International Journal of Advanced Research in Computer Engineering & Technology

Displaying 1-40 of 898 results

  • White Papers // Sep 2014

    Energy and Transmission Rate Aware Timeserving Routing in Wireless Sensor Network

    Timeserving routing has been implemented to minimize the energy consumption and to improve delivery ratio and packet ratio. The packets are forwarded through the higher priority nodes later lower priority nodes are discarded. Timeserving routing has been explored to extend the network throughput and minimize the energy consumption. Mainly to...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Data Integrity Proof for Cloud Storage

    Cloud computing has been envisioned as the paramount solution to the rising storage device costs of IT enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves expensive for enterprises or individual users to frequently update their...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    A New Clustering Validity Index for Fuzzy C Means Algorithm Based on Measure Of Disparity

    Cluster validity indexes have been used to evaluate the fitness of partitions produced by clustering algorithms. This paper presents a new validity index for fuzzy clustering called Inter-Cluster and Intra-Cluster Separation (IC2S) index. Therefore, the authors proposed the function of disparity which combines the intra and inter-cluster separation existing between...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Reducing Decryption Time of NTLM Hash Using Rainbow Tables

    The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Using passwords and password management routines for giving access rights is a technique that is as quite old. The use of such weak hash functions...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Performance Metric Comparison of Routing Protocols in Ad Hoc Wireless Multi-Hop Networks Using NS2

    In this paper, the authors present AntHocNet routing algorithm for Ad Hoc Wireless Multi-hop Networks (AHWMNs). AHWMNs are communication networks that consists of mobile wireless nodes placed together with minimal or no prior planning. Establishing and maintaining reliable paths between source and destination in such network is very difficult because...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Capacity & Performance Comparison of SISO and MIMO System for Next Generation Network (NGN)

    The world always wants to use a better wireless network that's why it always needs to be improved. Due to limited range, capacity and data rates of these wireless devices a MIMO (Multiple-Input Multiple-Output) system is introduced to overcome these limitations. This paper is aimed at studying the performance analysis...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Quality-Improved Gray Scale Image Using Pseudo-Randomized Visual Cryptography Algorithum With Sigmoid Function

    Security has gained a lot of importance as information technology is widely used. Cryptography refers to the study of mathematical techniques and related aspects of information security like data confidentiality, data Integrity, and of data authentication. Visual Cryptography (VC) is a process where a secret image is encrypted into shares...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Rotation, Scale and Font Invariant Character Recognition System using Neural Networks

    It is observed that the text extraction suffers from the drawback of size and rotation of the text appeared on the images and the scanning device has to be focused on the textual area of the image. This engages the person using the application software. However, this can be automated...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Efficient Route Selection Algorithm Design for Industrial Sensor Networks

    Improving reliability and energy efficiency is an important consideration in the industrial sensor networks. Due to the limited energy and communication ability of sensor nodes, it seems especially important to design a routing protocol for IWSNs so that sensing data can be transmitted to the receiver effectively. In this paper,...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Palmprint Authentication Based on Gabor Wavelet Using Sliding Window Approach

    A biometric system is a pattern recognition system that recognizes a person on the basis of the physiological or behavioral characteristics that the person possesses. There is increasing interest of researchers in the development of fast and accurate personal recognition systems. In this paper, the authors are using palmprint for...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    A Survey on Efficient Handover Procedure in Proxy Mobile Ipv6 Networks

    Proxy Mobile IPv6 (PMIPv6) is the NETwork-based Localized Mobility Management (NETLMM) protocol where access network supports the mobility of a mobile node on behalf of the mobile nodes. Yet PMIPv6 decreases the signaling overhead and handover latency, however it suffers from a packet loss issue and extend authentication latency through...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    A Survey on Co-existence Mechanisms in WLAN and WPAN Devices

    Wireless technologies have experienced an enormous growth in the last decades. The Wireless Personal Area Networks (WPANs) and Wireless Local Area Networks (WLANs) are heterogeneous networks which are used in different applications. Two networks, called Wi-Fi (IEEE 802.11 WLAN) and ZigBee (IEEE 802.15.4 WPAN), which operates in 2.4GHz frequency. Spectrum...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Analyzing the Performance of Routing Protocols for Multicasting and Group Communication in Mobile Ad-hoc Network

