International Journal of Advanced Research in Computer Science and Electronics Engineering

Displaying 1-40 of 61 results

  • White Papers // Jan 2015

    Recent Trends and Security Analysis of Long Term Evolution (LTE)

    Advancement and standardization of IEEE 802 project brings new fast communication technology called 4G communication or Long Term Evolution (LTE). Recently 3GPP has announces the commercialized version of LTE 4G technology as a LTE-Advance (LTE-A). Previous version of the LTE i.e. release 8 is solitary fastest broad-band technologies base on...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2014

    A Study on Bandwidth Estimation Aspects and Approaches

    One of the major requirements of a mobile network is QoS optimization. This optimization can be achieved using different approach applied at different layers. One of such approach is bandwidth estimation and optimization. Bandwidth optimization is the work applied on data link layer and IP layer respective to physical and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2014

    Protecting End-to-End Location Privacy in Cloud Computing Environment

    Cloud computing is a technology that provides the processing huge amount of data which depend on sharing computing resources like networks, servers, storage, applications, and services. The end-to-end location privacy has been neglecting in the field of cloud computing. Location privacy deals with the hide the location of source and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2014

    Cloud Disaster Management With Scheduling Strategy

    Cloud computing is one of today's most exciting technologies because of its capacity to reduce cost associated with computing while increasing flexibility and scalability. In the past few years, cloud computing has grown from being a promising business idea to one of the fastest growing sectors of the IT industry....

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2014

    Vehicle Position and its Range Determination Based on GPS and GSM Communication System with Android Application

    In this paper the authors allow user to protect their vehicle against unauthorized entering. This paper divided into two main parts the first part is on-board unit that installed in the vehicle to sense if any person enter it and ask user to enter a password to turn on the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Microprocessor Smart Cards for Centralizing Fare Collection in Public Services

    In today's world where public transit is the most commonly used and affordable means of transport. Dealing with it includes a lot of variables, especially at the time of payment. This problem is faced by almost every commuter in his/her daily routine. To address the problem, the authors propose centralizing...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Reliable and Efficient Data Transfer with Minimum Drop and Recovery Mechanism Using LCM in Wireless Sensor Network

    A WSN can be defined as a network of devices, denoted as nodes, which can sense the environment and communicate the information gathered from the monitored field (e.g., an area or volume) through wireless links. The data is forwarded, possibly via multiple hops, to a sink that can use it...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    GMT(Graph Mining Techniques) for crime Detection and Comparison with the proposed algorithm

    Cybercrime is one of the leading threats to company confidential data and resources. Now-a-days the criminal activities through the Internet (like stock crime, sniffing, and bank fraud) and through the network are on large scale. If a person or entity is attempting to commit fraud or participate in some sort...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    Secure Reversible Data Hiding with Image Encryption

    Reversible data hiding with image encryption is a technique, in which a secret data is embedded inside a confidential image in such a way that, at the receiver side, both the image and the data can be extracted without any loss. Existing data hiding methods embed data by vacating room...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    An Efficient Application of Zigbee Technology in Lighting Control

    Now-a-days there are so many applications used in this system which are useful for saving energy and light control. Zigbee is 802.15.4 IEEE standard. The Zigbee is low-cost, low-power consumption, wireless mesh networking standards and it is designed for low power consumption allowing batteries to essentially last forever. Zigbee is...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2013

    A Study on Image Segmentation Using Different Types of K-Means Clustering

    Image segmentation is the process of partitioning a digital image into several set of pixels or regions. The major goal of the image segmentation is to make simpler or change the illustration of an image into somewhat meaningful. Numerous image segmentations method has been proposed to solve the image segmentation...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Oct 2013

    Opinions on Opinion Mining: A Survey

    Opinion mining is a fast growing topic with its various application being used by an individual or any large organization. Traditionally, individuals gather feedbacks from their near and dear ones before any purchase, while organization conducts various surveys to improve their services. The largest source of feedbacks, these days, internet...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2013

    A Valued Analysis of Information Security, Threats and Solutions for Cloud Computing

    Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2013

    How Can M-Commerce Be Safe and Secure? Empirical Analysis Of M-Commerce Security Factors

    In today's world, if any business person wants to extend his business and compete, he must follow the supporting activities provided by the well known potter-millers' value chain model. And M-commerce is one of those activities. In previous years, E-commerce is an essential part of successful business trend setup in...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2013

    Optimal Routing Service for Wireless Network Security and Management

    Wireless network environment poses its unique challenges to the existing transaction models which are fail to solve. Wireless Ad-hoc NETworks (WANETs) experience serious security issues even when solutions employ preventive or reactive security mechanisms. In order to support both network operations and security requirements of critical applications, the authors present...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2013

    Providing Security for ATMs Using Digital Image Processing for Abnormal Incident Detection

    In this paper, the authors designed by using PIR (Passive Infrared Radial) sensor to provide high security in ATMs. The sensor is basically a pyroelectric device. When the PIR is exposed to infrared radiation, it generates an electric charge. This electric charge triggers the camera. Camera starts capturing video, and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Enhancing Security Using Graphical Patterns Selection (ENSUGPS)

    The various forms of authentication methods have drawbacks since alphanumeric usernames and passwords can be easily hacked. Graphical passwords are the images or representation of images as passwords. These are easy to remember and also provide more security. Humans can easily remember picture than textual character. There are various graphical...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Cloud and Intelligent Based SCADA Technology

    Burden placed on municipal utilities continues to increase. Customers demand quick identification of problem and solutions. Regulatory organizations have strict compliance requirements and an unprecedented ability to levy fines. The media is eager to sensationalize security incidents or weaknesses in public and natural resources. Traditional SCADA system, which comprises expensive...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Distributed Denial of Service Attack Prevention Using Critical Link Method in Manet

    Mobile Ad-hoc NETwork (MANET) is self configuring network of mobile node connected by wireless links and considered as network without infrastructure. Routing protocol plays a critical role for efficient communication between mobile nodes and operates on the basic assumption that nodes are completely supportive. Because of open organization and restricted...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Data Mining: Techniques, Applications and Issues

    Data and information or knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. In this paper, the authors have focused a variety of techniques, approaches and different areas...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Finger Print and Palm Print Based Multibiometric Authentication System with GUI Interface

    In this paper, a feature-level fusion framework to simultaneously protect multiple templates of a user as a single secure sketch is proposed. The contribution of the proposed work includes an embedded and extraction algorithm so as to reduce the computational complexity, processing time and storage space. A fusion algorithm to...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Frontline Techniques to Prevent Web Application Vulnerability

    Today web applications are becoming the prime target for cyber-attacks. Web attacks are growing in numbers, with most of organizations in a broad survey reporting that they had recently suffered web attacks. Last few years have shown a significant increase in the number of web-based attacks. Structured Query Language (SQL)...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    Attacking Cloud Through Cache Based Side Channel in Virtualized Environment

    Emerging trends in computation such as cloud computing require that computation be carried out in remote and hostile environments, where attackers have unlimited access to the devices, the data and the programs. Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    A Model for Web Developer to Overcome the Cross Platform Dependency in Mobile Technologies

    Most web developers has problem in building native mobile applications, requiring varied knowledge, skills and forced to change their platform. The technology is growing rapidly and fast enough, for web developers, to keep them up to date with it. Cross-platform apps for mobile are also in use but they don't...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2012

    RFID, GPS & GSM Based Vehicle Tracing & Employee Security System

    A RFID, GPS & GSM based vehicle tracking and employee security system combines the installation of an electronic device in a vehicle, with purpose-designed computer software to enable the company to track the vehicle's location. In vehicle tracking systems the authors use Global Positioning System (GPS) technology for locating the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2012

    Network Intrusion Detection by Using PCA Via SMO-SVM

    As network attacks have increased in number and severity over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Nov 2012

    Enhancing System Security Using Patterns

    In this paper, the authors are suggesting a combined consideration of security design patterns and threat modeling for the enhancement of security in the software systems. Software security helps in building software without security holes thereby preventing the security issues. The best way to do this is to apply specific...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Nov 2012

