International Journal of Advanced Research in Computer Science and Electronics Engineering

Displaying 1-40 of 58 results

  • White Papers // May 2014

    Cloud Disaster Management With Scheduling Strategy

    Cloud computing is one of today's most exciting technologies because of its capacity to reduce cost associated with computing while increasing flexibility and scalability. In the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing sectors of the IT industry....

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2014

    Vehicle Position and its Range Determination Based on GPS and GSM Communication System with Android Application

    In this paper the authors allow user to protect their vehicle against unauthorized entering. This paper divided into two main parts the first part is on-board unit that installed in the vehicle to sense if any person enter it and ask user to enter a password to turn on the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Reliable and Efficient Data Transfer with Minimum Drop and Recovery Mechanism Using LCM in Wireless Sensor Network

    A WSN can be defined as a network of devices, denoted as nodes, which can sense the environment and communicate the information gathered from the monitored field (e.g., an area or volume) through wireless links. The data is forwarded, possibly via multiple hops, to a sink that can use it...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Microprocessor Smart Cards for Centralizing Fare Collection in Public Services

    In today's world where public transit is the most commonly used and affordable means of transport. Dealing with it includes a lot of variables, especially at the time of payment. This problem is faced by almost every commuter in his/her daily routine. To address the problem, the authors propose centralizing...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    Secure Reversible Data Hiding with Image Encryption

    Reversible data hiding with image encryption is a technique, in which a secret data is embedded inside a confidential image in such a way that, at the receiver side, both the image and the data can be extracted without any loss. Existing data hiding methods embed data by vacating room...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    GMT(Graph Mining Techniques) for crime Detection and Comparison with the proposed algorithm

    Cybercrime is one of the leading threats to company confidential data and resources. Now-a-days the criminal activities through the Internet (like stock crime, sniffing, and bank fraud) and through the network are on large scale. If a person or entity is attempting to commit fraud or participate in some sort...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    An Efficient Application of Zigbee Technology in Lighting Control

    Now-a-days there are so many applications used in this system which are useful for saving energy and light control. Zigbee is 802.15.4 IEEE standard. The Zigbee is low-cost, low-power consumption, wireless mesh networking standards and it is designed for low power consumption allowing batteries to essentially last forever. Zigbee is...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2013

    A Study on Image Segmentation Using Different Types of K-Means Clustering

    Image segmentation is the process of partitioning a digital image into several set of pixels or regions. The major goal of the image segmentation is to make simpler or change the illustration of an image into somewhat meaningful. Numerous image segmentations method has been proposed to solve the image segmentation...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Oct 2013

    Opinions on Opinion Mining: A Survey

    Opinion mining is a fast growing topic with its various application being used by an individual or any large organization. Traditionally, individuals gather feedbacks from their near and dear ones before any purchase, while organization conducts various surveys to improve their services. The largest source of feedbacks, these days, internet...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2013

    A Valued Analysis of Information Security, Threats and Solutions for Cloud Computing

    Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2013

    How Can M-Commerce Be Safe and Secure? Empirical Analysis Of M-Commerce Security Factors

    In today's world, if any business person wants to extend his business and compete, he must follow the supporting activities provided by the well known potter-millers' value chain model. And M-commerce is one of those activities. In previous years, E-commerce is an essential part of successful business trend setup in...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2013

    Optimal Routing Service for Wireless Network Security and Management

    Wireless network environment poses its unique challenges to the existing transaction models which are fail to solve. Wireless Ad-hoc NETworks (WANETs) experience serious security issues even when solutions employ preventive or reactive security mechanisms. In order to support both network operations and security requirements of critical applications, the authors present...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2013

    Providing Security for ATMs Using Digital Image Processing for Abnormal Incident Detection

    In this paper, the authors designed by using PIR (Passive Infrared Radial) sensor to provide high security in ATMs. The sensor is basically a pyroelectric device. When the PIR is exposed to infrared radiation, it generates an electric charge. This electric charge triggers the camera. Camera starts capturing video, and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Enhancing Security Using Graphical Patterns Selection (ENSUGPS)