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile terminals that are able to dynamically form a temporary network without any aid from fixed infrastructure or centralized administration. In recent years, MANETs are continuing to attract the attention for their potential use in several fields such as...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    An Energy Efficient Multi-sink Clustering Based Weighted Rendezvous Planning Method for Wireless Sensor Networks

    With the fast development of the Internet, wireless communications has received significant attention. Wireless sensors networks are equipped with tiny, irreplaceable batteries and therefore it is necessary to design energy efficient algorithms to prolong the network lifetime. In Wireless Sensor Networks (WSNs), the sink mobility along a constrained path can...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Performance Evaluation of WiMAX Network under Various Modulation Techniques using Various Versions of TCP

    Worldwide interoperability for Microwave Access (WiMAX) is based on 802.16d/e Orthogonal Frequency Division Multiplexing (OFDM) based adaptive PHYsical layer (PHY) layer. It provides wireless broadband to fixed and mobile terminals. Modulation techniques enable WiMAX to optimize. WiMAX supports BPSK, DPSK, 16-QAM and 64-QAM. This paper parents the evaluation of various...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Energy Sucker Identifier and Energy Maximization in Wireless Networks

    In recent trend wireless networks place a vital role and tends to different security threat. The proposal considers a new class of resource consumption attacks which is defined as vampire attacks, not clearly defined earlier in routing protocols. The existing system used rate limiting and revocation methods to prevent energy...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Survey on WiMAX Technology and its Protocol-A Review

    High data rate services, multimedia applications and, in general, high quality information streams are now-a-days demanded by a larger and larger number of consumers. Wireless communications are expanding their field of action since they allow to obtain performances comparable to the cabled solutions, but with less costs in infrastructures and...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    A Novel Technique to Improve the Performance of Wireless Sensor Network using Adaptive Antennas and High-Altitude Platform

    In this paper, the concentric ring antenna array is developed to improve the communications link in wireless sensor networks. This technique is applied to the new Stratospheric aerial Platform (SP) infrastructure for sensor networks. An adaptive current feeding for the array is applied. The simulation results show the possibility of...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Compatibility Issues and Challenges in 802.11g Implementation: A Review

    In this paper, emphasis is laid on the understanding of 802.11g systems by studying the compatibility and design challenges of the system. Practically these systems pose some configurational security implementation problems, which are to be understood to the fullest. The energy drain topological issues in are studied and some solutions...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Refactoring Framework for Instance Code Smell Detection

    Code and design smells are the indicators of potential problems in code. They may obstruct the development of a system by creating difficulties for developers to fulfill the changes. Detecting and resolving code smells, is time-consuming process. Many number of code smells have been identified and the sequences through which...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    A Novel Approach to Enhanced Security in Public Cloud: Using LDAP Protocol

    The modern appearance of cloud computing has considerably changed everyone's view of infrastructure architectures, software release and progress models. Projecting as an advancement step, following the transition from mainframe computers to client/server deployment models, cloud computing include elements from utility computing, grid computing and autonomic computing, into modern deployment architecture....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Palliating Energy Diminution Attacks in WSN

    Network survivability is the ability of a network maintenance associated with loss and interferences, which is a main apprehension to the intend and intend analysis of wireless ad-hoc sensor networks. Ad-hoc low power wireless networks are in inquest in both discriminating and omnipresent computing. The projected technique proposes regarding energy...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Confidentiality and Anonymity Strengthening To Prevent Intruders in Network

    In a variety of application domains such as patient medical records, social networking, electronic voting, business and personal applications researchers have also examined the significance of anonymity. The secure sum allowing parties to work out the sum of their individual inputs devoid of disclosing the inputs to each another helps...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Android Mobile Based Home Automation Using Bluetooth

    In this paper, the authors present the overall design of Home Automation System (HAS) with low cost and wireless remote control. This system is designed to assist and provide support in order to fulfill the needs of elderly and disabled in home. Also, the smart home concept in the system...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Security in Mobile Ad Hoc Networks

    Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wire line networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium,...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Packet Flow Analysis and Jitter Base Comparison of AODV,DSDV and AntHocNet Routing Algorithm

    Due to the convenient nature of the internet and the falling prices of mobile hand held devices, more computer users are choosing to communicate with different portable devices. These include 3G phones, laptops, any other device capable of exchanging information and videos. This increasing demand for internet raises the importance...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Extending the Multilevel Security for Pervasive Computing by using UPnP-UP Networks

