International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 361-400 of 2185 results

  • White Papers // Jun 2014

    Routing Protocols in Infrastructure-Less Opportunistic Networks

    Opportunistic networks provide communication facilities by the intermittent connectivity among mobile nodes. Opportunistic network is an extension of MANET where complete path between two nodes wishing to communicate is unavailable. OPPortunistic NETworks (OPPNET) consider mobility, partitions, disconnections, etc. as norms instead of the exceptions. Due to the disconnections and re-connections...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Comparative Analysis of Private Key Cryptography Algorithms: DES, AES and Triple DES

    Today's internet world is very competitive and to survive in such a competitive world there must be a secure environment to communicate. Internet and network applications are growing fast day-by-day. For this purpose there is a requirement of efficient and strong algorithm which will provide strong encryption and all these...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Private Recommendation Based On Elgamal Homomorphic Encryption Scheme

    In recommender systems, online services access the user's profiles in order to generate useful recommendations. Depends on privacy perceptive data collected from the users, it generates recommendation in online services. Protecting the privacy of all participants is an essential requirement of the basic information filtering architectures, because the organize recommender...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Qos Aware Energy Efficient Routing in Wireless Sensor Networks

    Energy is a critical resource parameter in wireless sensor networks. Utilizing energy in an efficient manner is a challenging task in wireless sensor networks. This paper presents an overview on various energy efficient routing protocols which satisfies the criteria of QoS parameters. Various energy efficient and QoS based routing protocols...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Privacy and Integrity Preservation of Equality Tuple Queries Using Pairing Based Homomorphic Cryptosystem in WSN

    In today's world the need of WSN has increased not only in critical areas like military applications but also it has drastically increased in day today life like weather information and agriculture field. As WSN's gives an efficient and robust platform for all applications which will otherwise be hard to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Adaptive Routing In Communication Networks by Back Pressure

    In the paper, the authors contain considered every packet be running scared down a probably unlike course by using back pressure based adaptive routing algorithm. So there is poor delay performance and involve high implementation comply. Soon after than considered back pressure algorithm by obviously, they have developed a new...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    An Approach to Detect and Recognize Face using Swarm Intelligence and Gabor Filter

    Face recognition is an obscure and enchants software achievement. This is non-intrusive technique. This paper focuses on the method of feature extraction and feature selection to boost up the efficiency of face recognition systems. Here the authors are using minimal selected features with encouraging results in face recognition. This paper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Attribute Based Encryption with Verifiable Outsourced Decryption

    Attribute based encryption with verifiable outsourced decryption is a challenging application that server public key based one to many encryption that allows the user for the encryption and the decryption of the file/ data based on his own attributes. This application also server the user in terms of security saying...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Empirical Evaluation of Mutation Testing for Improving the Security and Reliability of Web-Application

    In today's world as the use of web-application is increasing the need of security in web application is also increasing. Securing web-application is very important as it has critical data and wide usage .The success of any web-application depends upon the security provided in it. The authors use mutation testing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Enhancing Software Quality Using Defect Preventation Techniques at Design Phase of SDLC

    Defect preventation is one of the important parts in software engineering. To improve software quality, the defects will find out at earlier stages of Software Development Life Cycle (SDLC). The purpose of defect preventation is to identify those defects in beginning or earlier phases of SDLC and prevent their reoccurrence....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Static and Dynamic Analysis of Object Oriented Systems

    A good quality software product requires efficient measures to accurately monitor the internal software quality attributes. Software metrics have been widely and successfully used to measure such internal quality attributes for object-oriented software systems. Coupling is an important qualitative measure for measuring the performance of software. Coupling is defined as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    E-Mail Spam Detection Using NLP

    Email is the \"Killer network application\". Email is ubiquitous and pervasive. In a relatively short time frame, the Internet has become irrevocably and deeply entrenched in the authors' modern society primarily due to the power of its communication substrate linking people and organizations around the globe. Much work on email...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Partition Base CAC with Queuing Model for 802.16e

    Call Admission Control (CAC) plays a vital role in providing Quality of Service (QoS) performance of the system. IEEE 802.16 standard does not describe the procedure for implementing CAC. There is a need of efficient CAC algorithm that simultaneously manages traffic and wisely utilizes the available bandwidth resources. In this...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Improving the Stability and Quality of Service in Cluster Head Using Rule Base System in MANET

