International Journal of Advanced Research in Computer Engineering & Technology

Displaying 1-40 of 917 results

  • White Papers // Oct 2014

    IMS Based Presence Service for Inter Domain Enterprise Mobility

    Enterprise mobility and IP multimedia system corporate services are becoming more relevant; in particular, the IMS-based presence service is starting to provide different kinds of seamlessly mobile services, with context awareness in a wide range of enterprise-deployment scenarios. However, the deployment of presence-based enterprise services in wide and heterogeneous wireless...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Enhancing A Software Testing Tool to Validate the Web Services

    At some point of time there is no specific testing strategy to consider the idea of testing web services. But in today's scenario, services along with tools are easily available on time. Web services are continuous evolving technologies which are outcome of gradual improvement of internet services. The improvement is...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Diagonal Block Steganography Based Enhanced Auxiliary Key Crypting for Secure Data Transfer

    In the ever-increasingly related sphere, the necessity of collaborating data over the internet has full-grown noticeably. This data can be seized and modified so there needs to be secured process against fraudulent entree. Cryptography and steganography are two vital parts of consideration that consist of a excessive proportion of applications....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    A Survey to Improved the Lifetime of WiMAX Using 802.16g Based Technology

    WiMAX (Worldwide interoperability Mobile Access) is commonly known as IEEE 802.16 standard. The two important technologies used in WIMAX are MIMO and OFDMA. These two services together provide high rate, high speed, can provide services even in difficult environment and can support more number of user. The core work carried...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    A Survey on Accessing Cloud Storage by Group Members with Secure Dynamic User Registration and Revocation

    One of the important characteristics of cloud computing is low maintenance which is economically beneficial to the user. All the user in the cloud provides their resources to the customer (or) a third party by sharing their data in a common area. Group Formation makes it simple, for a group...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    WSN Based Fire Detection and Extinguisher For Fireworks Warehouse

    Security is primary concern for everyone. There are many ways to provide security at industries. For the problem that fast changing of temperature and humidity may cause spontaneous combustion in the process of fireworks warehouse storage, a real-time detection warning system based on wireless sensor network is designed. Wireless sensor...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Robust Modification and Implementation of Randomized Cryptographic Algorithm

    The people live in an age of internet where most part of the day is spent online and not to forget the recent past like WikiLeaks and other such instances where, unfortunately, the privacy in communication over electronic media has been compromised to big extent causing irreparable damages. This raises...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    An Algorithm for Feature Level Fusion in Multimodal Biometric System

    The increasing demand for high secure and reliable authentication schemes, led to improvement in unimodal biometric system and hence multimodal biometric system has emerged as a mean of more secure and reliable authentication scheme. Multimodal biometric fusion is very promising process to enhances the strengths and reduce the weaknesses of...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Data Storage Transfer Using Classification and Prediction in Cognitive Radio System

    Cognitive radio is a wireless communication where a transceiver can detect the utilization of channel in a network. The major element used in cognitive radio is spectrum sensing, which mainly focus on improvement of spectrum utilization by enabling opportunistic access users through heterogeneous architectures and dynamic process. Spectrum sensing is...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Cryptographically Secure Linear Feedback Shift Register

    True random bit generator requires a naturally occurring source of randomness. Designing a hardware device or software program to exploit this randomness and produce a bit sequence that is free of biases and correlation is difficult task. For most cryptographic applications, the generator must not be subject to observation or...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Iris Segmentation and Recognition System

    The richness and apparent stability of the iris texture make it a robust biometric trait for personal authentication. The performance of an automated iris recognition system is affected by the accuracy of the segmentation process used to localize the iris structure. In case of wrong segmentation, wrong features will be...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    To Propose a Novel Technique to Reduce Link Failure Problem in MANET

    The wireless ad hoc network is the self configuring network; mobile nodes can leave or join the network when they want. There are various types of routing protocol in MANET. But there is a problem in routing protocol i.e. link failure problem which is responsible for degrade the performance of...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    A Survey of Biometric Fusion and Template Security Techniques

    Unimodal biometric has many problems like noisy data, intra class variation; inter class similarity, non-universality and spoofing which cause the system to be less accurate and secure. To overcome these problems and increase the level of security, biometric research enrolled multimodal biometrics into the field. Iris and palm print recognitions...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Cuckoo Search Algorithm for Speech Recognition