    Novel Approach for Hybrid Intrusion Detection System

    Intrusion Detection System (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Basically this paper is to develop host based cum network based intrusion detection system for Microsoft Windows XP environment. Proposed concept that had used in this was applying intrusion detection rule...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Security Issue on Aodv Routing Protocol Suffering From Blackhole Attack

    An ad-hoc network is a collection of mobile nodes that dynamically form a temporary network and are infrastructure less. This paper deals with security issues when AODV(Ad-hoc On-demand Distance Vector) protocol suffering from Blackhole attack BAODV (Bad Ad-hoc On-demand Distance Vector) routing suffering Blackhole attack, which can simulate blackhole attack...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Energy Efficient and Secured Routing

    Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. Wireless Sensor Networks (WSNs) have been increasingly available for large-scale applications in which energy efficiency &, security is an important performance measure. Driven by the energy...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Grid Computing and Cloud Computing: Description and Comparision

    In a basic grid computing system, every computer can access the resources of every other computer belonging to the network. In the ideal grid computing system, every resource is shared, turning a computer network into a powerful supercomputer. It's a special kind of distributed computing. In distributed computing, different computers...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Security Threats to Data Mining and Analysis Tools of TIA Program

    Data mining is the process that attempts to discover patterns in large data sets. The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns such as groups of data records i.e. cluster analysis, unusual records (anomaly detection) and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Which Cloud Service Provider Should I Opt for??? a Comparative Study of the Various Cloud Service Providers Along with the Focus on Various Techniques for Optimal Service Selection

    In today's world, cloud computing has generated a lot of interest and competition in the industry. With the emergence of new cloud Providers, identifying one that best suits the business needs of an enterprise is a challenging and difficult task. For to a novice or user with little knowledge about...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Gleaming the Cloud in the Virtualization Layer

    Cloud computing is a powerful and flexible software environment, which delegates the material's management and in which users pay as they go. Rather than operating their own data centers, today cloud users run their applications on the remote cloud infrastructures that are owned and managed by cloud providers. Cloud users...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Performance and Analysis of DS-CDMA Rake Receiver and Analyzing the BER Performance in Presence of Nonlinear Distortion in DS-CDMA System

    In this paper analysis the performance of a CDMA system by varying the system parameters. CDMA is a popular technology in cellular system due to its superior capacity and performance. In conventional CDMA, obtained better signal to noise ratio by using matched filter because of this rake receiver is used...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Survey of Energy Efficient Multicast Routing Protocols in Manet

    Although establishing correct and efficient routes is an important design issue in Mobile Ad hoc NETworks (MANETs), a more challenging goal is to provide energy efficient routes because mobile nodes' operation time is the most critical limiting factor. This paper surveys and analyses the energy aware routing protocols proposed for...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Grid Scheduling Using PSO With SPV Rule

    Grid computing can be defined as applying the resources of many computers in a network to a problem which requires a great number of computer processing cycles or access to large amounts of data. However, in the field of grid computing scheduling of tasks is a big challenge. The task...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    An Evaluation of Ad-Hoc Routing Protocols for Wireless Sensor Networks

    Wireless mobile ad-hoc networks are characterized as network of nodes without any physical connections. In these types of networks there is no fixed topology due to the mobility of nodes, interference, multipath propagation, environmental conditions and path loss. The purpose of this paper is to study, understand, analyze and discuss...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Improved K-Means Clustering Technique Using Distance Determination Approach

    Powerful systems for collecting data and managing it in large databases are in place in all large and mid-range organizations. The value of raw data (collected over a long time) is on the ability to extract high-level information: information useful for decision support, for exploration, and for better understanding of...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2012

    Optimization of DE Jong's Function Using Genetic Algorithm Approach

    Genetic algorithm is a search algorithm based on the mechanics of natural selection and natural genetics. The purpose of this paper is to optimize/maximize de Jong's function1 in GA using different selection schemes (like roulette wheel, random selection, besy fit/elitist fit rank selection, tournament selection). For the people's problem the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2013

