International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 241-280 of 2949 results

  • White Papers // Feb 2015

    A Resourceful Broadcasting in MANET Using System Code for Reducing Redundant Information

    Flooding is an important communication primitive in mobile ad-hoc networks and also serves as a building block for more complex protocols such as routing protocols. In any flooding mechanism, one must balance reliability against message overhead. On the one hand, increasing reliability generally involves sending a greater number of surplus...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2015

    Quality of Service Analysis of Software Reliability and Testability Using a New Dynamic Metric

    Today, it is very essential to ensure quality of service of software for meeting user and customer requirements. Quality of service is analyzed by software metrics. Dynamic metrics give better results as compared to static metrics and are used to calculate performance during run time behavior of system. As the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2015

    A Two Level Image Security Based on Arnold Transform and Chaotic Logistic Mapping

    In today's growing world of digital technology, access to the multimedia content is very easy and for some sensitive applications such as medical imaging, military system and legal problems, it is very essential to not only reinstate the original media without any loss of information but also to increase content's...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2015

    Optimization of Sierpinski Carpet Fractal Antenna

    In this paper, the authors study the sierpinski carpet fractal antenna in terms of optimality. The modified sierpinski fractal antenna shown to have the capability of being optimized, in terms of its return loss, bandwidth and gain. The sierpinski carpet antenna is a type of fractal antenna which is known...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2015

    Hidden Markov Model in Credit Card Fraud Detection

    The most accepted payment mode is credit card for both offline and online in today's world, it will provide cashless shopping at every shop across the world. It will be the most suitable way to do online shopping, paying bills, and performing other related tasks. Hence, risk of fraud transactions...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2015

    Algorithm and Software Development for MSA Design Using GA

    This is an algorithm is developed for designing microstrip antenna using genetic algorithm. Using the designed algorithm, software has developed which is capable to provide the design parameters for microstrip antenna and gain. The software is application software which is successfully tested for microstrip antenna. The software has functionally tested....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2015

    Facilitating the Service Discovery for the Cluster of Web Services using Hybrid WSTRec

    Clustering Web services would greatly increase the ability of Web service search engine to retrieve relevant services. The performance of traditional Web Service Description Language (WSDL)-based Web service clustering is not satisfied, due to the singleness of data source. Recently, Web service search engines such as Seekda allow users to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2015

    Review of Virtual Reality in Multimedia

    In this paper, the authors designed to provide the information about virtual reality contain wealth of information which is designed to newcomer and experienced technologist alike. Discuss all the aspect of virtual reality which include concept of virtual reality technologies used applications and ethical user. This is a complex and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Wireless Visual Visitor Verifier for Home Security Using Smart Phone

    In this paper, the authors deal with the design of an intelligent home access control system based on visual authentication. It allows the user to grant entry to any visitor to their house remotely after viewing the visitor's picture. The design uses the Arduino Uno as the system processor. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Identifying Critical Human Factors that Impact Software Process in Medium Sized Enterprises Using Genetic Algorithm Based Association Rule Mining

    With the increasing number of medium sized software organizations, production of quality software by such organizations has become a huge challenge for the stakeholders of such organizations. It is a well appreciated fact that a quality focus on the process is likely to yield quality products. While addressing the issue...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Safety Watch: Providing Human Security through Smartphone's

    SafetyWatch is a computerized wristwatch with functionality to provide safety and security to the users. This watch contains intelligent wearable sensor organized in a Bluetooth piconet controlled by a central application implemented on a mobile phone. The piconet is organized automatically, without any user's intervention. Observed data is stored locally...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Green Approach for Reducing Energy Consumption- A Case Study Report

    Green computing is the environmentally responsible use of computers and associated accessories. Which include printers, monitors and networking, storage devices and communications systems-efficiently and effectively with minimal or no impact on the environment and proper disposal of e-waste. In recent times, computer industry have come to realize that going green...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Design & Implementation of High Performance Pipelined Single Precision Floating Point Multiplier Based on Vedic Mathematics in ASIC

    High-speed multiplier is much desired to satisfy overall power budget of digital system. In this paper, the authors describe an efficient implementation of an IEEE 754 pipelined single precision floating point multiplier targeted for Xilinx Virtex-4. VHDL is used to implement a technology-independent pipelined design. Design does not support rounding....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    An Approach: Combining Clustering and Classification for Handling DataStream

    Traditional databases have been used in applications that require static data storage and comprise complex querying. But, now-a-days due to increase in use of Internet a huge continuously changing data is generated every day. This dynamically changing data are nothing but the data stream. They are unbounded, continuous usually come...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Stegtorrent Using Data De-Clustering

    Now-a-days, people widely use internet for data uploading and downloading using torrent. Previous system was less secure and time consuming. To overcome this problem the authors are going to implement stegtorrent using data de-clustering StegTorrent a new network steganographic method for file transfer service. Availability and scalability of storage systems...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Permit Access Control of Data Stored In Cloud to Authenticate Users

    In cloud computing storing data into cloud and retrieving data from the cloud with more securely is not a simple task and providing security to stored data is very difficult. This paper discusses how to overcome these problems. Before storing data the cloud must verify the authenticity of the series,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    A Comparative Survey on Discrimination Prevention Methods in Data Mining

    In the database large amount of data is collected and that data is analyzed using various data mining techniques. In data mining various issue are there like potential discrimination and privacy invasion. Discrimination is a partial treatment of individual or group based on their actual or perceived membership in certain...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Risk Management Process Analysis for Data and Communication Devices

    In this paper, the authors define what data and communication devices are; it's associated types of Security and methods used to "Break" security. The risk management process for data and communication devices such as risk assessment, risk mitigation and continuous risk monitoring, evaluation and review. This paper also strengthens the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Performance Analysis of Data Mining Algorithms

    There is no single best algorithm since it highly depends on the data any one are working with. Nobody can tell what should use without knowing the data and even then it would be just a guess. Classification algorithms of data mining have successfully been applied in the recent years...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Hybrid Clustering and Classification

    In data mining, C-Means clustering is well known for its efficiency proved good for large data sets. The aim of every clustering algorithm is to group the similar data items while ungroup the dissimilar items. C-Means clustering algorithm has the opposite principle as fuzzy clustering algorithm has i.e. in C-Means...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    URL Mining Using Agglomerative Clustering Algorithm

    The tremendous growth of the web world incorporates application of data mining techniques to the web logs. Data mining and World Wide Web encompasses an important and active area of research. Web log mining is analysis of web log files with web pages sequences. Web mining is broadly classified as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Text Mining on Unstructured Data using D-matrix

    Fault Dependency (D)-matrix is a systematic diagnostic model which is used to capture the fault system information at the hierarchical system-level. It consist dependencies between observable symptoms and failure modes associated with a system. Whenever user type any query for searching any file or data, most probably all the files...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    A Novel Method for Client Server Assignment in Distributed System Using Clustering Algorithm

    Distributed system is a collection of heterogeneous network. All networks are communicated with each other via internet. Distributed system has centric approach towards client-server. In client server network there are two distinct nodes, one is client and second is server. All these distinct nodes are communicated and co-ordinate with each...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Load Rebalancing in Public Cloud Based on Best Partitioning Technique by Dividing the Cloud

    Cloud computing is emerging technology where different users uses the resources dynamically. The number of users using the file systems is increasing day-by-day. Therefore distributed file systems are building blocks for cloud environment. When a client uploads a file it is partitioned into number of chunks to distinct nodes so...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Survey on Load Balancing Approaches in Cloud Computing Environment

    Cloud computing is a new emerging technology in the era of IT industries. It is a business oriented model which provides the computing resources to the client. It has become famous in short time because of their attractive services like easy to use, pay as use and accessibility of their...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Resource Allocation Algorithms in Cloud Computing for Agent Based Traffic Management

    Agent based computing is useful for handling of large scale distributed systems and uncertainty in dynamic environment. Urban traffic and transport management is ideal application suited for agent based solution because of the large distributed nature and dynamic busy idle nature. An important feature of an agent is it can...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Challenges and Issues in Android App Development- An Overview

    Smartphones have changed the definition of mobile phones by being a powerful communication tool inevitable in everybody's daily life along with varied options for fun and entertainment. It has now become a very common tool because of the popularity of android system in the electronics market. As it is an...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    A Survey on Encrypted Data Retrieval in Cloud Computing

    With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. Every owner data is encrypted before stored in the cloud server. Considering the large number of data users and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Implementation of Cloud Storage Security Mechanism using Digital Signature

    Data and computation integrity and security are major concerns for users of cloud computing facilities. Today's clouds typically place centralized, universal trust in all the cloud's nodes. This simplistic, full-trust model has the negative consequence of amplifying potential damage from node compromises, leaving such clouds vulnerable to myriad attacks. Unfortunately,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Trends towards Failover Techniques for Cloud Computing Environment

    Cloud computing is a technology that provides the processing huge amount of data which depend on sharing computing resources like networks, servers, storage, applications and services. Cloud provider provides the various services to the users. The failures that occur in cloud computing can be classified into two classes. One of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Study of Hadoop Distributed File system in Cloud Computing

    Hadoop is a free, open source framework that supports the processing of large data sets in a distributed computing environment. So Hadoop is applied widely as the most popular distributed platform. HDFS is comprised of interconnected clusters of nodes where files and directories are resided. HDFS, the Hadoop Distributed File...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Multi-factor Authentication Security Framework in Cloud Computing

    Data security is the most critical issues in a cloud computing environment. Authentication is a key technology for information security, which is a mechanism to establish proof of identities to get access of information in the system. Traditional password authentication does not provide enough security for information in cloud computing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Cloud Computing: Comparison with Grid Computing, Cloud Service Models, Architecture, Components, and Virtualization

    Technology innovation and its adoption are two critical successful factors for any business/organization. Cloud computing is an affordable option which creates efficiency and effectiveness, reduces costs involving electricity, bandwidth, operations and hardware and does not require functional staff, in-house expertise, space, power and infrastructure. Cloud computing is a recent technology...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    A Perspective on Big Data Technologies

    Big data is a term for massive data sets having large and complex structure with the difficulties of storing, visualizing and analyzing for further processes or results. With the prevalence of cloud computing today, there are so many technologies emerging on the internet and generating huge volume of data. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    A Review on Cloud Computing Adoption: An Exploratory Analysis

    The world has been witnessed with many technological revolutions. One of them is the computing technologies. The world is able to do many things with the utilization of this innovation. There have been many revolutions such as mainframe computers, super computers, web technologies, internet, grid computing, utility computing, etc. even...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    A Compact Table Based Time Efficient Technique for Mining Frequent Items from a Transactional Data Base

    Frequent item set mining is a heart favorite topic of research for many researchers over the years. It is the basis for association rule mining. Association rule mining is used in many applications like: market basket analysis, intrusion detection, privacy preserving, etc. In this paper, the authors have developed a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Location Based Reminder: An Android Application

    Location based reminder, is a mobile base application built on the Android platform that provides personal location based services such as location reminders, bookmarking, mapping and search nearby. Such applications are yet to be developed extensively. Mobile phones provide a potentially convenient and truly ubiquitous platform. So such a reminder...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Feature Extraction and Classification for Automatic Speaker Recognition System - A Review

    Automatic Speaker Recognition (ASR) has found immense applications in the industries like banking, security, forensics etc. for its advantages such as easy implementation, more secure, more user-friendly. To have a good recognition rate is a pre-requisite for any ASR system which can be achieved by making an optimal choice among...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Analysis of Various Security Breaches and Its Measures in Cloud Environment

    Cloud computing is a versatile technology that can support a broad-spectrum of applications. The low cost of cloud computing and its dynamic scaling renders it an innovation driver for small companies, particularly in the developing world. Now-a-days, digital storage of computer data is moving toward cloud computing which is a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2015

    Energy Efficient Data Dissemination in WSN with Mobile Sink

    With the advancements in the MEMS technology, wireless communication, there has been a growing need for the development of techniques and design methodologies that result in the efficient communication. In WSN the sensor nodes are typically energy constrained and most of the energy expenditure is attributed to communication and the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Dynamic Resource Allocation and Data Processing Framework for Cloud Architecture

