International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 361-400 of 2048 results

  • White Papers // May 2014

    Enhanced Security Approach for Centralized and Distributed Social Network by Sequential Clustering

    As the people know the social media has grown-up rapidly in the past few years. The different social media sites Facebook, Twitter, LinkedIn, and several holds public and confidential information about their users. In order to provide security to the users' social network graphs are anonymized before being published to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    LEACH Enhancement to Improve the Life Time of Wireless Sensor Networks

    Advances in the fields of computer hardware and software technologies have led to the development of the small wireless devices that will provide access to the information that was difficult to get or really impossible, some decades before. The Wireless Sensor Networks (WSNs) have now become one of the most...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Comparative Analysis of Tabu Search and Genetic Algorithms for Software Effort Estimation

    As with the growth of technology, competition level increases at a frequent rate. Each software company wants to develop its software in estimated time and budget. So, correct software effort estimation model is required. In this paper, COCOMO II is used for estimation of effort in person month for the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Security Facet in Cloud Computing

    The concept of cloud computing is a very vast concept which is very efficient and effective security services. The cloud computing and data methodology retrieval is a conceptual one of the based most technology which is used widely now-a-day. But in data privacy protection control challenging research work in cloud...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Hybrid TCP/IP and UDP: A Review Article

    Today all the application on the Internet uses the World Wide Web and HTTP protocol is used by all the transportation of the Web, which is built upon the TCP model. But as the authors know TCP is poorly suited for the short conversations that comprise a significant component of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Cloud Systems Security Threats and Prevention Mechanisms

    Cloud computing is a model for enabling service, on-demand network access, that's why cloud computing become the buzzword in the IT industry. The possible threats at various ends for cloud computing is emerging area for study and this paper provide security threats, its description and organized prevention in terms of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Real Time Routing Protocols in WSN:A Review

    Wireless Sensor Networks (WSNs) are revolutionizing the way people interact with the physical world. A large volume of sensor nodes are deployed to collect data from the environment, perform local processing, and communicate their results either with a Base Station (BS) which people may access via Internet or directly with...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Basic Understanding of Routing Protocols for Mobile Ad-Hoc Network with a Security Threat: Black Hole Attack

    The black hole problem is one of the security attacks that occur in Mobile Ad-hoc NETworks (MANETs). The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Mobile ad-hoc networks are autonomous and decentralized wireless systems. It consists of mobile...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Operating System Selection Using AHP on the Basis of Security, Cost and Boot Time

    Selection of best operating system for any specific requirement is dependent on multiple parameters and criteria. In this paper, the authors are going to apply \"Analytic Hierarchy Process\" (AHP) to evaluate the performance of different operating System and to select the best operating system. AHP is a Multi-Criteria Decision Making...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Survey on Location Based Data Encryption Algorithms for Mobile Devices

    Now-a-days, mobile communication has become an important part of the people daily life. The knowledge of mobile user's location enhances the class of services and applications that can be used by the mobile user. In many environments, wireless technology is the default access technology for a variety of services like...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Fingerprint Indexing Using Low Order Delaunay Triangulation with Geometric Constrants

    Fingerprint Identification has been a great challenge due to its complex search of huge fingerprint databases. Fingerprint indexing, a preprocessing phase before matching, aims to reduce the number of candidate hypotheses sent for further verification. Indexing large fingerprint databases eliminates the false positives and hastens the process of verification. This...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Retrospection of Hierarchal Routing Protocols for Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consists of spatially distributed independent sensors to observer physical or environmental conditions and to cooperatively pass their data through the network to a main location. This paper is a review of different clustering and routing protocols of Wireless Sensor Networks (WSNs). The main issue in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Survey on Probabilistic and Fuzzy Based Energy Efficient Clustering Protocols for Sensor Networks

    Wireless Sensor Network (WSN) plays very important role in today's life. The major role of WSN is to sense a particular region and transfer sensed information to a distant base station for further processing. Sensor networks composed of many sensor nodes will be utilized for sensing purpose. The major design...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Survey of Various Iris Recognition Methodologies

