International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 1-40 of 1896 results

  • White Papers // Jul 2014

    Survey on Prevention Methods for DDOS Attacks in MANETS

    Ad-hoc network is the network comprised of wireless nodes. It is infrastructure less network which is self-configured which means the connections are made without any centralized administration. MANET has no clear line of defence so both legitimate network users and malicious attackers can access it. In case of malicious nodes,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Survey of Fully Homomorphic Encryption and Its Potential to Cloud Computing Security

    Cloud computing is considered as one of the most promising innovation in the computing world over a decade. It is an emerging computing technology where applications and all the services are provided through Internet. Cloud computing is definitely money saver for enterprises, however its usage is still hindered by security...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Review on the Present State-of-The-Art of Association Rule Mining

    Most of the data mining applications used by real world enterprises have mechanisms for Frequent Itemset Mining (FIM). The quality FIM is employed using statistical measures such as support and confidence. Association Rule Mining (ARM) is used to generate association rules from frequent item sets. Such rules encapsulate the latent...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Review on Clustering Techniques in Data Mining

    Data mining is referred to as the process of discovering hidden patterns and trends from massive databases. The main motive of data mining process is to extract novel knowledge and use it. Data mining has been defined as the nontrivial extraction of implicit, previously unknown and potentially useful information from...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Survey on Congestion Control Technique in MANET/Review Paper

    In this paper, the authors study and analyze various congestion control mechanisms using a number of routing protocols in Mobile Ad hoc NETwork (MANET). As MANET is infrastructure less network so node movement and data load traffic which exceeds the network capacity, cannot be predicted which leads to problem of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Protective Model of Distributed Denial-of-Service in Internet For Lack of Variations

    Now-a-days Internet is essential part of the people's life but due to Distributed Denial-of-Service (DDoS) attacks its have some critical problems. Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The memory less feature of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Optimization of Job Scheduling in Cloud Computing Environment

    In this paper, the authors address parallel machine scheduling problems with Practical Swarm Optimization (PSO). A PSO approach embedded in a simulation model is proposed to minimize the maximum completion time (make span). The results are compared with those obtained by using the \"Longest processing time\" rule, which is known...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Authentication for securing network Using Passwords with Tree

    In this paper, the authors aim to enhance authorization and authentication process by using multilevel authentication to protect network from spiteful user and unauthorized access, implement security measure to protect data. It will also provide service level security. They provide a simple yet powerful demonstration of how a sturdy change...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Performance of AODV under Flooding Attack

    A Mobile Ad-hoc NETwork (MANET) is a type of ad hoc network that switches the locations and or it can rearrange itself on the fly. Because MANETS are mobile, it uses wireless connections to connect to various networks. This can be a standard LAN connection, or another medium, such as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Palmprint Recognition Using DCT-Mod2 Features and Backpropagation Neural Network

    A biometric system recognizes or authenticates individual based on some physical or behavioral characteristics that are intrinsically unique. Human palmprint image contains some unique features that can easily identify people, which make it a challenging topic for research. This paper proposes a new method for identification of person using palmprint....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Security Issues and Use of Cryptography in Cloud Computing

    Cloud computing means provides computing over the internet. The cloud is not a trust worthy. Hence, the cloud data centers are vulnerable assorted attacks. There is a dependency among the layers. So attack at any layer may affect the other layers. This paper focus on cloud security model for servicing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Irrigation Control System Using Android and GSM for Efficient Use of Water and Power

    The motivation for this project came from the countries where economy is based on agriculture and the climatic conditions lead to lack of rains & scarcity of water. The farmers working in the farm lands are solely dependent on the rains and bore wells for irrigation of the land. Even...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Study on Various Features of Multicast Routing Protocols in Mobile Ad hoc Networks

    In mobile ad hoc networks the routing is performed using multi-hop routing from a source to a destination node (or) nodes. Here, the dynamic routing must be focused since they are infrastructure less networks involving a collection of mobile devices communicating over a wireless link. So, it requires a proper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Monitoring and Controlling Of Distribution Transformer via GSM Modem

