International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 121-160 of 1713 results

  • White Papers // Jan 2014

    An Efficient Anomaly Detection System Using Featured Histogram and Fuzzy Rule Mining

    Anomaly detection is a concept widely applied to numerous domains. A number of techniques are used for finding the anomalous attacks. As the network traffic increases the people need an efficient system to monitor packet analysis of network flow data. Due to this frequent item set mining is foremost problem...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    A Robust Data Preserving Technique by K-Anonymity and Hiding Association Rules

    With the development of data mining technology, an increasing number of data can be mined out to reveal some potential information about user. While this will lead to a severe problem, which is users' privacy may be violated easily. The goal of privacy preserving is to mine the potential valuable...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    The Effect of Varying Resolution on the Recognition Performance of a Palm Vein Recognition System

    Palm vein recognition is one of the most desirable biometric identification techniques. It is also an important area in image processing and pattern recognition field. Several researches have been carried out on palm vein which has led to the proposition of different techniques. This paper investigates the effect of varying...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Cloud Computing Security Algorithm

    In this paper the authors elucidate a security model that can be implemented for a cloud computing infrastructure, which can ensure security at top level of architecture while maintaining the integrity of the system. The data encrypted by the proposed algorithm will only allow data file to open in the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    A Review on Privacy Preserving in Location Proof System

    Privacy is the most considered factor for the people and is the most important feature the developers to keep in mind while developing the applications. Over the last few decades many research focus on the location privacy but still contradiction and challenges in conquer these risk. The techniques and methodology...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Geometrical Normalization and Its Effects on Facial Recognition

    It is obvious that face recognition performance is greatly affected by the face cut. There are major databases for the face recognition evaluation, which use their own cut models. Therefore, there is no standard method for the face cut. There are many face recognition researches, which focus on feature extraction,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Message Security Using Armstrong Numbers and Authentication Using Colors

    The people are living in the information age. Hence data security plays an important role. Hackers are becoming more active now-a-days. Hence it is increasingly becoming more important to protect their data. There are some techniques used to make data transmission with protection. Cryptography is one of them. This paper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Encryption Using Elliptic Curve Cryptography Using Java as Implementation Tool

    Cryptography is the technique of hiding a message in some unintelligible format so that the message lies hidden in plain sight of an unintended person. The techniques of cryptography are centuries old. With technological advancement, techniques have evolved significantly. Public key cryptography offers a wide range of security over the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Providing Security to Web Applications in Anonymizing Networks Using Nymble

    With web applications remaining a popular target for attackers, ensuring security in web application has become very crucial especially when the attacker is trying to access the applications through anonymizing network. Tor is a well known and most commonly used anonymizing network. An anonymizing network is a network in which...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Improving Fuzzy Network Profiling for Intrusion Detection System in Cognitive Radio Network

    A cognitive radio network is an intelligent system that can be changed vigorously. It detects the available channel in the radio spectrum automatically. According to that it can changes the transmission parameter to allow concurrent communication in a given spectrum. The operational aspects of cognitive radio are being explored and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Performance Enhancement of K-Means Clustering Algorithms for High Dimensional Data sets

    Data mining has been defined as \"The nontrivial extraction of implicit, previously unknown, and potentially useful information from data\". Clustering is the automated search for group of related observations in a data set. The K-means method is one of the most commonly used clustering techniques for a variety of applications....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Analysis of Security Threats Over TLS/SSL

    Secure Socket Layer (SSL) also known as transport layer security is de facto standard for web security. It provide confidentiality and integrity of information in transit across the public networks using their powerful cipher suites but still it contains some loopholes or flaws in its foundation. In this paper the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    3d Password - A Secure Tool

    To protect the authors' system from intrusion is to use alphanumeric username as well as password. Hacking is very common now days. It becomes very easy for hackers to hack computer system. When user will type password the hacker can trace the number of keystrokes which the user do. By...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Sensitive Data Protection Using Bio-Metrics

    With the developing digital era, the use of internet applications has increased a lot. With the increase in the internet usage, the need of security has increased because of the increase in the hacking and phishing procedures. Moreover, every user has some sensitive and confidential data, which needs more security....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Anomaly-Based Intrusion Detection Systems Using Neural Network

