International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 121-160 of 1896 results

  • White Papers // Jun 2014

    Modelling Intrusion Detection System using Hidden Markov Model: A Review

    Information security has become a major concern to various businesses and organizations and requires an intelligent security system that can automatically detect the intrusions. An Intrusion Detection System (IDS) is used for this purpose. An intrusion detection system has become popular tool for observing patterns of activities in user accounts...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Enhanced AODV Routing Protocol Against Black Hole Attack

    MANET is a self-configuration wireless ad-hoc network of mobile nodes. Each node has a router or a switch connected by the wireless connection. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is specific vulnerable due to its fundamental...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Empirical Evaluation of Mutation Testing for Improving the Security and Reliability of Web-Application

    In today's world as the use of web-application is increasing the need of security in web application is also increasing. Securing web-application is very important as it has critical data and wide usage .The success of any web-application depends upon the security provided in it. The authors use mutation testing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Survey on Handwritten Devnagari Character Recognition Methods

    Now-a-days, character recognition has gained lot of attention in the field of pattern recognition due to its application in various fields. Optical Character Recognition (OCR) and Handwritten Character Recognition (HCR) has specific domain to apply. OCR system is most suitable for the applications like multi choice examinations, printed postal address...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Review of Power-Efficient Gathering in Sensor Information System (PEGASIS) for Network Optimization in WSN

    Wireless Sensor Networks (WSN) consists of small sensor nodes which perform sensing, computation and communication capabilities. These networks collect information from all sensor nodes and send it to the base node for further operations. PEGASIS is a hierarchical based routing protocol which is used for their high energy and good...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Enhancing Software Quality Using Defect Preventation Techniques at Design Phase of SDLC

    Defect preventation is one of the important parts in software engineering. To improve software quality, the defects will find out at earlier stages of Software Development Life Cycle (SDLC). The purpose of defect preventation is to identify those defects in beginning or earlier phases of SDLC and prevent their reoccurrence....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Stable AODV Protocol in Mobile Ad-Hoc Network

    An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure as the authors discussed in introduction. Each node in the network also functions as a mobile router of data packets for other nodes. However, due to node mobility, link failures in such...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Use of Restrictive Fields in Networks for Prevention of Attacks

    Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Novel Approaches for Mitigating Replica Nodes in WSN

    A WSN is composed of a large number of tiny sensor nodes and one or multiple more powerful sink nodes. Sensor nodes collect data from the surrounding environment and distribute the collected data to a sink node. Every sensor node has one or more sensors, a general purpose Central Processing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Securing the Android Phones Using the Power of Cloud

    In this paper, the authors review of the mobile cloud computing, including the meaning of cloud computing, as well as the concept of mobile cloud computing. This paper shed light on the basic model and presents a report on the approaches in mobile cloud computing. There are many issues in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Multi-Model Biometrics System for Person Identity Verification

    Multi-model biometrics system for person identity verification have mainly two authentication process, face identification and signature verification. A set of fisher scores is calculated for face image through partial derivative analysis of the parameters estimated in each HMM. These fisher scores are further combined with some traditional features such as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Self Learning Offloading Scheme for Android Phones

    Today cloud computing is the most popular technology and is growing day-by-day. Cloud is a group of computers or servers which are interconnected to each other within a network providing on demand computing services to its users. This paper includes discussion about the cloud, Mobile Cloud Computing and the working...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Investigation of E-Mail Application Based MANET Routing Protocols Under Black Hole Attack

    In mobile ad-hoc networks, each routing protocol is anxious as it routes the packet to destination node safely depending upon topology. Three types of routing protocols are proactive, reactive and hybrid. Ad-hoc On-demand Distance-Vector (AODV), Dynamic Source Routing (DSR) and temporally Ordered Routing Algorithm (TORA) has been considered for investigation...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Sybil-Decline: A Survey on Novel Trusted Identity and Threshold Based Path Rank for Sybil Attack Identification in Social Network

