International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 161-200 of 1894 results

  • White Papers // May 2014

    A Survey on Secure Data Aggregation in Wireless Sensor Network

    In wireless sensor network data aggregation is an important technique to achieve power efficiency in the sensor network. In some application such as: wireless sensor network, data mining, cloud computing and data aggregation is widely used. Because sensor node has limited battery power so data aggregation techniques have been proposed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Security Analysis for Data Grid Middle wares

    Grid computing is believed to be ultimate solution for meeting the increasing computation needs of organizations. At present the major focus is on load balancing in grid computing in order to improve the performance of grid. However, the user running an application on a remote machine in the grid-computing network...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Multi-Level SLA Management Architecture for Cloud Computing

    The SLA for a service must be based on realistic, achievable targets (e.g. for performance and availability), and the achievement of these targets depends on the performance of the internal and external services that underpin the delivery of the main service. Putting it another way, SLAs must reflect the levels...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Secure and Reliable Data Transmission Using Homomorphic Encryption in WSN

    In this paper the authors achieve reliable data transmission in Leach protocol using fully homomorphic encryption in wireless sensor network and show comparison of Leach without encryption, leach with reliable scheme using homomorphic encryption and leach with homomorphic encryption. In wireless sensor network energy, security and reliable data transmission is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Study on Causes and Effects of Link Failures in TCP/IP Network

    In recent years the Internet has been transformed from a special purpose network to a ubiquitous platform for a wide range of everyday communication services. It is observed that link failures occur as part of everyday operation, and the majority of them are short-lived (less than 10 minutes). This paper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Analysis of Bidgata using Apache Hadoop and Map Reduce

    In this electronic age, increasing number of organizations are facing the problem of explosion of data and the size of the databases used in today's enterprises has been growing at exponential rates. Data is generated through many sources like business processes, transactions, social networking sites, web servers, etc. and remains...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Study and Comprision of Partition Based and Hierarchical Clustering

    Data mining is the mechanism of implementing patterns in large amount of data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. Clustering is the very big area in which grouping of same type of objects in data mining. Clustering has divided into different...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Error Detection in Wireless Sensor Networks Based on Assertion Functions

    The increasing use of wireless sensor networks in different places, and according to the constraints such as limitation of energy sensors, memory, and that it is distributed in different and unsafe areas, caused to place in a danger and failure situation and it has led to the error management discussion...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    APRBM: Audit Policy Role Boundary Model for Enhanced Data Security and Isolation in Cloud

    Heavy load of all types of huge amount of data, software, and other resources has increased on the internet users with the improvements in internet technology. Hence a technology was developed which helped the user to store all their data, software or other information to a remote party which is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Congnitive Radio In Wireless Sensor Network

    Cognitive radio is an emerging wireless communications concept in which a network or a wireless node is able to sense its environment, and especially spectrum holes, and change its transmission and reception chains to communicate in an opportunistic manner, without interfering with licensed users. Cognitive radio thus aims to improve...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Review on Wireless Sensor And Networks Actor

    Wireless Sensor and Actor Networks (WSAN) are a collection of static sensors in which actors are movable unit's i.e. unmanned vehicles that examine the sensed data from their surroundings and take corrective actions. Various examples of WSAN are conducting search and rescue operation in urban areas, detecting pollution in coastal...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    An Overview of Memetic Approach to Design Problems of Wireless Networks

    In this paper, the authors explore the design problem of wireless network. In wireless cellular network cell to switch assignment is well-known NP-hard problem for location management. Personal Communication Services (PCS), cellular mobile network and universal mobile telecommunication services share analogous network architecture used for study. Some aspects of cell...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Security in MANET: Effective Value Based Malicious Node Detection and Removal Scheme

    Mobile Ad-hoc NETwork (MANET) is self configured network that consists of mobile nodes which communicate with each other to forward packets. MANET is vulnerable to various types of attacks like black hole, grey hole worm hole etc. due to its open medium, limited power, lack of clear lines of defense....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Performance Analysis in Routing Protocols for VANET

    VANET is an ad-hoc network formed between vehicles as per their need of communication. In order to develop a VANET every participating vehicle must be capable of transmitting and receiving wireless signals up to range of three hundred meters. The performance of VANET remains optimum within thousand meters and after...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Energy Efficient Layered Approach of Intrusion Detection System in Homogeneous and Heterogeneous WSN

    Shielding data on the host systems or from the intruders on web is an extremely tedious task. The intrusion detection system is a technology for finding malicious behavior in a method or questionable activities from so-called intruders or the unauthorized customers. Alerts are produced during the intrusion task, but when...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Performance Evaluation of Different TCP Variants Over Wimax Environment

    WiMAX technology is presently one of the most promising global telecommunication systems. Great hopes and important investments have been made for WiMAX, which is a broadband wireless access system having many applications: fixed or last-mile wireless access, backhauling, mobile cellular network, telemetering, etc. WiMAX is based on the IEEE 802.16...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    An Energy Efficiency Routing Algorithm for Increasing Area and Frequency of Wireless Sensor Networks

    The key challenge in wireless sensor network protocol design is to provide energy efficient communication, as most of the nodes in sensor networks have limited battery power and it is not feasible to recharge or replace the batteries. There are so many levels of power consumption in sensor networks like...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Issues and Challenges in Designing of a Routing Protocol for Multi-Hop Wireless Mesh Networks

    Wireless mesh network is the most likely technology due to its less installation cost and easily deployable. Here, data is delivered hop by hop from one node to another. The routing in wireless networks is a big challenging issue because of several routing attacks taken out in such networks. Wireless...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Framework of Hybrid Classification Model as Smart Agent in Distributed Systems for Network Monitoring

    In this paper, the authors compare SVM (Support Vector Machine) classification algorithm and neural networks classification algorithms identify the pitfalls and propose a new hybrid classification algorithm which is reliable, fast, efficient and robust handling large data sets. A new version of support vector machine algorithm is designed and developed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Securing Data Storage on Public Cloud by Encryption Based 2-Way Authentication

    Recent advances have given rise to the popularity and success of cloud computing. However, outsourcing the data to a third party causes the security and privacy issues to become a critical concern. This has raised the important security issue of how to control and prevent unauthorized access to data stored...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Fingerprint Recognition Using Orientation Features

    In this paper, the authors study and implement a fingerprint recognition system based on minutiae based matching quite frequently used in various fingerprint algorithms and techniques. The approach mainly involves extraction of features from the sample fingerprint images using orientation features and local direction pattern and then using Euclidean classifier....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Comparative Study of Localization Techniques for Ad-Hoc Sensor Network

    Wireless sensor networks consist of sensor nodes that are required to move around to complete their job assignments like collecting data or sampling the environment. Through fully, the location of sensor nodes is important information for core operation. So, localization is most fundamental problems in WSN. The exact and accurate...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Enhancement of BF, DYMO and ZRP Protocols Using New Cost Functions

    One of the biggest issues in routing is to providing satisfactory performance while scaling the wireless mesh network. It is interesting, however to investigate what happens when routing nodes are expanded in different propagation environment and how that affects routing metrics. In this paper, the authors examine the usage of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Efficient Encryption Techniques in Cryptography Better Security Enhancement

    There are many cryptography techniques that are used to encrypt and decrypt data that are transferred over a network. There are two basic types of cryptography: symmetric key and asymmetric key. This paper describes various encryption techniques (substitution and transposition) with their limitations. In this paper, encryption techniques are discussed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Effectual Resolute and Lodge Round Robin Packet Scheduling with Compression in IEEE 802.16 WIMAX Network

    In wireless communications provide different and efficient communication. By the usage of WiMAX communication, scheduling problem had many issues in the multi-hop communication. To reduce the packet scheduling Issues, The authors propose Effectual Resolute and Lodge Round Robin Packet scheduling with Compression [ERLRRPC]. This can be resolving the scalability problem,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Implementation of AES Using S-Box Rotation

    AES algorithm is considered as a secured algorithm. Still, some security issue lie in the S-box and key used In this paper, the authors have tried to give focus on the S-box rotation so that they get highly secured information. As the standard AES consists of four stages while in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Survey of Various Encryption Techniques for Audio Data

    The growth rate of the internet exceeds day-by-day. With the fast growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a major role in the field of network security. There are many encryption techniques available currently to secure the data. In this paper,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Study and Simulation of Vehicular Ad Hoc Network Modules Using MATLAB

    Mobile ad-hoc network research has been gaining steam in last few years. Lot of work has been put into devising routing protocols. With the development 802.11p standard dedicated to DSRC, realizing VANETs is very close. As is the case with any system associated with vehicular design, VANETs also must be...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    An Efficient Routing Protocols for Canvassing Energy in Wireless Sensor Networks

    Wireless sensor networks are widely considered as one of the most important technologies. In wireless sensor network, sensor nodes are used for gathering data and transmitting to sink but sensor nodes has limited energy and communication ability. So, it is important to design a routing protocol for WSNs so that...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Credit Card Fraud Recognition by Modifying K-Means

    Credit card is now-a-days used by many people. No one is having time, so most of the people rely on online shopping. Online shopping is the best way for shopaholic people. But problem is many people try to use other credit cards by just altering the digits. To avoid this...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Study of Malicious Activities & Challenges in MANET's

    Mobile ad hoc network comprises of a group of wireless nodes that can be set up anywhere and anytime without using any pre-existing network infrastructure. These allow people and devices to seamlessly internetwork in areas lacking any communication infrastructure. The communication between two nodes is peer to peer and the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Survey of Mobile Ad Hoc Network Using Clustering and Fault Detection

    Mobile Ad-hoc NETworks (MANETs) are a form of wireless networks which do not require a base station for providing network connectivity. Many MANETs' characteristics that distinguish MANETs from other wireless networks also make routing a challenging task. Cluster based routing is a MANET routing schemes in which various clusters of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Survey of Energy Efficient Algorithm Using WSN

    In wireless sensor networks, sensor nodes always have a limited power resource. The energy consumed by transferring data from the sensor node to its destination raises as a critical issue in designing reasonable wireless sensor network routing protocols. LEACH was the first protocol for balancing the energy consumption among nodes,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Load Balancing in MANETs: A Review

    Mobile Ad hoc NETwork (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. In this paper, current challenges in an ad hoc environment which...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Emotional Speech Recognition with Gaussian Mixture Model with Reference to Bodo Language

    In this paper, the authors basically with emotion recognition of Bodo speech using Gaussian Mixture Model (GMM) which allows training the desired data set from the main databases. Since GMM are suitable for developing emotion recognition model when large number of feature vector is available and hence GMM are known...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Security Enhancement Algorithms for Data Transmission In 4G Networks

    In this paper, the design and evaluation of security enhancement for data transmission in 4G networks is presented. An enhanced encryption method with AES algorithm is used here. Enhancement is done by applying dynamic S-box to round structured AES. The static S-box is made dynamic using cipher key. The inverse...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    An Overview of Black Box Web Vulnerability Scanners

    Web application users and web application vulnerabilities are increasing. Today web applications turning out to be tools of everyday use by many users with the growing popularity of the web. With this web application users are more prone to malicious attacks consequently the need of web security testing arises as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Review Paper on 4-Neighbour Parametric Route Selection Approach to Reduce Communication in Mobile Networks

    Routing is about to generate the optimum communication path in terms of energy and distance. But in an ad hoc network, the network is having limitations. It has limitations such as congestion, the attack over some particular nodes. In such case to perform the effective communication there is the requirement...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    More Efficient Energy Management System Using ZigBee Communication Through Comparison of Energy Usage

    In this paper, the authors describe more efficient home energy management system to reduce power consumption in home area. Home Energy Management System (HEMS) is a technology to reduce and manage home energy use. The feedback on energy consumption to energy users is known to be effective to reduce total...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Review Paper on Comparative Study of IEEE Protocols Suite

    IEEE 802.11 provides high bandwidth connectivity in a Local Area Network (LAN) environment that is suitable for most data applications. Wireless LAN (WLAN, also known as Wi-Fi) is a set of low tier, terrestrial, network technologies for data communication. It is called 802.11 after the name of the group formed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Multiple Biometric Security in Cloud Computing

    Cloud computing is one of the emerging technologies, that takes network users to the next level. Cloud is a technology where resources are paid per usage rather than owned. One of the biggest challenges in this technology is Security. Though users use service provider's resources, there is a great level...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Techniques for Malware Analysis

    Malware is a worldwide epidemic. Studies suggest that the impact of malware is getting worse. Two types of malware analysis are described here. One is static malware analysis and the other is dynamic malware analysis. Static malware analysis has some limitations. So, dynamic malware analysis is preferable for malware analysis....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Study of Routing Protocols for Wireless Sensor Networks

    For sensing environment, wireless sensor networks consist of huge number of low-cost, low-power and small nodes which have restriction on memory, power and computation resources. These nodes are sometime deployed in unfriendly environment where they can be tempered or physically not accessible. Topology of wireless sensor network remain changing as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Migration of Existing Applications to Cloud and Among Clouds

    Cloud computing is a form of parallel and distributed system where the resources are shared dynamically and services are provided to customers on demand. It is a new, rapidly growing technology. Hosting applications on a cloud saves a lot of time and effort for the organization as well as their...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Design and Performance Optimization of 8-Channel WDM System

    In this digital era the communication demand has increased from previous eras due to introduction of new communication techniques. As the authors can see there is increase in clients day by day, so they need huge bandwidth and high speed networks to deliver good quality of service to clients. Fiber...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Intrusion Detection System for Attack Prevention in Mobile Ad-Hoc Network

    Mobile ad-hoc networks prove to be the best fit for various applications like military operations, flood affected areas, remote area etc. Ad-hoc networks are limited with energy and generally more venerable to various attacks as compared to other types of networks. Insider attacks are one of the active attacks occurred...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Cloud Computing: A Review

    Cloud computing is a way to run IT industry in a better way. Instead of running applications themselves, these business organizations run it on a shared data center. The term "Cloud" is borrowed from telephony after introduction of concept of VPN, from those telecommunications companies, who until 1990s primarily offered...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Black Hole Attack in AODV Routing Protocol: A Review

    A mobile ad-hoc network is a self-configured collection of mobile nodes in which there is no need of predefined infrastructure. In this network nodes can arbitrarily change their geographic locations. MANET is more vulnerable to cyber attacks than wired networks because of no any central coordination mechanism. The black hole...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    A Proposed Model for Data Security of Cloud Storage Using Trusted Platform Module

    Cloud Computing is one of the emerging technologies in Computer Science. Cloud provides various types of services to them. Storage as a Service is generally seen as a good alternative for a small or mid-sized business that lacks the capital budget and/or technical personnel to implement and maintain their own...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    A Review on Algorithms for Mining Frequent Itemset Over Data Stream

    Frequent itemset mining over dynamic data is an important problem in the context of data mining. The two main factors of data stream mining algorithm are memory usage and runtime, since they are limited resources. Mining frequent pattern in data streams, like traditional database and many other types of databases,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    A Cluster Based Routing Protocol for Prolonging Network Lifetime in Heterogeneous Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) can provide low cost solutions to various real world problems. WSN consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location. To...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Cloud Computing Services and Applications

    Cloud computing refers to applications and services that run on a distributed network using virtualized resources and accessed by common Internet protocols and networking standards. It is distinguished by the notion that resources are virtual and limitless and that details of the physical systems on which software runs are abstracted...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    A Protocol for Ensuring Data Integrity in Cloud Environment

    Cloud computing aims to enable end-users to easily create and use software without a need to worry about the technical implementations and nitty-gritty's such as the software's physical hosting location, hardware specifications, efficiency of data processing. It moves the application software and databases to the centralized large data centers, where...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Security Integration in SDLC Analysis Phase

    SDLC stack is a layered architecture of application or software development. Effect of any layer is reflected on all the upper layers in other words base layer outcomes are executed in upper layers. Thus if a major changes occurred in lower layer than it is reflected on all the upcoming...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Analyzing High Performance Cloud Computing: A Perspective Approach

    Cloud computing is an emerging technology due to its ubiquitous features. It has emerged due to the limitations of available computer communication setup. Cloud is an attempt to migrate application independent of hardware and operating system without affecting network performance using virtualization. Being cloud supports Pay Per Use (PPU) system,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Data Storage in Cloud Server by Token Pre-Computation

    Cloud computing can be defined as a new style of computing in which dynamically scalable and often virtualized resources are provided as services over the internet. With cloud computing technology, users use a variety of devices, including PCs, laptops, smart phones, and PDAs to access programs, storage, and application-development platforms...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Channel Estimation in OFDM Systems

    Orthogonal Frequency Division Multiplexing (OFDM) provides an effective and low complexity means of eliminating inter symbol interference for transmission over frequency selective fading channels. This technique has received a lot of interest in mobile communication research as the radio channel is usually frequency selective and time variant. In OFDM system,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Study of BER for BPSK and DPSK (Coherent and Non-Coherent) Modulation in Turbo-Coded OFDM with Channel Estimation

    Orthogonal frequency division multiplexing is a popular modulation method in high speed wireless transmission. It removes the detrimental effect of multipath fading by partitioning the wideband fading channel into flat narrow band channels. For this purpose adaptive equalizer is used here. In this paper, the authors will design the OFDM...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2013

    Guaranteed QOS in Real-Time Traffic for Dynamic Subcarrier Allocation Over Multiuser OFDM Systems

    A dynamic resource allocation algorithm to satisfy the packet delay requirements for real-time services, while maximizing the system capacity in multiuser Orthogonal Frequency Division Multiplexing (OFDM) systems is introduced. The authors' proposed cross-layer algorithm, called Dynamic Subcarrier Allocation algorithm for Real-time Traffic (DSA-RT), consists of two interactive components. In the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Comparative Study of Multiclass Classification Techniques for Intrusion Detection

    Now-a-days, with the rapid development of the Internet, Internet security is becoming an important problem recently. Everyone wants to protect their data from both the internal and external attacks. In this initiative firewall, encryption and authentication serve as the first line of defense. And intrusion detection serves as the second...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Enhancing QoS by Using Weighted Fair Queuing Techniques

    Must applications in communications and Virtual Private Networks, (VPNs) require data networks to provide Quality-of-Service (QoS) guarantees, such as delay and jitter bounds to individual Network flows, providing such guarantees can be achieved by the link scheduling techniques along the path of these packets. Among many packet scheduling techniques proposed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Phishing & Anti-Phishing Techniques: Case Study

    Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look surprisingly legitimate and even the Web pages where users are asked to enter their information may look real. Phishing is similar to fishing in a lake, but instead of trying...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Improving System Protection and Performance in The Tor System End-To-End Tunable Path Selection

    Tor, a circuit-based low-latency anonymous communication service, is a protocol that is both ore secure and performs better, both in terms of observed performance and in terms of achievable anonymity and provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. This paper proposes improvements to the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Implementation of Effective Third Party Auditing for Data Security in Cloud

    Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Neural Cryptography for Secret Key Exchange and Encryption with AES

    Cryptography is the art of mangling information into apparent unintelligibility in a manner allowing a secret method of unmangling. The basic service provided by cryptography is the ability to send information between participants in a way that prevents others from reading it. In order to protect the content against an...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Surface Reconstruction Using Scattered Cloud Points

    Surface reconstruction means that retrieve the data by scanning an object using a device such as laser scanner and construct it using the computer to gain back the soft copy of data on that particular object. Surface reconstruction is a reverse method. It is very useful when in a particular...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    An Optimistic Approach for Query Construction and Execution in Cloud Computing Environment

    As the demand for cheaper commodity machines and large-scale databases rise, organizations have turned to cloud computing, or simply "The cloud," as the solution. Cloud data storage redefines the issues targeted on customer's out-sourced data (data that is not stored/retrieved from the customers own servers). In this paper, the authors...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    A Secure Reputation-Based Clustering Algorithm for Cluster Based Energy Optimized Mobile Ad-Hoc Network

    An economical approach for organizing large ad hoc networks is to divide the nodes into multiple clusters and designate for every cluster, a cluster head that is accountable for holding inter cluster control information. In Clustering, ad-hoc networks are divided into groups which are managed by elected nodes known as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Sustaining Proficient and Scalable Multicasting More Than Transportable Ad Hoc

    Group communications are important in Mobile Ad-hoc NETworks (MANETs). Multicast is a resourceful method for implementing group infrastructure. However, it is testing to implement efficient and scalable multicast in MANET due to the complexity in group attachment management and multicast packet forwarding over a active topology. The authors propose a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Modeling a Data Warehouse of Annotation of Medical Images using UML profile

    Medicine unlike other scientific disciplines has no single standardized vocabulary. It is favorable to emphasize the diversity of medical terms whose definition is rarely rigorous sometimes ambiguous specially the information from the medical image. Such imprecision is disadvantageous when user want to aggregate data from many medical practitioners. This gave...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Protocol to Find Multimedia Data in Peer-To-Peer Network

    Peer-To-Peer is an application-layer protocol. To form and maintain an overlay among participant nodes Peer-To-Peer protocol can be used. Search for a resource-object in the overlay it provides mechanisms for nodes to join, leave, publish. How does a node know which node in the system contains the data it is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Enterprise Network Traffic Monitoring, Analysis, and Reporting Using WINPCAP Tool With JPCAP API

    Today's enterprise networks are composed of multiple types of interconnected networks. Operations and management staff must provide an efficient, reliable and secure operating environment to support an organization's daily activities. Enterprise networks must be monitored for performance, security, and fault management .Current management uses the complex, hard-to-learn and hard-to-use tools....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Performance of OFDMA Based System on Varying Channel Length for Different Modulation Technique

    In these days Wireless Broadband Technologies allow simultaneous delivery of voice, data and video over fixed or mobile platforms. WiMax 4G, Orthogonal Frequency Division Multiplexing (OFDM), Interleave Orthogonal Frequency Division Multiplexing (IOFDM) are some of the emerging broadband technologies. The paper is divided into two parts channel estimation and channel...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Reducing PAPR in OFDM Systems Using a PTS Based Low Computational Complex Algorithm

    Orthogonal Frequency Division Multiplexing (OFDM) has proven to be the most promising technique for high speed data transmission over a dispersive channel. It is because of its several advantages such as high spectral efficiency, low implementation complexity, less vulnerability to echoes and non - linear distortion. However, it has few...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Methodological and Operational Deliberations in Cyber Attack and Cyber Exploitation

    When the people think of technology, what often comes to mind are televisions, communications devices such as cell phones and satellites, computers, and different modes of transportation? Various operational deliberations associated with "Weaponizing" the basic technology of cyber attack. This paper is relevant both to the attacker, who uses cyber...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Architectrue of Run-Time Platform Manager for Dynamic Data Management in MPSoC(MultiProcessor-System-on-Chip)

    This paper to be carried out is on the design methodology required to make intelligent decisions about the run-time MultiProcessor - Systems-on-Chip (MP-SoC) management and mapping of dynamic embedded software. However, obtaining experimental evidence of the soundness of the methodology by applying it on actual applications is a major requirement....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Inclusion of Flow Management for Automatic and Dynamic Route Discovery System by ARS

    This paper presents an Autonomous network Reconfiguration System (ARS) that enables a multi-radio WMN to autonomously recover from local link failures to preserve network performance. These failures cause severe performance deprivation in WMNs or require expensive manual network management for their real-time recovery. By using channel and radio diversities in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Designs of Virtual File System in Cloud Environment

    In this paper emphasis the virtual file system for storage of virtual image. The virtual machines raises the new challenges in the design and development of IaaS. The cloud middleware interacts with deployment and snapshot ting on clouds in a Amazon EC2 fashion. In this virtualization is also a technology...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2013

    Effective Management of Resource Provisioning Cost in Cloud Computing

    In this paper, cloud provides two provisioning plans for computing resources namely Reservation plan and On-demand plan. In reservation plan, cloud consumers have to pay in advance which makes it cheaper. Here a Robust Cloud Resource Provisioning (RCRP) algorithm is used in order to achieve the best advance reservation. Certain...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2013

    Achieving Data Availability and Reducing Query Delay Using Data Reapplication Technique in MANETS

    Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Network partition is necessary to rectify the link failure .In wireless network data availability and query delays are very important metrics. Due to the network partition data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)