    To improve network security different steps has been taken as size and importance of the network has increases day by day. Then chances of a network attacks increases Network is mainly attacked by some intrusions that are identified by network intrusion detection system. These intrusions are mainly present in data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Security and Reliability Analysis of Routing Protocols Under Low Rate Tcp-Target Dos Attack Over Manets

    A Mobile Ad hoc NETwork (MANET) is a dynamic multi-hop wireless network that is established by a group of mobile stations without necessarily using pre-existing infrastructure or centralized administration. It can be easily deployed which makes it very attractive for civilian and military applications. Because of its decentralized property, these...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Security Perspective for Agent Based Computing

    Agents were developed as representatives of a user, which a program could \"Spawn\" and delegate to perform a task independently of the program within a network. Security is an important issue for deployment of applications based on software agent technology. However, not all applications require the same set of countermeasures,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Clustering Analysis Based on Greedy Heuristic Algorithm

    Due to increase of the mining of compressed data from various types of applications. Clustering is the process for resolving that type of applications. Traditionally the users' are using different clustering applications for grouping elements with equal priority. And the authors represent single clustering process with multi dimensional data grouping...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    A Survey on Various Power Measuring Techniques for a Virtual Machine

    A cloud environment is a large number of computers that are connected together to form a communicating network and it is also defined as an individual or an organization that uses web application without installing it into the system. The virtualized datacenters plays an important role in cloud environment nowadays....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    A Survey on Discovery of Part-Whole Relations with Knowledge-Base

    Mining the data from large-plain text enhances the retrieval of information from resources. This paper describes about the automatic discovery of part-whole patterns from the texts using knowledge. The Parts are found by learning semantic constraints and linking documents to the knowledge-base. Knowledge discovery in text is a potential method,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    A Web Architectural Study of HTML5 with MVC Framework

    In the modern web application environment lot of changes are observed at different level of web access and processing. These changes include the mobile and Android dominated web applications, platform and browser independent web frameworks and the technologies. Client side web deployment using Flash and HTML5. In this presented work,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    A Hybrid Approach for handling SQLI Vulnerabilities in Web Applications

    Huge volumes of information storage and transfer are conveniently performed through internet using web applications. The web applications are highly vulnerable to injection flaws through which the malicious user/attacker can attack a system. SQLIA is a wide spread injection attack where the malicious user finds the parameter through which he...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Study of Local Kernel with Fuzzy C Mean Algorithm

    Remote sensing has become one of a new and interesting area in the field of computer science. Today, the authors have to handle a large amount of remote sensing images to obtain information concerning land cover mapping. Image classification is one of the important process in this field. Effectual use...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Privacy Preserving Using Direct and Indirect Discrimination Rule Method

    The Privacy Preserving Data mining (PPDM) has become an important issue in recent years because of abundance of sensitive information on the internet. Discrimination is a presuppose privileges where provide to the each separate group for the safety of the data which is stored. Discrimination is two type direct and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Mining Temporal Sequences Using Transform Techniques

    One of the main unresolved problems that arise during the data mining process is treating data that contains temporal information. In this situation, to get a good knowledge of entire data requires that the data should be viewed as sequence of events. Over the last decade many interesting techniques of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    A Survey on the Methods Used in Document Digitization and its Applications

    Document digitization and Document Analysis and Recognition (DAR) are techniques that are used for handling document images. Several techniques were implemented to perform document digitization. Article reconstruction is one of the main applications of document digitization. The four major steps of article reconstruction are grouping the article bodies, detecting the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Anomaly or Inconsistency Extraction Using Improved FP-Growth Algorithm

    Identifying network anomalies is essential in enterprise and provider networks for diagnosing events, like attacks or failures. Anomaly extraction method refers to automatically finding, in a large set of flows observed during an anomalous time interval, the flow associated with the anomalous events. It is important for root-cause analysis, attack...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    A Novel Approach to Increase Lifetime of WSNS Using Non-Uniform Cluster Size and Sub-Clustering