    Providing Security for ATMs Using Digital Image Processing for Abnormal Incident Detection

    In this paper, the authors designed by using PIR (Passive Infrared Radial) sensor to provide high security in ATMs. The sensor is basically a pyroelectric device. When the PIR is exposed to infrared radiation, it generates an electric charge. This electric charge triggers the camera. Camera starts capturing video, and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Enhancing Security Using Graphical Patterns Selection (ENSUGPS)

    The various forms of authentication methods have drawbacks since alphanumeric usernames and passwords can be easily hacked. Graphical passwords are the images or representation of images as passwords. These are easy to remember and also provide more security. Humans can easily remember picture than textual character. There are various graphical...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2013

    A Valued Analysis of Information Security, Threats and Solutions for Cloud Computing

    Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jul 2013

    Optimal Routing Service for Wireless Network Security and Management

    Wireless network environment poses its unique challenges to the existing transaction models which are fail to solve. Wireless Ad-hoc NETworks (WANETs) experience serious security issues even when solutions employ preventive or reactive security mechanisms. In order to support both network operations and security requirements of critical applications, the authors present...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Data Mining: Techniques, Applications and Issues

    Data and information or knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. In this paper, the authors have focused a variety of techniques, approaches and different areas...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2013

    How Can M-Commerce Be Safe and Secure? Empirical Analysis Of M-Commerce Security Factors

    In today's world, if any business person wants to extend his business and compete, he must follow the supporting activities provided by the well known potter-millers' value chain model. And M-commerce is one of those activities. In previous years, E-commerce is an essential part of successful business trend setup in...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Finger Print and Palm Print Based Multibiometric Authentication System with GUI Interface

    In this paper, a feature-level fusion framework to simultaneously protect multiple templates of a user as a single secure sketch is proposed. The contribution of the proposed work includes an embedded and extraction algorithm so as to reduce the computational complexity, processing time and storage space. A fusion algorithm to...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2013

    Frontline Techniques to Prevent Web Application Vulnerability

    Today web applications are becoming the prime target for cyber-attacks. Web attacks are growing in numbers, with most of organizations in a broad survey reporting that they had recently suffered web attacks. Last few years have shown a significant increase in the number of web-based attacks. Structured Query Language (SQL)...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Security Threats to Data Mining and Analysis Tools of TIA Program

    Data mining is the process that attempts to discover patterns in large data sets. The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns such as groups of data records i.e. cluster analysis, unusual records (anomaly detection) and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Nov 2012

    Enhancing System Security Using Patterns

    In this paper, the authors are suggesting a combined consideration of security design patterns and threat modeling for the enhancement of security in the software systems. Software security helps in building software without security holes thereby preventing the security issues. The best way to do this is to apply specific...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Security Issue on Aodv Routing Protocol Suffering From Blackhole Attack

    An ad-hoc network is a collection of mobile nodes that dynamically form a temporary network and are infrastructure less. This paper deals with security issues when AODV(Ad-hoc On-demand Distance Vector) protocol suffering from Blackhole attack BAODV (Bad Ad-hoc On-demand Distance Vector) routing suffering Blackhole attack, which can simulate blackhole attack...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2012

    Open Source Tools for Security Assessment

    Security assessments can mean different things to different people. This paper discusses common security assessments with open source tools. Each tools of the paper will address a phase of the different levels of security assessments. The paper is written for security practitioners and pen testers, and of course, students who...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Energy Efficient and Secured Routing

    Wireless sensor networks are a new type of networked systems, characterized by severely constrained computational and energy resources, and an ad hoc operational environment. Wireless Sensor Networks (WSNs) have been increasingly available for large-scale applications in which energy efficiency &, security is an important performance measure. Driven by the energy...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2012

    Anomaly Based Network Intrusion Detection by using Data Mining

    As network attacks have increased in number and severity over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Cloud and Intelligent Based SCADA Technology

    Burden placed on municipal utilities continues to increase. Customers demand quick identification of problem and solutions. Regulatory organizations have strict compliance requirements and an unprecedented ability to levy fines. The media is eager to sensationalize security incidents or weaknesses in public and natural resources. Traditional SCADA system, which comprises expensive...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2012

