International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 601-640 of 1713 results

  • White Papers // Aug 2013

    Secure and Dependable Cloud Storage and Retrieval for Metric Data

    Cloud storage service is widely used to outsource data. However, the data owners have security concerns on the cloud storage services as the cloud service providers focus more on storage rather than security. This paper considers a scenario where data owners store and retrieve metric data into cloud. The data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Crime Preventions Technique

    Face is the prime concern in criminal identification. The face is the people primary focus of attention in social life playing a major role in conveying identity and emotion. There is an abnormal increase in the crime rate and also the number of criminals is increasing, this leads towards a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Measurement Based Analysis of Reactive Protocols in MANET

    The main goal of an ad hoc network routing protocol is to establish correct and efficient route between a pair of mobile nodes so that messages delivered within the active route timeout interval. Route should be discovered and maintained with a minimum of overhead and bandwidth consumption. Routing is a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Person Tracking Using Gait

    Gait recognition is one kind of biometric technology that can be used to monitor people without their cooperation. Controlled environments such as banks, military installations and even airports need to be able to quickly detect threats and provide differing levels of access to different user groups. Gait shows a particular...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Various Protocols to Manage Cooperation and Reputation in MANET (A Review)

    MANETs rely on the cooperation of nodes for packet routing and forwarding. However, much of the existing work in MANETs assumes that mobile nodes will follow prescribed protocols without deviation. However, a user may misbehave due to several advantages resulting from noncooperation, the most obvious being power saving. As such,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Software Testing Using Soft Computing Technique

    Testing software is essential to ensure quality in IT systems. One of the testing methods is randomized testing which is effective for unit testing. The effectiveness of randomized testing is influenced by certain parameters. One such parameter is frequency of method calls. In this paper, the authors implement a genetic...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Mining Framework for Evolving User Profiles Involuntarily

    Data mining is one the analytical tools for analyzing information. It allow user to analyze data from many different scope, categorize it, and summarize the relationships. Theoretically, data mining is practice of finding correlation or pattern among dozens of fields in large relational databases. This paper can be defined as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Software Defect Prediction from Historical Data

    Software testing consumes major percentage of project cost, so researchers focuses of the \"How to minimizes cost of testing in order to minimize the cost of the project\". The software defect prediction is a method which predicts defects from historical database. Data mining Techniques are used to predict Software defects...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Enhanced Clustering Approach for Online and Offline Web Content Search

    This paper about extraction of data related to biomedical text. This approach is a concept of online and offline database. In traditional method, when the user is online then they get the data easily but when there is no connection of internet then user cannot get the data. In this...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    An Empirical Validation of Integrity Risk Factor Metric: An Object-Oriented Design Perspective

    Software is said to be secure if it is less prone to attack. Secure design leads building secure software. It is also required to check software design to assure that the design is safe or less prone to attack. In this paper, the authors proposed a methodology to scrutinize class...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Next Generation Networks - The Technology and Its Resource Management

    Next Generation Network (NGN) is a generic term that describes the evolution and migration of fixed and mobile network infrastructures from distinct, proprietary networks to converged networks based on IP. It is envisioned to be an interworking environment of heterogeneous networks of wired and wireless access networks, PSTN, satellites, broadcasting,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Integrate Mobile Devices with Grid by Using Efficient Local Resource Scheduling

    Grid computing has emerged as an important field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications, and in some cases, high-performance orientation. Grid computing is defined as \"Flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources\". In the road of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    A Survey of Behavior of MANET Routing Protocols Under Black-Hole Attack

    Mobile Ad hoc NETwork (MANET) is a collection of communication devices and mobile nodes through an intermediary joint wireless to communicate with each other, without pre-defined infrastructure or central authority exists.. Lacking of central administration or fixed infrastructure in this case is a key feature of the network from intruders....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    A Systematic Approach to Collaborate Quality Assurance Approaches

    Due to the increasing size and complexity of software today, the amount of effort for software Quality Assurance (QA) is growing and getting more and more expensive. There are many techniques lead to the improvement in software QA. Static analysis can obtain very good coverage while analyze program without execution,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Application Based Simulative Selection of Routing Algorithm in MANETS

    In the past few years, this has been seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or Wireless Local Area Networks (WLANs), not taking into account the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    DPCOBHA (Deduction and Prevention of Cooperative Black Hole Attack) in MANET

    A Mobile Ad hoc NETwork (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Multi Value Logic Based - Finger Print Unit

    Multiple-Valued Logic (MVL) - possibility to represent the information with more than two discrete levels. Representing data in a MVL system is more effective than the binary based representation, because the number of interconnections can be significantly reduced. The real advantage of higher-radix arithmetic is fewer arithmetic operations. Especially in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Survey on Techniques for Efficiently Detecting Intrusions in Multi-Tier Web Applications

    Web-delivered service is an emerging approach for IT service to reduce cost and improve delivery efficiency. Web-delivered services and applications have increased in both popularity and complexity. Daily tasks, such as banking, travel, and social networking, are all done via the web. Now the web applications have moved to the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Error Detection and Correction Using Reed Solomon Codes

    In the present world, communication system which includes wireless, satellite and space communication, reducing error is being critical. During message transferring the data might get corrupted, so high bit error rate of the wireless communication system requires employing to various coding methods for transferring the data. Channel coding for detection...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Person Verification with the Help of Finger Vein-A Review

    Finger vein identification is a biometric authentication system that matches the vascular pattern in an individual's finger to previously obtained data. The technology is currently in use or development for a wide variety of applications, including credit card authentication, automobile security, employee time and attendance tracking, computer and network authentication,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Online Banking Security Flaws: A Study

    Online banking has become increasingly important to the profitability of financial institutions as well as adding convenience for their customers. As the number of customers using online banking increases, online banking systems are becoming more desirable targets for criminals to attack. To maintain their customers' trust and confidence in the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Privacy Preserving Clustering Based on Fuzzy Data Transformation Methods

    Knowledge extraction process poses certain problems like accessing sensitive, personal or business information. Privacy invasion occurs owing to the abuse of personal information. Hence privacy issues are challenging concern of the data miners. Privacy preservation is a complex task as it ensures the privacy of individuals without losing the accuracy...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Real Environment Visualization Based on Nodes Movement Pattern and Routin Protocol in MANET

    Many researchers have been conducted on MANET related to performance measurement of various routing protocols. While measuring the performance of these protocols, during simulation an important factor to be considered is the mobility pattern of nodes in given area. Various research studies have considered a specific mobility pattern of nodes...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Location Tracking for VANET

    In this paper, the authors proposed locate and track a vehicle in VANET, based on its transmissions, during communication with other vehicles or the road-side infrastructure to tracking of vehicles based on their broadcasts, and proposed a solution called CARAVAN. They identified that by combining neighboring vehicles into groups, it...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    A Metric Based Prioritization Approach for Basic Path Testing

    White Box testing is the internal analysis approach to test a particular code or the system. While analyzing the code, it is required to separate the code blocks respective to the code criticality. There are different vectors to categorize these code statements or blocks called prioritization approaches. The priorities to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Comparison between Two Approach Based on Threshold and Entropy Based Approach

    Data mining refers to extracting or mining knowledge from large amounts of data. Organizing data into valid groupings is one of the most basic ways of understanding and learning. Cluster analysis is important for analyzing the number of clusters of natural data in several domains. Outlier detection is a fundamental...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    SURF Based Design and Implementation for Handwritten Signature Verification

    People are comfortable with pen and papers for authentication and authorization in legal transactions. Due to increase in amount of offline handwritten signatures it is very essential that a person's handwritten signature to be identified uniquely. In this paper, the authors will evaluate the use of SURF features in handwritten...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    A Novel Approach to Privacy Preserving Data Publishing

    The anonymization techniques, such as generalization and bucketization are used for privacy preserving micro data publishing. Here the Generalization loses considerable amount of information, especially for multi dimensional data and the bucketization method, does not prevent membership disclosure and does not apply for data that do not have a clear...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Identifying Functional Clones Between Java Directories Using Metric Based System

    Developers habitually copy a segment of software code, and then use it with or without modification. Identical part of software code is called clones. Software clone detection is significant because to minimize the software maintenance cost and to understand the system in a better way. Many code clone detection techniques...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Document Clustering on Various Similarity Measures

    Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters, thereby providing a basis for intuitive and informative navigation and browsing mechanisms. A wide variety of distance functions and similarity measures have been used for clustering. In...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Issues & Challenges for Security of Semantic Web

    Today semantic web technologies have several applications because of their expressive and reasoning power. Security is one in all the foremost vital quality attributes in Semantic web. This paper describes issues for security of semantic web and challenges for implementation of security through layers. These layers are presented as a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Effects of Black Hole Attack on an AODV Routing Protocol Through the Using Opnet Simulator

    The growing popularity of wireless networks, and the peak in the present era, so as to attract the wireless user, regardless of their geographical location. There is more and more Mobile Ad-hoc NETwork (MANET) the risk of security threats. One of these security threads is Black hole. In this type...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Secure and Reliable Multimodal Biometric Systems Using Two and Three Biometric Traits

    In this paper, the authors discuss about multimodal biometric systems using two biometric traits (Face and Palm Print) and three biometric traits (Face, Fingerprint and Palm Print). The results from both the systems are compared and it is proved that system with three traits is more secure and reliable as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    A Survey on Energy Efficient Data Mining in WSN

    The main motive of this paper is to study energy-efficient data-gathering mechanisms to detect sensor data irregularities Detection of sensor data irregularities is useful for practical applications as well as for network management, because the patterns found can be used for both decision making in applications and system performance tuning....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    A Modern Review on DNA Cryptographic Techniques

    In today's era as the rate of information storage and transformation is growing day by day; so as information security is becoming more important. To provide security to information there are various types of techniques as traditional cryptographic methods like substitution techniques, transposition techniques, hashing functions and algorithms like DES,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Study on Basically Available, Scalable and Eventually Consistent NOSQL Databases

    A relational database is a table-based data system where there is no scalability, minimal data duplication, computationally expensive table joins and difficulty in dealing with complex data. The problem with relations in relational database is that complex operations with large data sets quickly become prohibitively resource intense. Relational databases do...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Implementation of Cloud Computing by Using Short Job Scheduling

    Cloud Computing is one of the emerging research area that is been used effectively at the industry level. One of the major contribution of cloud computing is to avail all the resources at one place in the form a cluster and to perform the resource allocation based on request performed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Algorithm for Outlier Detection Based on Utility and Clustering (ODUC)

    Outlier analysis is one of the applied data mining technique. Outliers are data objects which do not comply with the general behavior or model of data. Statistical approach, distance-based approach, deviation-based approaches are some of the outlier detection methods. Clustering data mining technique groups' similar data objects into clusters, which...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Searchable Encryption and Fuzzy Keyword Search in Cloud Computing Technology

    Cloud computing is a technology that uses the internet and central remote servers to keep up data and applications. As becomes more mature, many organizations and individuals are attracted in storing more accessible data e.g. personal data files, company related information in the cloud. This technology allows for much more...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Review Report ATTACK Analysis in Mobile Ad HOC Network Based on System Observations

    This paper is dedicated to study attack and counter measure in MANET. After a short introduction what MANETs are and network security the authors present a survey of various attack in MANET pertaining to fill routing protocols. Their work and with a proposal analytical modeling to model some of these...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Cloud Service for Best Gateway in VANET

    Cloud computing is widely recognized as next generation computing paradigm, analyzing the possible way's of providing the cloud service to mobile network users using 3G, Wi-Fi, and satellite internet technologies aided undertaking this project. This paper is to grand cloud service to the vehicular ad-hoc network users efficiently, providing enough...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Research on Data Mining Classification

    The field data mining has various important techniques and one of them is classification which is receiving great attention recently in the database community. Classification technique can solve several problems in different fields like medicine, industry, business, science. Basically it involves finding rules that categorize the data into disjoint groups....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Frequent Pattern Analysis in Horizontal Layout Using Apriori Algorithm

    Knowledge discovery is the major task of data mining. The challenge is to model a suitable data. Centralized database management is achieved through data warehousing, mainly to improve efficiency while extracting and on data preparation. Data presentation is important phase in analysis. So data is collected and represented in the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Proficient Resource Mapping Framework in Clouds with Security and Search-Based Request

    Cloud computing is a new and promising paradigm delivering IT services as computing utilities. As clouds are intended to provide services to external users, providers need to be compensated for sharing their resources and capabilities. This aggregate at bottom aim on a fastidious group of traffic analysis attacks, flow correlation...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Mining Search Results from Web Databases with Wrapper Generation Using K-Means Clustering

    The data extraction techniques from web help to extract knowledge from web data, in which at least one of structured data is used in the mining process. The information collected from HTML tags and all sources, gives the minimum accuracy of result at the time of merging the collection of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Optimization of Clustering Problem Using Population Based Artificial Bee Colony Algorithm: A Review

    Data mining has been widely used and unifies research in fields such as computer science, statistics, databases, machine learning and artificial intelligence. Different techniques that also fit in this category include association learning, data classification and clustering as well as regression. Clustering is one of its main applications used to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    High-Throughput Genome Data Processing and Real-Time Analysis using Oracle Coherence In-Memory Technology

    Today, large sequencing centers are producing genomic data at the rate of 10 terabytes a day and require complicated processing to transform massive amounts of noisy raw data into biological information. With more and more medical knowledge discovered about genomic dispositions, the analysis and evaluation of genome data becomes a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    A Strategic Model to Enhance the Vertical Scalability in Cloud Environment

    In spite of the claimed advantages, the cloud still needs some work with regards to a variety of different issues. In this paper, the authors try to address the issue of vertical scalability of an application in a cloud. Improving the vertical scalability of applications is important in achieving the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Secure Cloud Data Sharing Within a Group

    In this paper, the authors propose a secure shared group model of cloud storage. Their proposed model is based on the cryptological technology that each member in the same group has its private key respectively and shares a common public key to protect the shared data in cloud. The illegal...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Secure Outsourcing of Linear Computations into the Cloud

    Computation outsourcing is one of the largest possibilities that the cloud enables. Clients with limited resources can utilize any necessary computing resources to outsource large-scale computations to the cloud. Despite the benefits of cloud computing, protection of the customers' confidential data is a major concern. This paper deals with secure...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    A Study of E-Learning in Cloud Computing

    E-learning introduces an entirely new learning environment for all. It had created excitement among researchers and educators towards hope for e-learning leads to a new revolution in education. E-learning systems hardly need of hardware and software resources. There are many educational institutions that cannot afford such investments, and cloud computing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2014

    Improved Apriori Algorithm VIA Frequent Itemsets Prediction

    Apriori algorithm is a classical algorithm of association rule mining. It is used to understand what products and services customers tend to purchase at the same time. This classical algorithm is inefficient due to so many scans of database. And if the database is large, it takes too much time...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Performance Evaluation of Cost-Time Based Workflow Scheduling Algorithms in Cloud Computing

    Cloud Computing has become more like an onset trend in the face of enterprises. It sets a milestone in the field of workflow execution in business process management. Workflow Management System is mainly devoted to support the definition as well as execution cum control of business processes. Workflow Scheduling is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Enhanced Security in Cloud Computing Environment Using Intrusion Detection System

    Cloud computing is essentially one of the most prominent and on demand technological aspect that IT offers today. It attempts to provide services to users on a leased basis which the user can get upon request. With its various service models, Cloud computing promises to cut the operational and capital...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    An Approach to Optimized Resource Scheduling Using Task Grouping in Cloud

    Cloud computing refers to Internet based development and utilization of computer technology, and hence, cloud computing can be described as a model of Internet-based computing. Scheduling is a critical problem in Cloud computing, because a cloud provider has to serve many users in Cloud computing system. So scheduling is the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Cloud Computing Technology as the Fastest Growing Part of Information Technology and Electronics Engineering for Providing Tremendous Benefits That Rapidly Treated as Exciting New Paradigm

    The authors are interested to know about cloud computing technology and now with the help of this paper they are going to explain it's each and every term related to this technology. Federal government agencies are looking for better vehicles to tame IT budgets. Cloud computing has been recently introduced...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    A Secure Way for Data Storage and Forwarding in Cloud

    In today's modern era everything is possible in terms of storage and making use of it as a service. Thus Cloud computing is used to store, manage, and process data using a network which is hosted rather than a local server or a personal computer. Cloud behaves like a group...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    A Expression Invariant Approach to Perform Face Recognition

    Face recognition is one of the primary and most complex biometric authentication system, on which lot of work is already done in last few decades But even then there is no sure shot solution. There are number of challenges associated with face recognition. One of such challenge is the facial...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Literature Survey on Elliptic Curve Encryption Techniques

    Preventing unauthorized access to corporate information systems is essential for many organizations. Communication security is one of the major areas of interest. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. The recent branch of network security is cryptography...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Separation -Preserving Mutual Auditing for Protected Cloud Storage

    Using cloud storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data storage and maintenance. However, the fact that users no longer have physical possession of the outsourced data makes...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Knowledge Discovery from Database Using an Integration of Clustering and Association Rule Mining

    Data mining is the process of automatic classification of cases based on data patterns obtained from a dataset. a number of algorithms have been developed and implemented to extract information and discover knowledge patterns that may be useful for decision support. Clustering and association are two important techniques of data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Impacts of Cloud Computing on E-Commerce Businesses and Industry

    Cloud computing has been one of the most popular topics on information technology, since it was proposed by Google. In the past years, cloud computing has become from a theoretical concept into the real applications in different industries such as telecommunication and healthcare. Inevitably, its influences on different industries have...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Optimal Round Robin (ORR) Scheduling for On-Demand Broadcast in Mobile Computing Environment

    Among the scarce resources of the network, bandwidth and energy of the mobile devices are influenced by the data dissemination in the wireless network environment. So, it is necessary to have an efficient scheduling algorithm which effectively utilizes them and improves the system performance in terms of database size and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Managed Dynamic Streaming Defile to Improving Security Attacks

    In this paper, the authors suggest a static study exercise for discovery various newly exposed application weaknesses such as Cross-Site Scripting (XSS): persistent, SQL shots and HTTP ripping aggressor. These exposures branch from unbridled input, which stands broadly expected as the utmost common source of security vulnerabilities in applications. They...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Contemporary Affirmation of Database Indexing Strategies

    In this paper, the authors present an orderly comparison of the applications that by using flat file and a diversity of indexed database approaches. In this paper, they consider the set of data mining approaches as applications. Measurements of run time as a function of database and minimum support threshold...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Improvement of Intrusion Detection System in Data Mining Using Neural Network

    Many researchers have argued that Artificial Neural Networks (ANNs) can improve the performance of Intrusion Detection Systems (IDS). one of the central areas in network intrusion detection is how to build effective systems that are able to distinguish normal from intrusive traffic. In this paper, four different algorithms are used...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Database Replication Using Eager Replication

    Distributed system is that system in which systems are logically connected. Data may be distributed or stored on multiple systems located at same physical location or may be distributed over a network of interconnected systems. Replication is the one of the good way to increase the performance of database system...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    An Efficient Image Cryptographic Technique by Applying Chaotic Logistic Map and Arnold Cat Map

    With the fast evolution of digital data exchange and increased usage of multi media images, it is essential to protect the confidential image data from unauthorized access. In natural images the values and position of the neighboring pixels are strongly correlated. The proposed method breaks this correlation increasing entropy of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Secure Transmission of Packets by Preventing Jamming Attacks

    Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Detection and Prevention Algorithms of DDOS Attack in MANETs

    Security is a weak link of network systems. The malicious usage and attacks have caused tremendous loss by impairing the functionalities of the computer networks. In an attempt to enhance security in MANETs many researchers have suggested and implemented new improvements to the protocols and some of them have suggested...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Hand Geometry Based Biometrics Using LabVIEW

    In this paper, the authors have developed a prototype hand geometry-based verification system and analyzed its performance. They have demonstrated the practical utility of this system by designing an application that uses hand geometry as opposed to password for restricting access to a web site. They present their preliminary verification...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Optimized Energy Efficient Resource Management in Cloud Data Center

    In recent years, IT infrastructures continue to grow rapidly driven by the demand for computational power created by modern compute-intensive business and scientific applications. However, a large-scale computing infrastructure consumes enormous amounts of electrical power leading to operational costs that exceed the cost of the infrastructure in few years. For...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    CloudSim Estimation of a Simple Particle Swarm Algorithm

    Life before cloud was very tough and complicated as user had to install lots of stuff on their machines which might rarely use again. The main idea to develop cloud was to decentralize the application from hardware and OS. Cloud computing allows consumers and businesses to use applications without installation...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Credit and ATM Card Fraud Prevention Using Multiple Cryptographic Algorithm

    Along with great increase in credit & ATM Card transactions, credit & ATM card fraud has become increasingly widespread in recent years. The proposed paper work investigates that the efficacy of applying DES & 3-DES algorithm is to prevent the credit card fraud problems. The different techniques & classification methods,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Secure and Dependable Cloud Storage and Retrieval for Metric Data

    Cloud storage service is widely used to outsource data. However, the data owners have security concerns on the cloud storage services as the cloud service providers focus more on storage rather than security. This paper considers a scenario where data owners store and retrieve metric data into cloud. The data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Crime Preventions Technique

    Face is the prime concern in criminal identification. The face is the people primary focus of attention in social life playing a major role in conveying identity and emotion. There is an abnormal increase in the crime rate and also the number of criminals is increasing, this leads towards a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    A Comparative Study on Feature Selection Using Data Mining Tools

    Clustering is an important technique of data mining. Clustering is an unsupervised learning problem that group objects based upon distance or similarity. Each group is known as a cluster. In this paper, the authors make use of a large database 'Cardiology dataset' containing 14 attributes and 303 instances to perform...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Dynamic VM Allocation Algorithm using Clustering in Cloud Computing

    Cloud computing has become the collective model for grouping the different technologies which are collaborated to provide the services on demand. Cloud computing is known as a dynamic service provider using very large scalable and virtualized resources over the Internet. These services include IaaS (Infrastructure as a Service), PaaS (Platform...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Integration of Web Services and Routing Techniques for Distributed Applications

    In this paper, the authors described an approach to Enterprise Application Integration (EAI) using extensible Web services. The approach is demonstrated by building a real-world application for EAI in the financial services domain. Its main purpose is to integrate the various web services together and also assess the routing technique...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2013

    Grouping of Personalized Web Documents by Naming Aliases

    In lots of works such as information retrieval, sentiment analysis, person name disambiguation as well as in biomedical fields it is required to identify the accurate references to an entity among a list of references. More previous work had been done on solving lexical ambiguity. Here, the authors proposed a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)