    Distribution transformers are one of the most important equipment in power network. Because of, the large number of transformers distributed over a wide area in power electric systems, the data acquisition and condition monitoring is a important issue. The main aim of this system is distribution transformer monitoring and controlling...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Intrusion Detection System for Intranet Security

    Intrusion detection system is the major aspect of network computer security. Unlike firewall, it does not block particular data but keeps track of incoming data and determines whether any intrusion is underway or not. it also has records of previous attacks for future reference. IDS prevent the intrusion in first...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Efficient Biometric Iris Recognition Using Hough Transform With Secret Key

    The demand for an accurate biometric system that provides reliable identification and verification of an individual has increased over the years. A biometric system that provides reliable and accurate identification of an individual is an iris recognition system. Iris recognition systems capture an image of an individual's eye; the iris...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    An Enhanced Steganography Technique for Hiding Text and Image Type Secret Messages

    The proposed concept presents data hiding concept with the combination of cryptography and steganography technique. Proposed concepts are supporting authentication, confidentiality and partially integrity security principal. To achieve these securities principal proposed concept apply symmetric cryptography technique to support confidentiality and authentication security principal and partially integrity security principal supported...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Dynamic Data Transmission Using Wireless Sensor Networks

    Packet transmission is the main important task in present days, because in wireless sensor networks every time topology construction was changed dynamically then transmission is mostly important task in those situation. This process will be done unnecessary users or nodes enter into wireless sensor networks and then they are accessing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    An Approach to Detect and Classify Bugs using Data Mining Techniques

    Web applications are very popular in daily life. With the rapid growth of technologies the usage of web applications are also increasing. Different languages are used for developing the web applications like C++, C#, ASP.NET, PHP and Java. The source code contains several types of bugs and errors. Software product...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Pragmatic Observation for the Detection of Selfish and Malicious Nodes in Ad-hoc Wireless Networks

    A Mobile Ad hoc NETwork (MANETs) are networks composed of a set of communicating devices which are able to spontaneously interconnect without any preexisting infrastructure. Devices in the range can communicate in point to point fashion. Still there are some problems in MANET about security and privacy, especially when used...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Multipath Routing metrics and QoS in Wireless Sensor Networks: Survey and Research Challenges

    Multipath routing is an efficient technique to route data in wireless sensor networks because it provides reliability, security, load balancing, which are critical in resource constrained systems such as WSNs. A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Now-a-days,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Steps In Fingerprint Enhancement Techniques

    In this paper, the authors study that fingerprints are the oldest and most widely used form of biometric identification. The widespread use of fingerprints, there is little statistical theory on uniqueness of fingerprint minutiae. A critical step in study statistics of fingerprint minutiae is to reliably extract minutiae from the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Practical Approaches for Estimating End-To-End Delay in Multi-Hop Networks

    In this paper, the authors present a practical approach which analyses and estimates end-to-end delay networks. The proposed practical results of the end-to-end delay distribution are validated through simulation (C program). Communication reliability is one of the most important concerns and fundamental issues in network systems, such as in cyber...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Trust based Report Payment Scheme for Multihop Wireless Networks

    A secure payment scheme, called as the Trust based Report Payment schEme (TRPE) is used in multi hop wireless networks to stimulate node cooperation, regulate packet transmission and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the trusted authority to update their credit accounts and temporarily...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    An Efficient Approach to Find Best Cloud Provider Using Broker

    Cloud computing is a new technology where one can store data in remote system instead of storing in their own local disk. The companies which provide services to customers are called as cloud service providers. Some of the services are storage, network, database etc. It will be really difficult for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Security Framework - A Case Study of a Higher Education Institution

    Security consideration is a very important issue in every organization today. It is the main concern today to have a very secure information system in place so that hackers from outside and the websites hosted on the servers cannot be attacked or disfigured or the contents cannot be changed by...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Privacy Preserving using Homomorphic Encryption

    In the recent time, privacy preserving has been studied extensively, because of the extensive explosion of sensitive information. Privacy preserving is one of the important areas that aim to provide security for secret information from unsolicited or unsanctioned disclosure. This has triggered the development of much privacy preserving technique using...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Data Transmission Using Efficient FEC over CDMA Channel

    Still image/video is one of the most important and also one of the most challenging types of traffic on communication networks. One of the challenges arises because communication networks can insert errors into still image/video, and also compressed image or compressed video is fragile in the presence of errors; that...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Survey of Different Approaches in Biometric Iris Recognition System

    Biometrics is an automated system that measure physical and behavioral uniqueness to identify an individual. Instead of requiring personal identification cards, keys or passwords, biometrics can identify fingerprints, face, iris, signature, or retinas of an individual for easy and convenient verification. Iris recognition is an automated method of biometric identification...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Review on Attack in MANET

    Mobile Ad hoc NETworks (MANETs) has become one of the most prevalent areas of research in the recent years because of the challenges it pose to the related protocols. MANET is an infrastructure less network with mobile nodes. Due to mobility provided to the node i.e. dynamicity of the network...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Survey Paper on PAPR Reduction Techniques in WiMax OFDM MODEL

    Orthogonal Frequency Division Multiplexing (OFDM) is a method of digital modulation. Multipath reflects the signal with different phases and time arrivals .The best solution of the multipath fading is OFDM. Orthogonal Frequency Division Multiplexing (OFDM) is a multicarrier modulation technique for high speed data transmission over multipath fading channels for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Misdirection Attack in WSN Due to Selfish Nodes; Detection and Suppression using Longer Path Protocol

    Wireless Sensor Network (WSN) applications are extended to fields like consumer, industrial and defense sectors. Thus WSNs are attacked easily by different kinds of attacks out of which misdirection attacks are not easy to detect and defend. Misdirection attacks are a type of Denial of Service (DoS) attacks. Here the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Study on Web Page Prediction Methods Using Web Usage Mining

    The web has become the world's largest repository of knowledge. Web usage mining is the process of discovering knowledge from the interactions generated by the user in the form of access logs, cookies, user sessions data. There is an exponential growth of web log due to which conventional methods were...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Web Search Recommendation System Using Concept Based Mining Techniques

    Data mining is the practice of automatically searching large stores of data to discover patterns and trends that go beyond simple analysis. Web content mining is the application of data mining techniques to discover patterns from the web. This paper proposes a method to extend with concept based mining to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Minimization of Unnecessary Field of View Utilization and Redundant Data Transmission in Wireless Multimedia Sensor Networks

    In this advanced era of science and technology, Wireless Multimedia Sensor Networks (WMSNs) have many applications in almost all the spheres of life starting from medical to military applications. Out of various challenges encountered in WMSNs, redundant data transmission stands as one of the major challenge due to which unnecessary...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    UART Soft-Core - Independent Customizable-Platform

    In this paper, the authors propose a technique for software-implementation of an UART (Universal-Asynchronous-Receive-Transmit) with the goal of getting a customizable UART-core which can be used as a module in implementing a bigger system irrespective of one's choice of implementation platform. Here they have written the core in VHDL (VHSIC...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Detecting Fake Access Point into Wireless Network Using Clock Skews as Fingerprinting Technique

    The presence of Rogue Access Point (RAP) is major security concern in wireless network. If this kind of security threat is alive into WLAN, it results into leakage of confidential information to outside network. In the authors' implementation, they have make used of clock skew of wireless LAN access point...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Proficient Graphical User Interface Based Biometric Iris Recognition System

    In today's scenario there is a great need of an efficient biometric technique that will be used for personal identification. Iris recognition is one of the most widely used biometric identification technique. Accuracy of an iris recognition system is always a concern for researchers because only that factor decides how...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Use of Hybrid GA and PSO for Routing Optimization in MANET

    MANET is the main area of research as it acts as a promising technology for a large range of applications owing to self-configuring and self-organizing capability in numerous networks. Having mobile nodes is the major characteristic of MANET, at the energy constraint of nodes must be considered while designing the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Some issues and challenges of Wireless Sensor Networks

    Sensor network consists of tiny sensors with general purpose computing elements to cooperatively monitor physical or environmental conditions, such as temperature, pressure, etc. They have a great potential for long term applications and also have the ability to transform human lives in various aspects. However, there have been resources constraints...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    PAPR Reduction in OFDM Systems Using a Non-Linear Polynomial Function

    In recent years, Orthogonal Frequency Division Multiplexing (OFDM) has gained significant attention and is preferred for transmission over a dispersive channel. It is because of its several advantages such as high spectral efficiency, low implementation complexity, less vulnerability to echoes and non - linear distortion. However, it has few limitations...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Mitigation of Crosstalk in Optical Network Using Modulation Techniques

    To transmit data from one point to another, some signal path is needed between those points. To create such path a medium is needed to transfer the data. The choice of this medium depends on the requirements and available infrastructure. Examples of media which can be used are air, copper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Study of Cloud Setup for College Campus

    Cloud Storage is an attractive concept in IT field since it allows the resources to be provisioned according to the user needs. It provides services on virtual machines whereby the user can share resources, software and other devices on demand. Cloud services are supported both by Proprietary and Open Source...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Monitoring and Controlling of Bank Security System

    In today's real time modern industrialized world security systems place a vital role. This bank security system is mainly designed to meet the requisite of the security of valuables things (jewels) which are hard earned. Unlike the present system involving the physicals locks which can be easily forged this has...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Enhancing Security of Caesar Cipher by Double Columnar Transposition Method

    Cryptography is an art and science of converting original message into non-readable form. There are two techniques for converting data into non-readable form: transposition technique and substitution technique. Caesar cipher is an example of substitution method. As Caesar cipher has various limitations so this talk will present a perspective on...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Intruder Proof and Authenticated Cryptography

    Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is a science of protecting information by encoding it into an unreadable format. Although, the ultimate goal of cryptography, and the mechanisms that make it up,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Comprehensive Analysis on Intrusion Detection Using Neural Network

    Intrusion detection is the process of detecting intrusion in network which it compromises the confidentiality integrity and availability of a resource. In this paper, the authors mainly focused on neural network algorithm applied for detecting intrusion. Aim of their research paper is to determine which neural network classifies the attacks...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Networking Devices and Topologies: A Succinct Study

    A network can be defined as a group of computers and other devices connected in some ways so as to be able to exchange data. Now in real life scenario several networks with different protocols and architectures are need to be interconnected for efficient communication. To support this feature there...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Securing Iris Templates Using Double Encryption Method

    The important aspect of all verification system is authentication and security. This aspect necessitates the development of a method that ensures user security and privacy. The traditional methods such as tokens and passwords provide security to the users. Uncertainly, the attackers can easily compromise these techniques. In recent years, the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Investigation of Various Throughput Improvement Techniques in DWDM Optical Networks

    When the information is transmitted over the network there are various reasons due to which there is loss of information. Some time due to congested networks the loss is more in the optical networks. As a result the authors need an intellectual algorithm or process which is applied to the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Combined Credit Risk and Collaborative Watchdog Method for Detecting Selfish Node over Mobile Ad-Hoc Network

    MANET is a peer-to-peer multihop mobile wireless network that has neither a fixed infrastructure nor a central server. The resource and mobility constraints of mobile nodes in mobile ad hoc network may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Data Synchronization Using Cloud Storage

    Cloud computing usually consists of front-end user devices and back-end cloud servers. This gives users to access a large volume of storage on cloud. In this project, the user can upload file from mobile or PC to the cloud storage. These files will be automatically synchronized to the user's devices...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Comparitive Handoff Latency Evaluation in IPv6 Based Mobility Management Protocols

    The mobility support protocols are classified into two categories; First, Host-based mobility management protocols such as Mobile IPv6, and its enhancements like FMIPv6, HMIPv6 and FHMIPv6. Secondly, Network-based localized mobility management protocols such as Proxy Mobile IPv6. This paper gives an overview to Host-based Mobility Management Internet Protocols. MIPv6 has...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Error Detection and Correction: An Introduction

    Unlike wired digital networks, wireless digital networks are much more prone to bit errors. Packets of bits that are received are more likely to be damaged and considered unusable in a packetized system. Error detection and correction mechanisms are vital and numerous techniques exist for reducing the effect of bit-errors...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Intrusion Detection System Using Wireshark

    Network Intrusion Detection System (NIDS) is an independent system that monitors the network traffic and analyzes them if they are free from attack or not. Network Intrusion Detection System (NIDS) is an intrusion detection system that attempts to discover unauthorized access to a computer network by analyzing traffic on the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Node Placement and Coverage in Asymmetrical Area

    What is the most important problem in sensor network designing is how to place sensors. Their arrangement can be designed carefully in order to build a surveillance system for optimization is very effective to achieve the desired design goals. With using the appropriate nodes placement, the authors can improve parameters...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    RFID Authentication Protocol: A Review

    RFID (Radio Frequency IDentification) is recently becoming popular due to its convenience and economical efficiency. Furthermore, RFID nowadays comes into the spotlight as a technology to substitute the barcode. On the other hand, RFID is jeopardized from various attacks and problems as an obstacle of widespread RFID deployment: replay, spoofing,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Security Through SSL

    As Internet has reached every home, so is the increase in the number of users. The studies have shown as the number of internet users is increasing day by day, there is increase in online transactions. As more number of websites are coming up with easy facility of transmitting information...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Implementation of Educational Cloud in Education Sector

    Cloud provides almost everything as service, and infrastructure provides resources as service over the Internet, and Storage cloud can provide storage as a service. These services can be used for storing and processing large data set over Internet. Due to the growth of educational institution all over the world there...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security

    In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    DDOS Attacks on Network; Anomaly Detection using Statistical Algorithm

    Distributed Denial-of-Service (DDoS) flood attack remains great threats to the Internet. This kind of attack consumes a large amount of network bandwidth or occupies network equipment resources by flooding them with packets from the machines distributed all over the world. To ensure the network usability and reliability, real-time and accurate...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    An Analysis on Denial of Service Attacks and Packets Defending Methodologies in Wireless Sensor Networks

    Security measures have been proposed to identify, isolate, mitigate and prevent the Denial of Service attacks in Wireless Sensor Networks. The wireless networks are preferred over the traditional approaches for its faster accessibility, connectivity, and compatibility among the extended variant set of users. Yet the need of authenticating the frames...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Comprehensive Study of Applications of Wireless Sensor Network

    There have been immense advancements in field of technology over the past years. Small size, low cost sensor networks have been developed which are capable of collecting, analyzing and transmitting information to a central processor node for further analysis and report generation. Wireless sensor network is a term for densely...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Comparative Assessment on the Jammers and Defensive Mechanisms in Wireless Sensor Networks

    The global applicability of the wireless technology for communication between devices has altered the entire framework for networks. Mobility of the devices yet allowed to access the services and flexibility are the stated advantages. But still the security measures need additional methodologies to prevent the illegitimate usage and attack to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Improved Chain Based Routing Protocol for WSN

    A WSN is a specialized wireless network made up of a large number of sensors and at least one base station. Recent technological advances in communications and computation have enabled the development of low-cost, low-power, small in size, and multifunctional sensor nodes in a Wireless Sensor Network (WSN). Since the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Novel caching strategy for time varying data for Mobile Networks

    The improvements in the computational and communication capabilities of mobile devices has made them all pervasive and is leading to Ubiquitous computing in which all computations will fade into the background. Much of research has gone into improving the functionality, computational power, size and power constraints of mobile devices such...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    An Improved PEGASIS Protocol to Enhance Energy Utilization in Wireless Sensor Network

    Wireless sensor network is an ad hoc network. Each sensor is defined with limited energy. Wireless sensor node deployed into the network to monitor the physical or environmental condition such as temperature, sound, vibration at different location. Each node collected the information than transmit to the base station. The data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Service Discovery in ADHOC Networks

    Service discovery dilemma creates new confront in ad-hoc networks. Due to the highly energetic nature of these networks and their bandwidth, energy these networks pose new challenges during service discovery. Traditional resolutions used in the Internet are hence not well suited for ad-hoc networks. In wireless ad-hoc networks, the system...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Automated Call Transfer Technique for Heterogeneous MANET

    Call Transferring is the essential functionality for dealing with the mobility of the mobile users in mixed or heterogeneous network. Compared with the conventional handover employed in the mobile networks, the complete call transfer is being proposed for 3G/4G for better performance on both link and system level. Previous work...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Security Issues and Security Algorithms in Cloud Computing

    Cloud Computing is the use of activity of using Computer hardware and software. Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third party provider who owns the infrastructure. It is often provided "As a service"...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Secured Multi-keyword Ranked Search over Encrypted Cloud Data

    Next generation computing stared with the advent of Cloud computing. In cloud computing data possessor are goaded to farm out their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. To ensure the safety of stored data, it becomes must to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    A Survey on Routing Protocols of MANETs by Using QoS Metrics

    MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. Routing is a critical issue in MANET and hence the focus of this paper along with the performance analysis of routing protocols. He growing interest in mobile ad hoc network technique has resulted in many...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Improving QoS in Adhoc Networks Using Fuzzy Network

    A Mobile Ad-hoc NETwork (MANET) is a collection of self-organized mobile nodes that are capable of communicating with each other without the aid of any established infrastructure or centralized administration. Routing algorithm has been a challenge task in the wireless ad hoc network for a long time due to the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    All the Way through Cellular Phones to Save Mishap Victims

    The proposal has been developed keeping in mind the considerations of cost and compatibility with existing system. The Short Message Service or SMS as it is popularly referred to, is made use of for this purpose. The solution offered is the Force-Transducer method. The victim is assumed to be unconscious...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Design an Enhanced Certificate Based Authentication Protocol for Wireless Sensor Networks

    Wireless sensor networks, have authorized data gathering from a vast geographical region, and for a wide range of tracking and monitoring application from both civilians and military domains, unprecedented opportunities is present. To the demands of the network users, it is expected that the WSNs would process, store and provide...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    A Security of Wireless Sensor Networks and Analysis on Efficient Broadcast Authentication

    A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize one way key chains and delayed disclosure of keys; however, such an approach requires time synchronization and delayed authentication. Another technique uses one-time signature schemes. Unfortunately, such schemes...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Performance Comparison of OLSR, GRP and TORA Using OPNET

    A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Dynamic Resource Allocation and Data Processing Framework for Cloud Architecture

    Cloud Computing has became an emerging area in the recent areas. It extends services like SaaS, PaaS and IaaS. One of the complicated applications in IaaS is parallel data processing. Parallel data processing is needed to integrate and deploy their programs in customer premises. However, the processing frameworks which are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Proposed Method of Cryptographic Key Generation for Securing Digital Image

    In the digital world, security is an important issue, and encryption is one of the ways to ensure security. In this paper, the authors presents image encryption/decryption scheme using biometric template (Palm Print). The proposed scheme is especially useful for encryption of large amounts of data, such as digital images...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Feature Extraction Algorithm of Fingerprint Recognition

    Most fingerprint matching algorithms are based on finding correspondences between minutiae in two fingerprints. In this paper, the authors present a modification of minutiae matching method, which utilizes correlation scores between the local neighbourhood areas of corresponding minutiae pairs and the edges that connect neighbouring matched minutiae pairs. Minutiae based...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)