    The Universal Plug and Play (UPnP) specification defines a set of protocols for promoting pervasive network connectivity of computers and intelligent devices or appliances. Now-a-days, the UPnP technology is becoming popular due to its robustness to connect devices and the large number of developed applications. One of the major drawbacks...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Sep 2014

    Performance of BER in MIMO-OFDM System

    The Multiple Input Multiple Output (MIMO) multiplies capacity by transmitting different signals over multiple antennas and Orthogonal Frequency Division Multiplexing (OFDM), which divides a radio channel into a large number of closely spaced sub channels to provide more reliable communication at high speeds. An arrangement of using MIMO-OFDM system gives...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Efficient Energy Conservation Algorithm for Mobile Sensor Nodes in Wireless Sensor Networks

    In this era, the wireless sensor networks have become more attractive for industrial applications, environmental monitoring, research units and so on. Coverage, delay and power management are the key constraints that degrade the performance of the wireless sensor networks. In this paper, the authors propose an energy efficient algorithm to...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Comparative Study of OSPFV3, IS-IS and OSPFV3_IS-IS Protocols Using OPNET

    As IPV6 is becoming popular day-by-day; due to its wide range of applications; and great hierarchy of IPs. But selecting the best protocol among available is found to be critical task. This paper includes Intermediate System to Intermediate System (IS-IS) and Open Shortest Path First V3 (OSPFV3) protocol and mentioned...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Hybridization of K-means and Harmony Search Method for Text Clustering Using Concept Factorization

    Huge amount of heterogeneous information is available on the web. Clustering is one of the techniques to deal with enormous amount of information. Clustering partitions a data set into groups where data objects in each group should exhibit large degree of similarity. Data objects with high similarity measure should be...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Analysis of Energy Efficient IEEE 802.11 MAC Protocol for Wireless Sensor Network

    Energy consumption in wireless sensor networks is one of the main challenges for researchers. Many researchers have been done for extending the overall network lifetime by minimizing the power consumption of sensor nodes. Most of the work is done over the MAC layer of network in which different kinds of...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Design and Implementation of Low Cost and High Energy Efficient Algorithm Using Swarm

    In ad-hoc network there are many problems which can be categorized as an optimization problem such as energy consumption, routing, localization and node deployment. These problems can be solved by using ant colony optimization swarm intelligence is one such class of ant colony optimization. Ant colony algorithm is inspired from...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Vehicular Network Handover Algorithm in Heterogeneous Environment (VNHAHE)

    As the people are in the era of wireless communication then vehicular communication is a major part of it. Multiple wireless access technologies i.e. Wi-Fi, WiMAX, UMTS and some advanced processor on device, make the device capable in communication. Normally an user can easily able to access the data from...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Mixed Integer Programming Model For The Vehicle Routing Problem With Time Windows Considering Avoiding Route

    The Vehicle Routing Problem (VRP) is a combinatorial optimization problem to specify a homogeneous set of vehicles and routes, in which each vehicle starts from a depot and traverses along a route in order to serve a set of customers with known geographical locations, and then finish its tour at...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Optimized Positioning Of Multiple Base Station for Black Hole Attack

    Wireless Sensor Network (WSN) consists of distributed autonomous sensors to monitor physical or environmental conditions, such as sound, temperature, pressure, etc. and to pass their data through the network to a main location. The modern networks are bi-directional. They also enable the control of sensor activity, so security is major...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Improving QoS by using Mobility Management Algorithm in Wireless Sensor Network

    Wireless sensor networks are expected to be one of the key enabling technologies in the next ten years protocols for such networks should be highly flexible because dynamic change in the network may leads to performance degradation of the network. However many recent applications make use of mobile sensor nodes,...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    A Dynamic Approach to Cloud Computing Security Over Cloud of Clouds

    The convention of cloud computing has increased promptly in the society. Cloud computing have many benefits in terms of accessibility of data and low expenditure. A fundamental characteristic of the cloud services is that user's data are usually processed remotely in unknown machines that users do not operate. It can...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    A Survey of VANETs: The Platform for Vehicular Networking Applications