    RFID, GPS & GSM Based Vehicle Tracing & Employee Security System

    A RFID, GPS & GSM based vehicle tracking and employee security system combines the installation of an electronic device in a vehicle, with purpose-designed computer software to enable the company to track the vehicle's location. In vehicle tracking systems the authors use Global Positioning System (GPS) technology for locating the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Nov 2012

    Novel Approach for Hybrid Intrusion Detection System

    Intrusion Detection System (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Basically this paper is to develop host based cum network based intrusion detection system for Microsoft Windows XP environment. Proposed concept that had used in this was applying intrusion detection rule...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2013

    Distributed Denial of Service Attack Prevention Using Critical Link Method in Manet

    Mobile Ad-hoc NETwork (MANET) is self configuring network of mobile node connected by wireless links and considered as network without infrastructure. Routing protocol plays a critical role for efficient communication between mobile nodes and operates on the basic assumption that nodes are completely supportive. Because of open organization and restricted...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2012

    Network Intrusion Detection by Using PCA Via SMO-SVM

    As network attacks have increased in number and severity over the past few years, Intrusion Detection System (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    Attacking Cloud Through Cache Based Side Channel in Virtualized Environment

    Emerging trends in computation such as cloud computing require that computation be carried out in remote and hostile environments, where attackers have unlimited access to the devices, the data and the programs. Recent exploration into the unique security challenges of cloud computing have shown that when virtual machines belonging to...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Sep 2012

    Grid Computing and Cloud Computing: Description and Comparision

    In a basic grid computing system, every computer can access the resources of every other computer belonging to the network. In the ideal grid computing system, every resource is shared, turning a computer network into a powerful supercomputer. It's a special kind of distributed computing. In distributed computing, different computers...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2012

    Implementing Parallel Data Mining Algorithm on High Performance Data Cloud

    Cloud computing technology has been emerged to manage large-scale data efficiently. And due to rapid growth of data, large scale data processing is becoming a focal point of information technique. To deal with this advancement in data collection and storage technologies, designing and implementing large-scale parallel algorithm for Data mining...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Which Cloud Service Provider Should I Opt for??? a Comparative Study of the Various Cloud Service Providers Along with the Focus on Various Techniques for Optimal Service Selection

    In today's world, cloud computing has generated a lot of interest and competition in the industry. With the emergence of new cloud Providers, identifying one that best suits the business needs of an enterprise is a challenging and difficult task. For to a novice or user with little knowledge about...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jun 2012

    Ecommerce Dealer Agent Mechanism in Cloud Computing Environment

    In this paper, the authors offered by software agent who made changes in electronic commerce trading which helps traders for purchasing of product based on the users preferences. The Ecommerce system based on cloud also provide the experience of customize transactions. The main aim of the paper is to create...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Aug 2012

    Gleaming the Cloud in the Virtualization Layer

    Cloud computing is a powerful and flexible software environment, which delegates the material's management and in which users pay as they go. Rather than operating their own data centers, today cloud users run their applications on the remote cloud infrastructures that are owned and managed by cloud providers. Cloud users...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // May 2012

    Survey on Intrusion Detection and Prevention System and Proposed Cost Effective Solution Using Software Agent

    Internet makes life easier, provides a best platform to do business and increases the employment and lots more the list is endless. Everything has two sides; the dark side of internet is its openness. Data are most precious in computer world, and any valuable things are viable target for thieves...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2015

    Recent Trends and Security Analysis of Long Term Evolution (LTE)

    Advancement and standardization of IEEE 802 project brings new fast communication technology called 4G communication or Long Term Evolution (LTE). Recently 3GPP has announces the commercialized version of LTE 4G technology as a LTE-Advance (LTE-A). Previous version of the LTE i.e. release 8 is solitary fastest broad-band technologies base on...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2014

    A Study on Bandwidth Estimation Aspects and Approaches

    One of the major requirements of a mobile network is QoS optimization. This optimization can be achieved using different approach applied at different layers. One of such approach is bandwidth estimation and optimization. Bandwidth optimization is the work applied on data link layer and IP layer respective to physical and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2014

