International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 121-160 of 2048 results

  • White Papers // Sep 2014

    A Parametric Analysis Approach for Improved Clustered Communication in WSN

    Clustering is the base architecture of any sensor network. To improve the communication and the life of such network, there is the requirement to improve the clustering approach. In this present paper, an effective clustering approach is presented under different parameters. The parameters considered in this paper for the cluster...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2014

    Use of Business Intelligence to Improve the Effectiveness of Enterprise Resource Planning: A Literature Survey

    Milk industry is very sensitive and their operations are very time bounding. Milk unions always find great difficulty in quickly making out required information because of voluminous data, improper segrartion, departmental arrangements and unprecedented delays. ERP - Enterprise Resources Planning is important tool to manage these resources. For any organization...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2014

    Cloud Computing For Mobile Users: Be Capable of Offloading Computation Save Energy?

    The cloud messengers a new epoch of computing wherever application services are presented through the Internet. Cloud computing can improve the computing ability of mobile systems, but is it the ultimate resolution for expand such systems' battery lifetimes? Cloud computing is a new prototype in which computing possessions such as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2014

    Efficient use of System Metrics for IDS Design

    Security and protection of highly sensitive and private data are the major concern in the present era of Information Technology. In the present paper, various intrusion detection and prevention system are studied. This paper is to provide a crucial solution for critical evaluation of variant attacks and their classification. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2014

    Survey of Different Methods of Privacy Preserving and Techniques

    Online services, such as Google, Yahoo and Amazon, a growing number of their storage users are starting to charge customers often e-mail, family photos and videos., such as valuable backup disk to store data and use these services today, a customer hosted data integrity perfectly intact and continue to return...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Reputation Based Alert Protocol for Mitigating Blackhole Attacks in Mobile Ad-Hoc Networks

    A mobile ad-hoc network is a self configuring infrastructure less network of mobile devices connected in a wireless manner. Anonymity is a state of being not identifiable within a set of subjects. MANETs make use of anonymous routing protocols in order to provide anonymity protection. Either hop-by-hop encryption or redundant...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Improving AODV Protocol by Nature Inspired Technique Against Blackhole and Greyhole Attacks in MANETs

    An ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. In this paper,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Privacy and Security-Enhancing for Multicloud Architectures

    Security challenges are still among the biggest obstacles when considering the adoption of cloud services. This triggered a lot of research activities, resulting in a quantity of proposals targeting the various cloud security threats. Alongside with these security issues, the cloud paradigm comes with a new set of unique features,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Performance Analysis of Black Hole Attack using Different Routing Protocols on WLAN-WiMAX Interface Network

    The authors are in advanced world of internet with new technologies. So many new wireless networks technologies have been emerged. WiMAX-WLAN interface network is advanced integrated wireless network. These networks are weak against many types of attacks. One of these attacks is the black hole. In this attack, a malicious...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Classification of Software Reliability Models

    It is the requirement of digital computer to execute system in a reliable environment for critical, real time control application. It is used to measure, planning and controlling the usage during the development, so that quality software can be produced. Reliability analysis is executed at several stages during the process...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Survey of Cloud Computing in Smartphones Cloud Computing Architectures

    Cloud computing is the next stage in the evolution of Internet's and web 2.0. Cloud computing provides the means through which everything, from computing power to computing communications, applications, business processes even personal association. Cloud computing in Smartphone's is the combination of Smartphone's and cloud computing based web services. It...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Improving Integrity Protection for Open Mobile Platforms

    Now-a-days, the cellular phones and smart phones are increasing usage in people's daily life. So with this advantage the security of the mobile devices is a big challenge and gained more importance. The problem is very challenging as the working environment of these Mobile devices has become more general purpose...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Review of Signature Generation for Private Information Leakage in Android Applications

    Currently, the number of Android phones (Smartphone) as well as its applications have been increased. Particularly, there are many applications that are \"Free\" to the user, but they are depend on advertisement services for their expenses. Such applications include an advertisement module that can collect a user's sensitive information from...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    An Incentive Based Opportunistic Routing Protocol (I-ORP) Using Human Mobility Pattern in a Mobile Ad-hoc Social Network