    Cuckoo search is one of the recent optimization algorithms in the league of nature based algorithm whose results are better than the PSO and ACO optimization algorithms. This paper is based on cuckoo search or cuckoo algorithm. Cuckoo Search (CS) is heuristic search algorithm which is inspired by the reproduction...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Survey Enhancement of Modified DSR Protocol For Removal and Detection of Selective Black Hole Attack in MANET

    A black hole attack in ad hoc network refers to an attack by malicious nodes, which forcibly acquires the route from a source to destination by falsely advertising shortest hop count to reach the destination node. In this paper, the authors present a Modified Dynamic Source Routing protocol (MDSR) to...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Multi Resonant Stacked Micro Strip Patch Antenna Designs for IMT, WLAN & WiMAX Applications

    In this paper, stacked multi resonant slotted Micro strip Patch Antennas (MPA) have been proposed which are suitable to be used for GSM, WLAN standard and WiMAX applications. The antennas have been designed using substrate of FR4 material. In the designed antennas, substrates having different thickness have been used. The...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Survey on Techniques for Cross Platform Mobile Application Development

    Smartphone is used by most of the population. Over thousands of applications are used daily and a new application gets launched as per need. In order to do work on phones itself many desktop applications are getting converted to mobile version by developers. And their real challenges to market are...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Oct 2014

    Estimation of PAPR Reduction in OFDM Using Modified DCT-SLM

    Orthogonal Frequency Division Multiplexing (OFDM) could be a digital transmission methodology developed to fulfill the increasing demand for higher information rates in communications which may be utilized in each wired and wireless environments. This paper describes the difficulty of the height to Peak-to-Average Power Ratio (PAPR) in OFDM that could...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Energy and Transmission Rate Aware Timeserving Routing in Wireless Sensor Network

    Timeserving routing has been implemented to minimize the energy consumption and to improve delivery ratio and packet ratio. The packets are forwarded through the higher priority nodes later lower priority nodes are discarded. Timeserving routing has been explored to extend the network throughput and minimize the energy consumption. Mainly to...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Data Integrity Proof for Cloud Storage

    Cloud computing has been envisioned as the paramount solution to the rising storage device costs of IT enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves expensive for enterprises or individual users to frequently update their...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    A New Clustering Validity Index for Fuzzy C Means Algorithm Based on Measure Of Disparity

    Cluster validity indexes have been used to evaluate the fitness of partitions produced by clustering algorithms. This paper presents a new validity index for fuzzy clustering called Inter-Cluster and Intra-Cluster Separation (IC2S) index. Therefore, the authors proposed the function of disparity which combines the intra and inter-cluster separation existing between...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Reducing Decryption Time of NTLM Hash Using Rainbow Tables

    The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Using passwords and password management routines for giving access rights is a technique that is as quite old. The use of such weak hash functions...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Performance Metric Comparison of Routing Protocols in Ad Hoc Wireless Multi-Hop Networks Using NS2

    In this paper, the authors present AntHocNet routing algorithm for Ad Hoc Wireless Multi-hop Networks (AHWMNs). AHWMNs are communication networks that consists of mobile wireless nodes placed together with minimal or no prior planning. Establishing and maintaining reliable paths between source and destination in such network is very difficult because...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Capacity & Performance Comparison of SISO and MIMO System for Next Generation Network (NGN)

    The world always wants to use a better wireless network that's why it always needs to be improved. Due to limited range, capacity and data rates of these wireless devices a MIMO (Multiple-Input Multiple-Output) system is introduced to overcome these limitations. This paper is aimed at studying the performance analysis...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Quality-Improved Gray Scale Image Using Pseudo-Randomized Visual Cryptography Algorithum With Sigmoid Function

    Security has gained a lot of importance as information technology is widely used. Cryptography refers to the study of mathematical techniques and related aspects of information security like data confidentiality, data Integrity, and of data authentication. Visual Cryptography (VC) is a process where a secret image is encrypted into shares...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Rotation, Scale and Font Invariant Character Recognition System using Neural Networks

    It is observed that the text extraction suffers from the drawback of size and rotation of the text appeared on the images and the scanning device has to be focused on the textual area of the image. This engages the person using the application software. However, this can be automated...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Efficient Route Selection Algorithm Design for Industrial Sensor Networks