    The various forms of authentication methods have drawbacks since alphanumeric usernames and passwords can be easily hacked. Graphical passwords are the images or representation of images as passwords. These are easy to remember and also provide more security. Humans can easily remember picture than textual character. There are various graphical...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Cloud and Intelligent Based SCADA Technology

    Burden placed on municipal utilities continues to increase. Customers demand quick identification of problem and solutions. Regulatory organizations have strict compliance requirements and an unprecedented ability to levy fines. The media is eager to sensationalize security incidents or weaknesses in public and natural resources. Traditional SCADA system, which comprises expensive...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Distributed Denial of Service Attack Prevention Using Critical Link Method in Manet

    Mobile Ad-hoc NETwork (MANET) is self configuring network of mobile node connected by wireless links and considered as network without infrastructure. Routing protocol plays a critical role for efficient communication between mobile nodes and operates on the basic assumption that nodes are completely supportive. Because of open organization and restricted...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Data Mining: Techniques, Applications and Issues

    Data and information or knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. In this paper, the authors have focused a variety of techniques, approaches and different areas...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Frontline Techniques to Prevent Web Application Vulnerability

    Today web applications are becoming the prime target for cyber-attacks. Web attacks are growing in numbers, with most of organizations in a broad survey reporting that they had recently suffered web attacks. Last few years have shown a significant increase in the number of web-based attacks. Structured Query Language (SQL)...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Finger Print and Palm Print Based Multibiometric Authentication System with GUI Interface

    In this paper, a feature-level fusion framework to simultaneously protect multiple templates of a user as a single secure sketch is proposed. The contribution of the proposed work includes an embedded and extraction algorithm so as to reduce the computational complexity, processing time and storage space. A fusion algorithm to...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    A Model for Web Developer to Overcome the Cross Platform Dependency in Mobile Technologies

    Most web developers has problem in building native mobile applications, requiring varied knowledge, skills and forced to change their platform. The technology is growing rapidly and fast enough, for web developers, to keep them up to date with it. Cross-platform apps for mobile are also in use but they don't...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    Attacking Cloud Through Cache Based Side Channel in Virtualized Environment

    Emerging trends in computation such as cloud computing require that computation be carried out in remote and hostile environments, where attackers have unlimited access to the devices, the data and the programs. Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2012

    RFID, GPS & GSM Based Vehicle Tracing & Employee Security System

    A RFID, GPS & GSM based vehicle tracking and employee security system combines the installation of an electronic device in a vehicle, with purpose-designed computer software to enable the company to track the vehicle's location. In vehicle tracking systems the authors use Global Positioning System (GPS) technology for locating the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2012

    Network Intrusion Detection by Using PCA Via SMO-SVM

    As network attacks have increased in number and severity over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Nov 2012

    Enhancing System Security Using Patterns

    In this paper, the authors are suggesting a combined consideration of security design patterns and threat modeling for the enhancement of security in the software systems. Software security helps in building software without security holes thereby preventing the security issues. The best way to do this is to apply specific...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Nov 2012

    Novel Approach for Hybrid Intrusion Detection System

    Intrusion Detection System (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Basically this paper is to develop host based cum network based intrusion detection system for Microsoft Windows XP environment. Proposed concept that had used in this was applying intrusion detection rule...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Grid Computing and Cloud Computing: Description and Comparision

    In a basic grid computing system, every computer can access the resources of every other computer belonging to the network. In the ideal grid computing system, every resource is shared, turning a computer network into a powerful supercomputer. It's a special kind of distributed computing. In distributed computing, different computers...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Security Issue on Aodv Routing Protocol Suffering From Blackhole Attack

    An ad-hoc network is a collection of mobile nodes that dynamically form a temporary network and are infrastructure less. This paper deals with security issues when AODV(Ad-hoc On-demand Distance Vector) protocol suffering from Blackhole attack BAODV (Bad Ad-hoc On-demand Distance Vector) routing suffering Blackhole attack, which can simulate blackhole attack...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Energy Efficient and Secured Routing

    Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. Wireless Sensor Networks (WSNs) have been increasingly available for large-scale applications in which energy efficiency &, security is an important performance measure. Driven by the energy...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Gleaming the Cloud in the Virtualization Layer

