International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 601-640 of 1712 results

  • White Papers // Aug 2013

    Enhanced Clustering Approach for Online and Offline Web Content Search

    This paper about extraction of data related to biomedical text. This approach is a concept of online and offline database. In traditional method, when the user is online then they get the data easily but when there is no connection of internet then user cannot get the data. In this...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    An Empirical Validation of Integrity Risk Factor Metric: An Object-Oriented Design Perspective

    Software is said to be secure if it is less prone to attack. Secure design leads building secure software. It is also required to check software design to assure that the design is safe or less prone to attack. In this paper, the authors proposed a methodology to scrutinize class...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Next Generation Networks - The Technology and Its Resource Management

    Next Generation Network (NGN) is a generic term that describes the evolution and migration of fixed and mobile network infrastructures from distinct, proprietary networks to converged networks based on IP. It is envisioned to be an interworking environment of heterogeneous networks of wired and wireless access networks, PSTN, satellites, broadcasting,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Integrate Mobile Devices with Grid by Using Efficient Local Resource Scheduling

    Grid computing has emerged as an important field, distinguished from conventional distributed computing by its focus on large-scale resource sharing, innovative applications, and in some cases, high-performance orientation. Grid computing is defined as \"Flexible, secure, coordinated resource sharing among dynamic collections of individuals, institutions, and resources\". In the road of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    A Survey of Behavior of MANET Routing Protocols Under Black-Hole Attack

    Mobile Ad hoc NETwork (MANET) is a collection of communication devices and mobile nodes through an intermediary joint wireless to communicate with each other, without pre-defined infrastructure or central authority exists.. Lacking of central administration or fixed infrastructure in this case is a key feature of the network from intruders....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    A Systematic Approach to Collaborate Quality Assurance Approaches

    Due to the increasing size and complexity of software today, the amount of effort for software Quality Assurance (QA) is growing and getting more and more expensive. There are many techniques lead to the improvement in software QA. Static analysis can obtain very good coverage while analyze program without execution,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Application Based Simulative Selection of Routing Algorithm in MANETS

    In the past few years, this has been seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or Wireless Local Area Networks (WLANs), not taking into account the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    DPCOBHA (Deduction and Prevention of Cooperative Black Hole Attack) in MANET

    A Mobile Ad hoc NETwork (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Multi Value Logic Based - Finger Print Unit

    Multiple-Valued Logic (MVL) - possibility to represent the information with more than two discrete levels. Representing data in a MVL system is more effective than the binary based representation, because the number of interconnections can be significantly reduced. The real advantage of higher-radix arithmetic is fewer arithmetic operations. Especially in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Survey on Techniques for Efficiently Detecting Intrusions in Multi-Tier Web Applications

    Web-delivered service is an emerging approach for IT service to reduce cost and improve delivery efficiency. Web-delivered services and applications have increased in both popularity and complexity. Daily tasks, such as banking, travel, and social networking, are all done via the web. Now the web applications have moved to the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Error Detection and Correction Using Reed Solomon Codes

    In the present world, communication system which includes wireless, satellite and space communication, reducing error is being critical. During message transferring the data might get corrupted, so high bit error rate of the wireless communication system requires employing to various coding methods for transferring the data. Channel coding for detection...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Person Verification with the Help of Finger Vein-A Review

    Finger vein identification is a biometric authentication system that matches the vascular pattern in an individual's finger to previously obtained data. The technology is currently in use or development for a wide variety of applications, including credit card authentication, automobile security, employee time and attendance tracking, computer and network authentication,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Online Banking Security Flaws: A Study

    Online banking has become increasingly important to the profitability of financial institutions as well as adding convenience for their customers. As the number of customers using online banking increases, online banking systems are becoming more desirable targets for criminals to attack. To maintain their customers' trust and confidence in the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Privacy Preserving Clustering Based on Fuzzy Data Transformation Methods

    Knowledge extraction process poses certain problems like accessing sensitive, personal or business information. Privacy invasion occurs owing to the abuse of personal information. Hence privacy issues are challenging concern of the data miners. Privacy preservation is a complex task as it ensures the privacy of individuals without losing the accuracy...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Real Environment Visualization Based on Nodes Movement Pattern and Routin Protocol in MANET

    Many researchers have been conducted on MANET related to performance measurement of various routing protocols. While measuring the performance of these protocols, during simulation an important factor to be considered is the mobility pattern of nodes in given area. Various research studies have considered a specific mobility pattern of nodes...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Location Tracking for VANET

    In this paper, the authors proposed locate and track a vehicle in VANET, based on its transmissions, during communication with other vehicles or the road-side infrastructure to tracking of vehicles based on their broadcasts, and proposed a solution called CARAVAN. They identified that by combining neighboring vehicles into groups, it...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    A Metric Based Prioritization Approach for Basic Path Testing

    White Box testing is the internal analysis approach to test a particular code or the system. While analyzing the code, it is required to separate the code blocks respective to the code criticality. There are different vectors to categorize these code statements or blocks called prioritization approaches. The priorities to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Comparison between Two Approach Based on Threshold and Entropy Based Approach

    Data mining refers to extracting or mining knowledge from large amounts of data. Organizing data into valid groupings is one of the most basic ways of understanding and learning. Cluster analysis is important for analyzing the number of clusters of natural data in several domains. Outlier detection is a fundamental...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Measurement Based Analysis of Reactive Protocols in MANET

    The main goal of an ad hoc network routing protocol is to establish correct and efficient route between a pair of mobile nodes so that messages delivered within the active route timeout interval. Route should be discovered and maintained with a minimum of overhead and bandwidth consumption. Routing is a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Person Tracking Using Gait

    Gait recognition is one kind of biometric technology that can be used to monitor people without their cooperation. Controlled environments such as banks, military installations and even airports need to be able to quickly detect threats and provide differing levels of access to different user groups. Gait shows a particular...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Various Protocols to Manage Cooperation and Reputation in MANET (A Review)

    MANETs rely on the cooperation of nodes for packet routing and forwarding. However, much of the existing work in MANETs assumes that mobile nodes will follow prescribed protocols without deviation. However, a user may misbehave due to several advantages resulting from noncooperation, the most obvious being power saving. As such,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Software Testing Using Soft Computing Technique

    Testing software is essential to ensure quality in IT systems. One of the testing methods is randomized testing which is effective for unit testing. The effectiveness of randomized testing is influenced by certain parameters. One such parameter is frequency of method calls. In this paper, the authors implement a genetic...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Secure Transmission of Packets by Preventing Jamming Attacks

    Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Detection and Prevention Algorithms of DDOS Attack in MANETs

    Security is a weak link of network systems. The malicious usage and attacks have caused tremendous loss by impairing the functionalities of the computer networks. In an attempt to enhance security in MANETs many researchers have suggested and implemented new improvements to the protocols and some of them have suggested...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    To Improve the Convergence Rate of K-Means Clustering Over K-Means with Weighted Page Rank Algorithm

    The proposed paper represents ranking based method that improved K-means clustering algorithm performance and accuracy. In this the authors have also done analysis of K-means clustering algorithm, one is the existing K-means clustering approach which is incorporated with some threshold value and second one is ranking method which is weighted...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    An Investigation on Constructing XML Structure Tree

    Now-a-days, several approaches are dealing with XML documents require generating the Structure Tree (XST) for these documents. These approaches could be for compressing, integrating, ontology representation, finding similarity of XML documents. This paper investigates the proper ways to generate XST by proposing two algorithms each one depends on different parsing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Mitigate the Impact of DoS Attacks by Verifying Packet Structure

    In this paper, a mechanism for reducing the DoS (Denial of Service) attack has been explored. DoS have become the major threat to the internet. It is malicious efforts of attackers to deny the legitimate user to access the website or any web service through internet. This is an attack...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Reversible Data Embedding Using Asymmetric Cryptosystem

    In this paper the authors propose a narrative reversible data embedding system within an image which is encrypted using a public key generated by ECC algorithm. Then the data which is to be hided can be embedded into the image by modifying a fraction of encrypted data. This encrypted image...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Proposed Framework for Bug Tracking System in OSS Domain

    According to the present scenario, open source software revolution is gaining momentum in information technology era. In the battlefield of software technology, the open source software cannot be ignored. The philosophy behind open source extends towards quality and efficiency. In open source software development there is a shared understanding among...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    Avalanche Effect and Its Statistical Analysis of NTRU & RSA Cryptosystem

    Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. Asymmetric encryption techniques i.e....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2013

    A Study on Similarity Measure for Fuzzy Sets

    Similarity measure for fuzzy sets is one of the researched topics of fuzzy set theory. The literature is vast and growing. This paper is to revisit the definitions of similarity measure which are predominant in the literature of fuzzy set theory. The authors wish to analyze these existing definitions with...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    An Approach to Enhanced Security of Multimedia Data Model Technology Based on Cloud Computing

    Most of user data is stored on local networks with servers that may be clustered and sharing storage. This approach has had time to be developed into stable architecture, and provide decent redundancy when deployed right. A newer emerging technology, cloud computing, has shown up demanding attention and quickly is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Meliorating Fingerprint Fuzzy Vault Using Multiple Polynomials

    Biometrics is a science which uses persons distinguishable characteristics like fingerprints, iris, retina, hand geometries or behavioral characteristics like keystroke dynamics, gait etc for authentication. The biometric template is a digital representation of an individual's distinct characteristics extracted from biometric sample. The templates are the crucial elements of the biometric...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    A Novel Deterministic Key Pre Distribution Schemes for Wireless Sensor Network

    Wireless Sensor Networks (WSN) usually consists of a large number of tiny sensors with limited computation capability, memory space and power resource. In this paper, the authors have proposed improved pairwise key management scheme based on deployment knowledge of the wireless sensor networks. Compared with previous proposed key pre-distribution schemes,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    A Survey on Digital Rights Management (DRM) and RSS (Rich Site Summary)

    In the proposed system a Rich Site Summary (RSS) feed is create and is protected internet by using Digital Rights Management (DRM) techniques. This RSS feed is like an application that is to be purchased by the required user. Without subscription and password the user is unable to access the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Palm Vein Technology Security

    Forget about signatures and photo IDs, forget about PIN numbers, forget about fingerprint, voiceprint, iris scan, or facial recognition security technologies to counter forged or stolen user IDs. Palm vein ID authentication, which uses an infrared sensor to capture the user's vein pattern unique to every individual's palm for an...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    A Novel Technique for Asymmetric Group Key Agreement for Dynamic Open Group Connection Networks

    In this paper, the authors proposed an Authenticated Asymmetric Group Key Agreement (A2GKA) protocol using bilinear mapping for dynamic networks. This protocol is mostly suitable for multicasting (or broadcasting) system without relying on the group controller to distribute secret keys to the group members. Their proposed protocol is equipped with...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    An Operative Algorithm for K-Means Clustering with New Initial Centroids

    Organizing data into sensible groups is the most fundamental way of understanding and learning. Clustering helps to organize data based on natural grouping without any category labels to identify the clusters. One of the most popular and simplest partitional clustering algorithms is the K-Means published in 1955. K-Means algorithm is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Using Dynamic Forms to Improve Data Quality

    In modern databases data quality is crucial problem. Data-entry forms grant the primitive and supportable opportunity for identifying and modifying errors, besides, for upgrading data quality at entry time, there has been a provincial research into automatic procedures. In this paper, the authors propose USHER, which is an end-to-end system...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Authentication and Key Distribution Schemes for Wireless Sensors Network

    Wireless sensor network contains sensor nodes having limited capabilities to sense, collect, and manipulate the data. The sensed data often need to be sent back to the base station for analysis. However, when the sensing field is too far from the base station, transmitting the data over long distances using...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Elicitation and Structured Representation Modeling of Security Requirements for Authentication Vulnerabilities in Web Applications

    An understanding of the risks to which application will be exposed, can be a good starting point to design and implement secure web applications. Business oriented web applications need complex authentication policies to securely implement business processes. Threats against the confidentiality, availability and integrity of the data stored, processed and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Configuring Floating Point Multiplier on Spartan 2E Hardware Module

    Floating point operations are hard to implement on FPGAs i.e. on reconfigurable hardware's because of their complexity of their algorithms. On the other hand, many scientific problems require floating point arithmetic with high level of accuracy in their calculations. Therefore, VHDL programming for IEEE single precision floating point multiplier module...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Personalized Web-Based Systems With fuzzy Systems Based on CI Modeling

    Personalization involves using technology of accommodate the differences between individual ones confined mainly to the web it is increasing by becoming a factor in education, health care, television and in both business to business and business to consumer settings. In this paper, the computational intelligence methods are identified and critically...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Applying Machine Learning for Fault Prediction Using Software Metrics

    Defective modules pose considerable risk by decreasing customer satisfaction and by increasing the development and maintenance costs. Therefore, in software development life cycle, it is essential to predict defective modules as early as possible so as to improve software developers' ability to identify the defect-prone modules and focus quality assurance...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    An Enhancement to TCPW BBE by Modifying the Bandwidth Estimation Using Modified EWMA

    Transport Control Protocol (TCP), the dominantly used transport protocol, execute well over wired networks. As far as wireless network is brought into use, TCP should be altered to work with wireless networks. TCP is designed for congestion control in wired networks. Since congestion is not only the main problem in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Different Compression Techniques and Their Execution In Database Systems To Improve Performance

    Compression in traditional database systems is known to improve performance significantly, it reduces the size of the data and improves I/O performance by reducing seek times (the data are stored nearer to each other), reducing transfer times (there is less data to transfer), and increasing buffer hit rate (a larger...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2011

    Impact of jQuery in Web Domain

    This paper represents the significance of jQuery and how it eliminates the important issues with much ease in real world web applications. In many complex situations jQuery eliminates the need for flash kind of work. It gives the faster performance during the loading of the web page. It's a new...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2011

    Importance of WCF in Web Applications

    This paper represents the importance of WCF services into the real world. In some complex scenario it is not possible to update the data at several location and also difficult to update the information at all the places. To address this type of issues WCF is useful and the WCF...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    An Overview and Study of Security Issues & Challenges in Cloud Computing

    Cloud computing is a promising technology to facilitate development of large-scale, on-demand, flexible computing infrastructures. But without security embedded into innovative technology that supports cloud computing, businesses are setting themselves up for a fall. The trend of frequently adopting this technology by the organizations automatically introduced new risk on top...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Power Aware Routing Protocols in Mobile Adhoc Networks-Survey

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network composed of mobile nodes without any fixed infrastructure. A very important and necessary issue for mobile ad-hoc networks is to find the route between source and destination that is a major technical challenge due to the dynamic topology of the network....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Complete Study on Energy Efficient Techniques for Mobile Adhoc Networks

    The process of wireless networks in the applications like transferring video files is subjected to dual constraints. Both minimization of power and other QoS requirements like delay, throughputs are have to be take care properly. Mobile Ad Hoc Networks are more perceptive to these issues where each mobile device is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Comparative Study of Routing Protocols in Wireless Sensor Network

    Wireless Sensor Networks consist of small nodes with sensing and computation, communication capabilities. Wireless network are highly dependent on specific application and are constrained by energy, storage capacity and power. To increase the lifetime of networks, energy awareness is essential consideration if the authors analyze routing protocols. Routing protocols of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Study on Various Data Mining Approaches of Association Rules

    Data mining is considered to deal with huge amounts of data which are kept in the database, to locate required information and facts. Innovation of association rules among the huge number of item sets is observed as a significant feature of data mining. The always growing demand of finding pattern...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Review on Security Issues of Routing Protocols in Mobile Ad-Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Resource Oriented Intelligent Scheduling Scheme to Estimate Software Release

    Software Release Management is an important key technology for distributing the project/product to the customer. The key success factor of any Software Product lies in how delicately the product is released to the customer. "Release management is the process of planning, building, testing and deploying hardware and software, the version...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Survey of Algorithms for Defending MANETs Against the DDoS Attacks

    Mobile Ad hoc Network is the kind of wireless networks that utilize multi-hop radio relaying and it is an infrastructure less Network due to its capability of operating without the support of any fixed infrastructure. Security plays a vital role in Mobile Ad hoc NETwork (MANET) due to its applications...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Usage of distributed identities and Decentralized Recommendation chains in Peer to Peer Reputation Mgt.

    One of the world habituated system is p2p in this Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client. The authors describes the Reputation...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    An Approach to Detect Black Hole Nodes in Wireless Network Using Cellular Automata

    In this paper, the authors have put an emphasis on Black Hole node detection if it exists in any Mobile Ad hoc NETworks (MANETs). The dynamic topology of MANETs allows nodes to join and leave the network at any time instance. This general feature of MANET has exposed to major...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Performance Issues and Evaluation considerations of web traffic for RIP & OSPF Dynamic Routing Protocols for Hybrid Networks Using OPNET

    In this paper, performance analysis of the Wireless and Wired computer networks for combination of conventional model of RIP and OSPF is evaluated through simulation which has been attempted using OPNET as simulating tool. For networks, the performance parameters like wireless LAN media access delay and throughput have been investigated...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Performance Enhancement of RSA Cryptography Algorithm by Membrane Computing

    The problem of using RSA algorithm in cryptography is the long time it takes for the encryption process. To overcome the problem, RSA algorithm uses short messages. In this paper, the authors make analysis for the RSA public key protocol in the framework of membrane computing to develop a membrane...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Comprehensive Study on Cloud Computing

    Cloud computing is becoming an increasingly popular enterprise model in which computing resources are made available on-demand to the user as needed. The unique value proposition of cloud computing creates new opportunities to align IT and business goals. Cloud computing use the internet technologies for delivery of IT-Enabled capabilities 'As...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Performance Analysis of IPSec VPN Over VoIP Networks Using OPNET

    Security and privacy become mandatory requirements for VoIP communications that needs security services such as confidentiality, integrity, authentication, non-replay and non repudiation. The available solutions are generic and do not respect voice specificities and constraints. Thus, Quality Of Service (QOS) of the voice is affected by delay, jitter, and packet...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Bidding Algorithm for Heightened Efficiency-Constructed Source Distribution in MANET

    This paper the authors propose and evaluate a combined routing, admission control and source distribution scheme that aims to maximize the aggregated efficiency of the system. As part of this scheme, two novel efficiency-constructed algorithms are presented. The core of the scheme is a distributed, price-constructed distribution algorithm that allocates...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Comparative Performance Analysis of Even Odd Round Robin Scheduling Algorithm (EORR) Using Dynamic Time Quantum With Round Robin Scheduling Algorithm Using Static Time Quantum

    In the Round-Robin scheduling scheme, the scheduler processes each job, one after another, after giving a preset quantum of time. It is a preemptive CPU scheduling algorithm which switches between the processes when static time quantum expires. Round Robin scheduling algorithm is designed especially for time sharing operating system but...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Improvement of NTRU Cryptosystem

    The NTRU cryptosystem can be used in a range of application which involves security in a network. NTRU is depending upon the algebraic structures of certain polynomial rings. The NTRU Encrypt is a public-key cryptosystem which is based on the shortest vector problem. Its main characteristics are the low memory...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Biometrics for Enhancement of Security Standards

    Biometrics has found an important place in the people day to day life. With growing concerns over security of individuals as well the data, there has been a step rise in the number and types of biometric devices and security. For enhancing the security standards of the Biometric devices some...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Heterogeneous Network-on-Chip Architecture for Scalability and Service Guarantees

    Today's Chip-level Multi-Processors (CMPs) feature up to a hundred discrete cores, and with increasing levels of integration, CMPs with hundreds of cores, cache tiles, and specialized accelerators are anticipated in the near future. In this paper, the authors propose and evaluate technologies to enable Networks-On-Chip (NOCs) to support a thousand...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    An Unified Approach for Process Quality Analysis and Control

    The process in a company finally results in product of the company, which represents the company standard. Hence, during the process execution time quality of the process needs to be taken care before and after the work done. In this paper, an unified approach to quality analysis and control of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Transaction Management in Homogenous Distributed Real-Time Replicated Database Systems

    A homogenous distributed real time replicated database system is a network of two or more DBMS that reside on one or more machines. A distributed system that connects two or more databases are Homogenous Distributed DataBase Systems (HDDBS) create different problems when accessing distributed and replicated databases. Particularly, access control...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Applying Load Balancing: A Dynamic Approach

    Now-a-day's, everything is going online. Web applications plays vital role on internet to provide 24x7 services to customers. When application becomes popular, traffic to that is also in a state of growing. For availability, scalability, performances boosting more and more servers are required. Load balancing is a key issue in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Study and Comparison of Software Process Improvement

    Software Process Improvement programs are being integrated with the key processes practiced in different software organizations, who really want to improve their processes continuously in order to enhance their quality of the products. Software Process Improvement (SPI) encompasses a set of activities that will lead to a better software process,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Multi-Viewpoint Based Similarity Measure and Optimality Criteria for Document Clustering

    All clustering methods have to assume some cluster relationship among the data objects that they are applied on. Similarity between a pair of objects can be defined either explicitly or implicitly. In this paper, the authors introduce a novel multi-viewpoint based similarity measure and two related clustering methods. The major...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    HBH Multicast Distribution Through Recursive Unicast Trees

    IP Multicasting has been, and still is, an interesting research topic. The Internet is likely been organized with both unicast and multicast enabled networks. Thus utmost importance is given to design protocols that allow the progressive deployment of the multicast service by supporting unicast clouds. This paper gives HBH (Hop-By-Hop...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Match the Face and Recognition Face Using Artificial Neural Network

    Face recognition is an important research problem spanning numerous fields and disciplines. This because face recognition, in additional to having numerous practical applications such as bankcard identification, access control, Mug shots searching, security monitoring, and surveillance system, is a fundamental human behaviour that is essential for effective communications and interactions...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Remote Voting System for Corporate Companies Using Visual Cryptography

    The project titled "Remote Voting System for Corporate Using Visual Cryptography" aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place, even when key stakeholders of election process are not available at...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    An Algorithm for Crypto Analysis in Manet

    A Mobile Ad hoc NETwork (MANET) is self-organizing, dynamic topology network, which is formed by a collection of mobile nodes through radio links. MANETs enable wireless communication between mobile devices without relying on a fixed infrastructure. Hence, routing in dynamic network is a new challenge. The authors used various routing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    A Modified Improved Text Encryption Approach Inspired by Genetic Algorithm Techniques Using RSA Algorithm

    In the recent times, security is the main thing that everybody is asking for; in the electronically message transferring system, data/information can be hacked anytime during transmission. The technique of keeping a message secure is cryptography. Cryptography is the study of mathematical techniques related to aspects of information security such...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2012

    Advanced Communication Through Flesh Red Tacton - Human Area Networking Technology

    All the user-friendly services require technologies that enable communication between people and objects in close proximity. This paper describes a model of human area networking technology that enables communication by touching, a technology the authors call Red Tacton. Human area networking technology for communication between mobile terminals and between terminals...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Comparison of Processor Scheduling Algorithms Using Genetic Approach

    Operating system efficiency is affected by several factors. Scheduling of CPU is one of the critical factors that affects the efficiency. In case of process scheduling the authors allocate processes to processor in a specified sequence so that efficiency of the system is maximized. In this paper genetic algorithm is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Development of Data Acquisition and Analysis System on Virtex 5

    This paper presents the development of Virtex5, Field Programmable Gate Array (FPGA) FPGA based data acquisition and analysis system. The system consists of data sampling and acquisition followed by Fast Fourier Transform Processor. The output Transformed data is read on host PC via RS232 for plotting and analysis. 'C' and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)