    Protecting End-to-End Location Privacy in Cloud Computing Environment

    Cloud computing is a technology that provides the processing huge amount of data which depend on sharing computing resources like networks, servers, storage, applications, and services. The end-to-end location privacy has been neglecting in the field of cloud computing. Location privacy deals with the hide the location of source and...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jun 2012

    An Overview of Techniques for Framework of Finger Stamping

    There are many, many techniques which can be used to fingerprint networking stacks. Basically, the users just look for things that differ among operating systems and write a investigation for the difference. Remote OS finger stamping is a part of the surveying steps of any goal network attack. Surveying is...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2012

    Anomaly Detection by Naive Bayes & RBF Network

    Intrusion detection by automated means is gaining widespread interest due to the serious impact of Intrusions on computer system or network. Several techniques have been introduced in an effort to minimize up to some extent the risk associated with Intrusion attack. In this paper, the authors have used a novel...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Jan 2013

    A Model for Web Developer to Overcome the Cross Platform Dependency in Mobile Technologies

    Most web developers has problem in building native mobile applications, requiring varied knowledge, skills and forced to change their platform. The technology is growing rapidly and fast enough, for web developers, to keep them up to date with it. Cross-platform apps for mobile are also in use but they don't...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Microprocessor Smart Cards for Centralizing Fare Collection in Public Services

    In today's world where public transit is the most commonly used and affordable means of transport. Dealing with it includes a lot of variables, especially at the time of payment. This problem is faced by almost every commuter in his/her daily routine. To address the problem, the authors propose centralizing...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Mar 2014

    Reliable and Efficient Data Transfer with Minimum Drop and Recovery Mechanism Using LCM in Wireless Sensor Network

    A WSN can be defined as a network of devices, denoted as nodes, which can sense the environment and communicate the information gathered from the monitored field (e.g., an area or volume) through wireless links. The data is forwarded, possibly via multiple hops, to a sink that can use it...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Apr 2014

    Vehicle Position and its Range Determination Based on GPS and GSM Communication System with Android Application

    In this paper the authors allow user to protect their vehicle against unauthorized entering. This paper divided into two main parts the first part is on-board unit that installed in the vehicle to sense if any person enter it and ask user to enter a password to turn on the...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Oct 2013

    Opinions on Opinion Mining: A Survey

    Opinion mining is a fast growing topic with its various application being used by an individual or any large organization. Traditionally, individuals gather feedbacks from their near and dear ones before any purchase, while organization conducts various surveys to improve their services. The largest source of feedbacks, these days, internet...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Dec 2013

    A Study on Image Segmentation Using Different Types of K-Means Clustering

    Image segmentation is the process of partitioning a digital image into several set of pixels or regions. The major goal of the image segmentation is to make simpler or change the illustration of an image into somewhat meaningful. Numerous image segmentations method has been proposed to solve the image segmentation...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    GMT(Graph Mining Techniques) for crime Detection and Comparison with the proposed algorithm

    Cybercrime is one of the leading threats to company confidential data and resources. Now-a-days the criminal activities through the Internet (like stock crime, sniffing, and bank fraud) and through the network are on large scale. If a person or entity is attempting to commit fraud or participate in some sort...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    Secure Reversible Data Hiding with Image Encryption

    Reversible data hiding with image encryption is a technique, in which a secret data is embedded inside a confidential image in such a way that, at the receiver side, both the image and the data can be extracted without any loss. Existing data hiding methods embed data by vacating room...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering

  • White Papers // Feb 2014

    An Efficient Application of Zigbee Technology in Lighting Control

    Now-a-days there are so many applications used in this system which are useful for saving energy and light control. Zigbee is 802.15.4 IEEE standard. The Zigbee is low-cost, low-power consumption, wireless mesh networking standards and it is designed for low power consumption allowing batteries to essentially last forever. Zigbee is...

    Provided By International Journal of Advanced Research in Computer Science and Electronics Engineering