    Cloud computing is a powerful and flexible software environment, which delegates the material's management and in which users pay as they go. Rather than operating their own data centers, today cloud users run their applications on the remote cloud infrastructures that are owned and managed by cloud providers. Cloud users...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Which Cloud Service Provider Should I Opt for??? a Comparative Study of the Various Cloud Service Providers Along with the Focus on Various Techniques for Optimal Service Selection

    In today's world, cloud computing has generated a lot of interest and competition in the industry. With the emergence of new cloud Providers, identifying one that best suits the business needs of an enterprise is a challenging and difficult task. For to a novice or user with little knowledge about...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Security Threats to Data Mining and Analysis Tools of TIA Program

    Data mining is the process that attempts to discover patterns in large data sets. The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns such as groups of data records i.e. cluster analysis, unusual records (anomaly detection) and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Performance and Analysis of DS-CDMA Rake Receiver and Analyzing the BER Performance in Presence of Nonlinear Distortion in DS-CDMA System

    In this paper analysis the performance of a CDMA system by varying the system parameters. CDMA is a popular technology in cellular system due to its superior capacity and performance. In conventional CDMA, obtained better signal to noise ratio by using matched filter because of this rake receiver is used...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Survey of Energy Efficient Multicast Routing Protocols in Manet

    Although establishing correct and efficient routes is an important design issue in Mobile Ad hoc NETworks (MANETs), a more challenging goal is to provide energy efficient routes because mobile nodes' operation time is the most critical limiting factor. This paper surveys and analyses the energy aware routing protocols proposed for...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Grid Scheduling Using PSO With SPV Rule

    Grid computing can be defined as applying the resources of many computers in a network to a problem which requires a great number of computer processing cycles or access to large amounts of data. However, in the field of grid computing scheduling of tasks is a big challenge. The task...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    An Evaluation of Ad-Hoc Routing Protocols for Wireless Sensor Networks

    Wireless mobile ad-hoc networks are characterized as network of nodes without any physical connections. In these types of networks there is no fixed topology due to the mobility of nodes, interference, multipath propagation, environmental conditions and path loss. The purpose of this paper is to study, understand, analyze and discuss...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Improved K-Means Clustering Technique Using Distance Determination Approach

    Powerful systems for collecting data and managing it in large databases are in place in all large and mid-range organizations. The value of raw data (collected over a long time) is on the ability to extract high-level information: information useful for decision support, for exploration, and for better understanding of...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Optimization of DE Jong's Function Using Genetic Algorithm Approach

    Genetic algorithm is a search algorithm based on the mechanics of natural selection and natural genetics. The purpose of this paper is to optimize/maximize de Jong's function1 in GA using different selection schemes (like roulette wheel, random selection, besy fit/elitist fit rank selection, tournament selection). For the people's problem the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    A Compression Algorithm for Optimization of Storage Consumption of Non Oracle Database

    Relational database are very important in satisfying today's information needs. This paper aims at optimization of storage consumption of non oracle database with the table compression algorithm of oracle 11g. Many concepts have been developed for compressing of relational database. But no concepts ever talked about the technique of compression...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Concise Representation of Multi-Level Association Rules Using MinMax Exact Rules

    Association Rule mining plays an important role in the discovery of knowledge and information. Association Rule mining discovers huge number of rules for any dataset for different support and confidence values, among this many of them are redundant, especially in the case of multi-level datasets. Mining non-redundant Association Rules in...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    DWT Based Copy-Move Image Forgery Detection

    In an age with digital media, it is no longer true that seeing is believing. In addition, digital forgeries, can be indistinguishable from authentic photographs. In a copy-move image forgery, a part of an image is copied and then pasted on a different location within the same image. In this...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jun 2012

    An Overview of Techniques for Framework of Finger Stamping

    There are many, many techniques which can be used to fingerprint networking stacks. Basically, the users just look for things that differ among operating systems and write a investigation for the difference. Remote OS finger stamping is a part of the surveying steps of any goal network attack. Surveying is...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2012