    During the last few years community network is getting popularity as per their user growth. They are generating a huge amount of data thus making promising promotion directions of business firms. Such concerns raise some issues related to fake profiles for more promotional activities. These fake profiles of the users...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Novel Secure Routing Protocol for Wireless Sensor Networks Using Binary Authentication Tree

    In this paper, the authors propose a novel threshold key pre distribution scheme for wireless sensor networks by using symmetric keys to achieve authentication service. In the propose scheme called SRPWSN. Due to the fact that the wireless links in sensor networks are susceptible to attacks and the nodal mobility...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Service Oriented Architecture in Project Management Software

    Service Oriented Architecture in Project Management Software (SOA-PMS) is used to collect the information from the different levels of software development process and different peoples involved in the project and product development., it monitors the entire software development life cycle and provide status and reports at the different levels, It...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Securing Data in Fiber Optics Through Steganography

    Today, the world of business would be inconceivable without fiber optic cables. The main demands of any communication system are speed, security, bandwidth, reliability and cost and all these requirements are fulfilled by fiber optic cables, there is no other means of transporting such huge volumes of information so fast...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Classification of Routing Protocols in Ad Hoc Wireless Network

    A mobile ad-hoc wireless network is made up of mobile nodes that are animatedly reconfigurable; self organized which provide on-demand networking solution. The goal of MANETs is to increase mobility into the area of mobile, self-directed and wireless domains, where a group of nodes form the network routing communication in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Routing Protocols in Infrastructure-Less Opportunistic Networks

    Opportunistic networks provide communication facilities by the intermittent connectivity among mobile nodes. Opportunistic network is an extension of MANET where complete path between two nodes wishing to communicate is unavailable. OPPortunistic NETworks (OPPNET) consider mobility, partitions, disconnections, etc. as norms instead of the exceptions. Due to the disconnections and re-connections...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Survey on Secure Group Communication and Applications

    Multicast communication is an efficient method of disseminating data to a group of beneficiaries over an open access network. Secure distribution of information to authorized recipients is an important prerequisite for group applications with commercial potential. An ever-increasing number of Internet applications, such as content and software distribution, distance learning,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Comparative Analysis of Private Key Cryptography Algorithms: DES, AES and Triple DES

    Today's internet world is very competitive and to survive in such a competitive world there must be a secure environment to communicate. Internet and network applications are growing fast day-by-day. For this purpose there is a requirement of efficient and strong algorithm which will provide strong encryption and all these...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Performance Analysis of Wavelength Assignment Algorithms in Optical Mesh Network Using Hegon Simulator

    In this paper, the authors analyze the performance of wavelength assignment algorithms such as first fit, random fit, most used, least used, least loaded, most loaded and to find their effect on the blocking probability in optical mesh network with traffic grooming. Hegons simulator is used to find the results....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Private Recommendation Based On Elgamal Homomorphic Encryption Scheme

    In recommender systems, online services access the user's profiles in order to generate useful recommendations. Depends on privacy perceptive data collected from the users, it generates recommendation in online services. Protecting the privacy of all participants is an essential requirement of the basic information filtering architectures, because the organize recommender...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    A Novel Authentication System Using Human Behaviour Against Objects

    The authors introduce a novel authentication system utilizing the psychological behavior and/or attitude of human beings to solve many open authentication issues of the current scenario. The proposed system involves the reaction of a human being against different objects at a given situation. The features & status of the objects...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Qos Aware Energy Efficient Routing in Wireless Sensor Networks

    Energy is a critical resource parameter in wireless sensor networks. Utilizing energy in an efficient manner is a challenging task in wireless sensor networks. This paper presents an overview on various energy efficient routing protocols which satisfies the criteria of QoS parameters. Various energy efficient and QoS based routing protocols...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Security in Fuzzy Improved Adaptive Delay Multicast Routing Protocol

    Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Although multicast routing algorithms in MANETs could be efficient in many situations, but the devices in MANETs are more vulnerable to attacks. In the areas where...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Privacy and Integrity Preservation of Equality Tuple Queries Using Pairing Based Homomorphic Cryptosystem in WSN

    In today's world the need of WSN has increased not only in critical areas like military applications but also it has drastically increased in day today life like weather information and agriculture field. As WSN's gives an efficient and robust platform for all applications which will otherwise be hard to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Modified Encryption and Decryption Using Symmetric Keys at Two Stages: Algorithm SKG 1.2

    In the paper, the author has introduced a modified symmetric key cryptographic method, called algorithm SKG 1.2, for data encryption and decryption of any file using symmetric key at two stages, by swapping the characters in the string of text and by shifting the characters to left or right. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Adaptive Routing In Communication Networks by Back Pressure

    In the paper, the authors contain considered every packet be running scared down a probably unlike course by using back pressure based adaptive routing algorithm. So there is poor delay performance and involve high implementation comply. Soon after than considered back pressure algorithm by obviously, they have developed a new...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Review of Energy Efficient AODV and DSR Routing Protocols

    The mobile communications devices in ad-hoc network are battery operated and have limited energy, so the network is an energy-constrained system and hence there is a need to maximize the network life. Power consumption rate of nodes must be evenly distributed but due to mobile nature of nodes and asymmetric...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    An Approach to Detect and Recognize Face using Swarm Intelligence and Gabor Filter

    Face recognition is an obscure and enchants software achievement. This is non-intrusive technique. This paper focuses on the method of feature extraction and feature selection to boost up the efficiency of face recognition systems. Here the authors are using minimal selected features with encouraging results in face recognition. This paper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Enhanced Diffie Hellman Algorithm

    Cryptography is the science of using mathematics to encrypt and decrypt data. Diffie Hellman algorithm is an asymmetric cryptography scheme for the encryption and decryption of data over computer network. This algorithm is meant for the generation of secret key. One major problem with Diffie Hellman algorithm is the man-in-the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jun 2014

    Attribute Based Encryption with Verifiable Outsourced Decryption

    Attribute based encryption with verifiable outsourced decryption is a challenging application that server public key based one to many encryption that allows the user for the encryption and the decryption of the file/ data based on his own attributes. This application also server the user in terms of security saying...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Effective Web Log Mining: An Implementation View

    With the increase in popularity of web in the past few decades, web mining has attracted lots of attention. An important area in Web mining is Web usage mining, the discovery of patterns in the browsing and navigation data of Web users. Web log mining is application of data mining...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Green Cloud Computing using Artificial Neural Networks

    In this paper the authors present the results of simulation work performed to enhance the effectiveness of green cloud computing using artificial neural networks. It has been shown that to predict that whether the cloud architecture will be green or not can be made more accurate by employing artificial neural...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Security Services using ECDSA in Cloud Computing

    Cloud computing security is the set of control-based technologies and policies designed to comply with the rules and regulations framed by the provider team to support and protect information, data applications and infrastructure associated with cloud computing use. Cloud computing security process should address the issues faced by the cloud...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Review: Graph Databases

    Graph databases have brought a new trend of modeling the data and solving problems. They perform better than relational database. Many big organizations like Google, Twitter, and Facebook are using graph databases to handle their large amount of data and queries. The selection of the graph database should be on...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Efficient Resource Utilization of Smartphone's Using Cloud Computing

    As Smartphone are becoming more complex and powerful to provide better functionalities, concerns are increasing regarding resource utilization of Smartphone. To efficiently utilize the Smartphone resources the people is using cloud computing there by increases the battery life and the performance of the Smartphone. Consider two computational processes, one by...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    An Approach for Privacy Preserving Cost of Intermediate Datasets in Cloud

    In cloud computing at the time of processing a data intensive application a large volume of intermediate datasets are generated, instead of regenerating these intermediate datasets, the authors can store these datasets in the cloud for future purpose. If any adversary should analyze these intermediate datasets they can get the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Round Robin Approach for VM Load Balancing Algorithm in Cloud Computing Environment

    Cloud computing is a new emerging trend in computer technology that has influenced every other entity in the entire industry, whether it is in the public sector or private sector with the advance feature of the cloud there are new possibility opening up how application can be built and how...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Enhanced Data Security in Cloud Computing with Third Party Auditor

    Cloud computing is environment which enables convenient, efficient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud is kind of centralized database where many organizations/clients...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Fundamentals and Development in Mobile Communication

    The goal of the next generation of mobile communications system is to provide a wide range of communication services to everyone everywhere and at anytime. The services provided to the mobile phone users are like high speed data transmission, improved video quality and multimedia services as well as voice signals....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Efficient Genetic Algorithm for Optimal Routing In Ad Hoc Networks

    Ad-hoc network is a collection of mobile hosts. This network uses two different types of protocols. They are proactive protocol and reactive protocol. Proactive protocol maintains routing table information. Reactive protocol is a path between source and destination and also called as on-demand protocol. Genetic Algorithm (GA) is used to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Architectural Design Approaches for Wireless Sensor Networks

    With ever-increasing interest in remote monitoring, and advances in embedded and sensing technologies, the Wireless Sensor Networks (WSN) research domain has experienced a great progress in recent years. The architectural design is an important concern in wireless sensor networks. This paper discusses the four different architectural approaches and protocols associated...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Load Balancing On Cloud Data Centres

    Clouds are high configured infrastructure delivers platform, software as service, which helps customers to make subscription for their requirements under the pay as the users go model. Cloud computing is spreading globally, due to its easy and simple service oriented model. The numbers of users accessing the cloud are rising...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    A Survey of Key Management Technique for Secure and Reliable Data Transmission in MANET

    A Mobile Ad-Hoc NETwork (MANET) is a self-configuring network of mobile nodes connected by wireless links to form an arbitrary topology without the use of existing infrastructure. Due to the nature of Unreliable Wireless medium Data Transfer is a major Problem in MANET and it lacks Security and Reliability of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Design and Architectural Issues in Wireless Sensor Networks

    With the help of recent researches in micro-electro-mechanical technology, wireless communication and digital electronics low cost, low power multipurpose sensors nodes of small size have been developed. Wireless sensor node's major steps in their work are sensing, processing of data, and communicating with other nodes. There are large varieties of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Collusive Piracy Prevention in P2P Network

    The primary cause of violation to intellectual property law is collusive piracy. Unpaid clients may get copyright contents from colluders illegally. Such kind of piracy causes to damage to content delivery in P2P network. The authors propose a system which prevents colluders from pirating the copyright contents in P2P.The firm...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Optimal Residual Energy Clustered Data Aggregation Protocol (ORECDA) in WSNs

    WSN consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. As sensor nodes are deployed in sensing field, they can help people to monitor and aggregate data. Researchers also try to find more efficient ways...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Energy Optimization Model for Wireless Ad-hoc Network

    Power consumption is one of the most important design criteria for ad-hoc networks as batteries provide limited working capacity to the mobile nodes. Power consumption control in ad-hoc networks is a more difficult problem due to non availability of access point and low battery power in network. Battery power of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    A Survey on Various Solutions of ARP Attacks

    The Address resolution protocol is the protocol is used to map the Internet Protocol (IP) address into the hardware address (MAC).When the host machine wants to know a physical address for any host in the network, it broadcasts the ARP request and the host that owns the IP address sends...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    An Efficient QOS Based Multimedia Content Distribution Mechanism in P2P Network

    Peer-To-Peer network is one in which each node in the network can act as a client or server for the other nodes in the network. It allows shared access to various resources such as files, peripherals, and sensors without the need for a central server. Content distribution in the P2P...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Defense Mechanism to Protect Cloud Comuputing Against Distributed Denial of Service Attacks

    Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to its consumers in multitenant environment but as facility increases complexity...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Securing Data by Using Cryptography with Steganography

    Securing data is a challenging issue in today's era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Novel Approach for Securing Biometric Template

    Template and database are critical parts of biometric systems. Attacker usually afflict biometric template. There can be various attacks on different modules of biometrics system and communication links among them. Securing templates from these attacks have become very important or imperative issue. Security is achieved by methods of cryptography, which...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Review Paper on Pooled Black Hole Attack in MANET

    Ad-hoc networks are emerging technology, due to their spontaneous nature, are frequently established insecure environments, which makes them vulnerable to attacks. These attacks are launched by participating malicious nodes against different network services. Ad hoc On-demand Distance Vector routing (AODV) is a broadly accepted network routing protocol for Mobile Ad-hoc...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Security Protocols Against Cyber Attacks Using SMS Alert

    Cybercrime refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. Cybercrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime has become high-profile. On...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Cross-Breed Job Scheduling for Reducing the Server Load Using RBAC at Cloud

    As the cloud computing is a new style of computing over internet. It has many advantages along with some crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related with the load management, fault tolerance and different security issues in cloud environment. In...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Transmission of Emergency Data Over Wireless Networks by Using Biosensors

    The biggest challenge in heal theme is the assurance of healthcare for every individual. People suffer from major health problems and are not provided with appropriate monitoring due to inadequate infrastructure and lacking human resources. Therefore using bio-sensors, medical data can be collected and can be supervised. The main objective...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Detection of Various Attacks in Wireless Sensor Networks Using Zero Knowledge Protocol

    Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, and have a lot of interesting applications, some of which are quite sensitive in nature and require full proof secured environment. The security mechanisms used for wired networks cannot be directly used in sensor networks as there is no...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Wireless Networking Security ("Secured-Nim": Blocking Misbehaving Users In Anonymizing Networks)

    Through this paper, the authors are trying to reflect the weaknesses and counter measures that are put forward until recently of the wireless security. They present a structure to help managers appreciate and review the various threats associated with the use of wireless security technology. They also discuss a number...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Intrusion Detection System (A Layered Based Approach for Finding Attacks)

    Now-a-days the number of computer networks keeps growing in parallel with transactions, especially on the Internet while streaming, video conferencing, chatting, searching, etc. This paper titled "Intrusion Detection System, a layered based approach for finding attacks" is an OSI layered based network Intrusion Detection System (IDS) proposed. Here the authors...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Confidentiality Scheme for Energy Efficient LEACH Protocol Using Homomorphic Encryption

    Wireless Sensor Network (WSN) has been an active research area over the past few years. However, the salient limit is energy. Due to this limitation, it seems important to design a routing protocol for WSN so that sensing data can be transmitted to the receiver securely and efficiently and at...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Study of MANET: Characteristics, Challenges, Application and Security Attacks

    Mobile Ad-hoc NETworks (MANETs) is an infrastructure-less, dynamic network consisting of a collection of wireless mobile nodes that communicate with each other without the use of any centralized authority. Due to its fundamental characteristics, such as wireless medium, dynamic topology, distributed cooperation, MANETs is vulnerable to various kinds of security...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Emerging New Trends in Transmission of Real Time Application (VOIP) to NGN By RTP

    A major consideration with the NGN is that it provides an equivalent voice service quality and resiliency as the current telephone network. The analysis carried out for this paper looked that without making any real time arrangement in data network in case of IP network will definitely detorate the Quality...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A New Efficient and Reliable On-Demand Routing Protocol for MANET (ERORPM)

    Mobile Ad-hoc NETworks (MANETs) belongs to a class of wireless network that is a spontaneous network can be formed dynamically and randomly without the need for infrastructural setups; therefore the mobile hosts communicate over multi-hop wireless links. In addition to the high degree of mobility, MANET nodes are distinguished by...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Detection of Denial of Service attacks on Mobile Internet Protocol Nodes

    DDoS (Distributed Denial of Service) attacks are the most common network attacks that had caused a serious economic loss so it is has to been stopped as early as possible to protect network damage. Earlier solutions for this problem are based on port-hopping between pairs of processors which are synchronous...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Enhanced Amalgam Encryption Approach for Grid Security

    Grid computing is about several processors distributed globally and sharing the computational resources to solve various problems. Grid computing has become an increasingly important research topic within computer science as in academic educational purpose and industrial research to government sector. Grid computing is concerned how to share and coordinated use...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Managing the Buffer Occupancy in Multi-Input-Multi-Output Network Systems using SAAP Approach

    In Multi-Input Multi-Output service, design of distributed explicit control flow procedures are being considered recently because of the abundance in wired/wireless applications. Several multicasting approaches are proposed for achieving the proper flow control in MIMO systems. One of the approach is SPID (Distributed self-tuning proportional integrative plus derivate) and SPI...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Anomaly detection in RDBMS

    Intrusion and malicious modification are more prevalent in database so organizations show considerable effort in maintaining the secrecy and security of the Database Management System. It shows interest in database activity monitoring and anomaly detection .Once an anomalous request is found suitable response scheme is needed to respond. Then once...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Fingerprint Fuzzy Vault: A Review

    This paper is a brief review of fuzzy vault which is a biometric template security technique. The advent of technology over the last decade has established biometric identification as an electronic equivalent to physical verification. Biometric traits offer a reliable solution to the problem of user authentication in identity management...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Data Mining Using Decision Tree for Sales Force Optimization

    Every organization implements a CRM system internally that may be computer based or manual. However, with the increase in the market competition and the advent of big players, the customer is spoilt with wide range of options to choose from. In this paper, the application of Decision Tree to optimize...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Comparative Study of T Slot & Cross Slot Coupled Microstrip Patch Antenna

    In this paper, the authors present a comparative study of cross slot micro-strip patch antenna and T slot coupled microstrip patch antenna, using proposed antenna design and probe feeding at proper position to find the resultant return loss, VSWR and bandwidth. They have observed that using slotted patch antenna and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    A Survey on Power Aware Routing in Manet

    Ad hoc network is a network without centralized administration in which different users can communicate and ex-change information. Mobile Ad-hoc NETwork (MANET) is a self configuring self organizing collection of mobile ad-hoc nodes with no fixed infrastructure. The node is free to move and the network topology changes rapidly. As...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Analysis on Intrusion Detection by Machine Learning Techniques: A Review

    There are many risks of network attacks under the Internet environment, internet security is a vital issue and therefore, the intrusion detection is one major research problem for business and personal networks to resist external attacks. The goal of Intrusion Detection Systems (IDSs) is to provide a wall of defense...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Event Driven Hierarchical Cluster Based Routing Protocol for Wireless Sensor Network

    The Wireless Sensor Networks (WSNs) is one of the booming field of research in recent era of scientific world. A WSN consists of sensors which are distributed spatially to monitor physical or environmental conditions and to pass their data cooperatively through the network to Base Station (BS). The major fact...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    An Efficient Coverage Scheme for Wireless Sensor Network

    This paper presents an efficient coverage scheme for wireless sensor networks. This scheme focuses on two coverage strategies of wireless sensor network which are compared on different parameters, where Delaunay triangulation is more efficient coverage strategy as compared to square grid deployment strategy because in Square grid coverage strategy if...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Appliance of Biometric and Median Filter Algorithm to Identify Lookalike Faces

    This paper is to present an accurate technique to identify two lookalike faces based on the concepts of biometrics and the Median Filter Algorithm. This paper gives some useful insight on the application of median filter and biometrics, where biometrics refers to methods for uniquely recognizing humans based upon one...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Data Storage Security Using Partially Homomorphic Encryption in a Cloud

    Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network. Traditionally organizations stored and maintained data in their own data centers, over which they had complete control....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Intelligent Vehicular Driving Assistance System(IVDAS) Using Wireless Computer Networks

    Driving safety is an important issue. There are several factors like human error, mechanical failure of vehicle, inclement weather conditions and roadway limitations that present a real challenge to the safety of the driver by causing road accidents. Most of the accidents take place due to driving stretch, unknown road...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)