    Vehicular Ad-hoc NETworks (VANETs) is a promising approach to the dissemination of spatio-temporal information such as the current traffic condition of a road segment or the availability of a parking breathing space. As a result of the constraint of the communication information measure, solely a restricted variety of knowledge things...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Aug 2014

    Modified Apriori Approach for Evade Intrusion Detection System

    Intrusion Detection System (IDS) is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network. A set of rules are used by signature based Intrusion Detection Systems (IDS) to detect hostile traffic in network segments or packets, which are so...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Document Faxing Through Mobicloud using Android

    In this paper, the authors discuss about the software which is developed for the Android mobile devices for widely used in the business fields as well as users day to day life activities. In this era of paperless offices and digital documents, users think the paper and ink fax machine...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Energy Renewal Approach in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) monitor the environmental conditions that can be used for various applications. They are often encumbered with limited battery energy. Thus, the network lifetime is widely regarded as the performance constriction. Wireless power transfer offers the possibility to remove this performance constriction thus allowing the sensor to...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Survey on Routing in Multihop Wireless Networks Using Micropayment Schemes

    In a Multihop Wireless Network (MWN), the packets from a source node are relayed through a large number of intermediate nodes before they are delivered to the destination. But such relaying of other's packets will consume valuable resources of these intermediate nodes such as their energy and computing power. Hence...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    A New Proposed Technique to Prevent NAV Attack in MACA Protocol

    The performance of Ad-hoc network is calculated by the number of packets successfully delivered to the destination. In multi-hop wireless networks, every node acts as middle node to forward packets to other nodes. To increase the overall network performance, number of packets delivered to the destination successfully must be increased....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Novel Remote Rendering and Monitoring on Persistent Mobile Cloud

    Cloud computing that offers data management services are emerging. Many mobile applications retrieve content from remote servers. The cloud and mobile serves as the new computing platforms for resource sharing via web. It converges into powerful cloud-mobile computing platform. Here the personal data with various Meta info structures that comes...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Data-Warehousing on Cloud Computing

    The authors' everyday data processing activities create massive amounts of data. Cloud computing has emerged as a new paradigm for hosting and delivering services over the internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning and allows enterprises to...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Percentage Based Trust Model with Bandwidth Reservation Technique for Privacy Preserving Routing in MANETs

    Routing in Mobile Ad-hoc NETworks are vulnerable to malicious traffic analysis, harmful attackers can mitigate paths and malicious intermediate nodes breaks security, ineffective reserve of available resources (utilization of bandwidth) in node causes losses and as well as anonymity, unobservability of communication is not provided. To detect misbehaviors and effective...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Secure Secret Key (SSK) Generation Algorithm for Multimedia Multicast Networks

    In the multimedia applications messages like audio and video messages are broadcasted through groups. To provide secrecy of those keys which are used in this communication, the methods like key generation and the key distribution among these groups should be done in a secure way. The problems due to this...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Routing Issues for Trust Based Framework in Mobile Ad Hoc Networks

    The execution and survival of ad hoc networks depends on cooperative and trusting nature of the distributed nodes. There is a common assumption in the routing protocols that all nodes are trustworthy and cooperative. However, this naive dependency on intermediate nodes makes the ad hoc networks vulnerable to passive and...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Efficient Broadcast Algorithms to Reduce Number of Transmission Based on Probability Scheme

    Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic. In the static approach, algorithms determine the status (forwarding/nonforwarding) of each node proactively based on local topology information and a globally known priority function. In the dynamic approach, local algorithms determine the status of each...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Security and Privacy in Emerging Wireless Networks with Mobile Sinks

    Mobile Sinks (MSs) are more significant in many Wireless Sensor Network (WSN) applications for well-organized data gathering and for unique and revoking compromised sensors. Mobile sinks are act as intermediate node. However, in sensor networks that make use of pairwise key establishment and authentication between sensor nodes and mobile sinks....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Combating Sybil Attacks using SybilGuard

    In this paper, the authors present a Sybil Guard, for combating against Sybil attacks without relying on a trusted central authority. Peer-To-Peer and other decentralized, distributed systems are known to be particularly open to Sybil attacks. In a Sybil attack, a malicious user obtains multiple fake identities and pretends to...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Survey on Data Sharing and Re-Encryption in Cloud