    The field of wireless sensor networks is the main attraction of various researchers due to its practical applications in daily life. It comprises of sensor nodes geographically distributed over an area, which sense the environmental conditions like temperature, humidity etc and pass this information to the sink. As these nodes...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Comparison the Various Clustering and Classification Algorithms of WEKA Tools

    Emergence of modern techniques for scientific data collection has resulted in large scale accumulation of data pertaining to diverse fields. Conventional database querying methods are inadequate to extract useful information from huge data banks. The development of data-mining applications such as classification and clustering has shown the need for machine...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Agglomerative Mean Shift Cluster Using Shortest Path and Fuzzification Algorithm

    In this paper, an agglomerative mean shift with fuzzy clustering algorithm for numerical data and image data, an extension to the standard fuzzy C-Means algorithm by introducing a penalty term to the objective function to make the clustering process not sensitive to the initial cluster centers. The new algorithm of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Exploration on Appliance of Intranet Technology for the Data Mine Techniques

    The knowledge management has become increasingly more important as big business leaders began to recognize that information, like land, labor, capital and energy, was an extremely important factor in production. As developing countries continue to shift toward \"Knowledge-based\" economies and Information Technology (IT) radically changes the economic, social and organizational...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Enhanced Mining of High Dimensional Data using Efficient Clustering Algorithm

    Feature selection in clustering is used for extracting the relevant data from a large collection of data by analyzing on various patterns of similar data. Based on the accuracy and efficiency of the data, major issue occurs in clustering. A novel approach called supervised attribute clustering algorithm is proposed to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    A Modern Watermarking Approach for Non- Numeric Relational Database

    In this paper, a modern watermarking approach is proposed for data authentication and integrity of relational database. For integrity verification of tables in the database, the watermark has to depend on a secret key and on the original copy of that table. It is important that the dependence on the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    A Minimum Execution Time Job Scheduling Algorithms in Simulated Grid Environment

    To achieve the promising potentials by using tremendous distributed resources, effective and efficient scheduling algorithms are fundamentally important. Scheduling such applications is challenging because target resources are heterogeneous, their load and availability varies dynamically. Previous parallel system was assumed to be organized with homogeneous platform and connected via memory, bus,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    An Efficient Framework for Clustering Data Based on Dbscan and K-Means Algorithms

    Clustering is one of the widely used knowledge discovery techniques to reveal structures in a data set that can be extremely useful to the analyst. As clustering does not make any statistical assumptions to data, it is referred to as unsupervised learning algorithm. The goal of clustering is to group...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    A Review on Mining Web Log Files for web Analytics and usage Patterns to improve web Organization

    The web access log is the best repositories for the knowledge source; it keeps the complete record of even a small event. One can easily identify web usage patterns for various web users. The Web usage pattern analysis is the process of identifying browsing patterns by analyzing the user's navigational...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Survey of Sequential Pattern Mining Algorithms and an Extension to Time Interval Based Mining Algorithm

    Sequential pattern mining finds the subsequence and frequent relevant patterns from the given sequences. Sequential pattern mining is used in various domains such as medical treatments, natural disasters, customer shopping sequences, DNA sequences and gene structures. Various sequential pattern mining algorithms such as GSP, SPADE, SPAM and PrefixSpan have been...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    A Decision Support System Based on Record to Record Travel Metaheuristic for Preemptive Continuous Problems

    A Decision Support System (DSS) is a computer centred system in which three components are integrated to support structured or semi-structured decision making in an interactive environment. The first component is the data subsystem that offers relevant data in the desired format to the decision-maker. The second one is the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Study and Performance Analysis of Tree Scan Algorithm for Multi-Core Architectures

    In the field of trees and tree related researches, a tree scan algorithm is very important. It is also called as all-prefix-scan algorithm. The algorithm works in a prefix scan manner. The inputs given are - the array of elements and the operator which is to be applied on the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2013

    Cloud Computing Outline Study for Computer Visualization

    The cloud computing offers the prospective to help scientists to practice or perform considerable number of computing resources often necessary in machine learning application such as computer Visualization problems. This suggestion would like to show that which benefits can be obtained from cloud in categorize to help medical image analysis...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Enhanced Data Security in Cloud Computing with Third Party Auditor

    Cloud computing is environment which enables convenient, efficient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud is kind of centralized database where many organizations/clients...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Fundamentals and Development in Mobile Communication

    The goal of the next generation of mobile communications system is to provide a wide range of communication services to everyone everywhere and at anytime. The services provided to the mobile phone users are like high speed data transmission, improved video quality and multimedia services as well as voice signals....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Efficient Genetic Algorithm for Optimal Routing In Ad Hoc Networks

    Ad-hoc network is a collection of mobile hosts. This network uses two different types of protocols. They are proactive protocol and reactive protocol. Proactive protocol maintains routing table information. Reactive protocol is a path between source and destination and also called as on-demand protocol. Genetic Algorithm (GA) is used to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Architectural Design Approaches for Wireless Sensor Networks

    With ever-increasing interest in remote monitoring, and advances in embedded and sensing technologies, the Wireless Sensor Networks (WSN) research domain has experienced a great progress in recent years. The architectural design is an important concern in wireless sensor networks. This paper discusses the four different architectural approaches and protocols associated...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Load Balancing On Cloud Data Centres

    Clouds are high configured infrastructure delivers platform, software as service, which helps customers to make subscription for their requirements under the pay as the users go model. Cloud computing is spreading globally, due to its easy and simple service oriented model. The numbers of users accessing the cloud are rising...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    A Survey of Key Management Technique for Secure and Reliable Data Transmission in MANET

    A Mobile Ad-Hoc NETwork (MANET) is a self-configuring network of mobile nodes connected by wireless links to form an arbitrary topology without the use of existing infrastructure. Due to the nature of Unreliable Wireless medium Data Transfer is a major Problem in MANET and it lacks Security and Reliability of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Design and Architectural Issues in Wireless Sensor Networks

    With the help of recent researches in micro-electro-mechanical technology, wireless communication and digital electronics low cost, low power multipurpose sensors nodes of small size have been developed. Wireless sensor node's major steps in their work are sensing, processing of data, and communicating with other nodes. There are large varieties of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Collusive Piracy Prevention in P2P Network

    The primary cause of violation to intellectual property law is collusive piracy. Unpaid clients may get copyright contents from colluders illegally. Such kind of piracy causes to damage to content delivery in P2P network. The authors propose a system which prevents colluders from pirating the copyright contents in P2P.The firm...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Optimal Residual Energy Clustered Data Aggregation Protocol (ORECDA) in WSNs

    WSN consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. As sensor nodes are deployed in sensing field, they can help people to monitor and aggregate data. Researchers also try to find more efficient ways...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Energy Optimization Model for Wireless Ad-hoc Network

    Power consumption is one of the most important design criteria for ad-hoc networks as batteries provide limited working capacity to the mobile nodes. Power consumption control in ad-hoc networks is a more difficult problem due to non availability of access point and low battery power in network. Battery power of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    A Survey on Various Solutions of ARP Attacks

    The Address resolution protocol is the protocol is used to map the Internet Protocol (IP) address into the hardware address (MAC).When the host machine wants to know a physical address for any host in the network, it broadcasts the ARP request and the host that owns the IP address sends...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    An Efficient QOS Based Multimedia Content Distribution Mechanism in P2P Network

    Peer-To-Peer network is one in which each node in the network can act as a client or server for the other nodes in the network. It allows shared access to various resources such as files, peripherals, and sensors without the need for a central server. Content distribution in the P2P...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Defense Mechanism to Protect Cloud Comuputing Against Distributed Denial of Service Attacks

    Cloud computing is an internet based pay as use service which provides three layered services (Software as a Service, Platform as a Service and Infrastructure as a Service) to its consumers on demand. These on demand service facilities provide to its consumers in multitenant environment but as facility increases complexity...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Securing Data by Using Cryptography with Steganography

    Securing data is a challenging issue in today's era. Most of the data travel over the internet and it becomes difficult to make data secure. So Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Novel Approach for Securing Biometric Template