    Improving reliability and energy efficiency is an important consideration in the industrial sensor networks. Due to the limited energy and communication ability of sensor nodes, it seems especially important to design a routing protocol for IWSNs so that sensing data can be transmitted to the receiver effectively. In this paper,...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Palmprint Authentication Based on Gabor Wavelet Using Sliding Window Approach

    A biometric system is a pattern recognition system that recognizes a person on the basis of the physiological or behavioral characteristics that the person possesses. There is increasing interest of researchers in the development of fast and accurate personal recognition systems. In this paper, the authors are using palmprint for...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    A Survey on Efficient Handover Procedure in Proxy Mobile Ipv6 Networks

    Proxy Mobile IPv6 (PMIPv6) is the NETwork-based Localized Mobility Management (NETLMM) protocol where access network supports the mobility of a mobile node on behalf of the mobile nodes. Yet PMIPv6 decreases the signaling overhead and handover latency, however it suffers from a packet loss issue and extend authentication latency through...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    A Survey on Co-existence Mechanisms in WLAN and WPAN Devices

    Wireless technologies have experienced an enormous growth in the last decades. The Wireless Personal Area Networks (WPANs) and Wireless Local Area Networks (WLANs) are heterogeneous networks which are used in different applications. Two networks, called Wi-Fi (IEEE 802.11 WLAN) and ZigBee (IEEE 802.15.4 WPAN), which operates in 2.4GHz frequency. Spectrum...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Analyzing the Performance of Routing Protocols for Multicasting and Group Communication in Mobile Ad-hoc Network

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile terminals that are able to dynamically form a temporary network without any aid from fixed infrastructure or centralized administration. In recent years, MANETs are continuing to attract the attention for their potential use in several fields such as...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    An Energy Efficient Multi-sink Clustering Based Weighted Rendezvous Planning Method for Wireless Sensor Networks

    With the fast development of the Internet, wireless communications has received significant attention. Wireless sensors networks are equipped with tiny, irreplaceable batteries and therefore it is necessary to design energy efficient algorithms to prolong the network lifetime. In Wireless Sensor Networks (WSNs), the sink mobility along a constrained path can...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Performance Evaluation of WiMAX Network under Various Modulation Techniques using Various Versions of TCP

    Worldwide interoperability for Microwave Access (WiMAX) is based on 802.16d/e Orthogonal Frequency Division Multiplexing (OFDM) based adaptive PHYsical layer (PHY) layer. It provides wireless broadband to fixed and mobile terminals. Modulation techniques enable WiMAX to optimize. WiMAX supports BPSK, DPSK, 16-QAM and 64-QAM. This paper parents the evaluation of various...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Energy Sucker Identifier and Energy Maximization in Wireless Networks

    In recent trend wireless networks place a vital role and tends to different security threat. The proposal considers a new class of resource consumption attacks which is defined as vampire attacks, not clearly defined earlier in routing protocols. The existing system used rate limiting and revocation methods to prevent energy...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Survey on WiMAX Technology and its Protocol-A Review

    High data rate services, multimedia applications and, in general, high quality information streams are now-a-days demanded by a larger and larger number of consumers. Wireless communications are expanding their field of action since they allow to obtain performances comparable to the cabled solutions, but with less costs in infrastructures and...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    A Novel Technique to Improve the Performance of Wireless Sensor Network using Adaptive Antennas and High-Altitude Platform

    In this paper, the concentric ring antenna array is developed to improve the communications link in wireless sensor networks. This technique is applied to the new Stratospheric aerial Platform (SP) infrastructure for sensor networks. An adaptive current feeding for the array is applied. The simulation results show the possibility of...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Compatibility Issues and Challenges in 802.11g Implementation: A Review

    In this paper, emphasis is laid on the understanding of 802.11g systems by studying the compatibility and design challenges of the system. Practically these systems pose some configurational security implementation problems, which are to be understood to the fullest. The energy drain topological issues in are studied and some solutions...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Refactoring Framework for Instance Code Smell Detection

    Code and design smells are the indicators of potential problems in code. They may obstruct the development of a system by creating difficulties for developers to fulfill the changes. Detecting and resolving code smells, is time-consuming process. Many number of code smells have been identified and the sequences through which...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    A Novel Approach to Enhanced Security in Public Cloud: Using LDAP Protocol