    In this paper, the authors consider the problem of finding high and low frequency node disjoint and multi constrained QoS using different paths from source to destination with the help of agent based fuzzy inference system. CGSR protocol divide the network into several small areas called clusters and the members...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Review on Software Quality Estimation

    Software quality is controlled by many types of uncertainties that occur during software development process which makes it difficult for the designer to evaluate the software quality. Software reuse has become a topic of much interest in the software community due to its potential benefits, which include increased product quality...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Comparative Performance in Routing Protocols for VANET

    A vehicular ad-hoc network is a new technique of MANET (Mobile Ad-hoc NETwork) which is used for establishes the communication linkage between road vehicles or located roadside infrastructure. In this paper, the authors have compared the throughput performance of three VANET routing protocol DSDV, AODV and DSR by using NS-2...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Improving the Quality of Service in Mobile Ad-Hoc Network Using Ant Colony Optimization

    A research issue that has gained lot of interest now-a-days is the design of Mobile Ad-hoc NETwork (MANET). Researches face a major challenge in achieving good performance while linking the new technology for MANET. A MANET is a set of mobile hosts which communicate with each other in a shared...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    OOS Provisioning in Rural Wireless Mesh Network

    Wireless Mesh Network (WMN) is a promising wireless network architecture having potential of last few miles connectivity. There has been considerable research work carried out on various issues like design, performance, security etc. in WMN. Due to increasing interest in WMN and use of smart devices with bandwidth hungry applications,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Maximizing the Lifetime of Wireless Sensor Network Using Z-SEP

    The Wireless Sensor Networks (WSNs) are comprised of thousands of sensor nodes, with restricted energy, that co-operate to accomplish a sensing task. Reducing the energy consumption of available resources is still a problem to be solved in Wireless Sensor Networks (WSNs). Many types of existing routing protocols are developed to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Adaptive Route Design for Wireless Sensor Networks with Multiple Mobile Sink in Delay Tolerant Mobile Applications

    Wireless sensor network has specific characteristics and requirements that are unique. The fundamental function of wireless sensor network is the gathering of information from a covered area. Information thus gathered by the sensor nodes deployed in the network is processed by sink nodes according to the applications. Motivated by their...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    DDOS Detection using Attack Model

    In today's world Distributed Denial of Service Attacks (DDoS) continue to pose a hazardous threat to cyber world. These attacks are still evolving and there is an utmost need to develop mechanisms which can be effective against them. It is however not easy to deal with such attacks. In this...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Efficient Certificate Revocation of Accused Nodes in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) is a self-configuring, infrastructure less network of mobile devices connected by wireless. The wireless and dynamic nature of MANET leads to various types of security attacks. The primary task is to provide the secure communication. To come across this challenge, the authors propose cluster based...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Modified Microstrip Antenna for Wireless Application

    In modern wireless communication system and incising of the wireless application, wider bandwidth, multiband and low profile anteenas are in great demand. The microstrip antennas are preferred due to small size, light weight and easy installation. A square microstrip antenna is described in this paper. The use of microstrip pattern...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    MIN-MAX Energy Aware Technique for Communication Life Time Increasing in Wireless Mobile Ad-Hoc Network

    Mobile Ad hoc NETwork (MANET) consists of a bunch of mobile nodes which will communicate with one another without the requirement of any fixed infrastructure or central controller. The movement of nodes in MANET is random, so MANET has a dynamic topology. Owing to dynamic topology, the link breakages with...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Novel Approaches for Mitigating Replica Nodes in WSN

    A WSN is composed of a large number of tiny sensor nodes and one or multiple more powerful sink nodes. Sensor nodes collect data from the surrounding environment and distribute the collected data to a sink node. Every sensor node has one or more sensors, a general purpose Central Processing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Multi-Model Biometrics System for Person Identity Verification