    Anomaly Detection by Naive Bayes & RBF Network

    Intrusion detection by automated means is gaining widespread interest due to the serious impact of Intrusions on computer system or network. Several techniques have been introduced in an effort to minimize up to some extent the risk associated with Intrusion attack. In this paper, the authors have used a novel...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    A Model for Web Developer to Overcome the Cross Platform Dependency in Mobile Technologies

    Most web developers has problem in building native mobile applications, requiring varied knowledge, skills and forced to change their platform. The technology is growing rapidly and fast enough, for web developers, to keep them up to date with it. Cross-platform apps for mobile are also in use but they don't...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2012

    Survey on Intrusion Detection and Prevention System and Proposed Cost Effective Solution Using Software Agent

    Internet makes life easier, provides a best platform to do business and increases the employment and lots more the list is endless. Everything has two sides; the dark side of internet is its openness. Data are most precious in computer world, and any valuable things are viable target for thieves...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jun 2012

    Ecommerce Dealer Agent Mechanism in Cloud Computing Environment

    In this paper, the authors offered by software agent who made changes in electronic commerce trading which helps traders for purchasing of product based on the users preferences. The Ecommerce system based on cloud also provide the experience of customize transactions. The main aim of the paper is to create...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Gleaming the Cloud in the Virtualization Layer

    Cloud computing is a powerful and flexible software environment, which delegates the material's management and in which users pay as they go. Rather than operating their own data centers, today cloud users run their applications on the remote cloud infrastructures that are owned and managed by cloud providers. Cloud users...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Which Cloud Service Provider Should I Opt for??? a Comparative Study of the Various Cloud Service Providers Along with the Focus on Various Techniques for Optimal Service Selection

    In today's world, cloud computing has generated a lot of interest and competition in the industry. With the emergence of new cloud Providers, identifying one that best suits the business needs of an enterprise is a challenging and difficult task. For to a novice or user with little knowledge about...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2012

    Implementing Parallel Data Mining Algorithm on High Performance Data Cloud

    Cloud computing technology has been emerged to manage large-scale data efficiently. And due to rapid growth of data, large scale data processing is becoming a focal point of information technique. To deal with this advancement in data collection and storage technologies, designing and implementing large-scale parallel algorithm for Data mining...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Grid Computing and Cloud Computing: Description and Comparision

    In a basic grid computing system, every computer can access the resources of every other computer belonging to the network. In the ideal grid computing system, every resource is shared, turning a computer network into a powerful supercomputer. It's a special kind of distributed computing. In distributed computing, different computers...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2014

    Vehicle Position and its Range Determination Based on GPS and GSM Communication System with Android Application

    In this paper the authors allow user to protect their vehicle against unauthorized entering. This paper divided into two main parts the first part is on-board unit that installed in the vehicle to sense if any person enter it and ask user to enter a password to turn on the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Reliable and Efficient Data Transfer with Minimum Drop and Recovery Mechanism Using LCM in Wireless Sensor Network

    A WSN can be defined as a network of devices, denoted as nodes, which can sense the environment and communicate the information gathered from the monitored field (e.g., an area or volume) through wireless links. The data is forwarded, possibly via multiple hops, to a sink that can use it...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Microprocessor Smart Cards for Centralizing Fare Collection in Public Services

    In today's world where public transit is the most commonly used and affordable means of transport. Dealing with it includes a lot of variables, especially at the time of payment. This problem is faced by almost every commuter in his/her daily routine. To address the problem, the authors propose centralizing...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    Secure Reversible Data Hiding with Image Encryption

    Reversible data hiding with image encryption is a technique, in which a secret data is embedded inside a confidential image in such a way that, at the receiver side, both the image and the data can be extracted without any loss. Existing data hiding methods embed data by vacating room...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    GMT(Graph Mining Techniques) for crime Detection and Comparison with the proposed algorithm

    Cybercrime is one of the leading threats to company confidential data and resources. Now-a-days the criminal activities through the Internet (like stock crime, sniffing, and bank fraud) and through the network are on large scale. If a person or entity is attempting to commit fraud or participate in some sort...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2013

    A Study on Image Segmentation Using Different Types of K-Means Clustering

    Image segmentation is the process of partitioning a digital image into several set of pixels or regions. The major goal of the image segmentation is to make simpler or change the illustration of an image into somewhat meaningful. Numerous image segmentations method has been proposed to solve the image segmentation...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Oct 2013

    Opinions on Opinion Mining: A Survey

    Opinion mining is a fast growing topic with its various application being used by an individual or any large organization. Traditionally, individuals gather feedbacks from their near and dear ones before any purchase, while organization conducts various surveys to improve their services. The largest source of feedbacks, these days, internet...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    An Efficient Application of Zigbee Technology in Lighting Control

    Now-a-days there are so many applications used in this system which are useful for saving energy and light control. Zigbee is 802.15.4 IEEE standard. The Zigbee is low-cost, low-power consumption, wireless mesh networking standards and it is designed for low power consumption allowing batteries to essentially last forever. Zigbee is...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2014

    Cloud Disaster Management With Scheduling Strategy

    Cloud computing is one of today's most exciting technologies because of its capacity to reduce cost associated with computing while increasing flexibility and scalability. In the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing sectors of the IT industry....

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Performance and Analysis of DS-CDMA Rake Receiver and Analyzing the BER Performance in Presence of Nonlinear Distortion in DS-CDMA System

    In this paper analysis the performance of a CDMA system by varying the system parameters. CDMA is a popular technology in cellular system due to its superior capacity and performance. In conventional CDMA, obtained better signal to noise ratio by using matched filter because of this rake receiver is used...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Survey of Energy Efficient Multicast Routing Protocols in Manet

    Although establishing correct and efficient routes is an important design issue in Mobile Ad hoc NETworks (MANETs), a more challenging goal is to provide energy efficient routes because mobile nodes' operation time is the most critical limiting factor. This paper surveys and analyses the energy aware routing protocols proposed for...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Grid Scheduling Using PSO With SPV Rule

    Grid computing can be defined as applying the resources of many computers in a network to a problem which requires a great number of computer processing cycles or access to large amounts of data. However, in the field of grid computing scheduling of tasks is a big challenge. The task...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    An Evaluation of Ad-Hoc Routing Protocols for Wireless Sensor Networks

    Wireless mobile ad-hoc networks are characterized as network of nodes without any physical connections. In these types of networks there is no fixed topology due to the mobility of nodes, interference, multipath propagation, environmental conditions and path loss. The purpose of this paper is to study, understand, analyze and discuss...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Improved K-Means Clustering Technique Using Distance Determination Approach

    Powerful systems for collecting data and managing it in large databases are in place in all large and mid-range organizations. The value of raw data (collected over a long time) is on the ability to extract high-level information: information useful for decision support, for exploration, and for better understanding of...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Optimization of DE Jong's Function Using Genetic Algorithm Approach

    Genetic algorithm is a search algorithm based on the mechanics of natural selection and natural genetics. The purpose of this paper is to optimize/maximize de Jong's function1 in GA using different selection schemes (like roulette wheel, random selection, besy fit/elitist fit rank selection, tournament selection). For the people's problem the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    A Compression Algorithm for Optimization of Storage Consumption of Non Oracle Database

    Relational database are very important in satisfying today's information needs. This paper aims at optimization of storage consumption of non oracle database with the table compression algorithm of oracle 11g. Many concepts have been developed for compressing of relational database. But no concepts ever talked about the technique of compression...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Concise Representation of Multi-Level Association Rules Using MinMax Exact Rules

    Association Rule mining plays an important role in the discovery of knowledge and information. Association Rule mining discovers huge number of rules for any dataset for different support and confidence values, among this many of them are redundant, especially in the case of multi-level datasets. Mining non-redundant Association Rules in...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    DWT Based Copy-Move Image Forgery Detection

    In an age with digital media, it is no longer true that seeing is believing. In addition, digital forgeries, can be indistinguishable from authentic photographs. In a copy-move image forgery, a part of an image is copied and then pasted on a different location within the same image. In this...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    An Ant Inspired Bacterial Foraging Methodology Proposed to Solve Open Shop Scheduling Problems