    Cloud storage helps enterprises and government agencies significantly reduce their financial overhead of data management, since they can now archive their data backups remotely to third-party cloud storage providers rather than maintain data centers of their own. Security concerns become relevant as the authors outsource the storage of possibly sensitive...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Link Stability and Energy Optimization by Excluding Self node for Mobile and Wireless Networks

    Mobile Ad-hoc NETworks (MANETs) have more popularity among mobile network devices and wireless communication technologies. A MANET is multihop mobile wireless network that have neither a fixed infrastructure nor a central server. Every node in a MANET will act as a router, and also communicates with each other. The mobility...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures

    The extensive use of e-commerce creates new ways for both image and brands to be attacked. Attackers use various gimmicks and techniques to find various loopholes in the system. While there has been good ways to identify threats, educating customers and identifying countermeasures. Attacks on customer sensitive information has the...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    A Survey on Different Fingerprint Recognition Systems

    In this paper, the authors are comparing various fingerprint recognition system which are based on minutiae and ridge feature extraction. Here they are comparing various methods using minutiae features only or ridge features only or using both the methods together. This paper shows the direction for future scope on advancement...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Fast distribution of Data in Wireless Sensor Network using Concurrency Operation

    Wireless Sensor Network can be applied in verity of applications in real time. Efficient data dissemination enables parameter reconfiguration, network reprogramming, security holes patching, software bug fixing and etc. The current dissemination protocols use network coding techniques to face the packet losses. The coding overhead is the bottleneck in dissemination...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Review of Password Protecting Mechanism

    In the online communication, the password has an important role to secure user personal details. These passwords are taken to be secure and it must be retain personally. The third person may take a password without knowledge of original user and they may do any fraudulent activities on the victim's...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Concert Augmentation in Cognitive Radio System with OFDM and Beamforming Technique for Data Communication

    Cognitive Radio is a proficiency that enables the cognitive users (secondary users) to stumble on white space (unused spectrum) in the primary user's spectrum band and allowing them to make exploit of the detected spectrum of data transmission. As soon as the white space has been recognized, it will be...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Feb 2013

    Improving P2P Performance by Applying Proper Replica Placement Strategies

    One among the several emerging distributed computing systems is Peer-To-Peer (P2P) systems that provide a platform for large internet scale distributed applications, with no dedicated infrastructure, develops distributed applications by dividing them across individual systems termed peers which takes the role of both client as well as servers. Popularity of...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    The Efficient Load Balancing in The Parallel Computer

    Recently CPU workload hardware technology and multiprocessor service are developing rapidly. Mathematically computation must be completed within a certain time period .Through the mathematical analysis, the authors' study identify various useful result that should be interest in system designer .If all the parallel computer are not same type means not...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    An Overview & Analysis Safety Proposal And Policies Of Internet Network Safety

    Now-a-days network safety is very crucial and protected opinion, to determine virus. The review of the process of network safety policies to the private network connected to the internet & information networks. The network safety define such as like emphasis on an e-business, sound network safety, computer system safety as...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    Improvement on Multi Group-Leach Protocol of Wireless Sensor Network

    Communication is the major cause of energy depletion in the wireless sensor network, so designing of energy efficient routing algorithm is one of the key challenges that need to be addressed for extending life time of network. This paper studies the MGLEACH and puts forward some improvements to it. The...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    A Study Of Different Attacks In Manet And Discussion About Solutions Of Black Hole Attack On Aodv Protocol

    MANETs are gaining popularity now days due to flexibility and communication without the infrastructure or centralized access point. The dynamic changing nature of network topology makes any node in MANET to leave and join the network at any point of time. From a security design perspective, MANETs have no clear...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    Balanced Window Size Allocation Mechanism for Congestion Control of Transmission Control Protocol Based on Improved Bandwidth Estimation

    TCP is the widely used protocol for its reliable data communication over the network. Though it is used for enabling communication over the large network, it has some incapability in handling continues data transmission with reduced congestion over the internet. One of the most problems of TCP is fixing window...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    Open-Source Network Simulation Tools: An Overview

    In the network research area, implementation of a whole network in real world is not easily possible because establishing of network in a real world is very difficult. A single test bed containing multiple networked computers, routers and data links to validate and verify a certain network protocol or a...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    A Design of an Efficient, Robust, Autonomous and a Well Coordinated Distributed Network Monitory System for Large Computer Networks