    The modern appearance of cloud computing has considerably changed everyone's view of infrastructure architectures, software release and progress models. Projecting as an advancement step, following the transition from mainframe computers to client/server deployment models, cloud computing include elements from utility computing, grid computing and autonomic computing, into modern deployment architecture....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Palliating Energy Diminution Attacks in WSN

    Network survivability is the ability of a network maintenance associated with loss and interferences, which is a main apprehension to the intend and intend analysis of wireless ad-hoc sensor networks. Ad-hoc low power wireless networks are in inquest in both discriminating and omnipresent computing. The projected technique proposes regarding energy...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Document Faxing Through Mobicloud using Android

    In this paper, the authors discuss about the software which is developed for the Android mobile devices for widely used in the business fields as well as users day to day life activities. In this era of paperless offices and digital documents, users think the paper and ink fax machine...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Energy Renewal Approach in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) monitor the environmental conditions that can be used for various applications. They are often encumbered with limited battery energy. Thus, the network lifetime is widely regarded as the performance constriction. Wireless power transfer offers the possibility to remove this performance constriction thus allowing the sensor to...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Survey on Routing in Multihop Wireless Networks Using Micropayment Schemes

    In a Multihop Wireless Network (MWN), the packets from a source node are relayed through a large number of intermediate nodes before they are delivered to the destination. But such relaying of other's packets will consume valuable resources of these intermediate nodes such as their energy and computing power. Hence...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    A New Proposed Technique to Prevent NAV Attack in MACA Protocol

    The performance of Ad-hoc network is calculated by the number of packets successfully delivered to the destination. In multi-hop wireless networks, every node acts as middle node to forward packets to other nodes. To increase the overall network performance, number of packets delivered to the destination successfully must be increased....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Novel Remote Rendering and Monitoring on Persistent Mobile Cloud

    Cloud computing that offers data management services are emerging. Many mobile applications retrieve content from remote servers. The cloud and mobile serves as the new computing platforms for resource sharing via web. It converges into powerful cloud-mobile computing platform. Here the personal data with various Meta info structures that comes...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Data-Warehousing on Cloud Computing

    The authors' everyday data processing activities create massive amounts of data. Cloud computing has emerged as a new paradigm for hosting and delivering services over the internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning and allows enterprises to...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs

    Routing in Mobile Ad-hoc NETworks are vulnerable to malicious traffic analysis, harmful attackers can mitigate paths and malicious intermediate nodes breaks security, ineffective reserve of available resources (utilization of bandwidth) in node causes losses and as well as anonymity, unobservability of communication is not provided. To detect misbehaviors and effective...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Secure Secret Key (SSK) Generation Algorithm for Multimedia Multicast Networks

    In the multimedia applications messages like audio and video messages are broadcasted through groups. To provide secrecy of those keys which are used in this communication, the methods like key generation and the key distribution among these groups should be done in a secure way. The problems due to this...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Routing Issues for Trust Based Framework in Mobile Ad Hoc Networks

    The execution and survival of ad hoc networks depends on cooperative and trusting nature of the distributed nodes. There is a common assumption in the routing protocols that all nodes are trustworthy and cooperative. However, this naive dependency on intermediate nodes makes the ad hoc networks vulnerable to passive and...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Efficient Broadcast Algorithms to Reduce Number of Transmission Based on Probability Scheme

    Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic. In the static approach, algorithms determine the status (forwarding/nonforwarding) of each node proactively based on local topology information and a globally known priority function. In the dynamic approach, local algorithms determine the status of each...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Security and Privacy in Emerging Wireless Networks with Mobile Sinks

    Mobile Sinks (MSs) are more significant in many Wireless Sensor Network (WSN) applications for well-organized data gathering and for unique and revoking compromised sensors. Mobile sinks are act as intermediate node. However, in sensor networks that make use of pairwise key establishment and authentication between sensor nodes and mobile sinks....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Combating Sybil Attacks using SybilGuard

    In this paper, the authors present a Sybil Guard, for combating against Sybil attacks without relying on a trusted central authority. Peer-To-Peer and other decentralized, distributed systems are known to be particularly open to Sybil attacks. In a Sybil attack, a malicious user obtains multiple fake identities and pretends to...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Survey on Data Sharing and Re-Encryption in Cloud