    This paper represents the efficiency of the Ant inspired Bacterial Foraging Optimization (ABFO), the hybrid technique of Ant Colony Optimization (ACO) algorithm and Bacterial Foraging Optimization (BFO) algorithm from Bio Inspired Computing to solve the Open Shop Scheduling Problems (OSSP). The Ant inspired Bacterial Foraging Optimization (ABFO) was tested on...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Radar Cross Section Prediction for Different Objects Using Mat Lab and Radar Cross Section (RCS) Reduction

    Radar Cross Section (RCS) depends on the characteristic dimensions of the object compared to the radar wave length. The Radar Cross Section of the target determines the power density returned to the radar for a particular power density incident on the target. The cross section is more dependent on the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Image Watermarking Analysis: Using Discrete Cosine Transform and LSB Substitution

    In this paper, the authors describe a new very accurate and reliable method that can detect watermarked image by LSB embedding in randomly scattered pixels in both 24-bit color images and 8-bit grayscale or color images, the LSB Modification and DCT are two techniques are analyzed by using various distortion...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Bio-Metric Trust and Security in Mobile Banking

    The invention of mobile phones makes the human life easier. The purpose of this paper is to identify security risks in mobile banking and to provide an authentication method for mobile banking transaction by using bio-metric mechanism. Current mobile banking authentication is challenging and identified as a major security risk....

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    ANN Implementation for Classification of Noisy Numeral Corrupted By Salt and Pepper Noise

    Neural Network (NN) is information processing paradigm that is inspired by the way biological nervous systems, such as the brain, process information. Neural Networks are known to be capable of providing good recognition rate in presence of noise. Neural Network with various architectures and Training algorithms have successfully been applied...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Formulation of Homogenous Cluster Environment Using Commodity Grade Computers and MPI Paradigm

    With the advent of market being flooded with cheaper processing power and memory, there is a revolutionary shift from developing a single high end machine to combining cheaper and commercial machines to serve the same purpose. In the interest of said proposition clusters have been the most effective option. This...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Design & Analysis of Matrix Arbiter for NoC Architecture

    Network-on-Chip (NoC) is a general purpose on-chip communication concept that offers high throughput, which is the basic requirement to deal with complexity of modern systems. Arbiter is used in NoC Router when number of input port are request for same output port. In this paper, the authors are design Matrix...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Design of High Speed Six Transistor Full Adder Using a Novel Two Transistor XOR Gates

    In modern era, the numbers of transistors are reduced in the circuit and ultra low power design have emerged as an active research topic due to its various applications. A full adder is one of the essential component in digital circuit design, many improvements have been made to reduce the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Performance Analysis of Networks Using RED for Congestion Control

    Congestion avoidance techniques monitor network traffic load in an effort to anticipate and avoid congestion at common network bottlenecks. Congestion avoidance is achieved through packet dropping. Among the more commonly used congestion avoidance mechanisms is Random Early Detection (RED), which is optimum for high-speed transit networks. Random Early Detection (RED)...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Data Security and Authentication Using Steganography and STS Protocol

    Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret. Steganography and cryptography are both ways to protect information from unwanted parties but neither technology alone is perfect and can be...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    A Survey on Cloud Computing and Its Services

    Cloud computing creates a virtual paradigm for sharing data and computations over a scalable network of nodes. In this paper, the authors have surveyed various aspects of cloud and their development tools. This paper also attention to the current development cloud with their QoS measures. Cloud computing is fast growing...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Enhancing Security Using Graphical Patterns Selection (ENSUGPS)

    The various forms of authentication methods have drawbacks since alphanumeric usernames and passwords can be easily hacked. Graphical passwords are the images or representation of images as passwords. These are easy to remember and also provide more security. Humans can easily remember picture than textual character. There are various graphical...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2013

    Providing Security for ATMs Using Digital Image Processing for Abnormal Incident Detection

    In this paper, the authors designed by using PIR (Passive Infrared Radial) sensor to provide high security in ATMs. The sensor is basically a pyroelectric device. When the PIR is exposed to infrared radiation, it generates an electric charge. This electric charge triggers the camera. Camera starts capturing video, and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering