International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 1-40 of 2048 results

  • White Papers // Nov 2014

    Comparative Study of Nymble

    In order to allow users to access Internet services privately, anonymizing networks like Tor uses a series of routers to hide the client's IP address from the server. These networks, however, have been marred by users employing this anonymity for abusive purposes such as defacing popular web sites. Usually, web...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Study on Security Methods, Threats in Wireless Body Area Networks

    As there is more research is going on Wireless Body Area Networks (WBANs) on their QoS and energy improvement as every sensor node in WBANs is having some constraints like energy consumption. However another major constraint is security, as this network collecting the important information. Therefore there must have efficient...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Overview of Routing Protocols in Wireless Local Area Networks

    In this paper, the authors X-rays the overview of routing protocols in Wireless Local Area Network (WLAN). Wireless network comprises of many applications in mobile computing systems, laptops, IPADs and PDAs, which are dynamically and arbitrarily interconnected. These systems are capable of changing state on a regular basis, thereby altering...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Design and Performance Analysis of Compact Corner Notched Printed Rectangular Monopole Antenna (PRMA) for Ultra-Wideband (UWB) Communications

    In this paper a compact corner notched Rectangular Monopole Patch Antenna (RMPA) has been proposed for ultra-wideband communications. Based on a reference RMPA, multiple antennas have been designed and performance parameters have been analyzed. As performance parameters return losses, impedance bandwidth, Voltage Standing Wave Ratio (VSWR), gain, radiation pattern and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Overview of 4G Technologies

    Demand of wireless data services are constantly growing with increasing usage of Internet services. 4G is a term used to refer to the next wave of high speed mobile technology that will be used to replace the current 3G network. 4G technology provides high speed mobile broadband Internet access. For...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Design and Development of New Symmetric Cryptography Protocol to Improve Text Security

    Internet is easiest communication channel between two parties. During communication between parties' lots of text information's is transmitted from one system to another system. This is an immense thing at sending end but at receiving end it comes with immense risk. Chances of hacking of information during the transmission process...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    94 POS Terminal using Biometrics for Attendance Management System

    In this paper, the development of an attendance management system using biometrics is proposed. Managing employee attendance during working hours and shifts has become a difficult challenge. The ability to compute the attendance percentage becomes a major task as manual computation produces errors, and also wastes a lot of time....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Mod-Encoder Based Compression Algorithm for Secure Data Communications

    Now-a-days, data communications over internet is increased, as the internet usage is increased, the traffic and adversary attacks on the communication path also increased. To avoid attacks, secure data communications are needed to provide privacy and confidentiality of data. Cryptography is the most secure mechanism to provide privacy and confidentiality....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Artificial Intelligence in E learning Using Pedagogical Software Agents

    The field of artificial intelligence in education has becoming the most challenging area in the last several decades. Using AI concept and techniques, new forms of intelligent software can be created. That allows the computer to act as an intelligent learner or tutor. Therefore the aim of this paper is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Genetic Algorithm based Path Optimization for Extending the Network's Lifetime in Multi-Hops Wireless Sensor Networks

    Wireless sensor networks consists of a number of spatially distributed energy constraint nodes. Since sensor nodes are energy constraint, so the authors aim is to maximize the network lifetime by utilizing the energy of nodes very efficiently. This paper focuses on reducing the involvement of the most power hungry node...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Weighted Sum Method Scheduling Chaining System for Efficient Data Routing

    Wireless sensor network may consists of a large number of wireless sensor nodes deployed in the desired network area in order to sense the specific changes going in there. As these sensor nodes are limited source of energy so the authors focuses on utilizing the energy of these nodes as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    An Efficient Strategy for Stability Management of Cache in Ad Hoc Networks

    In mobile ad hoc networks environments, data caching is necessary as it increases the capability of mobile devices to access required data, and get better overall system performance. The mechanisms of cache consistency in the literature are grouped into three most important categories such as push based, pull based, as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Software Reliability with Random Test Cases

    The probability of failure-free operation of a computer program in a specified environment for a specified time, called reliability. The prime concern in software quality is reliability. There are many approaches to calculate reliability. Here the authors are calculating reliability by using Mean Time To Failure (MTTF). In this paper,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Redundancy Management of Multipath Routing for Intrusion Tolerance of Packet Loss by Malicious Node in HWSN

    In this paper, the authors propose redundancy management of Heterogeneous Wireless Sensor Networks (HWSNs) where they are utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes which cause packet loss in the network. The research problem they are addressing in this paper is efficient...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    IEURC: Integrity of Shared Data with Efficient User Revocation in the Cloud

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and security in the cloud storage, users in the group need to compute signatures on all the blocks in shared data, and due to data modifications performed by different users, different...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Comparative Study of the Various Routing Protocols in Mobile Ad-Hoc Networks Using OPNET Simulator

    Mobile Ad-hoc NETworks (MANETs) is type of network which built up spontaneously whenever communicating devices come into range. Due to high mobility of nodes link breakage occurs frequently, Nodes In a network service as host as well as a router. MANET does not have any fixed infrastructure and inanity of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Survey on Blocking Probability in MPLS

    MPLS has high-lightened as the most promising technology for the internet to provide the speed and bandwidth guaranteed services. In this paper, focus is on the blocking probability and load congestion when traffic is overloaded. When network resources are insufficient to accommodate the offered load then load congestion exists. It...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Study of Design and Development of Integrated Development Environment using Qt C++ Framework

    In this paper, the authors concerned with the construction and development of a tool known as the Integrated Development Environment (IDE) using Qt C++ framework. An IDE is computer software which basically includes source code editor, a compiler or interpreter or both, build automation tools and a debugger and provides...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    The Role of Best bits in Iris for Efficient Person Authentication

    Biometric person authentication techniques based on the pattern of the human iris is well suited to be applied to any access control system requiring a high level of security due to the desirable properties such as distinctiveness, non-invasiveness, and stability of iris patterns. In this paper, the authors have attempted...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Secure Data Access with Enhanced Two Factor Authentication in Cloud Computing

    Cloud computing is an emerging trend in today's world and becoming very efficient and useful. Cloud computing is basically a shared pool of resources that includes software, storage, data, applications and infrastructure. The services are offer on pay per user basis. Storage as a service is a kind of service...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Survey on Cluster Formation for Wireless Sensor Network

    To form a WSN, the most important issues is addressing. Although Wireless Sensor Networks (WSNs) have been extensively researched, their deployment is still a main concern. In this paper, the authors show that the address assignment scheme defined by ZigBee will perform poorly in terms of address utilization. This paper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Survey on Biometric Human Gait Recognition

    Biometrics refers to the metrics related to human characteristics and traits. Human recognition biometrics basically came into existence from real life criminal and forensic applications. Human gait recognition is a distance based behavioral feature of biometric. It is relatively a new area being studied nowadays mainly because it is unobtrusive....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Steganography: A Data Hiding Technique

    The proliferation of the Internet has made it possible for anybody to send and receive information instantly from anywhere around the world. Communication of secret information is a major challenge and its complexity increases with the levels of sophistication. Steganography is a form of data hiding technique that provides mechanism...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    An Attacker Misbehavior and Security Schemes to Protect MANET: A Survey

    Security has become a critical issue between the mobile nodes in MANET. MANET is generally more prone to physical security attacks and threats than the fixed-cable networks. The inherent characteristics of MANET such as wireless medium, highly dynamic topology, distributed cooperation, resource constrained capability and limited physical security poses number...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Security Schemes in Distributed Data Storage Using Proxy Re-encryption

    Present days many users store their important data in cloud. To ensure that the security of the cloud stored data users need to encrypt the important data. The point of data security which has always been important aspect of quality, cloud computing cause a new security threats. In cloud computing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Dynamic Beaconing Strategy for Geographic Routing in MANET

    Nodes have to update their registry on nearby nodes so as to forward effectively. This applies to geographic routing. Beacon packets that contains the geographic location of nodes. Previously, node mobility independent periodic beaconing and patterns in traffic were analyzed and was found to be cost intensive for updating and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Rate Adaptive Video Multicast in Multirate Wireless Networks

    Adapting modulation and transmission bit-rates for video multicast in a multi rate wireless network is a challenging problem because of network dynamics, variable video bit-rates and varied clients who may expect differentiated video qualities. Prior work on the leader-based schemes selects the transmission bit-rate that provides reliable transmission for the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Recent Attacks on SSL

    Normally, the data is transmitted in plain text between a server and client. Secure Socket Layer, known as SSL is a security protocol. SSL is used to establish a secure connection between server and client. Recently in 2014, few attacks were identified by security researchers on SSL. The authors are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    An Analysis on Cloud Security Mechanism

    Cloud computing is a well known term in the field of software industry. In this paper, the authors give a short description on cloud computing, its architecture which contains IaaS, PaaS and SaaS its deployment model public, private, hybrid and community cloud is described. Cloud computing has some severe issues...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Gateway Based Shortest Path Detection Using Dijkstra's Algorithm and Closest Adjacency Condition (DA-CAC) in WSN

    Wireless network is the most growing area of recent research because of its wide applicability and huge user quantity. Networks operating in wireless medium are based on the type of service by which communication is offered like MANET, WSN, ZigBee, Bluetooth, cognitive etc. Wireless Sensor Network (WSN) is one of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Relative Analysis of Hierarchical Routing in Wireless Sensor Networks Using Cuckoo Search

    Wireless sensor networks are those networks which are composed by the collection of very small devices mainly named as nodes. These nodes are integrated with small battery life which is very hard or impossible to replace or reinstate. For the sensing, gathering and processing capabilities, the usage of battery is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Survey on Imparting Data in Cloud Storage Using Key Revocation Process

    Cloud computing is ideal for places where the data remain in a fixed environment, which are unavailable. Today imparting of data with security places is a major issue in cloud computing. For security issues key aggregate place a vital role to offer secured data transfer. This paper provides the various...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    To Reduce Energy Consumption Using Neural Network and Knowledge Based Techniques in WSN

    Wireless Sensor Networks (WSNs) consists of large number sensor nodes. The sensor nodes are battery powered devices, they communicate over a wireless medium and consumes energy during data transmission. In the past year's various techniques have been proposed to reduce the battery consumption of wireless sensor networks. The previous approaches...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Hybrid Optimization using Genetic Algorithm and Neural Network in CBIR

    Widespread cardinality of images and paintings has made traditional keyword based search, an inefficient method for retrieval of required input image data. When the authors input an image into the database, then Content-Based Image Retrieval (CBIR) system gets the similar images from a large database for that query image. Implementation...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Detection and Prevention Techniques for Black hole Attack in Wireless Sensor Networks (WSN's): A Review

    Wireless sensor network is one of the emerging areas of research in present scenario. It is a wireless means of communication in which nodes can communicate without any physical medium. As there is no communication media, the data is transmitted from one node to another in the form of packets....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Survey on Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

    A social networking service is an online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. A social network service consists of a representation of each user, his/her social links, and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Study of IPv4 and IPv6 Features

    Internet Protocol (IP) is widely used on the internet. It is one of the major protocols in TCP/IP protocol suite. It is used to identify each host on the network through logical addresses. Nowadays there are two versions of internet protocol, Ipv4 (Internet protocol version 4) and Ipv6 (Internet protocol...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    An Influence: Vendor Locking in Meta Cloud

    Cost and scalability benefits of cloud storage services are apparent. However, selecting a single storage service provider limits availability and scalability to the selected provider and may further cause a vendor lock-in effect. In this paper, the authors present meta storage, a federated cloud storage system that can integrate diverse...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Comparative and Analysis Study of Data Flow in Different Computer Network Topologies

    Basically, topology is usually schematic description of the arrangement of a network, including its nodes and connecting lines. Topology plays a great role in computer network for connecting computers. Topology is designed for both small and large networks. Topology takes different types to construct those networks based on their needs....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    NSP: Price Variation for Network Users

    Recent papers have shown that the majority of today's internet traffic is related to Peer-To-Peer (P2P) traffic. The study of bandwidth in P2P networks is very important. Because it helps the authors in more efficient capacity planning and QoS provisioning when they would like to design a large scale computer...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    PAPR Reduction in OFDM Systems Using a Non-Linear Polynomial Function

    In recent years, Orthogonal Frequency Division Multiplexing (OFDM) has gained significant attention and is preferred for transmission over a dispersive channel. It is because of its several advantages such as high spectral efficiency, low implementation complexity, less vulnerability to echoes and non - linear distortion. However, it has few limitations...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Mitigation of Crosstalk in Optical Network Using Modulation Techniques

    To transmit data from one point to another, some signal path is needed between those points. To create such path a medium is needed to transfer the data. The choice of this medium depends on the requirements and available infrastructure. Examples of media which can be used are air, copper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Study of Cloud Setup for College Campus

    Cloud Storage is an attractive concept in IT field since it allows the resources to be provisioned according to the user needs. It provides services on virtual machines whereby the user can share resources, software and other devices on demand. Cloud services are supported both by Proprietary and Open Source...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Monitoring and Controlling of Bank Security System

    In today's real time modern industrialized world security systems place a vital role. This bank security system is mainly designed to meet the requisite of the security of valuables things (jewels) which are hard earned. Unlike the present system involving the physicals locks which can be easily forged this has...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Enhancing Security of Caesar Cipher by Double Columnar Transposition Method

    Cryptography is an art and science of converting original message into non-readable form. There are two techniques for converting data into non-readable form: transposition technique and substitution technique. Caesar cipher is an example of substitution method. As Caesar cipher has various limitations so this talk will present a perspective on...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Intruder Proof and Authenticated Cryptography

    Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is a science of protecting information by encoding it into an unreadable format. Although, the ultimate goal of cryptography, and the mechanisms that make it up,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Comprehensive Analysis on Intrusion Detection Using Neural Network

    Intrusion detection is the process of detecting intrusion in network which it compromises the confidentiality integrity and availability of a resource. In this paper, the authors mainly focused on neural network algorithm applied for detecting intrusion. Aim of their research paper is to determine which neural network classifies the attacks...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Networking Devices and Topologies: A Succinct Study

    A network can be defined as a group of computers and other devices connected in some ways so as to be able to exchange data. Now in real life scenario several networks with different protocols and architectures are need to be interconnected for efficient communication. To support this feature there...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Securing Iris Templates Using Double Encryption Method

    The important aspect of all verification system is authentication and security. This aspect necessitates the development of a method that ensures user security and privacy. The traditional methods such as tokens and passwords provide security to the users. Uncertainly, the attackers can easily compromise these techniques. In recent years, the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Investigation of Various Throughput Improvement Techniques in DWDM Optical Networks

    When the information is transmitted over the network there are various reasons due to which there is loss of information. Some time due to congested networks the loss is more in the optical networks. As a result the authors need an intellectual algorithm or process which is applied to the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Combined Credit Risk and Collaborative Watchdog Method for Detecting Selfish Node over Mobile Ad-Hoc Network

    MANET is a peer-to-peer multihop mobile wireless network that has neither a fixed infrastructure nor a central server. The resource and mobility constraints of mobile nodes in mobile ad hoc network may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Data Synchronization Using Cloud Storage

    Cloud computing usually consists of front-end user devices and back-end cloud servers. This gives users to access a large volume of storage on cloud. In this project, the user can upload file from mobile or PC to the cloud storage. These files will be automatically synchronized to the user's devices...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Comparitive Handoff Latency Evaluation in IPv6 Based Mobility Management Protocols

    The mobility support protocols are classified into two categories; First, Host-based mobility management protocols such as Mobile IPv6, and its enhancements like FMIPv6, HMIPv6 and FHMIPv6. Secondly, Network-based localized mobility management protocols such as Proxy Mobile IPv6. This paper gives an overview to Host-based Mobility Management Internet Protocols. MIPv6 has...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Error Detection and Correction: An Introduction

    Unlike wired digital networks, wireless digital networks are much more prone to bit errors. Packets of bits that are received are more likely to be damaged and considered unusable in a packetized system. Error detection and correction mechanisms are vital and numerous techniques exist for reducing the effect of bit-errors...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Intrusion Detection System Using Wireshark

    Network Intrusion Detection System (NIDS) is an independent system that monitors the network traffic and analyzes them if they are free from attack or not. Network Intrusion Detection System (NIDS) is an intrusion detection system that attempts to discover unauthorized access to a computer network by analyzing traffic on the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Node Placement and Coverage in Asymmetrical Area

    What is the most important problem in sensor network designing is how to place sensors. Their arrangement can be designed carefully in order to build a surveillance system for optimization is very effective to achieve the desired design goals. With using the appropriate nodes placement, the authors can improve parameters...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    RFID Authentication Protocol: A Review

    RFID (Radio Frequency IDentification) is recently becoming popular due to its convenience and economical efficiency. Furthermore, RFID nowadays comes into the spotlight as a technology to substitute the barcode. On the other hand, RFID is jeopardized from various attacks and problems as an obstacle of widespread RFID deployment: replay, spoofing,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Security Through SSL

    As Internet has reached every home, so is the increase in the number of users. The studies have shown as the number of internet users is increasing day by day, there is increase in online transactions. As more number of websites are coming up with easy facility of transmitting information...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Implementation of Educational Cloud in Education Sector

    Cloud provides almost everything as service, and infrastructure provides resources as service over the Internet, and Storage cloud can provide storage as a service. These services can be used for storing and processing large data set over Internet. Due to the growth of educational institution all over the world there...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Implementation of Caesar Cipher with Rail Fence for Enhancing Data Security

    In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information sharing is susceptible to certain attacks. Cryptography was introduced to solve this problem. Cryptography is art for achieving security by encoding the plain text message to cipher text. Substitution and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    DDOS Attacks on Network; Anomaly Detection using Statistical Algorithm

    Distributed Denial-of-Service (DDoS) flood attack remains great threats to the Internet. This kind of attack consumes a large amount of network bandwidth or occupies network equipment resources by flooding them with packets from the machines distributed all over the world. To ensure the network usability and reliability, real-time and accurate...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    An Analysis on Denial of Service Attacks and Packets Defending Methodologies in Wireless Sensor Networks

    Security measures have been proposed to identify, isolate, mitigate and prevent the Denial of Service attacks in Wireless Sensor Networks. The wireless networks are preferred over the traditional approaches for its faster accessibility, connectivity, and compatibility among the extended variant set of users. Yet the need of authenticating the frames...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Comprehensive Study of Applications of Wireless Sensor Network

    There have been immense advancements in field of technology over the past years. Small size, low cost sensor networks have been developed which are capable of collecting, analyzing and transmitting information to a central processor node for further analysis and report generation. Wireless sensor network is a term for densely...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Comparative Assessment on the Jammers and Defensive Mechanisms in Wireless Sensor Networks

    The global applicability of the wireless technology for communication between devices has altered the entire framework for networks. Mobility of the devices yet allowed to access the services and flexibility are the stated advantages. But still the security measures need additional methodologies to prevent the illegitimate usage and attack to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Improved Chain Based Routing Protocol for WSN

    A WSN is a specialized wireless network made up of a large number of sensors and at least one base station. Recent technological advances in communications and computation have enabled the development of low-cost, low-power, small in size, and multifunctional sensor nodes in a Wireless Sensor Network (WSN). Since the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Novel caching strategy for time varying data for Mobile Networks

    The improvements in the computational and communication capabilities of mobile devices has made them all pervasive and is leading to Ubiquitous computing in which all computations will fade into the background. Much of research has gone into improving the functionality, computational power, size and power constraints of mobile devices such...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    An Improved PEGASIS Protocol to Enhance Energy Utilization in Wireless Sensor Network

    Wireless sensor network is an ad hoc network. Each sensor is defined with limited energy. Wireless sensor node deployed into the network to monitor the physical or environmental condition such as temperature, sound, vibration at different location. Each node collected the information than transmit to the base station. The data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Service Discovery in ADHOC Networks

    Service discovery dilemma creates new confront in ad-hoc networks. Due to the highly energetic nature of these networks and their bandwidth, energy these networks pose new challenges during service discovery. Traditional resolutions used in the Internet are hence not well suited for ad-hoc networks. In wireless ad-hoc networks, the system...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Automated Call Transfer Technique for Heterogeneous MANET

    Call Transferring is the essential functionality for dealing with the mobility of the mobile users in mixed or heterogeneous network. Compared with the conventional handover employed in the mobile networks, the complete call transfer is being proposed for 3G/4G for better performance on both link and system level. Previous work...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Security Issues and Security Algorithms in Cloud Computing

    Cloud Computing is the use of activity of using Computer hardware and software. Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third party provider who owns the infrastructure. It is often provided "As a service"...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Secured Multi-keyword Ranked Search over Encrypted Cloud Data

    Next generation computing stared with the advent of Cloud computing. In cloud computing data possessor are goaded to farm out their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. To ensure the safety of stored data, it becomes must to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    A Survey on Routing Protocols of MANETs by Using QoS Metrics

    MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. Routing is a critical issue in MANET and hence the focus of this paper along with the performance analysis of routing protocols. He growing interest in mobile ad hoc network technique has resulted in many...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Improving QoS in Adhoc Networks Using Fuzzy Network

    A Mobile Ad-hoc NETwork (MANET) is a collection of self-organized mobile nodes that are capable of communicating with each other without the aid of any established infrastructure or centralized administration. Routing algorithm has been a challenge task in the wireless ad hoc network for a long time due to the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    All the Way through Cellular Phones to Save Mishap Victims

    The proposal has been developed keeping in mind the considerations of cost and compatibility with existing system. The Short Message Service or SMS as it is popularly referred to, is made use of for this purpose. The solution offered is the Force-Transducer method. The victim is assumed to be unconscious...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Design an Enhanced Certificate Based Authentication Protocol for Wireless Sensor Networks

    Wireless sensor networks, have authorized data gathering from a vast geographical region, and for a wide range of tracking and monitoring application from both civilians and military domains, unprecedented opportunities is present. To the demands of the network users, it is expected that the WSNs would process, store and provide...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    A Security of Wireless Sensor Networks and Analysis on Efficient Broadcast Authentication

    A broadcast authentication mechanism is important in wireless sensor networks, assuring receivers of a packet's validity. To provide authentication, some researchers utilize one way key chains and delayed disclosure of keys; however, such an approach requires time synchronization and delayed authentication. Another technique uses one-time signature schemes. Unfortunately, such schemes...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Performance Comparison of OLSR, GRP and TORA Using OPNET

    A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Dynamic Resource Allocation and Data Processing Framework for Cloud Architecture

    Cloud Computing has became an emerging area in the recent areas. It extends services like SaaS, PaaS and IaaS. One of the complicated applications in IaaS is parallel data processing. Parallel data processing is needed to integrate and deploy their programs in customer premises. However, the processing frameworks which are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Proposed Method of Cryptographic Key Generation for Securing Digital Image

    In the digital world, security is an important issue, and encryption is one of the ways to ensure security. In this paper, the authors presents image encryption/decryption scheme using biometric template (Palm Print). The proposed scheme is especially useful for encryption of large amounts of data, such as digital images...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Feature Extraction Algorithm of Fingerprint Recognition

    Most fingerprint matching algorithms are based on finding correspondences between minutiae in two fingerprints. In this paper, the authors present a modification of minutiae matching method, which utilizes correlation scores between the local neighbourhood areas of corresponding minutiae pairs and the edges that connect neighbouring matched minutiae pairs. Minutiae based...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)