    Cloud storage helps enterprises and government agencies significantly reduce their financial overhead of data management, since they can now archive their data backups remotely to third-party cloud storage providers rather than maintain data centers of their own. Security concerns become relevant as the authors outsource the storage of possibly sensitive...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Link Stability and Energy Optimization by Excluding Self node for Mobile and Wireless Networks

    Mobile Ad-hoc NETworks (MANETs) have more popularity among mobile network devices and wireless communication technologies. A MANET is multihop mobile wireless network that have neither a fixed infrastructure nor a central server. Every node in a MANET will act as a router, and also communicates with each other. The mobility...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures

    The extensive use of e-commerce creates new ways for both image and brands to be attacked. Attackers use various gimmicks and techniques to find various loopholes in the system. While there has been good ways to identify threats, educating customers and identifying countermeasures. Attacks on customer sensitive information has the...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    A Survey on Different Fingerprint Recognition Systems

    In this paper, the authors are comparing various fingerprint recognition system which are based on minutiae and ridge feature extraction. Here they are comparing various methods using minutiae features only or ridge features only or using both the methods together. This paper shows the direction for future scope on advancement...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Fast distribution of Data in Wireless Sensor Network using Concurrency Operation

    Wireless Sensor Network can be applied in verity of applications in real time. Efficient data dissemination enables parameter reconfiguration, network reprogramming, security holes patching, software bug fixing and etc. The current dissemination protocols use network coding techniques to face the packet losses. The coding overhead is the bottleneck in dissemination...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Review of Password Protecting Mechanism

    In the online communication, the password has an important role to secure user personal details. These passwords are taken to be secure and it must be retain personally. The third person may take a password without knowledge of original user and they may do any fraudulent activities on the victim's...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Concert Augmentation in Cognitive Radio System with OFDM and Beamforming Technique for Data Communication

    Cognitive Radio is a proficiency that enables the cognitive users (secondary users) to stumble on white space (unused spectrum) in the primary user's spectrum band and allowing them to make exploit of the detected spectrum of data transmission. As soon as the white space has been recognized, it will be...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Improving P2P Performance by Applying Proper Replica Placement Strategies

    One among the several emerging distributed computing systems is Peer-To-Peer (P2P) systems that provide a platform for large internet scale distributed applications, with no dedicated infrastructure, develops distributed applications by dividing them across individual systems termed peers which takes the role of both client as well as servers. Popularity of...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    The Efficient Load Balancing in The Parallel Computer

    Recently CPU workload hardware technology and multiprocessor service are developing rapidly. Mathematically computation must be completed within a certain time period .Through the mathematical analysis, the authors' study identify various useful result that should be interest in system designer .If all the parallel computer are not same type means not...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    An Overview & Analysis Safety Proposal And Policies Of Internet Network Safety

    Now-a-days network safety is very crucial and protected opinion, to determine virus. The review of the process of network safety policies to the private network connected to the internet & information networks. The network safety define such as like emphasis on an e-business, sound network safety, computer system safety as...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    Improvement on Multi Group-Leach Protocol of Wireless Sensor Network

    Communication is the major cause of energy depletion in the wireless sensor network, so designing of energy efficient routing algorithm is one of the key challenges that need to be addressed for extending life time of network. This paper studies the MGLEACH and puts forward some improvements to it. The...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    A Study Of Different Attacks In Manet And Discussion About Solutions Of Black Hole Attack On Aodv Protocol

    MANETs are gaining popularity now days due to flexibility and communication without the infrastructure or centralized access point. The dynamic changing nature of network topology makes any node in MANET to leave and join the network at any point of time. From a security design perspective, MANETs have no clear...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    Balanced Window Size Allocation Mechanism for Congestion Control of Transmission Control Protocol Based on Improved Bandwidth Estimation

    TCP is the widely used protocol for its reliable data communication over the network. Though it is used for enabling communication over the large network, it has some incapability in handling continues data transmission with reduced congestion over the internet. One of the most problems of TCP is fixing window...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    Open-Source Network Simulation Tools: An Overview

    In the network research area, implementation of a whole network in real world is not easily possible because establishing of network in a real world is very difficult. A single test bed containing multiple networked computers, routers and data links to validate and verify a certain network protocol or a...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    A Design of an Efficient, Robust, Autonomous and a Well Coordinated Distributed Network Monitory System for Large Computer Networks

    Information security assurance over networks is one of the key major issues facing the network infrastructure of organizations and information systems in today's world. Data security and access control to information are issues of great importance in large scale networks. Network performance tracking and tracking of malicious activities over networks...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    Automatic Wireless Attendance Recording and Management Using Near Field Communication (NFC)

    In this world of automation, there is a continuous need for the constant evolution and up gradation of the existing mechanisms. There is an urge for automation wherein people do less work and machines do more. This paper aims at providing a user friendly and automated way of attendance entry...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    Sensor-Network Based Intelligent Water Quality Monitoring and Control

    Water quality monitoring has become a crucial question around the whole world. Traditionally, remote water sensing based on satellites is widely used to monitor the water quality for rivers, lakes, seas and oceans. Recent advances in communication technology, especially wireless sensor networks have inspired numerous remote sensing and control applications....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Network Security Protocol with Cryptography and RFID System

    Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique, in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both process "Encryption" and "Decryption") is widely used...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Investigation on Performance of Trust Based Model and Trust Evaluation of Reactive Routing Protocols in MANET

    In this paper, the authors investigate and implementing trust based route selection in mobile wireless ad hoc networks. A system that stores and updates trust values for nodes encountered in Mobile Ad-hoc NETworks. Since a route consists of many nodes that are grouped, different strategies for evaluation of routes based...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Improving the Efficiency of Ranked Keyword Search Over Cloud Data

    In this paper, the authors define and solve the effective yet secure ranked keyword search over encrypted cloud data. They used order preserving symmetric encryption to protect the cloud data. Even though there are lots of searching techniques available, they are not giving efficient search results. For example the search...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Cloud Computing: An Architecture, Its Security Issues & Attacks

    Every day new things are added in old and those things should have to be preserve for managing the future, new things are always come with the major question that where should keep the things safely? This concept is applicable for both the regular household things as well as the...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Preamplification of Signal Between Satellites

    Inter-satellite communication is the process of transmitting information between satellites. Optical communication in inter-satellite system involves the process of transmitting information with light as carrier wave. While transmitting information due to some noises or any other external factors some losses may occur. In this paper, the reduction in nose by...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    A Survey on Data Aggregation Techniques for Wireless Sensor Networks

    Wireless Sensor Network is an area of growing interest in which recent advancements in the field of sensing, computing and communication attracted various research efforts. Limitations of sensors involve power consumption, computation as well as communication capability. Data aggregation is one practical solution of constraint of power consumption. Various data...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Prediction Based Data Collection in Wireless Sensor Network

    A Wireless Sensor Network is a network that is made of hundreds or thousands of sensor nodes which are densely deployed in an unattended environment with the capabilities of sensing, wireless communications and computations which collects and disseminates environmental data. For many applications in Wireless Sensor Networks, users may want...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    An Efficient Sharing of Personal Health Records Using DABE in Secure Cloud Environment

    Cloud computing has emerged as one of the most influential paradigms in the IT industry for last few years. Normally data owners and service providers are not in the same trusted domain in cloud computing. Personal Health Record (PHR) is an emerging patient-centric model of health information exchange, which is...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    A Survey on AODV Routing Protocol for AD-HOC Network

    Now-a-days, ad-hoc network has become an indivisible part for communication for mobile devices. There are different types of topology for implementation of ad-hoc network. AODV is one of them which are a reactive protocol that react on demand. Security occurs in every kind of network for protecting from various attacks....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage

    Cloud computing is the emerging technology and also it requires strong security when dealing with public cloud data. Cloud access control is one of the security requirements. The basic security requirements for cloud storage are Authentication, authorization and access control. There are various access control scheme available for cloud storage....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    FGEST: Finger Tracking and Gesture Recognition in Smartphones

    Recent advances in mobile processors have made complex calculations possible and feasible in Smartphones. Taking advantage of these developments, the authors aim to develop a gesture recognition application that can recognize finger movements effectively in a variety of lighting conditions and perform corresponding actions. This enables them to incorporate a...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology