International Journal of Advanced Research in Computer Science and Electronics Engineering

Displaying 1-40 of 61 results

  • White Papers // Jan 2015

    Recent Trends and Security Analysis of Long Term Evolution (LTE)

    Advancement and standardization of IEEE 802 project brings new fast communication technology called 4G communication or Long Term Evolution (LTE). Recently 3GPP has announces the commercialized version of LTE 4G technology as a LTE-Advance (LTE-A). Previous version of the LTE i.e. release 8 is solitary fastest broad-band technologies base on...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2014

    A Study on Bandwidth Estimation Aspects and Approaches

    One of the major requirements of a mobile network is QoS optimization. This optimization can be achieved using different approach applied at different layers. One of such approach is bandwidth estimation and optimization. Bandwidth optimization is the work applied on data link layer and IP layer respective to physical and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2014

    Protecting End-to-End Location Privacy in Cloud Computing Environment

    Cloud computing is a technology that provides the processing huge amount of data which depend on sharing computing resources like networks, servers, storage, applications, and services. The end-to-end location privacy has been neglecting in the field of cloud computing. Location privacy deals with the hide the location of source and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2014

    Cloud Disaster Management With Scheduling Strategy

    Cloud computing is one of today's most exciting technologies because of its capacity to reduce cost associated with computing while increasing flexibility and scalability. In the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing sectors of the IT industry....

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2014

    Vehicle Position and its Range Determination Based on GPS and GSM Communication System with Android Application

    In this paper the authors allow user to protect their vehicle against unauthorized entering. This paper divided into two main parts the first part is on-board unit that installed in the vehicle to sense if any person enter it and ask user to enter a password to turn on the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Reliable and Efficient Data Transfer with Minimum Drop and Recovery Mechanism Using LCM in Wireless Sensor Network

    A WSN can be defined as a network of devices, denoted as nodes, which can sense the environment and communicate the information gathered from the monitored field (e.g., an area or volume) through wireless links. The data is forwarded, possibly via multiple hops, to a sink that can use it...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Microprocessor Smart Cards for Centralizing Fare Collection in Public Services

    In today's world where public transit is the most commonly used and affordable means of transport. Dealing with it includes a lot of variables, especially at the time of payment. This problem is faced by almost every commuter in his/her daily routine. To address the problem, the authors propose centralizing...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    An Efficient Application of Zigbee Technology in Lighting Control

    Now-a-days there are so many applications used in this system which are useful for saving energy and light control. Zigbee is 802.15.4 IEEE standard. The Zigbee is low-cost, low-power consumption, wireless mesh networking standards and it is designed for low power consumption allowing batteries to essentially last forever. Zigbee is...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    Secure Reversible Data Hiding with Image Encryption

    Reversible data hiding with image encryption is a technique, in which a secret data is embedded inside a confidential image in such a way that, at the receiver side, both the image and the data can be extracted without any loss. Existing data hiding methods embed data by vacating room...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    GMT(Graph Mining Techniques) for crime Detection and Comparison with the proposed algorithm

    Cybercrime is one of the leading threats to company confidential data and resources. Now-a-days the criminal activities through the Internet (like stock crime, sniffing, and bank fraud) and through the network are on large scale. If a person or entity is attempting to commit fraud or participate in some sort...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2013

    A Study on Image Segmentation Using Different Types of K-Means Clustering

    Image segmentation is the process of partitioning a digital image into several set of pixels or regions. The major goal of the image segmentation is to make simpler or change the illustration of an image into somewhat meaningful. Numerous image segmentations method has been proposed to solve the image segmentation...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Oct 2013

    Opinions on Opinion Mining: A Survey

    Opinion mining is a fast growing topic with its various application being used by an individual or any large organization. Traditionally, individuals gather feedbacks from their near and dear ones before any purchase, while organization conducts various surveys to improve their services. The largest source of feedbacks, these days, internet...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2013

    A Valued Analysis of Information Security, Threats and Solutions for Cloud Computing

    Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2013

    How Can M-Commerce Be Safe and Secure? Empirical Analysis Of M-Commerce Security Factors

    In today's world, if any business person wants to extend his business and compete, he must follow the supporting activities provided by the well known potter-millers' value chain model. And M-commerce is one of those activities. In previous years, E-commerce is an essential part of successful business trend setup in...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2013

    Optimal Routing Service for Wireless Network Security and Management

    Wireless network environment poses its unique challenges to the existing transaction models which are fail to solve. Wireless Ad-hoc NETworks (WANETs) experience serious security issues even when solutions employ preventive or reactive security mechanisms. In order to support both network operations and security requirements of critical applications, the authors present...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2013

    Providing Security for ATMs Using Digital Image Processing for Abnormal Incident Detection

    In this paper, the authors designed by using PIR (Passive Infrared Radial) sensor to provide high security in ATMs. The sensor is basically a pyroelectric device. When the PIR is exposed to infrared radiation, it generates an electric charge. This electric charge triggers the camera. Camera starts capturing video, and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Enhancing Security Using Graphical Patterns Selection (ENSUGPS)

    The various forms of authentication methods have drawbacks since alphanumeric usernames and passwords can be easily hacked. Graphical passwords are the images or representation of images as passwords. These are easy to remember and also provide more security. Humans can easily remember picture than textual character. There are various graphical...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Cloud and Intelligent Based SCADA Technology

    Burden placed on municipal utilities continues to increase. Customers demand quick identification of problem and solutions. Regulatory organizations have strict compliance requirements and an unprecedented ability to levy fines. The media is eager to sensationalize security incidents or weaknesses in public and natural resources. Traditional SCADA system, which comprises expensive...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Distributed Denial of Service Attack Prevention Using Critical Link Method in Manet

    Mobile Ad-hoc NETwork (MANET) is self configuring network of mobile node connected by wireless links and considered as network without infrastructure. Routing protocol plays a critical role for efficient communication between mobile nodes and operates on the basic assumption that nodes are completely supportive. Because of open organization and restricted...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Data Mining: Techniques, Applications and Issues

    Data and information or knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. In this paper, the authors have focused a variety of techniques, approaches and different areas...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Frontline Techniques to Prevent Web Application Vulnerability

    Today web applications are becoming the prime target for cyber-attacks. Web attacks are growing in numbers, with most of organizations in a broad survey reporting that they had recently suffered web attacks. Last few years have shown a significant increase in the number of web-based attacks. Structured Query Language (SQL)...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Finger Print and Palm Print Based Multibiometric Authentication System with GUI Interface

    In this paper, a feature-level fusion framework to simultaneously protect multiple templates of a user as a single secure sketch is proposed. The contribution of the proposed work includes an embedded and extraction algorithm so as to reduce the computational complexity, processing time and storage space. A fusion algorithm to...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    A Model for Web Developer to Overcome the Cross Platform Dependency in Mobile Technologies

    Most web developers has problem in building native mobile applications, requiring varied knowledge, skills and forced to change their platform. The technology is growing rapidly and fast enough, for web developers, to keep them up to date with it. Cross-platform apps for mobile are also in use but they don't...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    Attacking Cloud Through Cache Based Side Channel in Virtualized Environment

    Emerging trends in computation such as cloud computing require that computation be carried out in remote and hostile environments, where attackers have unlimited access to the devices, the data and the programs. Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2012

    RFID, GPS & GSM Based Vehicle Tracing & Employee Security System

    A RFID, GPS & GSM based vehicle tracking and employee security system combines the installation of an electronic device in a vehicle, with purpose-designed computer software to enable the company to track the vehicle's location. In vehicle tracking systems the authors use Global Positioning System (GPS) technology for locating the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2012

    Network Intrusion Detection by Using PCA Via SMO-SVM

    As network attacks have increased in number and severity over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Nov 2012

    Enhancing System Security Using Patterns

    In this paper, the authors are suggesting a combined consideration of security design patterns and threat modeling for the enhancement of security in the software systems. Software security helps in building software without security holes thereby preventing the security issues. The best way to do this is to apply specific...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Nov 2012

    Novel Approach for Hybrid Intrusion Detection System

    Intrusion Detection System (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Basically this paper is to develop host based cum network based intrusion detection system for Microsoft Windows XP environment. Proposed concept that had used in this was applying intrusion detection rule...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Grid Computing and Cloud Computing: Description and Comparision

    In a basic grid computing system, every computer can access the resources of every other computer belonging to the network. In the ideal grid computing system, every resource is shared, turning a computer network into a powerful supercomputer. It's a special kind of distributed computing. In distributed computing, different computers...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Security Issue on Aodv Routing Protocol Suffering From Blackhole Attack

    An ad-hoc network is a collection of mobile nodes that dynamically form a temporary network and are infrastructure less. This paper deals with security issues when AODV(Ad-hoc On-demand Distance Vector) protocol suffering from Blackhole attack BAODV (Bad Ad-hoc On-demand Distance Vector) routing suffering Blackhole attack, which can simulate blackhole attack...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Energy Efficient and Secured Routing

    Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. Wireless Sensor Networks (WSNs) have been increasingly available for large-scale applications in which energy efficiency &, security is an important performance measure. Driven by the energy...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Gleaming the Cloud in the Virtualization Layer

    Cloud computing is a powerful and flexible software environment, which delegates the material's management and in which users pay as they go. Rather than operating their own data centers, today cloud users run their applications on the remote cloud infrastructures that are owned and managed by cloud providers. Cloud users...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Which Cloud Service Provider Should I Opt for??? a Comparative Study of the Various Cloud Service Providers Along with the Focus on Various Techniques for Optimal Service Selection

    In today's world, cloud computing has generated a lot of interest and competition in the industry. With the emergence of new cloud Providers, identifying one that best suits the business needs of an enterprise is a challenging and difficult task. For to a novice or user with little knowledge about...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Security Threats to Data Mining and Analysis Tools of TIA Program

    Data mining is the process that attempts to discover patterns in large data sets. The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns such as groups of data records i.e. cluster analysis, unusual records (anomaly detection) and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    An Ant Inspired Bacterial Foraging Methodology Proposed to Solve Open Shop Scheduling Problems

    This paper represents the efficiency of the Ant inspired Bacterial Foraging Optimization (ABFO), the hybrid technique of Ant Colony Optimization (ACO) algorithm and Bacterial Foraging Optimization (BFO) algorithm from Bio Inspired Computing to solve the Open Shop Scheduling Problems (OSSP). The Ant inspired Bacterial Foraging Optimization (ABFO) was tested on...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Radar Cross Section Prediction for Different Objects Using Mat Lab and Radar Cross Section (RCS) Reduction

    Radar Cross Section (RCS) depends on the characteristic dimensions of the object compared to the radar wave length. The Radar Cross Section of the target determines the power density returned to the radar for a particular power density incident on the target. The cross section is more dependent on the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Image Watermarking Analysis: Using Discrete Cosine Transform and LSB Substitution

    In this paper, the authors describe a new very accurate and reliable method that can detect watermarked image by LSB embedding in randomly scattered pixels in both 24-bit color images and 8-bit grayscale or color images, the LSB Modification and DCT are two techniques are analyzed by using various distortion...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Bio-Metric Trust and Security in Mobile Banking

    The invention of mobile phones makes the human life easier. The purpose of this paper is to identify security risks in mobile banking and to provide an authentication method for mobile banking transaction by using bio-metric mechanism. Current mobile banking authentication is challenging and identified as a major security risk....