    Iris recognition, a biometric technique for personal identification, provides one of the most protected methods of verification and recognition. Iris recognition system captures an image of an individuals' eye. The iris in the image is then intended for segmentation and normalized for characteristic extraction procedure. The performance of iris recognition...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Stratified Path Using Fortuitous Enclosure Field For Incursion Revelation

    Incursion revelation faces a number of problems; model of a real-time incursion revelation expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. An incursion revelation system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Automated Layer Identification and Classification of Network Packets

    In this paper, the authors present a traffic classification scheme to improve classification performance and also the performance of the system. In the proposed scheme they are grouping the correlated flows and classifying it by using a classifier combination framework and aggregating Naive Bayes (NB) predictions of the correlated flows....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Fuzzy Clustering Life Span Fortification with Data Compression, Nearest Neighbour Technique and Elliptical Curve Cryptography in WSN

    Today WSN plays the essential role in the field of information and communication. The foremost drawback is consumption of the energy. Energy is heart of the sensor node. The fuzzy cluster method is the proposed to address the energy concern, fuzzy cluster mathematical approach involves dealing with several variables and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Scalable Mobile Presence Cloud with Authentication Through PGP

    Efficient and scalable server architecture, called PresenceCloud, which enables mobile presence services to support large-scale social network applications. When a mobile user joins a network, PresenceCloud searches for the presence of their friends and notifies them of their arrival. PresenceCloud organizes presence servers into a quorum-based server-to-server architecture for efficient...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Comparative Analysis of TCP Traffic and UDP Traffic Under AODV Using Mobile Ad Hoc Network

    The transmission of information in a MANET relies on the performance of the traffic scenario (application traffic agent and data traffic) used in a network. The traffic scenario determines the reliability and capability of information transmission, which necessitates its performance analysis. The objective of this paper is to compare the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Secure Data Storage Over Distributed Nodes in Network Through Broadcast Techniques

    Network wide broadcasting is one of the major mechanisms in wireless network to resolve may issues. In wireless network communication the source node sends a message to all other nodes that are present in the network. The nodes are communicating with each other but these nodes do not have any...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Application of 802.15.4 in Wireless Sensor Network

    To predict the lifetime of wireless sensor networks before their installation is an important concern. ZigBee is an emerging worldwide standard for wireless personal area network based on the IEEE 802.15.4-2003 standard for Low-Rate Wireless Personal Area Networks (LRWPANs). The IEEE 802.15.4 standard is specifically meant to support long battery...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Commonly Used Spatial Data Mining Data Structures - A Survey

    In this paper the authors deal with spatial data structures for indexing and with their usability for knowledge discovery in spatial data. Huge amount of data processed in spatial data mining requires using some indexing structures to speed up the mining process. Typical data types and operations used in geographic...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Improving Efficiency of Learning FIDs in Fuzzy Relational Databases

    Fuzzy databases are developed to provide users with the ability to store data that can be used in deriving information satisfying their needs. They accommodate a wider range of real-world requirements and provide a friendlier environment for man-machine interaction. The information obtained from them can be used in decision making...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Cloud Security Solutions: Comparison Among Various Cryptographic Algorithms

    Cloud computing is emerging as a new thing and many of the organizations are moving toward the cloud but lacking due to security reasons. The concept of cloud computing is associated closely with Infrastructure-as-a-Services (IaaS), Platform-as-a-Services (PaaS), Software-as-a-Services (SaaS) all of which means a service oriented architecture. These provides the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Data Warehouse Security Using Log Based Analysis: A Review

    Various techniques have been emerged in last few years to improve data privacy for security reasons. But these techniques involve extra overhead in case of large data warehousing system. Thus to remove extra overhead and to improve the security of sensitive information the authors involve the concept of masking and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Block level mod value based Pixel Difference Method for High Capacity Reversible Data Hiding in Images

    In this paper the authors present a novel scheme to hide data in image using block level mod value based pixel difference method. The image is first divided into equal sized blocks. The extra space required for embedding the secret data in the image is created by storing the image...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    HMAC Filtering Scheme for Data Reporting in Wireless Sensor Network

    Wireless sensor networks consists of a large number of small sensor nodes and itself are deprived of high memory requirements, high processing power and are limited in usage of efficient security mechanisms and susceptible to possible node compromise, passive and active attacks. These restrictions make them extremely vulnerable to variety...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Replica Detection and Eliminating XML Duplicates in Hierarchical Data

    Duplicate detection consists in detecting multiple representations of a same real - world object. Hierarchical data consist of both tree and graph model. The novel comparison strategy that uses graph model in terms of relationships proposed for hierarchical data. Instead, pairs of objects at any level of the hierarchy are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Implementation of OFDM based Transreciever for IEEE 802.11a on FPGA

    In this paper the authors focus on the implementation of transreciever for the IEEE 802.11a WLAN standard which incorporates OFDM as its multiplexing and modulation technique. An OFDM is a multi-carrier modulation technique which divides the available spectrum into many subcarriers. Due to the orthogonality of carriers and sharing of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Resource Allocation Algorithm for Datacenters in Cloud Computing

    Clouds are rapidly becoming an important platform for scientific applications. Virtualization facilitates the provision of flexible resources and bill there user based on processor time or number of VM instances. Cloud applications consume huge amount of energy, this also cause high operational cost. This paper presents a cost-efficient and energy...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    TDMA Start-up and Restart Synchronization Using PIC Micro-controller

    The multiple access schemes allow sharing of a finite amount of radio spectrum. In this paper, Time Division Multiple Access (TDMA) scheme for wired communication media is proposed. Time-Division Multiplexing (TDM) is a technology in which transmission and reception of each independent signal is achieved through a common signal path....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    A Review Paper on Various Data Mining Techniques

    Presently, a very large amount of data stored in databases is increasing at a tremendous speed. This requires a need for new techniques and tools to aid humans in automatically and intelligently analyzing large data sets to acquire useful information. This growing need gives a view for a new research...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    A Review of Cloud Systems and Resource Allocation Strategies

    Cloud computing is on demand service as it offers dynamic, flexible and efficient resource allocation for reliable and guaranteed services in pay-as-the user-use manner to the customers. Cloud computing offers multiple cloud users requesting number of cloud services simultaneously, so there must be a provision that all resources are made...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Analysis and Modification of a Parallel Polynomial Root-Finding Algorithm Using Message Passing Interface

    Parallelism plays an important role today on every platform from high-end industrial applications to low-end domestic ones. It is recognized that increased computational performance is not subsequent to faster processors, but parallel ones. Traditional sequential algorithms are modified for parallel implementation in order to harness the computational potential of parallel...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Comparison of Ensemble Based Classification Algorithms

    Learning data sampled from a non-stationary distribution has been shown to be a very challenging problem in machine learning, because the joint probability distribution between the data and classes changes over time. Most real time problems as they change with time can suffer concept drift. For example, a recommender or...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Data Mining Approach for Mobile based location prediction by Clustering Technique

    Mobile prediction is one of the most essential issues that need to be explored for mobility management in mobile computing systems. In this paper, the authors propose a new algorithm for predicting the next inter cell movement of a mobile user in a personal communication system network. In first phase...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    A Framework for Supporting Mixed-Join Queries in Cloud Data Stores

    Cloud storage provides high availability and scalability for web applications, but it loses the power of complex queries. The cloud data stores may include row oriented tables and column oriented tables in the same database. The cloud storage systems must be capable of performing mixed queries in these tables with...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Dual Optimized System for Flip-Flop Grouping Using Data Driven Clock Gating Approach

    Data driven clock gating is a popular technique used in many synchronous circuits for reducing dynamic power dissipation. Power optimization plays the major role in the recent years. So far the power is reduced by reducing the circuit size, or by reducing the capacitor, frequency and voltage value of the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    An Efficient Approach Using Test Case Prioritization Based on Requirement Based Clustering for Web Applications

    Test case prioritization techniques arrange the test cases in such a way that more crucial test cases are executed earlier to increase the effectiveness of testing. Clustering refers to collect the objects having the similar properties in the same group. The groups in which the data is being divided are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Mining Search Results from Web Databases with Wrapper Generation Using K-Means Clustering

    The data extraction techniques from web help to extract knowledge from web data, in which at least one of structured data is used in the mining process. The information collected from HTML tags and all sources, gives the minimum accuracy of result at the time of merging the collection of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Security Issues Pertaining to Ad-Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which form an arbitrary topology. Ad-hoc networks are a new paradigm of wireless communication for mobile hosts. There is no fixed Infrastructure such as base stations for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Backup Two Phase Commit Protocol (B2PC) Renders the Trustworthy Coordination Problem Over Distributed Transactions

    Today all the business transactions are being deployed over the Internet using Web Service Atomic Transaction specification. For such distributed transactions always a trustworthy coordinator is needed and this trustworthy coordinator should able to tolerate the Byzantine Fault. In order to overcome such fault, this paper proposes the Byzantine Fault...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Trust and Privacy Challenges in Securing Cloud Computing Environment's

    Cloud computing is known as the newest technologies in IT field which causes some worries for consumers and its producers due to its novelty. Looking at it's the paper, the authors can see the privacy and security aspects and trust are the main concerns. It creates an important hindrance for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Precise Survey on Intrusion Detection Systems

    A system monitoring the events that are occurring in a computer system or network and analyzing the cyber threats such as Intrusions in the network is defined as Intrusion Detection System (IDSs).In the present days as the cost of Information processing and Internet accessibility falls down, Organizations are becoming highly...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    The Wane of Dominant (Symbian Operating System)

    With the emerging needs of the users abundance of technology has been invented to fulfill these sprouting needs of the users. Due to these plenty of inventions, technology has made its advancement in all fields. Mobiles Phones is an amazing invention of technology that has made itself a necessity in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Survey on Neighbor Discovery in Asynchronous Wireless Sensor Networks

    The Neighbor Discovery is a process of identifying the nearest node. So the identification can done through Neighbor Discovery Protocol (NDP) is a protocol in the Internet Protocol Suite used with IPv6. It is responsible for address auto-configuration of nodes, discovery of other nodes on the link, and maintaining reach-ability...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Scalable Peer-To-Peer Lookup Protocol for Internet Applications

    While peer-to-peer networks are mainly used to locate unique resources across the Internet, new interesting deployment scenarios are emerging. Particularly, some applications (e.g., VoIP) are proposing the creation of overlays for the localization of services based on equivalent servants (e.g., voice relays). This paper explores the possible overlay architectures that...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Verilog Implementation of FPGA Based DSP Design Like FFT Processors

    Implementing hardware design in Field Programmable Gate Arrays (FPGAs) is a formidable task. There is more than one way to implement the DSP design for FFT processor and digital FIR filter. Based on the design specification, careful choice of implementation method and tools can save a lot of time and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Method for Breaking RSA Security

    The security on many public key encryption schemes relied on the intractability of finding the integer factoring problem such as RSA scheme. However, there are great deals of researches related to the RSA factoring modulus compared with the other type of attacks RSA scheme. So the need for more methods...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A New Method for Image Segmentation

    Image processing is a form of signal processing. One of the typical operations on image processing is image segmentation. In this paper, the authors use new image segmentation algorithms based on information bottleneck method. Here they are going to use three algorithms; first they introduce the split-and-merge algorithm, where an...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    An Experimental Distributed Protocol to Serve Dynamic Groups for Peer-to-Peer Streaming

    Peer-To-Peer (P2P) streaming has been widely deployed over the Internet. A streaming system usually has multiple channels, and peers may form multiple groups for content distribution. In this paper, the authors propose a distributed overlay framework (called SMesh) for dynamic groups where users may frequently hop from one group to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    On Demand Route Routing Protocol (ODRRP) for MANET

    Mobile Ad hoc NETworks (MANET) play an important role in connecting devices in pervasive environments. Each node in MANET can act as source and router. In this paper, the authors propose a On Demand Route Routing Protocol (ODRRP) with Broadcast Reply which combines the merits of both proactive and reactive...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Secure on Demand Route Routing Protocol (SODRRP) for MANET

    Ad-hoc networks, due to their improvised nature, are frequently established insecure environments, which makes them susceptible to attacks. These attacks are launched by participating malicious nodes against different network services. Routing protocols, which act as the binding force in these networks, are a common target of these nodes. On Demand...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Additive Studying in Hierarchical Neural Networks for Object Recognition

    Robots that execute non-trivial projects in real-world surrounds are probably to find objects they have not seen before. Thus the power to learn new objects is a necessity skill for advanced mobile service robots. The model demonstrated in this paper has the power to learn new objects it is shown...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Optimizing Congestion in Wireless Ad-Hoc Networks

    The authors study joint design of end-to-end congestion control and Per-link Medium Access Control (MAC) in ad-hoc networks. In the current scenario wireless communication is emerging the world. Wireless Ad Hoc networks demands for higher intermediate node supports for long-range communication. Wireless Ad Hoc network is an emerging communication approach....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    The Usage of DAA Protocol in False Data Detection in Wireless Sensor Networks

    The authors know that data are travelled from multiple hop in the network during its travelling some are the attacker may inject the false data into the pocket of message. These are cases raised regularly in wireless network because of non reliability, of course so many reliable techniques are developed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Impact of Firewall and VPN for Securing WLAN

    Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE 802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology still exists. The thought was that the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    QoS-Aware Web Service Selection Using SOMA

    It is important to deliver appropriate services to requested users. In case of unavailability of a user requested composite service, enforces the system to invoke service selection that involves choosing individual concrete services towards service composition. The services are selected based on two criteria: functional based and non-functional based. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Twig Pattern Matching Algorithms for XML

    The emergence of XML promised significant advances in B2B integration. This is because users can store or transmit structure data using this highly flexible open standard. An effective well-formed XML document structure helps convert data into useful information that can be processed quickly and efficiently. From this point there is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Efficient Detection of Denial of Service Attacks in MANET

    Mobile Ad Hoc NETworks (MANETs) are the set of mobile hosts operating without the aid of the established infrastructure of centralized administration. MANET is characterized by limited resources such as bandwidth, battery power, storage space and node mobility. The underlying assumption is that the intermediate nodes cooperate in forwarding packets....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Behavioral Study of Issues and Challenges in Mobile Adhoc Network

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links without central infrastructure. Each node operates not only as an end system, but also as a router to forward the packets. The nodes are free to move about and organize themselves into a network...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Wireless Sensor Networks: Architecture, Protocols, Simulator Tool

    Wireless Sensor Networks (WSN) is an interconnection of a large number of nodes deployed for monitoring the system by means of measurement of its parameters. Recent research in wireless sensor networks has led to various new protocols which are particularly designed for sensor networks. To design these networks, the factors...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Efficient and Secured Multicasting Over MANET's Through EGMP

    Group communications are important in Mobile Ad hoc NETworks (MANET). Multicast is an efficient method for implementing group communications. However, it is challenging to implement efficient and scalable multicast in MANET due to the difficulty in group membership management and multicast packet forwarding over a dynamic topology. The authors propose...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Caching Approach Foundation on Information Density Evaluation in Wireless Ad Hoc Networks

    Data caching strategy for ad hoc networks whose nodes exchange information items in a peer-to-peer fashion. Data caching is a fully distributed scheme where each node, upon receiving requested information, determines the cache drop time of the information or which content to replace to make room for the newly arrived...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Network Simulator NS2-2.35

    A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions. There are many challenges for a sensor network from hardware point of view, to produce low cost and tiny sensor nodes so that energy dissipation is less. Energy is the scarcest resource of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Investigating Path Loss Effect in Wireless Sensor Networks

    In Wireless communication, the average received power decreases logarithmically with distance. The main factor responsible for this is path loss, which represents signal attenuation as a positive quantity measured in dB. In this paper, the authors investigate the effects of noise level on various parameters such as Bit Error Rate...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    A Concise Survey on Multicast Routing Protocols for MANETs

    MANETs are treated to be an important network type in many disaster recovery applications. Nodes in MANETs are often self configuring without centralized infra structure and have limited power. Multicasting is a type of group communication in which group membership management is a crucial task. There are a number of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Damping of Oscillations of Multi-Machine Power Systems With Multiple UPFC

    One of the important function of Unified Power Flow Controller (UPFC) is transient stability improvement and damping of oscillations in a power system network. This paper examines the impact of multiple UPFC on oscillation damping of a power system. A real based multi machine-65 bus system is modeled and analyzed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Implementation of Middleware Services Based on the Servers for Applications

    The Service Level Agreement (SLA) is a document that defines and identifies the various services given by a service provider to its clients. SLA specifies the various metrics such as service availability, service efficiency, service throughput, etc. The manual Service Level Agreement is eliminated with the use of the middleware...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    A Review on the Performance of Caching Algorithms for Video Streaming Services in IPTV

    Due to the extensive adoption of broadband Internet services and recent progress in video technologies, Internet Protocol TeleVision (IPTV) is becoming more and more important. IPTV offers a wide variety of interesting services such as VOD (Video on Demand), PVR (Personal Video Recorder), game, shopping as well as live TV...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Real Time Based QoS Analysis in MANET

    A Mobile Ad hoc NETwork (MANET) is a set of wireless mobile nodes that can communicate with each other without using any fixed infrastructure. It is also necessary for MANET devices to communicate in a seamless manner. There are multiple routing protocols that have been developed for MANETS. There is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Performance Analysis of Proactive and Reactive Routing Protocols in MANET

    A Mobile Ad hoc NETwork (MANET) consists of mobile wireless nodes. The communication between these mobile nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The main classes of MANET routing protocols are Proactive, Reactive and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    An Experimental Analysis of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

    Peer-TO-Peer (P2P) networks are self-configuring networks with minimal or no central control. P2P networks are more vulnerable to dissemination of malicious or spurious content, malicious code, viruses, worms, and Trojans than the traditional client-server networks, due to their unregulated and unmanaged nature. By introduction of a central trusted authority like...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Revisualizing Survivability Aspects in WDM Networks

    The impetus focus is on to provide high data transfer and utilization of high bandwidth, so the era of computer networks completed a journey from co-axial, twisted pairs cables to optical cables migrating from SONET/SDH to WDM technology based networks. WDM network concerns to logical topology derived on given physical...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    An Approach for Web Based GIS Route Finder System

    The rapid rises in population along with increased urban land use have generated considerable travel demand as well as numerous transport problems. The congestion, safety and environmental problems has increased to such an extent that it has become increasingly difficult to navigate due to the combined effects of rapid motorization...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Independent Task Scheduling in Cloud Computing by Improved Genetic Algorithm

    Scheduling is a critical problem in Cloud computing, because a cloud provider has to serve many users in Cloud computing system. So scheduling is the major issue in establishing Cloud computing systems. A good scheduling technique also helps in proper and efficient utilization of the resources. Many scheduling techniques have...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Study and Performance Analysis of IDEA With Variable Rounds

    IDEA is a 64-bit block cipher with 128-bit keys introduced by Lai and Massey in 1991. IDEA is one of the most widely used block ciphers, due to its inclusion in several cryptographic packages, such as PGP. Since its introduction in 1991, IDEA has withstood extensive crypt-analytic effort, but no...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Solving the Hidden Terminal Problems Using Directional-Antenna Based MAC Protocol for Wireless Adhoc Networks

    In wireless networks, hidden terminal problem is common and leads to collision which makes it difficult to provide the required quality of multimedia services or support priority based services. To overcome these problems a directional antennas have been extensively used in designing MAC protocols for wireless network. Directional antennas provide...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Design and Implementation of Automatic Meter Reading System Using GSM, ZIGBEE Through GPRS

    Designing and implementing commercial as well as industrial systems based on Wireless communication has always been a prominent field of interest among many researchers and developers. This paper presents an implementation methodology for a Wireless Automatic Meter Reading System (WAMRS) incorporating the widely used GSM and Zigbee network. In many...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Effectual Software Design Using Software Matrices and COCOMO-II

    Software engineering means the application of a systematic, disciplined and quantifiable approach to the development, operation, and maintenance of software. As the people are becoming more and more reliant on software systems, more effort is being put on development of efficient, reliable and cost-effective software. Software measurement helps them understand...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)