    Information security assurance over networks is one of the key major issues facing the network infrastructure of organizations and information systems in today's world. Data security and access control to information are issues of great importance in large scale networks. Network performance tracking and tracking of malicious activities over networks...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    Automatic Wireless Attendance Recording and Management Using Near Field Communication (NFC)

    In this world of automation, there is a continuous need for the constant evolution and up gradation of the existing mechanisms. There is an urge for automation wherein people do less work and machines do more. This paper aims at providing a user friendly and automated way of attendance entry...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Apr 2013

    Sensor-Network Based Intelligent Water Quality Monitoring and Control

    Water quality monitoring has become a crucial question around the whole world. Traditionally, remote water sensing based on satellites is widely used to monitor the water quality for rivers, lakes, seas and oceans. Recent advances in communication technology, especially wireless sensor networks have inspired numerous remote sensing and control applications....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Network Security Protocol with Cryptography and RFID System

    Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique, in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both process "Encryption" and "Decryption") is widely used...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Investigation on Performance of Trust Based Model and Trust Evaluation of Reactive Routing Protocols in MANET

    In this paper, the authors investigate and implementing trust based route selection in mobile wireless ad hoc networks. A system that stores and updates trust values for nodes encountered in Mobile Ad-hoc NETworks. Since a route consists of many nodes that are grouped, different strategies for evaluation of routes based...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Improving the Efficiency of Ranked Keyword Search Over Cloud Data

    In this paper, the authors define and solve the effective yet secure ranked keyword search over encrypted cloud data. They used order preserving symmetric encryption to protect the cloud data. Even though there are lots of searching techniques available, they are not giving efficient search results. For example the search...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Cloud Computing: An Architecture, Its Security Issues & Attacks

    Every day new things are added in old and those things should have to be preserve for managing the future, new things are always come with the major question that where should keep the things safely? This concept is applicable for both the regular household things as well as the...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Preamplification of Signal Between Satellites

    Inter-satellite communication is the process of transmitting information between satellites. Optical communication in inter-satellite system involves the process of transmitting information with light as carrier wave. While transmitting information due to some noises or any other external factors some losses may occur. In this paper, the reduction in nose by...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    A Survey on Data Aggregation Techniques for Wireless Sensor Networks

    Wireless Sensor Network is an area of growing interest in which recent advancements in the field of sensing, computing and communication attracted various research efforts. Limitations of sensors involve power consumption, computation as well as communication capability. Data aggregation is one practical solution of constraint of power consumption. Various data...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    Prediction Based Data Collection in Wireless Sensor Network

    A Wireless Sensor Network is a network that is made of hundreds or thousands of sensor nodes which are densely deployed in an unattended environment with the capabilities of sensing, wireless communications and computations which collects and disseminates environmental data. For many applications in Wireless Sensor Networks, users may want...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    An Efficient Sharing of Personal Health Records Using DABE in Secure Cloud Environment

    Cloud computing has emerged as one of the most influential paradigms in the IT industry for last few years. Normally data owners and service providers are not in the same trusted domain in cloud computing. Personal Health Record (PHR) is an emerging patient-centric model of health information exchange, which is...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    A Survey on AODV Routing Protocol for AD-HOC Network

    Now-a-days, ad-hoc network has become an indivisible part for communication for mobile devices. There are different types of topology for implementation of ad-hoc network. AODV is one of them which are a reactive protocol that react on demand. Security occurs in every kind of network for protecting from various attacks....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    A Novel Role Based Cross Domain Access Control Scheme for Cloud Storage

    Cloud computing is the emerging technology and also it requires strong security when dealing with public cloud data. Cloud access control is one of the security requirements. The basic security requirements for cloud storage are Authentication, authorization and access control. There are various access control scheme available for cloud storage....

    Provided By International Journal of Advanced Research in Computer Engineering & Technology

  • White Papers // Mar 2013

    FGEST: Finger Tracking and Gesture Recognition in Smartphones

    Recent advances in mobile processors have made complex calculations possible and feasible in Smartphones. Taking advantage of these developments, the authors aim to develop a gesture recognition application that can recognize finger movements effectively in a variety of lighting conditions and perform corresponding actions. This enables them to incorporate a...

    Provided By International Journal of Advanced Research in Computer Engineering & Technology