    In the authors' understanding of how individual mobility patterns shape and impact the social network is limited, but is essential for a deeper understanding of network dynamics and evolution. This question is largely unexplored, partly due to the difficulty in obtaining large-scale society-wide data that simultaneously capture the dynamical information...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Efficient Approach for the Detection of Wormhole Attack Using Dynamic Source Routing Protocol in MANET

    Wireless networks are playing very important role in the present world. Mobile Ad hoc NETworks (MANETs) are the extension of the wireless networks. These networks are playing crucial role in the each and every field of the human life. They are used in those places where a simple wireless network...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Business Process Management in Small and Medium Enterprises: The Service Industry

    A business process typically crosses the borders of organizational departments and even companies. Thus, business processes are complex artifacts that challenge managers in their efforts to properly manage them. Against this background, business process models are key artifacts to represent how work is performed in organizations. There is a great...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    A Multi-Parameter Scheme to Enhance a Network Life in Wireless Sensor Network's

    It works on the routing in the WSN using the shared cache memory. The existing approach of routing in WSN works on centralized basis. The local source node transmits data to its cluster head then the cluster head transmits data to the base station. The base station transmits the data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Analysis of Least-Significant-Bit and Pixel-Value-Difference Steganography, an E-Governance Data-Security Issue

    Steganography, an efficient way of digital data hiding have travelled a long path by hiding information within image, audio, text and video. E-governance, one of the most popular ways of interaction between mass and government has been benefited by steganography algorithms. In this paper, the authors have discussed, compared and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Neural Network Based Efficient Block Classification of Computer Screen Images for Desktop Sharing

    In this paper, the authors present a neural network based efficient block classification of compound images for desktop sharing. The objective is to maximize the precision and recall rate of the classification algorithm, while at the same time minimizing the execution and training time of the neural network. It segments...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Making Cloud Computing More Efficient

    Green computing is a study and practice of designing, manufacturing, using of computers, servers & associated systems (such as storage devices, monitors, printers and networking & communications systems) efficiently & effectively with minimal impact on the environment. This paper continues into key areas such as making computers as energy efficient...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Modified Distance Vector Routing Algorithm

    Routing Information Protocol (RIP) is one of the well-known implementation of distance vector routing protocol. One problem with distance vector routing protocol is instability. Any network using this protocol can become unstable. One solution to this problem is defining a short value to infinity. In rip the value of infinity...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    An Effective Communication Classification Approach to Improve VLeach Protocol

    Clustering is an effective network construction and organizing approach in which complete network is divided in small area segments called clusters. Communication within the cluster is controlled by a controller called cluster head. In V Leach protocol, there are two CH in a cluster but only one CH is activated...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Image Encryption Based On Arnold Cat Map and S-Box

    In this paper, a new image encryption technique is proposed based on the combination of the pixel shuffling and S-box of AES encryption algorithm. Firstly, the Arnold cat map is used to shuffle the positions of the image pixels in the spatial-domain. Then the shuffled image is encrypted by nonlinear...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    DNS based Intelligent Disaster Recovery for Virtual Servers: Failover and failback

    IT service continuity management is a process that deals with disasters impacting IT services. ITSCM allows an organization to understand the disaster recovery weaknesses within their IT services and take measures to ensure that services are recovered as efficiently as possible when required. Every organization prepares ITSC plan which is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Comparison of LSB and MSB Based Image Steganography

    Steganography is an art of communication that hides the secret (i.e. message, information or communication in any form) data over a public channel. Hiding the occurrence of communication can be done by superimpose a secret message into cover message (i.e. an stego image) which the sender and the receiver can...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    A Unique Light Weight Time Stamp based Security Protocol for Wireless Adhoc Network

    In MANET strong encryption algorithms are difficult to implement due to computational complexity. Therefore authentication along with encryption is to be used with different variants suitable to the specific network. As there are no central base station authentication is difficult to implement. Hence oblate public key cryptography is most prominently...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Maintenance of Secure Intrusion Detection System for Mobile Ad-Hoc Network

    Now-a-days, Mobile Ad hoc NETworks (MANETs) are very popular research area. MANET is one of the mainly essential and unique applications. The mobility and scalability brought by wireless network made it possible in many applications. MANET does not require a fixed network infrastructure; every single node works as both a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Enhancement Key of Cryptography and Stenography Using RSA

    Cryptography and stenography are two processes used for sending information in secret way. Goal of both processes are to provide protection for information but in different way. In this paper, the authors motive to represent a new method for protection that is generated by combination of both process stenography and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Speech Recognition Techniques: A Review

    Speech is the most natural and efficient way to exchange information for human beings. This paper presents detailed review of speech recognition. Speech recognition is essential for a computer to reach the goal of natural human-computer communication. Speech recognition has gained a lot of interest in the researchers from various...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    A Study on A Hybrid Approach of Genetic Algorithm & Fuzzy To Improve Anomaly or Intrusion

    An Intrusion Detection System (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. This paper describes a technique of applying Genetic Algorithm (GA) and fuzzy to network Intrusion Detection Systems (IDSs). A brief...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    Access Aware Routing Protocol (AARP) Towards Trust Management for Mobile Ad Hoc Networks

    In this paper, Access Aware Routing Protocol (AARP) towards trust management problem for Mobile Ad hoc NETwork (MANET) is proposed. In MANET, nodes periodically move over the terrain space with transmission range. In this paper, a scheme to handle trust establishment and aggregation issues is proposed. Unlike trust management in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2014

    A Survey of Key Pre Distribution Schemes for Wireless Networks

    The security in wireless sensor network is a burning issue. There are many researchers, who are working on the security requirements of the wireless sensor networks. In this paper, the authors are presenting a survey for pre key distribution in the wireless sensor network. Key management is a challenging issue...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Survey on Prevention Methods for DDOS Attacks in MANETS

    Ad-hoc network is the network comprised of wireless nodes. It is infrastructure less network which is self-configured which means the connections are made without any centralized administration. MANET has no clear line of defence so both legitimate network users and malicious attackers can access it. In case of malicious nodes,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Survey of Fully Homomorphic Encryption and Its Potential to Cloud Computing Security

    Cloud computing is considered as one of the most promising innovation in the computing world over a decade. It is an emerging computing technology where applications and all the services are provided through Internet. Cloud computing is definitely money saver for enterprises, however its usage is still hindered by security...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Review on the Present State-of-The-Art of Association Rule Mining

    Most of the data mining applications used by real world enterprises have mechanisms for Frequent Itemset Mining (FIM). The quality FIM is employed using statistical measures such as support and confidence. Association Rule Mining (ARM) is used to generate association rules from frequent item sets. Such rules encapsulate the latent...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Review on Clustering Techniques in Data Mining

    Data mining is referred to as the process of discovering hidden patterns and trends from massive databases. The main motive of data mining process is to extract novel knowledge and use it. Data mining has been defined as the nontrivial extraction of implicit, previously unknown and potentially useful information from...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Survey on Congestion Control Technique in MANET/Review Paper

    In this paper, the authors study and analyze various congestion control mechanisms using a number of routing protocols in Mobile Ad hoc NETwork (MANET). As MANET is infrastructure less network so node movement and data load traffic which exceeds the network capacity, cannot be predicted which leads to problem of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Protective Model of Distributed Denial-of-Service in Internet For Lack of Variations

    Now-a-days Internet is essential part of the people's life but due to Distributed Denial-of-Service (DDoS) attacks its have some critical problems. Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The memory less feature of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Optimization of Job Scheduling in Cloud Computing Environment

    In this paper, the authors address parallel machine scheduling problems with Practical Swarm Optimization (PSO). A PSO approach embedded in a simulation model is proposed to minimize the maximum completion time (make span). The results are compared with those obtained by using the \"Longest processing time\" rule, which is known...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Authentication for securing network Using Passwords with Tree

    In this paper, the authors aim to enhance authorization and authentication process by using multilevel authentication to protect network from spiteful user and unauthorized access, implement security measure to protect data. It will also provide service level security. They provide a simple yet powerful demonstration of how a sturdy change...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Enhanced Data Security in Cloud Computing with Third Party Auditor

    Cloud computing is environment which enables convenient, efficient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud is kind of centralized database where many organizations/clients...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Fundamentals and Development in Mobile Communication

    The goal of the next generation of mobile communications system is to provide a wide range of communication services to everyone everywhere and at anytime. The services provided to the mobile phone users are like high speed data transmission, improved video quality and multimedia services as well as voice signals....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Efficient Genetic Algorithm for Optimal Routing In Ad Hoc Networks

    Ad-hoc network is a collection of mobile hosts. This network uses two different types of protocols. They are proactive protocol and reactive protocol. Proactive protocol maintains routing table information. Reactive protocol is a path between source and destination and also called as on-demand protocol. Genetic Algorithm (GA) is used to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Architectural Design Approaches for Wireless Sensor Networks

    With ever-increasing interest in remote monitoring, and advances in embedded and sensing technologies, the Wireless Sensor Networks (WSN) research domain has experienced a great progress in recent years. The architectural design is an important concern in wireless sensor networks. This paper discusses the four different architectural approaches and protocols associated...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Load Balancing On Cloud Data Centres

    Clouds are high configured infrastructure delivers platform, software as service, which helps customers to make subscription for their requirements under the pay as the users go model. Cloud computing is spreading globally, due to its easy and simple service oriented model. The numbers of users accessing the cloud are rising...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    A Survey of Key Management Technique for Secure and Reliable Data Transmission in MANET

    A Mobile Ad-Hoc NETwork (MANET) is a self-configuring network of mobile nodes connected by wireless links to form an arbitrary topology without the use of existing infrastructure. Due to the nature of Unreliable Wireless medium Data Transfer is a major Problem in MANET and it lacks Security and Reliability of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Design and Architectural Issues in Wireless Sensor Networks

    With the help of recent researches in micro-electro-mechanical technology, wireless communication and digital electronics low cost, low power multipurpose sensors nodes of small size have been developed. Wireless sensor node's major steps in their work are sensing, processing of data, and communicating with other nodes. There are large varieties of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Collusive Piracy Prevention in P2P Network

    The primary cause of violation to intellectual property law is collusive piracy. Unpaid clients may get copyright contents from colluders illegally. Such kind of piracy causes to damage to content delivery in P2P network. The authors propose a system which prevents colluders from pirating the copyright contents in P2P.The firm...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Optimal Residual Energy Clustered Data Aggregation Protocol (ORECDA) in WSNs

    WSN consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. As sensor nodes are deployed in sensing field, they can help people to monitor and aggregate data. Researchers also try to find more efficient ways...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Energy Optimization Model for Wireless Ad-hoc Network

    Power consumption is one of the most important design criteria for ad-hoc networks as batteries provide limited working capacity to the mobile nodes. Power consumption control in ad-hoc networks is a more difficult problem due to non availability of access point and low battery power in network. Battery power of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    A Survey on Various Solutions of ARP Attacks

    The Address resolution protocol is the protocol is used to map the Internet Protocol (IP) address into the hardware address (MAC).When the host machine wants to know a physical address for any host in the network, it broadcasts the ARP request and the host that owns the IP address sends...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    An Efficient QOS Based Multimedia Content Distribution Mechanism in P2P Network

    Peer-To-Peer network is one in which each node in the network can act as a client or server for the other nodes in the network. It allows shared access to various resources such as files, peripherals, and sensors without the need for a central server. Content distribution in the P2P...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Defense Mechanism to Protect Cloud Comuputing Against Distributed Denial of Service Attacks

    Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to its consumers in multitenant environment but as facility increases complexity...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Securing Data by Using Cryptography with Steganography

    Securing data is a challenging issue in today's era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Novel Approach for Securing Biometric Template