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    ANN Implementation for Classification of Noisy Numeral Corrupted By Salt and Pepper Noise

    Neural Network (NN) is information processing paradigm that is inspired by the way biological nervous systems, such as the brain, process information. Neural Networks are known to be capable of providing good recognition rate in presence of noise. Neural Network with various architectures and Training algorithms have successfully been applied...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Formulation of Homogenous Cluster Environment Using Commodity Grade Computers and MPI Paradigm

    With the advent of market being flooded with cheaper processing power and memory, there is a revolutionary shift from developing a single high end machine to combining cheaper and commercial machines to serve the same purpose. In the interest of said proposition clusters have been the most effective option. This...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2014

    Vehicle Position and its Range Determination Based on GPS and GSM Communication System with Android Application

    In this paper the authors allow user to protect their vehicle against unauthorized entering. This paper divided into two main parts the first part is on-board unit that installed in the vehicle to sense if any person enter it and ask user to enter a password to turn on the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Reliable and Efficient Data Transfer with Minimum Drop and Recovery Mechanism Using LCM in Wireless Sensor Network

    A WSN can be defined as a network of devices, denoted as nodes, which can sense the environment and communicate the information gathered from the monitored field (e.g., an area or volume) through wireless links. The data is forwarded, possibly via multiple hops, to a sink that can use it...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Microprocessor Smart Cards for Centralizing Fare Collection in Public Services

    In today's world where public transit is the most commonly used and affordable means of transport. Dealing with it includes a lot of variables, especially at the time of payment. This problem is faced by almost every commuter in his/her daily routine. To address the problem, the authors propose centralizing...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    Secure Reversible Data Hiding with Image Encryption

    Reversible data hiding with image encryption is a technique, in which a secret data is embedded inside a confidential image in such a way that, at the receiver side, both the image and the data can be extracted without any loss. Existing data hiding methods embed data by vacating room...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    GMT(Graph Mining Techniques) for crime Detection and Comparison with the proposed algorithm

    Cybercrime is one of the leading threats to company confidential data and resources. Now-a-days the criminal activities through the Internet (like stock crime, sniffing, and bank fraud) and through the network are on large scale. If a person or entity is attempting to commit fraud or participate in some sort...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2013

    A Study on Image Segmentation Using Different Types of K-Means Clustering

    Image segmentation is the process of partitioning a digital image into several set of pixels or regions. The major goal of the image segmentation is to make simpler or change the illustration of an image into somewhat meaningful. Numerous image segmentations method has been proposed to solve the image segmentation...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Oct 2013

    Opinions on Opinion Mining: A Survey

    Opinion mining is a fast growing topic with its various application being used by an individual or any large organization. Traditionally, individuals gather feedbacks from their near and dear ones before any purchase, while organization conducts various surveys to improve their services. The largest source of feedbacks, these days, internet...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    An Efficient Application of Zigbee Technology in Lighting Control

    Now-a-days there are so many applications used in this system which are useful for saving energy and light control. Zigbee is 802.15.4 IEEE standard. The Zigbee is low-cost, low-power consumption, wireless mesh networking standards and it is designed for low power consumption allowing batteries to essentially last forever. Zigbee is...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2014

    Cloud Disaster Management With Scheduling Strategy

    Cloud computing is one of today's most exciting technologies because of its capacity to reduce cost associated with computing while increasing flexibility and scalability. In the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing sectors of the IT industry....

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    A Model for Web Developer to Overcome the Cross Platform Dependency in Mobile Technologies

    Most web developers has problem in building native mobile applications, requiring varied knowledge, skills and forced to change their platform. The technology is growing rapidly and fast enough, for web developers, to keep them up to date with it. Cross-platform apps for mobile are also in use but they don't...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Enhancing Security Using Graphical Patterns Selection (ENSUGPS)

    The various forms of authentication methods have drawbacks since alphanumeric usernames and passwords can be easily hacked. Graphical passwords are the images or representation of images as passwords. These are easy to remember and also provide more security. Humans can easily remember picture than textual character. There are various graphical...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2013

    Providing Security for ATMs Using Digital Image Processing for Abnormal Incident Detection

    In this paper, the authors designed by using PIR (Passive Infrared Radial) sensor to provide high security in ATMs. The sensor is basically a pyroelectric device. When the PIR is exposed to infrared radiation, it generates an electric charge. This electric charge triggers the camera. Camera starts capturing video, and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2013

