order to provide ubiquitous Services (u-Service) which deliver useful information to service users without human intervention, this paper implements...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2009

    Network Intrusion Detection Using FP Tree Rules

    In the faceless world of the internet, online fraud is one of the greatest reasons of loss for web merchants. Advanced solutions are needed to protect e-businesses from the constant problems of fraud. Many popular fraud detection algorithms require supervised training, which needs human intervention to prepare training cases. Since...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2009

    SPIM Architecture for MVC based Web Applications

    The model/view/controller design pattern divides an application environment into three components to handle the user-interactions, computations and output respectively. This separation greatly favors architectural reusability. The pattern works well in the case of single address space and not proven to be efficient for web applications involving multiple address spaces. Web...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2010

    Towards a Complete Solution to Mobility Management for Multiple-Operability Mobile Systems

    In the Multiple-Operability Mobile Systems, Mobile Users (MUs) will be able to move across various heterogeneous networks while using their Mobile Terminals (MTs) to communicate. It has been proven that this global roaming freedom significantly increases the network-signaling traffic. Several schemes have been recently proposed to reduce such a traffic....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Apr 2010

    Dynamic Key-Scheduling and Authentication Scheme for Distributed Wireless Network

    A self-protection technique is suggested for ad hoc networks, as they fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11. Despite their efficiency, these standards do not provide...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2010

    Single-path Streaming Optimized Routing Protocol for Dense Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) have advanced to the multimedia processing and streaming applications in the recent past with the advent of higher end motes like the iMote2. The data rates available from the radios of the WSN nodes are low so that for streaming applications to be sustained in...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2010

    An Efficient Multi Access Protocol for Wireless Networks

    In this paper, the authors propose and evaluate an efficient multi-access protocol for cell-based wireless networks. The protocol addresses the problems in existing random-access protocols for wireless networks: long-term fairness as well as short term fairness in accessing a shared channel and the detection of hidden and exposed collisions. The...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2010

    Mobile Machine for E-payment Scheme

    The attractiveness of mobile e-trade has been growing quickly these today. This is largely due to the exponential increasing of Internet networks in the midst of citizens. In addition, during the past few years the mobile trade has also been growing mostly because of the growth in vending of mobile...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2011

    Architectural Performance of WiMAX Over WiFi with Reliable QoS Over Wireless Communication

    Due to fast development of technology, future communication and transmission are totally depends upon wireless network. Wireless networks are generally less efficient and irregular compared to wired networks, which make Quality of Service (QoS) provision a bigger challenge for wireless communications. The wireless medium has limited bandwidth, higher packet error...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2011

    Wireless Sensor Network Based Fire Monitoring and Extinguishing System in Real Time Environment

    Firefighting is one of the most dangerous professions in which people are employed. The dangers associated are the result of a number of factors such as lack of information regarding the location, size and spread of the fire. The use of wireless sensor networks may be one way of reducing...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Mar 2011

    Adaptive Fault Tolerant Routing in Interconnection Networks: A Review

    A multi-processor / computer systems are connected by varieties of interconnection networks. To enable any non-faulty component (Node / Link) to communicate with any other non-faulty component in an injured interconnection network, the information on component failure is to be made available to non-faulty components, so as to route messages...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Apr 2010

    Fuzzy Based Approach for Packet Dropping in Wireless Networks

    In wireless networks, resource management is a very complicated issue because of scarcity in resources. This paper presents a fuzzy based packet dropping scheme for wireless networks in the context of future generation cellular networks. In this scheme, a buffer manager located at the base station uses a fuzzy controller...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Apr 2010

    Virtual Market Using Logistics Optimization

    In this paper the authors have proposed an idea called virtual marketplace that effectively utilizes the widespread and vast cellular phone infrastructure and the recent advances in sensor technology, leading to tremendous cost and time saving. This idea takes virtual markets to a new level of evolution, with unparalleled customer...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Dec 2013

    Enterprise Risk Management Integrated framework for Cloud Computing

    The emergence of cloud computing is a fundamental shift towards new on-demand business models together with new implementation models for the applications portfolio, the infrastructure, and the data, as they are provisioned as virtual services using the cloud. These technological and commercial changes have an impact on current working practices....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Dec 2013

    Design of Dependable and Trustworthiness Of Data Communication In WSN

    In this paper, the authors discuss a novel of the most challenging issues so far is the extension of network lifetime with regards to small battery capacity and self-sustained operation. Endeavors to save energy have been made on various frontiers, ranging from hardware improvements over medium access and routing protocols...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Dec 2013

    Data Retrieval Mechanisms in Mobile Environments by Using Spatial Queries

    In this paper, the authors discuss a novel hybrid replacement policy to adopt in the design of their cache. According to their hybrid caching strategy, the results of the most frequently accessed queries are maintained in a static cache of fixed size, which is completely rebuilt at fixed time intervals....

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2011

    Performance Analysis of Hierarchical Clustering Algorithm

    Clustering is the classification of objects into different groups, or more precisely, the partitioning of a data set into subsets (clusters), so that the data in each subset (ideally) share some common trait - often proximity according to some defined distance measure. Data clustering is a common technique for statistical...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2011

    A New Algorithm to Detect the Non-Termination of Triggers in Active Databases

    Active databases are a combination of traditional static databases and active rules, meant to be automated mechanisms to maintain integrity and facilitate in providing database functionalities. Active database systems can react to the occurrence of some predefined events automatically. In many applications, active rules or triggers may interact in complex...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2010

    Performance Evaluation of Sequential and Parallel Mining of Association Rules using Apriori Algorithms

    The information age has seen most of the activities generating huge volumes of data. The explosive growth of business, scientific and government databases sizes has far outpaced the authors' ability to interpret and digest the stored data. This has created a need for new generation tools and techniques for automated...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2013

    Remote Access using Remote Frame Buffer Protocol based on Virtual Network Computing Architecture in Mobile Cloud

    Mobile Cloud Computing (MCC) is the emerging area with the usage of cloud computing in mixture with mobile devices. The principle of mobile cloud computing physically splits the user interface from the application logic. Although they suffer from intrinsic resource limitations, mobile devices have become very prevalent. Mobile Cloud Computing...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Mar 2014

    CPU Scheduling Algorithms: A Survey

    Scheduling is the fundamental function of operating system. For scheduling, resources of system shared among processes which are going to be executed. CPU scheduling is a technique by which processes are allocating to the CPU for a specific time quantum. In this paper, the review of different scheduling algorithms are...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Apr 2014

    Access Control in Cloud Computing Environment

    Cloud computing is a new technology which is directly connected with the internet which provide on demand self service internet infrastructure where a customer can pay and use only what is needed. Cloud computing all services are managed by third party cloud service provider. Now-a-days, majority using static password to...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2013

    Overview of the Side Channel Attacks

    The security of cryptographic algorithms such as block ciphers and public-key algorithms relies on the secrecy of the key. Traditionally, when cryptanalyists examine the security of a cryptographic algorithm, they try to recover the secret key by observing the inputs and outputs of the algorithm. Assuming this type of attack...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2009

    Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated System Using Recurrent Neural Network

    The associative memory feature of the hopfield type recurrent neural network is used for the pattern storage and pattern authentication. This paper outlines an optimization relaxation approach for signature verification based on the Hopfield Neural Network (HNN) which is a recurrent network. The standard sample signature of the customer is...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Securing Cloud from Cloud Drain

    Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2014

    Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop Mobile Payment Systems

    Payment transactions initiated through a mobile device are growing and security concerns must be addressed. People coming from payment card industry often talk passionately about porting ISO 9564 PIN standard based authentication in open-loop card payment to closed-loop mobile financial transactions and certification of closed-loop payment product or solution against...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Sep 2014

    Survey on Host and Network Based Intrusion Detection System

    With the recent advances in technology, people are sharing more and more information among each other. Some organizations like medicine, military etc. are sharing data which is highly sensitive and important. For secure communication, people are using cryptography, using secret key, so that only authenticated receiver can decrypt the message...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Multi-Level Secret Sharing Scheme for Mobile Ad-Hoc Networks

    In this paper, the authors are concerned with security for Mobile Ad-hoc NETworks (MANETs) using threshold cryptography. When they are applying cryptography to MANETs, key management schemes must provide the cryptographic keys in a secure manner and storing the secret information within the nodes, thwarting the activities of malicious nodes...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Sep 2014

    A Novel Technique in Software Engineering for Building Scalable Large Parallel Software: Demonstration on Dynamical Core of VARSHA - A Global Circulation Model Software

    Parallel processing is the only alternative for meeting computational demand of scientific and technological advancement. Yet first few parallelized versions of a large application code-in the present case-a meteorological global circulation model-are not usually optimal or efficient. Large size and complexity of the code cause making changes for efficient parallelization...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Security Issues in Cloud Computing - A Review

    Cloud computing is the most emerging trend in information technology now days. It is attracting the organizations due to its advantages of scalability, throughput, easy and cheap access and on demand up and down grading of SaaS, PaaS and IaaS. Besides all the salient features of cloud environment, there are...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2014