    Template and database are critical parts of biometric systems. Attacker usually afflict biometric template. There can be various attacks on different modules of biometrics system and communication links among them. Securing templates from these attacks have become very important or imperative issue. Security is achieved by methods of cryptography, which...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Review Paper on Pooled Black Hole Attack in MANET

    Ad-hoc networks are emerging technology, due to their spontaneous nature, are frequently established insecure environments, which makes them vulnerable to attacks. These attacks are launched by participating malicious nodes against different network services. Ad hoc On-demand Distance Vector routing (AODV) is a broadly accepted network routing protocol for Mobile Ad-hoc...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Security Protocols Against Cyber Attacks Using SMS Alert

    Cybercrime refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. Cybercrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime has become high-profile. On...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Cross-Breed Job Scheduling for Reducing the Server Load Using RBAC at Cloud

    As the cloud computing is a new style of computing over internet. It has many advantages along with some crucial issues to be resolved in order to improve reliability of cloud environment. These issues are related with the load management, fault tolerance and different security issues in cloud environment. In...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Transmission of Emergency Data Over Wireless Networks by Using Biosensors

    The biggest challenge in heal theme is the assurance of healthcare for every individual. People suffer from major health problems and are not provided with appropriate monitoring due to inadequate infrastructure and lacking human resources. Therefore using bio-sensors, medical data can be collected and can be supervised. The main objective...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Detection of Various Attacks in Wireless Sensor Networks Using Zero Knowledge Protocol

    Wireless Sensor Networks (WSNs) offer an excellent opportunity to monitor environments, and have a lot of interesting applications, some of which are quite sensitive in nature and require full proof secured environment. The security mechanisms used for wired networks cannot be directly used in sensor networks as there is no...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Wireless Networking Security ("Secured-Nim": Blocking Misbehaving Users In Anonymizing Networks)

    Through this paper, the authors are trying to reflect the weaknesses and counter measures that are put forward until recently of the wireless security. They present a structure to help managers appreciate and review the various threats associated with the use of wireless security technology. They also discuss a number...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Intrusion Detection System (A Layered Based Approach for Finding Attacks)

    Now-a-days the number of computer networks keeps growing in parallel with transactions, especially on the Internet while streaming, video conferencing, chatting, searching, etc. This paper titled "Intrusion Detection System, a layered based approach for finding attacks" is an OSI layered based network Intrusion Detection System (IDS) proposed. Here the authors...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Confidentiality Scheme for Energy Efficient LEACH Protocol Using Homomorphic Encryption

    Wireless Sensor Network (WSN) has been an active research area over the past few years. However, the salient limit is energy. Due to this limitation, it seems important to design a routing protocol for WSN so that sensing data can be transmitted to the receiver securely and efficiently and at...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Study of MANET: Characteristics, Challenges, Application and Security Attacks

    Mobile Ad-hoc NETworks (MANETs) is an infrastructure-less, dynamic network consisting of a collection of wireless mobile nodes that communicate with each other without the use of any centralized authority. Due to its fundamental characteristics, such as wireless medium, dynamic topology, distributed cooperation, MANETs is vulnerable to various kinds of security...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Emerging New Trends in Transmission of Real Time Application (VOIP) to NGN By RTP

    A major consideration with the NGN is that it provides an equivalent voice service quality and resiliency as the current telephone network. The analysis carried out for this paper looked that without making any real time arrangement in data network in case of IP network will definitely detorate the Quality...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A New Efficient and Reliable On-Demand Routing Protocol for MANET (ERORPM)

    Mobile Ad-hoc NETworks (MANETs) belongs to a class of wireless network that is a spontaneous network can be formed dynamically and randomly without the need for infrastructural setups; therefore the mobile hosts communicate over multi-hop wireless links. In addition to the high degree of mobility, MANET nodes are distinguished by...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Detection of Denial of Service attacks on Mobile Internet Protocol Nodes

    DDoS (Distributed Denial of Service) attacks are the most common network attacks that had caused a serious economic loss so it is has to been stopped as early as possible to protect network damage. Earlier solutions for this problem are based on port-hopping between pairs of processors which are synchronous...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Enhanced Amalgam Encryption Approach for Grid Security

    Grid computing is about several processors distributed globally and sharing the computational resources to solve various problems. Grid computing has become an increasingly important research topic within computer science as in academic educational purpose and industrial research to government sector. Grid computing is concerned how to share and coordinated use...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Managing the Buffer Occupancy in Multi-Input-Multi-Output Network Systems using SAAP Approach

    In Multi-Input Multi-Output service, design of distributed explicit control flow procedures are being considered recently because of the abundance in wired/wireless applications. Several multicasting approaches are proposed for achieving the proper flow control in MIMO systems. One of the approach is SPID (Distributed self-tuning proportional integrative plus derivate) and SPI...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Anomaly detection in RDBMS

    Intrusion and malicious modification are more prevalent in database so organizations show considerable effort in maintaining the secrecy and security of the Database Management System. It shows interest in database activity monitoring and anomaly detection .Once an anomalous request is found suitable response scheme is needed to respond. Then once...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Fingerprint Fuzzy Vault: A Review

    This paper is a brief review of fuzzy vault which is a biometric template security technique. The advent of technology over the last decade has established biometric identification as an electronic equivalent to physical verification. Biometric traits offer a reliable solution to the problem of user authentication in identity management...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Data Mining Using Decision Tree for Sales Force Optimization

    Every organization implements a CRM system internally that may be computer based or manual. However, with the increase in the market competition and the advent of big players, the customer is spoilt with wide range of options to choose from. In this paper, the application of Decision Tree to optimize...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Comparative Study of T Slot & Cross Slot Coupled Microstrip Patch Antenna

    In this paper, the authors present a comparative study of cross slot micro-strip patch antenna and T slot coupled microstrip patch antenna, using proposed antenna design and probe feeding at proper position to find the resultant return loss, VSWR and bandwidth. They have observed that using slotted patch antenna and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    A Survey on Power Aware Routing in Manet

    Ad hoc network is a network without centralized administration in which different users can communicate and ex-change information. Mobile Ad-hoc NETwork (MANET) is a self configuring self organizing collection of mobile ad-hoc nodes with no fixed infrastructure. The node is free to move and the network topology changes rapidly. As...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Analysis on Intrusion Detection by Machine Learning Techniques: A Review

    There are many risks of network attacks under the Internet environment, internet security is a vital issue and therefore, the intrusion detection is one major research problem for business and personal networks to resist external attacks. The goal of Intrusion Detection Systems (IDSs) is to provide a wall of defense...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Event Driven Hierarchical Cluster Based Routing Protocol for Wireless Sensor Network

    The Wireless Sensor Networks (WSNs) is one of the booming field of research in recent era of scientific world. A WSN consists of sensors which are distributed spatially to monitor physical or environmental conditions and to pass their data cooperatively through the network to Base Station (BS). The major fact...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    An Efficient Coverage Scheme for Wireless Sensor Network

    This paper presents an efficient coverage scheme for wireless sensor networks. This scheme focuses on two coverage strategies of wireless sensor network which are compared on different parameters, where Delaunay triangulation is more efficient coverage strategy as compared to square grid deployment strategy because in Square grid coverage strategy if...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Appliance of Biometric and Median Filter Algorithm to Identify Lookalike Faces

    This paper is to present an accurate technique to identify two lookalike faces based on the concepts of biometrics and the Median Filter Algorithm. This paper gives some useful insight on the application of median filter and biometrics, where biometrics refers to methods for uniquely recognizing humans based upon one...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Data Storage Security Using Partially Homomorphic Encryption in a Cloud

    Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network. Traditionally organizations stored and maintained data in their own data centers, over which they had complete control....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Intelligent Vehicular Driving Assistance System(IVDAS) Using Wireless Computer Networks

    Driving safety is an important issue. There are several factors like human error, mechanical failure of vehicle, inclement weather conditions and roadway limitations that present a real challenge to the safety of the driver by causing road accidents. Most of the accidents take place due to driving stretch, unknown road...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)