    Template and database are critical parts of biometric systems. Attacker usually afflict biometric template. There can be various attacks on different modules of biometrics system and communication links among them. Securing templates from these attacks have become very important or imperative issue. Security is achieved by methods of cryptography, which...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Review Paper on Pooled Black Hole Attack in MANET

    Ad-hoc networks are emerging technology, due to their spontaneous nature, are frequently established insecure environments, which makes them vulnerable to attacks. These attacks are launched by participating malicious nodes against different network services. Ad hoc On-demand Distance Vector routing (AODV) is a broadly accepted network routing protocol for Mobile Ad-hoc...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Security Protocols Against Cyber Attacks Using SMS Alert

    Cybercrime refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. Cybercrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime has become high-profile. On...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Cross-Breed Job Scheduling for Reducing the Server Load Using RBAC at Cloud

    As the cloud computing is a new style of computing over internet. It has many advantages along with some crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related with the load management, fault tolerance and different security issues in cloud environment. In...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Transmission of Emergency Data Over Wireless Networks by Using Biosensors

    The biggest challenge in heal theme is the assurance of healthcare for every individual. People suffer from major health problems and are not provided with appropriate monitoring due to inadequate infrastructure and lacking human resources. Therefore using bio-sensors, medical data can be collected and can be supervised. The main objective...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Detection of Various Attacks in Wireless Sensor Networks Using Zero Knowledge Protocol

    Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, and have a lot of interesting applications, some of which are quite sensitive in nature and require full proof secured environment. The security mechanisms used for wired networks cannot be directly used in sensor networks as there is no...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Wireless Networking Security ("Secured-Nim": Blocking Misbehaving Users In Anonymizing Networks)

    Through this paper, the authors are trying to reflect the weaknesses and counter measures that are put forward until recently of the wireless security. They present a structure to help managers appreciate and review the various threats associated with the use of wireless security technology. They also discuss a number...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Intrusion Detection System (A Layered Based Approach for Finding Attacks)

    Now-a-days the number of computer networks keeps growing in parallel with transactions, especially on the Internet while streaming, video conferencing, chatting, searching, etc. This paper titled "Intrusion Detection System, a layered based approach for finding attacks" is an OSI layered based network Intrusion Detection System (IDS) proposed. Here the authors...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Confidentiality Scheme for Energy Efficient LEACH Protocol Using Homomorphic Encryption

    Wireless Sensor Network (WSN) has been an active research area over the past few years. However, the salient limit is energy. Due to this limitation, it seems important to design a routing protocol for WSN so that sensing data can be transmitted to the receiver securely and efficiently and at...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Study of MANET: Characteristics, Challenges, Application and Security Attacks

    Mobile Ad-hoc NETworks (MANETs) is an infrastructure-less, dynamic network consisting of a collection of wireless mobile nodes that communicate with each other without the use of any centralized authority. Due to its fundamental characteristics, such as wireless medium, dynamic topology, distributed cooperation, MANETs is vulnerable to various kinds of security...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Emerging New Trends in Transmission of Real Time Application (VOIP) to NGN By RTP

    A major consideration with the NGN is that it provides an equivalent voice service quality and resiliency as the current telephone network. The analysis carried out for this paper looked that without making any real time arrangement in data network in case of IP network will definitely detorate the Quality...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A New Efficient and Reliable On-Demand Routing Protocol for MANET (ERORPM)

    Mobile Ad-hoc NETworks (MANETs) belongs to a class of wireless network that is a spontaneous network can be formed dynamically and randomly without the need for infrastructural setups; therefore the mobile hosts communicate over multi-hop wireless links. In addition to the high degree of mobility, MANET nodes are distinguished by...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Detection of Denial of Service attacks on Mobile Internet Protocol Nodes

    DDoS (Distributed Denial of Service) attacks are the most common network attacks that had caused a serious economic loss so it is has to been stopped as early as possible to protect network damage. Earlier solutions for this problem are based on port-hopping between pairs of processors which are synchronous...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Enhanced Amalgam Encryption Approach for Grid Security