    Optimal Routing Service for Wireless Network Security and Management

    Wireless network environment poses its unique challenges to the existing transaction models which are fail to solve. Wireless Ad-hoc NETworks (WANETs) experience serious security issues even when solutions employ preventive or reactive security mechanisms. In order to support both network operations and security requirements of critical applications, the authors present...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2013

    A Valued Analysis of Information Security, Threats and Solutions for Cloud Computing

    Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2013

    How Can M-Commerce Be Safe and Secure? Empirical Analysis Of M-Commerce Security Factors

    In today's world, if any business person wants to extend his business and compete, he must follow the supporting activities provided by the well known potter-millers' value chain model. And M-commerce is one of those activities. In previous years, E-commerce is an essential part of successful business trend setup in...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Data Mining: Techniques, Applications and Issues

    Data and information or knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. In this paper, the authors have focused a variety of techniques, approaches and different areas...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Frontline Techniques to Prevent Web Application Vulnerability

    Today web applications are becoming the prime target for cyber-attacks. Web attacks are growing in numbers, with most of organizations in a broad survey reporting that they had recently suffered web attacks. Last few years have shown a significant increase in the number of web-based attacks. Structured Query Language (SQL)...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Finger Print and Palm Print Based Multibiometric Authentication System with GUI Interface

    In this paper, a feature-level fusion framework to simultaneously protect multiple templates of a user as a single secure sketch is proposed. The contribution of the proposed work includes an embedded and extraction algorithm so as to reduce the computational complexity, processing time and storage space. A fusion algorithm to...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Nov 2012

    Enhancing System Security Using Patterns

    In this paper, the authors are suggesting a combined consideration of security design patterns and threat modeling for the enhancement of security in the software systems. Software security helps in building software without security holes thereby preventing the security issues. The best way to do this is to apply specific...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Security Threats to Data Mining and Analysis Tools of TIA Program

    Data mining is the process that attempts to discover patterns in large data sets. The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns such as groups of data records i.e. cluster analysis, unusual records (anomaly detection) and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2012

    Open Source Tools for Security Assessment

    Security assessments can mean different things to different people. This paper discusses common security assessments with open source tools. Each tools of the paper will address a phase of the different levels of security assessments. The paper is written for security practitioners and pen testers, and of course, students who...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Security Issue on Aodv Routing Protocol Suffering From Blackhole Attack

    An ad-hoc network is a collection of mobile nodes that dynamically form a temporary network and are infrastructure less. This paper deals with security issues when AODV(Ad-hoc On-demand Distance Vector) protocol suffering from Blackhole attack BAODV (Bad Ad-hoc On-demand Distance Vector) routing suffering Blackhole attack, which can simulate blackhole attack...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Energy Efficient and Secured Routing

    Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. Wireless Sensor Networks (WSNs) have been increasingly available for large-scale applications in which energy efficiency &, security is an important performance measure. Driven by the energy...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2012

    Anomaly Based Network Intrusion Detection by using Data Mining

    As network attacks have increased in number and severity over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Cloud and Intelligent Based SCADA Technology

    Burden placed on municipal utilities continues to increase. Customers demand quick identification of problem and solutions. Regulatory organizations have strict compliance requirements and an unprecedented ability to levy fines. The media is eager to sensationalize security incidents or weaknesses in public and natural resources. Traditional SCADA system, which comprises expensive...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2012

    RFID, GPS & GSM Based Vehicle Tracing & Employee Security System

    A RFID, GPS & GSM based vehicle tracking and employee security system combines the installation of an electronic device in a vehicle, with purpose-designed computer software to enable the company to track the vehicle's location. In vehicle tracking systems the authors use Global Positioning System (GPS) technology for locating the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Nov 2012

    Novel Approach for Hybrid Intrusion Detection System

    Intrusion Detection System (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Basically this paper is to develop host based cum network based intrusion detection system for Microsoft Windows XP environment. Proposed concept that had used in this was applying intrusion detection rule...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Distributed Denial of Service Attack Prevention Using Critical Link Method in Manet

    Mobile Ad-hoc NETwork (MANET) is self configuring network of mobile node connected by wireless links and considered as network without infrastructure. Routing protocol plays a critical role for efficient communication between mobile nodes and operates on the basic assumption that nodes are completely supportive. Because of open organization and restricted...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2012

    Network Intrusion Detection by Using PCA Via SMO-SVM

    As network attacks have increased in number and severity over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    Attacking Cloud Through Cache Based Side Channel in Virtualized Environment

    Emerging trends in computation such as cloud computing require that computation be carried out in remote and hostile environments, where attackers have unlimited access to the devices, the data and the programs. Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jun 2012

    An Overview of Techniques for Framework of Finger Stamping

    There are many, many techniques which can be used to fingerprint networking stacks. Basically, the users just look for things that differ among operating systems and write a investigation for the difference. Remote OS finger stamping is a part of the surveying steps of any goal network attack. Surveying is...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2012

    Anomaly Detection by Naive Bayes & RBF Network

    Intrusion detection by automated means is gaining widespread interest due to the serious impact of Intrusions on computer system or network. Several techniques have been introduced in an effort to minimize up to some extent the risk associated with Intrusion attack. In this paper, the authors have used a novel...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2012

    Survey on Intrusion Detection and Prevention System and Proposed Cost Effective Solution Using Software Agent

    Internet makes life easier, provides a best platform to do business and increases the employment and lots more the list is endless. Everything has two sides; the dark side of internet is its openness. Data are most precious in computer world, and any valuable things are viable target for thieves...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jun 2012

    Ecommerce Dealer Agent Mechanism in Cloud Computing Environment

    In this paper, the authors offered by software agent who made changes in electronic commerce trading which helps traders for purchasing of product based on the users preferences. The Ecommerce system based on cloud also provide the experience of customize transactions. The main aim of the paper is to create...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Gleaming the Cloud in the Virtualization Layer

    Cloud computing is a powerful and flexible software environment, which delegates the material's management and in which users pay as they go. Rather than operating their own data centers, today cloud users run their applications on the remote cloud infrastructures that are owned and managed by cloud providers. Cloud users...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Which Cloud Service Provider Should I Opt for??? a Comparative Study of the Various Cloud Service Providers Along with the Focus on Various Techniques for Optimal Service Selection

    In today's world, cloud computing has generated a lot of interest and competition in the industry. With the emergence of new cloud Providers, identifying one that best suits the business needs of an enterprise is a challenging and difficult task. For to a novice or user with little knowledge about...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2012

    Implementing Parallel Data Mining Algorithm on High Performance Data Cloud

    Cloud computing technology has been emerged to manage large-scale data efficiently. And due to rapid growth of data, large scale data processing is becoming a focal point of information technique. To deal with this advancement in data collection and storage technologies, designing and implementing large-scale parallel algorithm for Data mining...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Grid Computing and Cloud Computing: Description and Comparision

    In a basic grid computing system, every computer can access the resources of every other computer belonging to the network. In the ideal grid computing system, every resource is shared, turning a computer network into a powerful supercomputer. It's a special kind of distributed computing. In distributed computing, different computers...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2015

    Recent Trends and Security Analysis of Long Term Evolution (LTE)

    Advancement and standardization of IEEE 802 project brings new fast communication technology called 4G communication or Long Term Evolution (LTE). Recently 3GPP has announces the commercialized version of LTE 4G technology as a LTE-Advance (LTE-A). Previous version of the LTE i.e. release 8 is solitary fastest broad-band technologies base on...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2014

    A Study on Bandwidth Estimation Aspects and Approaches

    One of the major requirements of a mobile network is QoS optimization. This optimization can be achieved using different approach applied at different layers. One of such approach is bandwidth estimation and optimization. Bandwidth optimization is the work applied on data link layer and IP layer respective to physical and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering