International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 81-120 of 2949 results

  • White Papers // Apr 2015

    Novel Technique Uncertain Data Classification Using Support Vector Machine

    In this paper, the authors examine a novel learning replica in which the experiential input is corrupted with noise. Based on a probability modeling technique, they derivative a common statistical formulation where unnoticed input is replica as a hidden mixture basic. They were proficient to proposed evaluation technique that obtains...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    False Positives Reduction in Intrusion Detection Systems Using Alert Correlation and Data Mining Techniques

    During the last years and with the growth of the cyber-attacks, the information safety has become an essential element. Therefore users must find the best ways to protect their IT system from these attacks. Researchers have proposed different methods and algorithms to improve Intrusion Detection Systems (IDSs). There are different...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Employee Attendance Management System Using Android

    This employee attendance management system is used for keeping the record of an employee in an organized organization such as school, college, universities, etc. The authors' paper is to design an employee attendance system which could effectively manage attendance of employee at institutes, organization, etc. This application maintains a database...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Web Content Mining: Techniques and Algorithms

    The Web has growing continuously with respect to the volume of information, in the complexity of its topology, as well as in its diversity of content and services. This phenomenon was transformed the web in spite of its young age to an obscure media to take useful information. If users...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    An Improved Data Offloading Framework for Effective Mobile Data Offloading in Campus Network

    Data offloading is a technique to transfer data between different networks like mobile network to Wi-Fi networks. Wi-Fi or Wi-max networks are very fast and require no spectrum fees to implement them. Whereas, mobile networks require the spectrum reservations which are highly costly and heavily affect the service charges offered...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Contribution of Hadoop to Big Data Problems

    In the today's era of technology storing and processing a data is a very important aspect. Now-a-days, even tera bytes and penta bytes of data is not sufficient for the storage of large chunk of database. For that reason companies today use the concept of Hadoop in their application. Also...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Resource Optimization in Virtual-Cloud Infrastructure for Effective IT Governance

    Now-a-days, cloud computing is core technology used in IT governance due to its agility and efficient resource utilizations. Majorly, IT system focuses on on-demand business services to end users by using flexible cloud computing models in terms of their ease in deployment strategy. The cloud computing deployment involves various components...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Big Data Analysis Using HDFS, C-MEANS and MapReduce

    In this electronic age, increasing number of organizations are facing the problem of explosion of data and the size of the databases used in today's enterprises has been growing at exponential rates. Data is generated through many sources like business processes, transactions, social networking sites, web servers, etc. and remains...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    A Survey of Data Mining Approaches in Performance Analysis and Evaluation

    Education domain is very big and spread across complete geographical locations. It is widespread in other domain as well. Considering the influence of education, there is enormous amount of data is available. This data is related to teaching, learning and assessment of students across all educational institutes. In recent years,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Performance Investigation of a Planar Antenna for a Cheap WLAN USB Dongle

    Portable computing devices such as laptops, palmtops, tabs, Smartphone and even the conventional PC are connected to internet via mostly wireless links as the fashion of wireless fidelity grows. Among the present technologies for such devices WLAN and Wi-Fi are famous. USB dongles still play a vital role. But one...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    A Survey on Hadoop Technology and Its Role in Information Technology

    Hadoop is the popular open source implementation of MapReduce, a powerful tool designed for deep analysis and transformation of very large data sets. Hadoop enables the users to explore complex data, using custom analyses tailored to their information and questions. Hadoop is the system that allows unstructured data to be...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Query Optimization for Intelligent Data Mining to Obtain Abstract User Views

    Several web applications provide interface for dynamic query formation for better user experience and efficient data mining. However, several applications fail to measure the need of user session constraints. The authors propose a self-learning dynamic query builder which can measure session constraints to enhance the efficiency of dynamic query formation....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    A Survey on Decision Tree Based Approaches in Data Mining

    Decision tree learning is the most popular and powerful approach in knowledge discovery as well as in data mining. This is used for exploring large and complex bodies of data in order to discover useful patterns. Decision tree learning uses a decision tree as a predictive model which maps observations...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Data Mining Clustering Methods: A Review

    Clustering is data mining technique of grouping objects or data into clusters in which objects within the cluster have high similarity, but are very dissimilar to objects in the other clusters. Similarities and dissimilarities are measured on the attribute values which describes the objects. Clustering methods are used to formulate...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    A Survey: Data Retrieval in Hadoop MapReduce

    Big data concerns massive amount of data. Hadoop is a framework for processing large amount of data. Hadoop distributed file system and MapReduce programming model is use to storage and retrieval of big data. The terabytes size is easily stored on HDFS and analyzes using MapReduce. The authors' approach aims...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    A Review: On Data Mining and Data Gathering Algorithm in WSN

    Data mining in sensor networks is the method of selecting application-oriented standards and patterns with acceptable accuracy from a continuous, fast and probably non ended flow of data streams from sensor networks. In this case, all data cannot be stored and must be processed quickly. Data mining techniques has to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Review of Various Enhancement for Clustering Algorithms in Big Data Mining

    The enlarging volumes of information emerging by the progress of technology, makes clustering of big data a challenging task. The K-means clustering algorithm is most commonly used algorithms for clustering analysis. The existing K-means algorithm is, inefficient while working on big data and improving the algorithm remains a problem. K-means...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Machine Fault Identification Using Data Mining Technique and R Programming (Packages and Tools)

    Rolling bearings are a type of bearing that basically uses cylinders to maintain the separation between the moving parts of the bearing. The main purpose of a roller bearing is to reduce rotational friction and support radial and axial loads. Compared to ball bearings, roller bearings can support heavy radial...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Optimization Technique for Removing the Deficiencies of Current Apriori Algorithm

    In last few decades, there is an increase in storing the information in electronic format. This massive amount of data needs analyzing. For this there is a technique, which is designed for mining the databases and is less time consuming. This paper is on existing Apriori algorithm in which databases...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Advance Resource Discovery System Using Data Mining Technique

    One of the challenges facing the current web is the efficient use of all the available information. The Web 2.0 phenomenon has favored the creation of contents by average users and thus the amount of information that can be found for diverse topics has grown exponentially in the last years....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Big Data Processing in Sentiment and Opinion Mining for Detecting Student Depression in E-Learning Using Rich Facebook

    The sentiment analysis holds the terms are sentiments (comments based on feeling) and opinion (comments based on thought or knowledge) to detect the depression only for student through the e-learning system. Here, introduce the Facebook application interface as a "Postbuk" for mining and authenticating the comments extraction from the Facebook...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Implementing Booth Multiplication Algorithm Using Software Virtual Hardware

    In this paper, the authors present a new way of testing hardware's using their home made software entitled "Virtual hardware". They have developed this software for the purpose of generating feasibility study report of any hardware. This software checks whether the fabrication of any hardware is feasible or not. This...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    A Data Mining Objective Function with Feature Selection Algorithm Using Document Clustering

    Conventional feature selection classifiers work with known and precise data values. In recent data collection methods, appreciable amount of attributes are uncertain. The uncertain attributes, in almost all applications, have more influences on the dataset on information classification and feature selection constructs. Uncertainty needs to be handled properly reasons for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Replication for Improving Availability & Balancing Load in Cloud Data Centres

    In this paper, the authors focused on the problem of availability of data on the data nodes and replication process. Cloud computing service providers require a system which can handle a large number of requests at a time. For processing the huge cloud of requests for data access, services need...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Design and Implementation of Discovering Association Rule for Information Retrieval

    Aliases are very important in information retrieval to retrieve complete information about a personal name from the web, as some of the web pages of the person may also be referred by the people aliases. The aliases for a personal name are extracted by previously proposed alias extraction method. In...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Multi-Key Encryption in Multi-Tenant Database for Data Isolation

    Multi-tenancy is to provide services to multiple clients on same physical resources through virtualization. But, at the same time providing security to private data of multiple tenants is big challenge. In this paper, the focus is on security and data privacy (isolation) for SaaS applications that are built and deployed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Devices Interfacing with PC Using 8-Bit Serial Port Communication and Visual Basic 2010

    An electronics switch is a device which has electronic control assembly attached to it. They are provided with an access control system. This system allows the user to control the device with software which is developed and designed using visual basic .NET 2010 serial port communication. The code is entered...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2015

    Open System Architecture Platform for Big Data: An Integrated Emergency Disaster Response System Architecture

    In situations such as emergency where urgent and active response is needed to access the case and deploy relief or support with effective service in real-time and notices drawn and effectively distributed, easy to use applications with disparate devices and wide range coverage are necessary for sharing information as well...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    Cloud Computing: Flowing Model in IT Services

    Cloud computing based on the virtual environment and it is the useful technique for the IT organizations. Cloud computing befits more prevalent because of their availability of storage on demand. In cloud computing the data stored in the storage area and accessed by the organizations on their demand from the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    Implementation of Dynamic Resource Allocation using Virtual Machines in Cloud Computing

    Cloud computing allows business customers to scale up and down their resource usage based on needs. Many of the touted gains in the cloud model come from resource multiplexing through virtualization technology. In this paper, the authors present a system that uses virtualization technology to allocate data center resources dynamically...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    Identity Based Authentication for Data Stored in Cloud

    In this paper, the authors propose a new identity and authentication of data stored in cloud scheme for secure data storage in clouds that support anonymous authentication. This paper is to secure and protect the data which come under the property of users. Their scheme also added feature of access...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    Review Paper on Data-aware Caching for Big Data Applications

    In this paper, the authors review on data-aware caching for big data applications. The term big data deals with extensively large sets of data which the data may be structured or unstructured. MapReduce has been the center piece of Apache Hadoop software tool designed for the distributed processing and storage...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    Conceptual Studies of Various Operating Systems and it's Performance

    In this paper, the authors provide the information of various operating systems and circumstance of the user in the system. It is useful to provide the interest area and friendly nature of the system with user. A modern OS can service several user programs simultaneously. The operating system achieves it...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    Cloud Computing: Issues Regarding Security, Applications and Mobile Cloud Computing

    Cloud computing is the use of computing resources that are delivered as a service over a network. Today, cloud computing generates a lot of solutions. Now-a-days, there are many innovations coming every day in the mobile applications in order to serve end users in best possible ways as well as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    Spatio -Temporal Data Mining

    Spatio temporal data sets are often very large and difficult to analyze and display. Since they are fundamental for decision support in many application contexts, recently a lot of interest has arisen toward data-mining techniques to filter out relevant subsets of very large data repositories as well as visualization tools...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    A Review on Energy Efficient Techniques in Green Cloud Computing

    Green cloud computing is approach used to improve the utilization of computing resources those users are using in cloud computing network such as servers, storage, its applications and services and reduce energy consumption of these resources which improves power efficiency. This is done by various technologies such as virtualization and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    Using Encryption Technique for Effective Data Storage

    Today people are living in a digital world. Data is generated from sensors, social networking sites and satellites at an unbelievable speed. In this digital world, data is generated and collected at a rapid rate that is exceeding the boundary range. According to IBM, 2.5 quintillion bytes of data are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    Android Based Academic Scheduler

    In today's world of rat race and deadlines, it's very hard to keep track on all everyone's day-to-day activities. Since everyday students are bombarded with new tasks and assignments, missing their due dates is the most common stress inducing factor among the students. So the need arises to have a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    Content Based Image Retrieval in E-Commerce for Quality Products

    Content based image retrieval is the task of retrieving images from the large collection of database on the basis of their own visual content. Content-based image retrieval, a technique which uses visual contents to search images from large scale image databases according to users' interests, has been an active and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2015

    An Efficient Privacy Preserving Method for Classification in Data Mining System

    The privacy protection of data is very important issue in data mining system. Data mining system contain large amount of confidential and sensitive data. These confidential data cannot be share to everyone. Therefore, privacy protection of data is required in data mining system for avoiding privacy leakage of data. Data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Smart Antenna Its Algorithms and Implementation

    Smart Antenna generally refers to any antenna array, terminated in a sophisticated signal processor, which can adjust or adapt its own beam pattern in order to emphasize signals of interest and to minimize interfering signals. Smart antennas generally encompass both switched beam and beam formed adaptive systems. Switched beam systems...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Research Issues in Wireless Networks

    The arrival of wireless technology has reduced the human efforts for accessing data at various locations by replacing wired infrastructure with wireless infrastructure and also providing access to devices having mobility. Since, wireless devices need to be small and bandwidth constrained, some of the key challenges in wireless networks are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Data Hiding in Image Using Least Significant Bit With Cryptography

    To increase the security of messages sent over the internet steganography is used. This paper discussed a technique used on the LSB (Least Significant Bit) and a new encryption algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Novel Security Scheme for Image Steganography Using Cryptography Technique

    In today's information age, information sharing and transfer has increased exponentially. The information vulnerable to unauthorised access and interception, while in storage or transmission. Cryptography and Steganography are the two major techniques for secret communication. The contents of secret message are scrambled in cryptography, where as in steganography the secret...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    A Biometric Authentication Based Secured ATM Banking System

    Authentication is a critical part of any trustworthy computing system which ensures that, only individuals with corroborated identities can log on to the system or access system resources. Biometric authentication with cryptography has ameliorated the security level for authentication. In this paper, a Bio-metric system for encrypting the user password...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Multi-Dimensional QoS Decision Making Model for Composition of Web Services

    Web services distributed in the internet can be integrated into a composite service for meeting the enterprise needs. QoS driven web service composition is the current research area in web services. There are many research papers published for quality enabled web service composition. However, only a few researchers focus on...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Network Coding for Privacy Protection Against Traffic Analysis in Multi-Hop Wireless Networks

    Traffic analysis presents a serious threat to wireless network privacy due to the open nature of wireless medium. In Multi-hop Wireless Network (MWN), the mobile nodes relay others' packets for enabling new applications and enhancing the network deployment and performance. Privacy threat is one of the critical issues in multi-hop...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2012

    Application of Principal Component Analysis in Software Quality Improvement

    Statistical modeling technique has pivotal role in better understanding of the software development processes. Among them neural network techniques have enhanced predictive capability than most other statistical models. This paper explains the application of principal component analysis to neural network modeling as a way to improve predictability of neural network....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Secret Key Encryption Algorithm Using Genetic Algorithm

    In today's information age, information sharing and transfer has increased exponentially. Security, integrity, non-repudiation, confidentiality, and authentication services are the most important factors in information security. In now days the security of digital images attracts much attention, especially when these digital images are stored in memory or send through the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    MANET: Issues and Behavior Analysis of Routing Protocols

    Mobile Ad hoc NETworks(MANET) are characterized by multihop wireless connectivity, infrastructure less environment and frequently changing topology. The nodes acts as router and communicate to each other. This paper aims to provide a means of understanding the issues and protocol(OSPF, DSR, AODV, TORA, OLSR and DSDV) of MANET and investigating...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Efficient Resource Allocation for Wireless Multicast in Heterogeneous Networks

    In this paper, the authors first comment that the bandwidth consumption in the shortest path tree can be reduced in the heterogeneous wireless networks because the routing of the shortest path tree here is more flexible. The shortest path tree in the heterogeneous wireless networks consists of two parts. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Threat Modeling and Security Pattern Used in Design Phase of Secure Software Development Life Cycle

    Improving software-engineering practices and processes can lead to the creation of secure software, as software that realizes with justifiably high confidence, the process improvement generates software releases with extremely few defects, reasonable development costs, lower maintenance costs, and enhanced product reputation. The purpose of this paper is to explain the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Quantum Key Agreement Through Information Reconciliation and Privacy Amplification

    This paper considers the problem of security in practical implementation of Quantum Key Agreement applying the concept of Information Reconciliation and Privacy Amplification targeted towards the computer science community. Firstly, a scheme is proposed which is operable in presence of noise using procedure called 'Entanglement purification' on Bell states to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    A New Hybridized K-Means Clustering Based Outlier Detection Technique for Effective Data Mining

    Now-a-days million of databases have been used in business management, Govt., scientific engineering & in many other application & keeps growing rapidly in present day scenario. The explosive growth in data & database has generated an urgent need to develop new technique to remove outliers for effective data mining. In...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    A Survey on Fingerprint Biometric System

    Fingerprint is the most popular biometric system that is widely used in various authentication applications, PC logon, gate access control systems, and so on. The reason can be considered that fingerprint can achieve the best balance among authentication performance, cost, size of device, and ease of use. However, most of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    P2P Video Delivery With SURFNET for Fast Search

    A Peer-To-Peer video on demand has been developed to reduce the pressure of the YouTube by reducing the search delay of existing peer to peer system. The system the authors consider consists of peers which are interested in receiving the video stream (RTP server) and peers which have obtained the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    TCP Performance Issues and Related Enhancement Schemes Over Wireless Network Environment

    Transmission Control Protocol (TCP), an important transport layer communication protocol, is typically tuned to perform well in traditional wired networks, where Bit Error Rate (BER) is low and congestion is the primary cause of packet loss. The emergence of various mobile access networks has prompted researchers to look for suitable...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Detection of Sinkhole Attack Against DSR Protocol MANET

    A wireless ad hoc network is a temporary network set up by wireless nodes usually moving randomly and communicating without a network infrastructure. Due to security vulnerabilities of the routing protocols, however, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. In this paper, the authors...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2012

    Implementation of MB-OFDM Transmitter Baseband Using FPGA Approach for High Speed Application

    An enhancement to the FDM system, as MB-OFDM, has been proposed to reduce the complexity and power consumption without sacrificing performance. In this paper, the authors presented the detailed FPGA implementation of a complete-OFDM transmitter. The entire transmitter can be mapped onto a single FPGA chip. Multi-Band Orthogonal Frequency Division...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Simulation and Performance Analysis of OLSR Routing Protocol Using OPNET

    In this paper discusses and evaluates "Optimized Link State Routing Protocol" OLSR routing protocol to better performance. Using OPNET simulator tools for the performance of OLSR routing protocol simulation, create in small network (30 nodes), medium size network (40 nodes) and large network (50 nodes) the complexity of the mobile...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Review of Optical World Technologies and Switching Network Devices

    Optics is the science of light and has a very long history. In the modern world of telecommunication and Information and Communication Technologies (ICT), the term "Photonics" is sometimes used for the application of optical technology, such as lasers and optical fiber, in electronics. In the past, high costs have...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    UML Modelling of Geographic Routing Protocol "Greedy Perimeter Stateless Routing" for Its Integration Into the "Java Network Simulator"

    In this paper, the authors propose an UML modeling of the "Greedy Perimeter Stateless Routing" (GPSR) protocol that integrate this geographic routing protocol, into "Java Network Simulator" to simulate and study this protocol in a first time and offer some improvement in these features. Java Network Simulator (JNS) is a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Studies on Performance Aspects of Scheduling Algorithms on Multicore Platforms

    The theory of scheduling has expanded rapidly during the past years. As multi-core architectures begin to emerge, operating system issues are to be considered for best use of multi-core processes. Due to the architectural differences in the state of art multi-core processors such as shared caches, memory controllers etc., it...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Performance Analysis of CORDIC Architectures Targeted for FPGA Devices

    Digital Signal Processing domain has long been dominated by software systems; however, the state of art signal processing is now again switching back to hardware based solutions. This requires development of algorithms that can be efficiently implemented on different hardware platforms. CORDIC is one such hardware-efficient algorithm that is used...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Access Control Schemes & Its Security Measurements in Wireless Sensor Networks: A Survey

    Nodes in the Wireless Sensor Network may be lost due to either depletion of battery power or malicious attacks. So it is inevitable to insert a new node for the extension of life time of Sensor Networks. A lot of researchers proposed their works towards this arena that is how...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Analysis for Go-Back-N ARQ Protocols on Multi Channels by Using AIMD Congestion Control Algorithm

    In this paper, the authors proposed to improve channels transmission rate but different time-invariant error rates. By assuming the Gilbert-Elliott Model (GEM) for each channel and TCP for high speed. The Additive Increase/Multiplicative-Decrease (AIMD) algorithm is a feedback control algorithm best known for its use in TCP Congestion Avoidance. AIMD...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Performance Evolutionary in AWGN Channel for 802.11a High Speed Network

    FDMA, TDMA and CDMA are the well known multiplexing techniques used in wireless communication systems. While working with the wireless systems using these techniques various problems encountered are multi-path fading, time dispersion which lead to Inter-Symbol Interference (ISI), lower bit rate capacity, requirement of larger transmit power for high bit...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    An Artificial Intelligence Approach Towards Intrusion Detection in Soft Systems

    Soft Systems is the terminology given to those systems that have a software base at its working side as a primary or secondary support. These systems may include Wireless system such as cellular networks, ad hoc networks or any other software that may be dealing with encrypted information which is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Improving Comprehensibility of Source Code by Applying Coding Styles

    Recent studies underline the software quality problems by many approaches and methods, in improving the software quality for supporting developers. Source code textual properties, in particular the usage of proper identifiers, are also an important indicator of software quality. A new cohesion metric (conceptual cohesion), proposed by Marcus et al.,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Secure Routing by Elimination of Black Holes in Ad Hoc Networks

    Mobile Ad Hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Ad Hoc Networks have the attributes such as wireless connection, continuously changing topology, distributed operation and easy of deployment. Each node operates...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Robust Data Security for Cloud While Using Third Party Auditor

    Cloud computing has been envisioned as the next-generation technology of IT industries. The Cloud is a platform where data owner remotely store their data in the cloud to enjoy the high quality applications and services. The client or data owner send their data to data centre and utilize the service...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2012

    A Simulation Based Study of AODV, DSR, DSDV Routing Protocols in MANET Using NS-2

    Mobile Ad-hoc Networks are autonomously self-organized networks without infrastructure support. To facilitate communication within the network a routing protocol is used to discover routes between nodes. The main aim of the routing protocol is to have an efficient route establishment between a pair of nodes, so that messages can be...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2012

    The Security Issues of Cloud Computing Over Normal & IT Sector

    Here, the authors are going to discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. Cloud computing is a set of IT services that are provided to a customer...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2012

    Online Statistical Internet Traffic Classification Approaches

    Internet traffic classification into specific network applications is essential for managing network resources and from security point of view. Traditional classification techniques such as port based and payload based are having significant limitations. Hence, newer statistical approach is adopted for classifying internet traffic into specific applications. This paper reviews modern...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2012

    OPNET Based Simulation and Performance Analysis of GRP Routing Protocol

    Mobile Ad-Hoc NETwork (MANET) is a network of mobile nodes that can communicate with each other without using any centralized control or fixed infrastructure .This paper using OPNET simulation tool for the performance of GRP routing protocol simulation, build a small scale the complexity of the mobile Ad-Hoc network model,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    Peer-to-Peer Networks for Modeling Malware Propagation

    A key emerging and popular communication paradigm, primarily employed for information dissemination, is Peer-To-Peer (P2P) networking. In this paper, the authors model the spread of malware in decentralized, Gnutella type of peer-to-peer networks. Their study reveals that the existing bound on the spectral radius governing the possibility of an epidemic...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2012

    A Comparative Study of Cloud Computing Service Providers

    This paper describes cloud computing, a computing platform for the next generation of the Internet. The paper defines clouds, explains the benefits of cloud computing, and outlines cloud architecture and its major components. This paper also presents a comparative study of various cloud computing service providers. The comparison is based...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2012

    Enhancement of QoS Performance in Wireless LAN: Analysis

    Wireless Local Area Network (WLAN) has become more popular in recent years. With increase in demand users are expecting Quality of Service (QoS) for multimedia services in WLAN. To improve scalability and manageability for the Quality of Service (QoS) guaranteed Wireless LAN (WLAN) Access Point (AP) using a simple mechanism....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2012

    Node Disjoint Minimum Interference Multipath (ND-MIM) Routing Protocol for Mobile Ad Hoc Networks

    Node-disjoint routing in MANETs is very essential to reduce the end-to-end packet delay and increase the packet delivery ratio. AODV (Ad Hoc On-demand Multipath Distance Vector) which is widely used for MANETs creates single-path route between a pair of source and destination nodes. Node disjoint paths may have worst performance...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2012

    Design and Implementation of RNS Model Based Steganographic Technique for Secured Transmission

    Despite of modern findings in security mechanisms, a vast scope lies ahead of researchers to extend their innovative proposals in the field of network security, especially in the genre of cryptography. The formulation of the proposed technique lies with the essence of cryptography, in alliance with steganography, restoring the USP...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)