    Grid computing is about several processors distributed globally and sharing the computational resources to solve various problems. Grid computing has become an increasingly important research topic within computer science as in academic educational purpose and industrial research to government sector. Grid computing is concerned how to share and coordinated use...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Managing the Buffer Occupancy in Multi-Input-Multi-Output Network Systems using SAAP Approach

    In Multi-Input Multi-Output service, design of distributed explicit control flow procedures are being considered recently because of the abundance in wired/wireless applications. Several multicasting approaches are proposed for achieving the proper flow control in MIMO systems. One of the approach is SPID (Distributed self-tuning proportional integrative plus derivate) and SPI...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Anomaly detection in RDBMS

    Intrusion and malicious modification are more prevalent in database so organizations show considerable effort in maintaining the secrecy and security of the Database Management System. It shows interest in database activity monitoring and anomaly detection .Once an anomalous request is found suitable response scheme is needed to respond. Then once...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Fingerprint Fuzzy Vault: A Review

    This paper is a brief review of fuzzy vault which is a biometric template security technique. The advent of technology over the last decade has established biometric identification as an electronic equivalent to physical verification. Biometric traits offer a reliable solution to the problem of user authentication in identity management...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Data Mining Using Decision Tree for Sales Force Optimization

    Every organization implements a CRM system internally that may be computer based or manual. However, with the increase in the market competition and the advent of big players, the customer is spoilt with wide range of options to choose from. In this paper, the application of Decision Tree to optimize...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Comparative Study of T Slot & Cross Slot Coupled Microstrip Patch Antenna

    In this paper, the authors present a comparative study of cross slot micro-strip patch antenna and T slot coupled microstrip patch antenna, using proposed antenna design and probe feeding at proper position to find the resultant return loss, VSWR and bandwidth. They have observed that using slotted patch antenna and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    A Survey on Power Aware Routing in Manet

    Ad hoc network is a network without centralized administration in which different users can communicate and ex-change information. Mobile Ad-hoc NETwork (MANET) is a self configuring self organizing collection of mobile ad-hoc nodes with no fixed infrastructure. The node is free to move and the network topology changes rapidly. As...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Analysis on Intrusion Detection by Machine Learning Techniques: A Review

    There are many risks of network attacks under the Internet environment, internet security is a vital issue and therefore, the intrusion detection is one major research problem for business and personal networks to resist external attacks. The goal of Intrusion Detection Systems (IDSs) is to provide a wall of defense...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Event Driven Hierarchical Cluster Based Routing Protocol for Wireless Sensor Network

    The Wireless Sensor Networks (WSNs) is one of the booming field of research in recent era of scientific world. A WSN consists of sensors which are distributed spatially to monitor physical or environmental conditions and to pass their data cooperatively through the network to Base Station (BS). The major fact...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    An Efficient Coverage Scheme for Wireless Sensor Network

    This paper presents an efficient coverage scheme for wireless sensor networks. This scheme focuses on two coverage strategies of wireless sensor network which are compared on different parameters, where Delaunay triangulation is more efficient coverage strategy as compared to square grid deployment strategy because in Square grid coverage strategy if...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Appliance of Biometric and Median Filter Algorithm to Identify Lookalike Faces

    This paper is to present an accurate technique to identify two lookalike faces based on the concepts of biometrics and the Median Filter Algorithm. This paper gives some useful insight on the application of median filter and biometrics, where biometrics refers to methods for uniquely recognizing humans based upon one...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Data Storage Security Using Partially Homomorphic Encryption in a Cloud

    Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network. Traditionally organizations stored and maintained data in their own data centers, over which they had complete control....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Intelligent Vehicular Driving Assistance System(IVDAS) Using Wireless Computer Networks

    Driving safety is an important issue. There are several factors like human error, mechanical failure of vehicle, inclement weather conditions and roadway limitations that present a real challenge to the safety of the driver by causing road accidents. Most of the accidents take place due to driving stretch, unknown road...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)