    Software Defined Networking: A Concept and Related Issues

    Software Defined Networking (SDN) is the networking architecture that has gained attention of researchers in recent past. It is the future of programmable networks. Traditional networks were very complex and difficult to manage. SDN is going to change this by offering a standard interface (open flow) between the control plane...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2009

    Real Time and Energy Efficient Transport Protocol for Wireless Sensor Networks

    Reliable transport protocols such as TCP are tuned to perform well in traditional networks where packet losses occur mostly because of congestion. Many applications of wireless sensor networks are useful only when connected to an external network. Previous research on transport layer protocols for sensor networks has focused on designing...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // May 2009

    The Study State Analysis of Tandem Queue with Blocking and Feedback

    The structure of a simple two station Markovian tandem queue is as follows: tasks arrive at a buffer with zero, finite or infinite capacity, in front of the first station according to a Poisson process. Zero capacity means that no task may wait or it will be lost from the...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2009

    Information Delivery System through Bluetooth in Ubiquitous Networks

    Ubiquitous and Pervasive Computing (UPC) is a popular paradigm whose purpose is to emerge computers into the real world, to serve humans where the ubiquitous network is the underneath infrastructure. In order to provide ubiquitous Services (u-Service) which deliver useful information to service users without human intervention, this paper implements...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2009

    SPIM Architecture for MVC based Web Applications

    The model/view/controller design pattern divides an application environment into three components to handle the user-interactions, computations and output respectively. This separation greatly favors architectural reusability. The pattern works well in the case of single address space and not proven to be efficient for web applications involving multiple address spaces. Web...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jun 2009

    Network Intrusion Detection Using FP Tree Rules

    In the faceless world of the internet, online fraud is one of the greatest reasons of loss for web merchants. Advanced solutions are needed to protect e-businesses from the constant problems of fraud. Many popular fraud detection algorithms require supervised training, which needs human intervention to prepare training cases. Since...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Higher Throughput Maintenance Using Average Time Standard for Multipath Data Delivery Ad-hoc Network System

    Wireless network has come out as one of the key enablers for reliable data delivery for different types of applications. Ad-hoc network consists of self-actuated node that collaborates in order to transfer the information. Trajectory-based Statistical Forwarding (TSF) method used optimal target point selection algorithm to forward packets in order...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Solving The Problem of Adaptive E-Learning By Using Social Networks

    Throughout the last few decades, the nature of training in numerous instructive organizations has declined prompting inadmissible low scholastic execution, large amount of useful lack of education, developing populace of unemployable graduates. Adapting never was limited to classrooms. The changing sociotechnical connection offers a guarantee of new open doors, and...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2014

    Mobile Operating Systems and Application Development Platforms: A Survey

    Earlier mobile communication technologies were dominated by vertically integrated service provision which are highly bounded mainly to voice and short message services that are organized in a monopolistic competition between few mobile virtual network operators, service providers and enhanced service providers. In the recent years, however, radical change driven by...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Oct 2014

    Application Layer Intrusion Detection with Combination of Explicit-Rule-Based and Machine Learning Algorithms and Deployment in Cyber- Defence Program

    There have been numerous works on network intrusion detection and prevention systems, but work on application layer intrusion detection and prevention is rare and not very mature. Intrusion detection and prevention at both network and application layers are important for cyber-security and enterprise system security. Since application layer intrusion is...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Nov 2009

    An Approach of MST Generation Algorithm Based on Node Weightage

    In this paper, the authors consider generation of Minimal Spanning Trees (MST) of a simple symmetric and connected graph G. They propose a new algorithm to find out minimal spanning tree of the graph G based on the weight age of nodes in graph. The time complexity of the problem...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Aug 2009

    A Modular Approach on Statistical Randomness Study of Bit Sequences

    Randomness studies of bit sequences, created either by a ciphering algorithm or by a pseudorandom bit generator are a subject of prolonged research interest. During the recent past the 15 statistical tests of NIST turn out to be the most important as well as dependable tool for the same. For...

    Provided By International Journal of Advanced Networking and Applications (IJANA)

  • White Papers // Jul 2014

    Cryptography System for Online Communication Using Polyalphabetic Substitution Method

    Online communication is one of the common means of communication in this era of globe village. As the number of people being connected to online communication system through their mobile phone, computer or any other e-communication tools increases, there is need to secure the communication networks from adversaries (third parties)...

    Provided By International Journal of Advanced Networking and Applications (IJANA)