International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 161-200 of 2419 results

  • White Papers // Jan 2015

    Location Based Reminder: An Android Application

    Location based reminder, is a mobile base application built on the Android platform that provides personal location based services such as location reminders, bookmarking, mapping and search nearby. Such applications are yet to be developed extensively. Mobile phones provide a potentially convenient and truly ubiquitous platform. So such a reminder...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Load Rebalancing in Public Cloud Based on Best Partitioning Technique by Dividing the Cloud

    Cloud computing is emerging technology where different users uses the resources dynamically. The number of users using the file systems is increasing day-by-day. Therefore distributed file systems are building blocks for cloud environment. When a client uploads a file it is partitioned into number of chunks to distinct nodes so...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Survey on Load Balancing Approaches in Cloud Computing Environment

    Cloud computing is a new emerging technology in the era of IT industries. It is a business oriented model which provides the computing resources to the client. It has become famous in short time because of their attractive services like easy to use, pay as use and accessibility of their...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Resource Allocation Algorithms in Cloud Computing for Agent Based Traffic Management

    Agent based computing is useful for handling of large scale distributed systems and uncertainty in dynamic environment. Urban traffic and transport management is ideal application suited for agent based solution because of the large distributed nature and dynamic busy idle nature. An important feature of an agent is it can...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Challenges and Issues in Android App Development- An Overview

    Smartphones have changed the definition of mobile phones by being a powerful communication tool inevitable in everybody's daily life along with varied options for fun and entertainment. It has now become a very common tool because of the popularity of android system in the electronics market. As it is an...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    A Survey on Encrypted Data Retrieval in Cloud Computing

    With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. Every owner data is encrypted before stored in the cloud server. Considering the large number of data users and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Implementation of Cloud Storage Security Mechanism using Digital Signature

    Data and computation integrity and security are major concerns for users of cloud computing facilities. Today's clouds typically place centralized, universal trust in all the cloud's nodes. This simplistic, full-trust model has the negative consequence of amplifying potential damage from node compromises, leaving such clouds vulnerable to myriad attacks. Unfortunately,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Trends towards Failover Techniques for Cloud Computing Environment

    Cloud computing is a technology that provides the processing huge amount of data which depend on sharing computing resources like networks, servers, storage, applications and services. Cloud provider provides the various services to the users. The failures that occur in cloud computing can be classified into two classes. One of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Study of Hadoop Distributed File system in Cloud Computing

    Hadoop is a free, open source framework that supports the processing of large data sets in a distributed computing environment. So Hadoop is applied widely as the most popular distributed platform. HDFS is comprised of interconnected clusters of nodes where files and directories are resided. HDFS, the Hadoop Distributed File...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Multi-factor Authentication Security Framework in Cloud Computing

    Data security is the most critical issues in a cloud computing environment. Authentication is a key technology for information security, which is a mechanism to establish proof of identities to get access of information in the system. Traditional password authentication does not provide enough security for information in cloud computing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Cloud Computing: Comparison with Grid Computing, Cloud Service Models, Architecture, Components, and Virtualization

    Technology innovation and its adoption are two critical successful factors for any business/organization. Cloud computing is an affordable option which creates efficiency and effectiveness, reduces costs involving electricity, bandwidth, operations and hardware and does not require functional staff, in-house expertise, space, power and infrastructure. Cloud computing is a recent technology...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    A Perspective on Big Data Technologies

    Big data is a term for massive data sets having large and complex structure with the difficulties of storing, visualizing and analyzing for further processes or results. With the prevalence of cloud computing today, there are so many technologies emerging on the internet and generating huge volume of data. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    A Review on Cloud Computing Adoption: An Exploratory Analysis

    The world has been witnessed with many technological revolutions. One of them is the computing technologies. The world is able to do many things with the utilization of this innovation. There have been many revolutions such as mainframe computers, super computers, web technologies, internet, grid computing, utility computing, etc. even...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    A Compact Table Based Time Efficient Technique for Mining Frequent Items from a Transactional Data Base

    Frequent item set mining is a heart favorite topic of research for many researchers over the years. It is the basis for association rule mining. Association rule mining is used in many applications like: market basket analysis, intrusion detection, privacy preserving, etc. In this paper, the authors have developed a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Wireless Visual Visitor Verifier for Home Security Using Smart Phone

    In this paper, the authors deal with the design of an intelligent home access control system based on visual authentication. It allows the user to grant entry to any visitor to their house remotely after viewing the visitor's picture. The design uses the Arduino Uno as the system processor. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Identifying Critical Human Factors that Impact Software Process in Medium Sized Enterprises Using Genetic Algorithm Based Association Rule Mining

    With the increasing number of medium sized software organizations, production of quality software by such organizations has become a huge challenge for the stakeholders of such organizations. It is a well appreciated fact that a quality focus on the process is likely to yield quality products. While addressing the issue...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Safety Watch: Providing Human Security through Smartphone's

    SafetyWatch is a computerized wristwatch with functionality to provide safety and security to the users. This watch contains intelligent wearable sensor organized in a Bluetooth piconet controlled by a central application implemented on a mobile phone. The piconet is organized automatically, without any user's intervention. Observed data is stored locally...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Green Approach for Reducing Energy Consumption- A Case Study Report

    Green computing is the environmentally responsible use of computers and associated accessories. Which include printers, monitors and networking, storage devices and communications systems-efficiently and effectively with minimal or no impact on the environment and proper disposal of e-waste. In recent times, computer industry have come to realize that going green...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Emergency Call for Nearest Ambulance during Airbag Inflation using Wireless Sensor Networks

    An airbag is a vehicle safety device. It is an occupant restraint system consisting of a flexible fabric envelope or cushion designed to inflate rapidly during an automobile collision. Its purpose is to cushion occupants during a crash and provide protection to their bodies when they strike interior objects such...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Implementation and Comparative Study of Adder Circuit for Low Power & High Performance System

    Adding two binary numbers is a basic operation in binary electronic processing system. Adder plays an imperative role in arithmetic process such as addition, subtraction, multiplication, division etc. In VLSI applications, area, delay and power are the key factors which must be taken into account in the design of a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Consrtuction of BCD Adder Using Integrated Qubit Gates for Quantum Applications

    Reversible logic is an emerging technology; it has hellocious applications in various fields, such as Nano computing, DNA Computing QCA (Quantum Cellular Automata), optical computing etc. limitations of CMOS in deep sub micron regime leads to failure of Moore's law, leads to development of reversible circuits. Reversible logic implementation reduces...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    A Comparative Study of Decision Tree, Naive Bayesian and k-nn Classifiers in Data Mining

    Data mining concept is emerging fast in recognition; it is a technology which is amalgamation of diversified fields like machine learning, artificial intelligence, database system and statistics. The main goal of data mining process is to dig out information from a large data into form which could be comprehensible for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Cost Effective Algorithms for Materialized View Selection in Data Centric Environment

    The notion of data warehouse can be defined as a central repository for all or significant parts of the data that an enterprise's various business systems collect which support making management's decision effectively, for the success of data warehouse accurate and timely consolidated information as well as quick query response...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    A Survey on Sentence-Level Text Clustering

    In this paper, the authors survey various results related to clustering. It explains about the problems in clustering in sentence level text and the solutions to overcome these problems. Now-a-days, a web search engine often returns thousands of sentences in response to a query, making it difficult for users to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Extended Data Mining Technique for Ontology Learning to Present Multi-Media Learning Contents

    Due to the enormous availability of the learning resources in the internet/intranet, the authors need to have a system which picks the relevant resources to the students or teachers to improvise the learning. To achieve this they need a system which captures the learner's activity, their preference of learning, teaching...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Query Optimization and Execution Plan Generation in the Object-Oriented Databases under Inheritance

    In this paper, the authors present an approach using object-oriented databases under inheritance that permits to enrich technique of query optimization existing in the object-oriented databases. Their experimental study shows performance of query after implementation of inheritance method using relational as well as object oriented database. Looking at the success...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Review of a Methodology for Direct and Indirect Discrimination Prevention in Data Mining

    Data mining is a more and more necessary technology for extracting useful data hidden in giant collections of information. There are, however, negative social perceptions concerning data processing, among that potential privacy invasion and potential discrimination. The latter consists of below the belt treating individuals on the premise of their...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Cost Efficiency of Data Mining Within One Pass

    Data mining is nothing but the extracting the data from the data warehouse. But the basic of data mining is to extract the data pattern which is weighted frequent pattern in the data warehouse. Because this type of extraction is very useful for business analysis. And weighted frequent pattern mining...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    A Distributed Data Management System for Association Rule in Big Data Environment

    The association rule of data science and predictive analysis with domain knowledge can build an important improvement for logistics, reviews various approaches to infer the patterns from big data using aggregation, filtering and tagging. Earlier research shows that data aggregation concerns about gathered data and how efficiently it can be...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    To Detect Terror-Related Activities on the Web using Data Mining Techniques

    An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior ('Profile') of terrorists by applying a data mining algorithm to the textual content of terror-related Web sites. The resulting profile is used by the system...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Binary Matrix Approach for Mining Frequent Sequential Pattern in Large Databases

    Data mining is the computational process of discovering patterns in large datasets involving methods at the intersection of artificial intelligence, machine learning, statistics, and systems. Mining sequential patterns from inaccurate or uncertain data, such as those data arising from sensor readings and GPS trajectories, is important for discovering hidden knowledge...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    A Survey on Several Technical Methods for Selecting Initial Cluster Centers in K-Means Clustering Algorithm

    Drastic growth of digital data is an emerging area of concern which has led to concentration of data mining technique. The actual data mining task is the programmatic or semi-programmatic analysis of large quantities of data to extract hidden interesting patterns such as groups of data records, which is usually...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    A Review on Extracting and Analyzing Patterns from Web Data

    In this paper, the authors emphasize on detecting plagiarism over web efficiently. Plagiarism is one of the serious forms of thefts done in professional areas where a professional or student use other person work without their permission and present it by their name. Web mining can be defined as extracting...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Achieving Zero Failover Using Logical Standby Database in Oracle Dataguard

    There are basically two methods to configure data guard, one is with the help of standby physical database and other is with the help of logical standby database. The data guard is monitoring tool which observes continuous activities of primary database with the help of observer. The data guard can...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Comparative Analysis of Query Optimization in the Object-Oriented Database & Relational Databases Using Clauses

    In this paper, the authors present an approach using database clauses that permits to enrich technique of query optimization existing in the object-oriented databases and the comparative analysis of query optimization for relational databases and object oriented database based on cost, cardinality and no of bytes. Focus is on queries...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    A Lifecycle based Testing of Data Warehouse

    Data Warehouse Testing (DWT) forms a very crucial stage in the DW development as all the important decisions are taken based on the information residing in Data Warehouse (DW). As business information is available in diverse form but mostly in repositories of unstructured data. While developing the DW, immense amount...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    A Multilevel Privacy Preservation Technique for Outsourced Database

    In order to get the hidden knowledge from the dataset one has to apply the mining algorithms. But for hiding the knowledge these information the miner apply privacy preserving data mining algorithms are used. These techniques prevent the sensitive information by applying different methods of preservation. This paper focus on...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Big Data Analytics for Advertisement Promotion

    In this paper, the authors deal with applying the big data analytics for advertisement promotion. In the current era, Internet users are rapidly increases. The users are involved in distributed processing of mass data through a cluster composed by many machines and personalized search services based on the user profile...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Discovering Informative Knowledge in Complex Data by Using Combined Mining

    Combined data mining is the update data mining concept for evaluating complex data into number of multiple data sources for achieving information easily based on their performance on operations. Multi-feature, multi sources and multi methods are the semantic techniques for developing those types of events in combing mining for retrieving...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2014

    Relative Evaluation of Utilized Data Using Z-Request Indexing Methods

    Horizon is a fundamental operation in different applications to give back a set of captivating focuses from a perhaps gigantic information space. Given a table, the operation discovers all tuple's that are not charged by an interchange tuple's. It is discovered that the current figurings can't manage horizon on gigantic...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    An Energy Efficiency Routing Algorithm for Increasing Area and Frequency of Wireless Sensor Networks

    The key challenge in wireless sensor network protocol design is to provide energy efficient communication, as most of the nodes in sensor networks have limited battery power and it is not feasible to recharge or replace the batteries. There are so many levels of power consumption in sensor networks like...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Securing Data Storage on Public Cloud by Encryption Based 2-Way Authentication

    Recent advances have given rise to the popularity and success of cloud computing. However, outsourcing the data to a third party causes the security and privacy issues to become a critical concern. This has raised the important security issue of how to control and prevent unauthorized access to data stored...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Framework of Hybrid Classification Model as Smart Agent in Distributed Systems for Network Monitoring

    In this paper, the authors compare SVM (Support Vector Machine) classification algorithm and neural networks classification algorithms identify the pitfalls and propose a new hybrid classification algorithm which is reliable, fast, efficient and robust handling large data sets. A new version of support vector machine algorithm is designed and developed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Congnitive Radio In Wireless Sensor Network

    Cognitive radio is an emerging wireless communications concept in which a network or a wireless node is able to sense its environment, and especially spectrum holes, and change its transmission and reception chains to communicate in an opportunistic manner, without interfering with licensed users. Cognitive radio thus aims to improve...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Survey of Energy Efficient Algorithm Using WSN

    In wireless sensor networks, sensor nodes always have a limited power resource. The energy consumed by transferring data from the sensor node to its destination raises as a critical issue in designing reasonable wireless sensor network routing protocols. LEACH was the first protocol for balancing the energy consumption among nodes,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Survey of Mobile Ad Hoc Network Using Clustering and Fault Detection

    Mobile Ad-hoc NETworks (MANETs) are a form of wireless networks which do not require a base station for providing network connectivity. Many MANETs' characteristics that distinguish MANETs from other wireless networks also make routing a challenging task. Cluster based routing is a MANET routing schemes in which various clusters of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Study of Malicious Activities & Challenges in MANET's

    Mobile ad hoc network comprises of a group of wireless nodes that can be set up anywhere and anytime without using any pre-existing network infrastructure. These allow people and devices to seamlessly internetwork in areas lacking any communication infrastructure. The communication between two nodes is peer to peer and the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Credit Card Fraud Recognition by Modifying K-Means

    Credit card is now-a-days used by many people. No one is having time, so most of the people rely on online shopping. Online shopping is the best way for shopaholic people. But problem is many people try to use other credit cards by just altering the digits. To avoid this...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    An Efficient Routing Protocols for Canvassing Energy in Wireless Sensor Networks

    Wireless sensor networks are widely considered as one of the most important technologies. In wireless sensor network, sensor nodes are used for gathering data and transmitting to sink but sensor nodes has limited energy and communication ability. So, it is important to design a routing protocol for WSNs so that...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Study and Simulation of Vehicular Ad Hoc Network Modules Using MATLAB

    Mobile ad-hoc network research has been gaining steam in last few years. Lot of work has been put into devising routing protocols. With the development 802.11p standard dedicated to DSRC, realizing VANETs is very close. As is the case with any system associated with vehicular design, VANETs also must be...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Survey of Various Encryption Techniques for Audio Data

    The growth rate of the internet exceeds day-by-day. With the fast growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a major role in the field of network security. There are many encryption techniques available currently to secure the data. In this paper,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Implementation of AES Using S-Box Rotation

    AES algorithm is considered as a secured algorithm. Still, some security issue lie in the S-box and key used In this paper, the authors have tried to give focus on the S-box rotation so that they get highly secured information. As the standard AES consists of four stages while in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Effectual Resolute and Lodge Round Robin Packet Scheduling with Compression in IEEE 802.16 WIMAX Network

    In wireless communications provide different and efficient communication. By the usage of WiMAX communication, scheduling problem had many issues in the multi-hop communication. To reduce the packet scheduling Issues, The authors propose Effectual Resolute and Lodge Round Robin Packet scheduling with Compression [ERLRRPC]. This can be resolving the scalability problem,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Efficient Encryption Techniques in Cryptography Better Security Enhancement

    There are many cryptography techniques that are used to encrypt and decrypt data that are transferred over a network. There are two basic types of cryptography: symmetric key and asymmetric key. This paper describes various encryption techniques (substitution and transposition) with their limitations. In this paper, encryption techniques are discussed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Enhancement of BF, DYMO and ZRP Protocols Using New Cost Functions

    One of the biggest issues in routing is to providing satisfactory performance while scaling the wireless mesh network. It is interesting, however to investigate what happens when routing nodes are expanded in different propagation environment and how that affects routing metrics. In this paper, the authors examine the usage of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Comparative Study of Localization Techniques for Ad-Hoc Sensor Network

    Wireless sensor networks consist of sensor nodes that are required to move around to complete their job assignments like collecting data or sampling the environment. Through fully, the location of sensor nodes is important information for core operation. So, localization is most fundamental problems in WSN. The exact and accurate...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    More Efficient Energy Management System Using ZigBee Communication Through Comparison of Energy Usage

    In this paper, the authors describe more efficient home energy management system to reduce power consumption in home area. Home Energy Management System (HEMS) is a technology to reduce and manage home energy use. The feedback on energy consumption to energy users is known to be effective to reduce total...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    An Overview of Black Box Web Vulnerability Scanners

    Web application users and web application vulnerabilities are increasing. Today web applications turning out to be tools of everyday use by many users with the growing popularity of the web. With this web application users are more prone to malicious attacks consequently the need of web security testing arises as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Survey on Prevention Methods for DDOS Attacks in MANETS

    Ad-hoc network is the network comprised of wireless nodes. It is infrastructure less network which is self-configured which means the connections are made without any centralized administration. MANET has no clear line of defence so both legitimate network users and malicious attackers can access it. In case of malicious nodes,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    An Approach to Detect and Classify Bugs using Data Mining Techniques

    Web applications are very popular in daily life. With the rapid growth of technologies the usage of web applications are also increasing. Different languages are used for developing the web applications like C++, C#, ASP.NET, PHP and Java. The source code contains several types of bugs and errors. Software product...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Dynamic Data Transmission Using Wireless Sensor Networks

    Packet transmission is the main important task in present days, because in wireless sensor networks every time topology construction was changed dynamically then transmission is mostly important task in those situation. This process will be done unnecessary users or nodes enter into wireless sensor networks and then they are accessing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Multipath Routing metrics and QoS in Wireless Sensor Networks: Survey and Research Challenges

    Multipath routing is an efficient technique to route data in wireless sensor networks because it provides reliability, security, load balancing, which are critical in resource constrained systems such as WSNs. A wireless sensor network is a large collection of sensor nodes with limited power supply and constrained computational capability. Now-a-days,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Pragmatic Observation for the Detection of Selfish and Malicious Nodes in Ad-hoc Wireless Networks

    A Mobile Ad hoc NETwork (MANETs) are networks composed of a set of communicating devices which are able to spontaneously interconnect without any preexisting infrastructure. Devices in the range can communicate in point to point fashion. Still there are some problems in MANET about security and privacy, especially when used...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Practical Approaches for Estimating End-To-End Delay in Multi-Hop Networks

    In this paper, the authors present a practical approach which analyses and estimates end-to-end delay networks. The proposed practical results of the end-to-end delay distribution are validated through simulation (C program). Communication reliability is one of the most important concerns and fundamental issues in network systems, such as in cyber...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Steps In Fingerprint Enhancement Techniques

    In this paper, the authors study that fingerprints are the oldest and most widely used form of biometric identification. The widespread use of fingerprints, there is little statistical theory on uniqueness of fingerprint minutiae. A critical step in study statistics of fingerprint minutiae is to reliably extract minutiae from the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    An Efficient Approach to Find Best Cloud Provider Using Broker

    Cloud computing is a new technology where one can store data in remote system instead of storing in their own local disk. The companies which provide services to customers are called as cloud service providers. Some of the services are storage, network, database etc. It will be really difficult for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Trust based Report Payment Scheme for Multihop Wireless Networks

    A secure payment scheme, called as the Trust based Report Payment schEme (TRPE) is used in multi hop wireless networks to stimulate node cooperation, regulate packet transmission and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the trusted authority to update their credit accounts and temporarily...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Minimization of Unnecessary Field of View Utilization and Redundant Data Transmission in Wireless Multimedia Sensor Networks

    In this advanced era of science and technology, Wireless Multimedia Sensor Networks (WMSNs) have many applications in almost all the spheres of life starting from medical to military applications. Out of various challenges encountered in WMSNs, redundant data transmission stands as one of the major challenge due to which unnecessary...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    UART Soft-Core - Independent Customizable-Platform

    In this paper, the authors propose a technique for software-implementation of an UART (Universal-Asynchronous-Receive-Transmit) with the goal of getting a customizable UART-core which can be used as a module in implementing a bigger system irrespective of one's choice of implementation platform. Here they have written the core in VHDL (VHSIC...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Web Search Recommendation System Using Concept Based Mining Techniques

    Data mining is the practice of automatically searching large stores of data to discover patterns and trends that go beyond simple analysis. Web content mining is the application of data mining techniques to discover patterns from the web. This paper proposes a method to extend with concept based mining to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Placement Prediction through Data Mining

    Recruitment is one of the most important functions for any organization as they seek talented and qualified professionals to fill up their positions. Majority of the companies have been focusing on campus recruitment to fill up their positions. This method is the best way to get the right resources at...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Study on Handoff Techniques to Communicate in Cellular Networks

    The continuation of an active call is one of the most important quality measurements in cellular systems. Handoff process enables a cellular system to provide such a facility by transferring an active call from one cell to another. Different approaches are proposed and applied in order to achieve better handoff...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Iris Recognition using Feature Detection Techniques in Matlab Simulink Model Blockset

    The biometric identification system is one of the technologies used in the recognition system. Iris recognition system is the most reliable system for an individual identification. Now-a-days, many applications have been implemented with this feature such as the time attendance system for high security environment, hospitals, airports, government agencies, educational...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Power Sensitive Framework for Energy Efficient Wireless Ad-Hoc Network

    Ad hoc mobile devices today operate on batteries. Hence, power consumption becomes an important issue. To maximize the lifetime of ad hoc mobile networks, the power consumption rate of each node must be evenly distributed, and the overall transmission power for each connection request must be minimized. In this paper,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Enhanced Clustering Algorithm on Academic Activities

    Clustering analysis method is one of the main analytical methods in data mining, the method of clustering algorithm will influence the clustering results directly. This paper discusses the traditional clustering algorithms and analyzes the shortcomings of standard algorithm, such as the k-means clustering algorithm has to calculate the distance between...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Database Security Based on Human Authentication Using Facial Recognition

    Data is the most significant and essential entity to every organization. Companies invest millions of dollars in order to protect and manage the access to their data. The privacy and confidentiality of any data could be easily determined from the fact that the sensitivity of organizational data is because of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Performance Evaluation of Variants of Stable Election Based WSN protocols

    Wireless Sensor Networks (WSNs) contain a large number of sensor nodes that sense the environment they are employed in; and gather the data and forward it to the Base Station (BS). The sensing and transmission of data involves a huge amount of energy. While WSNs are equipped to handle complex...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Accountability and Security of Data Stored in the Cloud

    Cloud computing is Internet based computing on a pay-as-you-use basis where-in virtualized servers provide software, infrastructure, platform, devices and other resources in a shared environment to customers. The most important feature of the cloud services is that users' data are processed in remote, unknown machines that users do not possess...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Enhanced Receiver Based Stateless Multicasting Routing Protocol for Ad-hoc Network

    Mobile ad-hoc network consist of individual mobile nodes communicating via wireless link and provides multicasting with the aid of multicast routing protocols. These protocols are typically stateful, where each node in the group maintains the state information which requires more communication cost between the nodes. In dynamic network topology, communication...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Manifest files Analyser System for Detecting Android Malware

    Android is an open source and fast growing technologies used in tab, mobile devices and Smartphone. The threats of android attacks are increasing with the popularity of smart phone usage. So the many studies going on the mobile security. Once the device infected with the malware, the user suffers from...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)