    Multi-model biometrics system for person identity verification have mainly two authentication process, face identification and signature verification. A set of fisher scores is calculated for face image through partial derivative analysis of the parameters estimated in each HMM. These fisher scores are further combined with some traditional features such as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Sybil-Decline: A Survey on Novel Trusted Identity and Threshold Based Path Rank for Sybil Attack Identification in Social Network

    During the last few years community network is getting popularity as per their user growth. They are generating a huge amount of data thus making promising promotion directions of business firms. Such concerns raise some issues related to fake profiles for more promotional activities. These fake profiles of the users...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Service Oriented Architecture in Project Management Software

    Service Oriented Architecture in Project Management Software (SOA-PMS) is used to collect the information from the different levels of software development process and different peoples involved in the project and product development., it monitors the entire software development life cycle and provide status and reports at the different levels, It...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Classification of Routing Protocols in Ad Hoc Wireless Network

    A mobile ad-hoc wireless network is made up of mobile nodes that are animatedly reconfigurable; self organized which provide on-demand networking solution. The goal of MANETs is to increase mobility into the area of mobile, self-directed and wireless domains, where a group of nodes form the network routing communication in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Survey on Secure Group Communication and Applications

    Multicast communication is an efficient method of disseminating data to a group of beneficiaries over an open access network. Secure distribution of information to authorized recipients is an important prerequisite for group applications with commercial potential. An ever-increasing number of Internet applications, such as content and software distribution, distance learning,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Performance Analysis of Wavelength Assignment Algorithms in Optical Mesh Network Using Hegon Simulator

    In this paper, the authors analyze the performance of wavelength assignment algorithms such as first fit, random fit, most used, least used, least loaded, most loaded and to find their effect on the blocking probability in optical mesh network with traffic grooming. Hegons simulator is used to find the results....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Novel Authentication System Using Human Behaviour Against Objects

    The authors introduce a novel authentication system utilizing the psychological behavior and/or attitude of human beings to solve many open authentication issues of the current scenario. The proposed system involves the reaction of a human being against different objects at a given situation. The features & status of the objects...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Security in Fuzzy Improved Adaptive Delay Multicast Routing Protocol

    Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Although multicast routing algorithms in MANETs could be efficient in many situations, but the devices in MANETs are more vulnerable to attacks. In the areas where...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Modified Encryption and Decryption Using Symmetric Keys at Two Stages: Algorithm SKG 1.2

    In the paper, the author has introduced a modified symmetric key cryptographic method, called algorithm SKG 1.2, for data encryption and decryption of any file using symmetric key at two stages, by swapping the characters in the string of text and by shifting the characters to left or right. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Review of Energy Efficient AODV and DSR Routing Protocols

    The mobile communications devices in ad-hoc network are battery operated and have limited energy, so the network is an energy-constrained system and hence there is a need to maximize the network life. Power consumption rate of nodes must be evenly distributed but due to mobile nature of nodes and asymmetric...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Enhanced Diffie Hellman Algorithm

    Cryptography is the science of using mathematics to encrypt and decrypt data. Diffie Hellman algorithm is an asymmetric cryptography scheme for the encryption and decryption of data over computer network. This algorithm is meant for the generation of secret key. One major problem with Diffie Hellman algorithm is the man-in-the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Enhanced AODV Routing Protocol Against Black Hole Attack

    MANET is a self-configuration wireless ad-hoc network of mobile nodes. Each node has a router or a switch connected by the wireless connection. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is specific vulnerable due to its fundamental...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Survey on Handwritten Devnagari Character Recognition Methods

    Now-a-days, character recognition has gained lot of attention in the field of pattern recognition due to its application in various fields. Optical Character Recognition (OCR) and Handwritten Character Recognition (HCR) has specific domain to apply. OCR system is most suitable for the applications like multi choice examinations, printed postal address...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Review of Power-Efficient Gathering in Sensor Information System (PEGASIS) for Network Optimization in WSN

    Wireless Sensor Networks (WSN) consists of small sensor nodes which perform sensing, computation and communication capabilities. These networks collect information from all sensor nodes and send it to the base node for further operations. PEGASIS is a hierarchical based routing protocol which is used for their high energy and good...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Stable AODV Protocol in Mobile Ad-Hoc Network

    An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure as the authors discussed in introduction. Each node in the network also functions as a mobile router of data packets for other nodes. However, due to node mobility, link failures in such...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Hybrid Optimization using Genetic Algorithm and Neural Network in CBIR

    Widespread cardinality of images and paintings has made traditional keyword based search, an inefficient method for retrieval of required input image data. When the authors input an image into the database, then Content-Based Image Retrieval (CBIR) system gets the similar images from a large database for that query image. Implementation...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Detection and Prevention Techniques for Black hole Attack in Wireless Sensor Networks (WSN's): A Review

    Wireless sensor network is one of the emerging areas of research in present scenario. It is a wireless means of communication in which nodes can communicate without any physical medium. As there is no communication media, the data is transmitted from one node to another in the form of packets....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Survey on Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

    A social networking service is an online service, platform, or site that focuses on facilitating the building of social networks or social relations among people who, for example, share interests, activities, backgrounds, or real-life connections. A social network service consists of a representation of each user, his/her social links, and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Study of IPv4 and IPv6 Features

    Internet Protocol (IP) is widely used on the internet. It is one of the major protocols in TCP/IP protocol suite. It is used to identify each host on the network through logical addresses. Nowadays there are two versions of internet protocol, Ipv4 (Internet protocol version 4) and Ipv6 (Internet protocol...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    An Influence: Vendor Locking in Meta Cloud

    Cost and scalability benefits of cloud storage services are apparent. However, selecting a single storage service provider limits availability and scalability to the selected provider and may further cause a vendor lock-in effect. In this paper, the authors present meta storage, a federated cloud storage system that can integrate diverse...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Comparative and Analysis Study of Data Flow in Different Computer Network Topologies

    Basically, topology is usually schematic description of the arrangement of a network, including its nodes and connecting lines. Topology plays a great role in computer network for connecting computers. Topology is designed for both small and large networks. Topology takes different types to construct those networks based on their needs....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    NSP: Price Variation for Network Users

    Recent papers have shown that the majority of today's internet traffic is related to Peer-To-Peer (P2P) traffic. The study of bandwidth in P2P networks is very important. Because it helps the authors in more efficient capacity planning and QoS provisioning when they would like to design a large scale computer...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    The Role of Best bits in Iris for Efficient Person Authentication

    Biometric person authentication techniques based on the pattern of the human iris is well suited to be applied to any access control system requiring a high level of security due to the desirable properties such as distinctiveness, non-invasiveness, and stability of iris patterns. In this paper, the authors have attempted...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Secure Data Access with Enhanced Two Factor Authentication in Cloud Computing

    Cloud computing is an emerging trend in today's world and becoming very efficient and useful. Cloud computing is basically a shared pool of resources that includes software, storage, data, applications and infrastructure. The services are offer on pay per user basis. Storage as a service is a kind of service...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Survey on Cluster Formation for Wireless Sensor Network

    To form a WSN, the most important issues is addressing. Although Wireless Sensor Networks (WSNs) have been extensively researched, their deployment is still a main concern. In this paper, the authors show that the address assignment scheme defined by ZigBee will perform poorly in terms of address utilization. This paper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Survey on Biometric Human Gait Recognition

    Biometrics refers to the metrics related to human characteristics and traits. Human recognition biometrics basically came into existence from real life criminal and forensic applications. Human gait recognition is a distance based behavioral feature of biometric. It is relatively a new area being studied nowadays mainly because it is unobtrusive....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Steganography: A Data Hiding Technique

    The proliferation of the Internet has made it possible for anybody to send and receive information instantly from anywhere around the world. Communication of secret information is a major challenge and its complexity increases with the levels of sophistication. Steganography is a form of data hiding technique that provides mechanism...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    An Attacker Misbehavior and Security Schemes to Protect MANET: A Survey

    Security has become a critical issue between the mobile nodes in MANET. MANET is generally more prone to physical security attacks and threats than the fixed-cable networks. The inherent characteristics of MANET such as wireless medium, highly dynamic topology, distributed cooperation, resource constrained capability and limited physical security poses number...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Security Schemes in Distributed Data Storage Using Proxy Re-encryption

    Present days many users store their important data in cloud. To ensure that the security of the cloud stored data users need to encrypt the important data. The point of data security which has always been important aspect of quality, cloud computing cause a new security threats. In cloud computing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Implementation of Ad-hoc on Demand Distance Vector and Optimized Link State Routing Protocol for Mobile Ad-hoc Network with QoS

    A mobile ad hoc network is formed without the central administration that consist of mobile nodes they can use a wireless interface to send a packet data. MANET stands for Mobile Ad hoc NETwork in which two or more mobile nodes connects through a wireless links so that they can...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Caching the Performance of Dynamic Source Routing Protocol for Mobile Ad Hoc Network: A Review

    Mobile ad hoc network is the important topic of research. A mobile ad hoc network is a collection of mobile devices that communicate with each other with the help of wireless links and behave as a distributed manner. Dynamic source routing protocol is used to find out the performance of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Impact of Caching the Performance of Dynamic Source Routing Protocol for Mobile Ad Hoc Network

    In recent years mobile ad hoc networks have become very popular and lots of research is being done on different aspects of MANET. Mobile ad hoc networks a system of mobile nodes communicate with each other over wireless links and behave as a distributed manner. There are different aspects are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    A Study of Cloud Computing: Opportunities, Challenges and Resource Utilization

    Cloud computing represents a new paradigm with an architectural shift from traditional distributed computing. It presents computing resources like hardware, software, platform or infrastructure as utility oriented services to the consumers. Cloud computing is the means through which computing resources such as applications, infrastructures, business processes, hardware etc. can be...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Dynamic Beaconing Strategy for Geographic Routing in MANET

    Nodes have to update their registry on nearby nodes so as to forward effectively. This applies to geographic routing. Beacon packets that contains the geographic location of nodes. Previously, node mobility independent periodic beaconing and patterns in traffic were analyzed and was found to be cost intensive for updating and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Rate Adaptive Video Multicast in Multirate Wireless Networks

    Adapting modulation and transmission bit-rates for video multicast in a multi rate wireless network is a challenging problem because of network dynamics, variable video bit-rates and varied clients who may expect differentiated video qualities. Prior work on the leader-based schemes selects the transmission bit-rate that provides reliable transmission for the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Recent Attacks on SSL

    Normally, the data is transmitted in plain text between a server and client. Secure Socket Layer, known as SSL is a security protocol. SSL is used to establish a secure connection between server and client. Recently in 2014, few attacks were identified by security researchers on SSL. The authors are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    An Analysis on Cloud Security Mechanism

    Cloud computing is a well known term in the field of software industry. In this paper, the authors give a short description on cloud computing, its architecture which contains IaaS, PaaS and SaaS its deployment model public, private, hybrid and community cloud is described. Cloud computing has some severe issues...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Gateway Based Shortest Path Detection Using Dijkstra's Algorithm and Closest Adjacency Condition (DA-CAC) in WSN

    Wireless network is the most growing area of recent research because of its wide applicability and huge user quantity. Networks operating in wireless medium are based on the type of service by which communication is offered like MANET, WSN, ZigBee, Bluetooth, cognitive etc. Wireless Sensor Network (WSN) is one of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Artificial Intelligence in E learning Using Pedagogical Software Agents

    The field of artificial intelligence in education has becoming the most challenging area in the last several decades. Using AI concept and techniques, new forms of intelligent software can be created. That allows the computer to act as an intelligent learner or tutor. Therefore the aim of this paper is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Genetic Algorithm based Path Optimization for Extending the Network's Lifetime in Multi-Hops Wireless Sensor Networks

    Wireless sensor networks consists of a number of spatially distributed energy constraint nodes. Since sensor nodes are energy constraint, so the authors aim is to maximize the network lifetime by utilizing the energy of nodes very efficiently. This paper focuses on reducing the involvement of the most power hungry node...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Weighted Sum Method Scheduling Chaining System for Efficient Data Routing

    Wireless sensor network may consists of a large number of wireless sensor nodes deployed in the desired network area in order to sense the specific changes going in there. As these sensor nodes are limited source of energy so the authors focuses on utilizing the energy of these nodes as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    An Efficient Strategy for Stability Management of Cache in Ad Hoc Networks

    In mobile ad hoc networks environments, data caching is necessary as it increases the capability of mobile devices to access required data, and get better overall system performance. The mechanisms of cache consistency in the literature are grouped into three most important categories such as push based, pull based, as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Software Reliability with Random Test Cases

    The probability of failure-free operation of a computer program in a specified environment for a specified time, called reliability. The prime concern in software quality is reliability. There are many approaches to calculate reliability. Here the authors are calculating reliability by using Mean Time To Failure (MTTF). In this paper,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Redundancy Management of Multipath Routing for Intrusion Tolerance of Packet Loss by Malicious Node in HWSN

    In this paper, the authors propose redundancy management of Heterogeneous Wireless Sensor Networks (HWSNs) where they are utilizing multipath routing to answer user queries in the presence of unreliable and malicious nodes which cause packet loss in the network. The research problem they are addressing in this paper is efficient...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    IEURC: Integrity of Shared Data with Efficient User Revocation in the Cloud

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and security in the cloud storage, users in the group need to compute signatures on all the blocks in shared data, and due to data modifications performed by different users, different...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Comparative Study of the Various Routing Protocols in Mobile Ad-Hoc Networks Using OPNET Simulator

    Mobile Ad-hoc NETworks (MANETs) is type of network which built up spontaneously whenever communicating devices come into range. Due to high mobility of nodes link breakage occurs frequently, Nodes In a network service as host as well as a router. MANET does not have any fixed infrastructure and inanity of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Survey on Blocking Probability in MPLS

    MPLS has high-lightened as the most promising technology for the internet to provide the speed and bandwidth guaranteed services. In this paper, focus is on the blocking probability and load congestion when traffic is overloaded. When network resources are insufficient to accommodate the offered load then load congestion exists. It...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Study of Design and Development of Integrated Development Environment using Qt C++ Framework

    In this paper, the authors concerned with the construction and development of a tool known as the Integrated Development Environment (IDE) using Qt C++ framework. An IDE is computer software which basically includes source code editor, a compiler or interpreter or both, build automation tools and a debugger and provides...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2013

    Enhanced Face Recognition Algorithm using PCA with Artificial Neural Networks

    Face detection from a long database of face images with different backgrounds is not an easy task. In this paper, the authors demonstrate the face detection system of colored face images which is invariant to the background and acceptable illumination conditions. A threshold level is set to reject the non-human...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2013

    A Study About Green Computing

    In past a few years computer paradigm is shifted to remote data centres and the software and hardware services available on the basis of pay for use .This is called Cloud Computing, In which user have to pay for the services. Cloud provides the services - Software as a service,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2013

    Evaluating Fuzzy Reliability Using Vague Set Approach

    Most of the researches in classical reliability theory are based on binary state assumption for states. Such systems may be considered working to certain degrees at different states of its degradation during its transition from fully working state to completely failed state. Fuzzy set theory has been studied extensively over...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2013

    Phishing Detection System Using Machine Learning and Hadoop-MapReduce

    Detecting & Identifying phishy websites is a tedious work. Several attributes are needed to be taken into consideration & finally using the data mining algorithms, a final decision is made. For finding these attribute the authors have used MapReduce algorithm in collaboration with Hadoop file system. In existing online phishing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Network Lifetime Enhancement Using Genetic Algorithm

    Major applications of Wireless Sensor Networks (WSNs) are monitoring and tracking. The large numbers of sensors are deployed in remote and inaccessible places therefore deployment and maintenance should be easy and scalable. Sensors have limited battery backup as they are small in size. The energy is a critical factor in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Optimization of KDD Cup 99 Dataset for Intrusion Detection Using Hybrid Swarm Intelligence with Random Forest Classifier

    Intrusion detection system plays a vital role in system security which operates data in real time that may leads to dimensionality problem. KDD cup 99 which widely used as a benchmark dataset to detect intrusion is analyzed in this paper. The main drawback of the dataset is its redundancy and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Priority Based Workflow Management in Grid Computing System

    Grid is offered to solve huge and complex problems, and type of parallel computing technology in which the nodes are almost completely independent of each other in terms of resources. A priority-based workflow management algorithm in grid is proposed in this paper. The aim of this research is to divide...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)