    Cloud Computing has became an emerging area in the recent areas. It extends services like SaaS, PaaS and IaaS. One of the complicated applications in IaaS is parallel data processing. Parallel data processing is needed to integrate and deploy their programs in customer premises. However, the processing frameworks which are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Proposed Method of Cryptographic Key Generation for Securing Digital Image

    In the digital world, security is an important issue, and encryption is one of the ways to ensure security. In this paper, the authors presents image encryption/decryption scheme using biometric template (Palm Print). The proposed scheme is especially useful for encryption of large amounts of data, such as digital images...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2013

    An Adaptive Technique for Data Propagation in Sensor Networks

    Micro Electro-Mechanical Systems (MEMS) have made in-situ sensing with Wireless Sensor Networks (WSNs) a promising technique. As wireless integrated network sensors are powered with a small battery and they usually work in an unattended manner, the main constraint of a sensor node is that its energy resource is limited. To...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Design of IMAR Using Proxy Servers in Wireless Network

    An integrated wireless network architecture using proxy servers to support mobility management. The technique takes advantage of the existing functionalities of proxy servers to provide mobility support for applications such as Web browsing and ftp, without modifying the IP protocol stack of the mobile host. The architecture uses proxy servers...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Stochastic Analysis of Various Security Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are emerging as a new technology in the IT ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security and social factors. A wireless sensor network is a collection of nodes organized into a cooperative...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Average Delay and Throughput Analysis on Ad Hoc Network Protocols

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes communicating with each other using multi-hop wireless links without any existing network infrastructure or centralized administration. In recent years, a variety of routing protocols targeted specifically at this environment have been developed and some performance simulations are made....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Comprehensive Wireless Sensor Node Structural Design

    The focus of this paper is to develop a general structural design that addresses the needs of wireless sensor node. The structural design is not tied to any particular radio or processing technology but rather details how the computation and communication should brought together. To communicate over a wireless link,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Performance Evaluation of MANET Routing Protocols With Scalability Using QoS Metrics of VOIP Applications

    Mobile Ad Hoc NETworks (MANET) is wireless network without infrastructure, where every node functions as transmitter, router and data sink. As many previous works have shown that the routing performance is greatly dependent on the availability and stability of wireless links. With the growth of the Internet services, Voice over...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    A Security Based Multimedia Web Service Framework Supporting Multimedia Content Streaming

    At Present web services standards is not well supported the transfer of streaming data. To incorporate multimedia streaming sustain in the Web services domain, this manuscript introduces a new multimedia streaming Web services framework for the transfer of streaming multimedia content with security in the form of XML encryption and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Analysis of LEACH Protocol in Wireless Sensor Networks

    Wireless Sensor Network is a network of sensor nodes without having any central controller. Its growth is expeditiously increasing and that's why there is an immense field for research in this area. Sensors depend entirely on the trust of their battery for power, which cannot be revitalized or substituted. So...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Implementation of Network Security Using Genetic Algorithm

    Information security has become one of the most important concerns of the total information technology development process. And all the technologies that are used to support the management and maintenance of most of the enterprise are commonly online. So network security is the subject which is applicable anywhere in the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Level of Fusion in Multimodal Biometrics: A Review

    User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degree of freedom, non-universality of the biometric trait and unacceptable error rates. So the need of using multimodal biometric system occurred. A multimodal biometric system combines the different biometric traits and provides...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Mobile Computing - An Introduction with Ad Hoc Networks

    A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. Mobile computing is human - computer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Enhanced Data Security in Cloud Computing with Third Party Auditor

    Cloud computing is environment which enables convenient, efficient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud is kind of centralized database where many organizations/clients...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Fundamentals and Development in Mobile Communication

    The goal of the next generation of mobile communications system is to provide a wide range of communication services to everyone everywhere and at anytime. The services provided to the mobile phone users are like high speed data transmission, improved video quality and multimedia services as well as voice signals....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Efficient Genetic Algorithm for Optimal Routing In Ad Hoc Networks

    Ad-hoc network is a collection of mobile hosts. This network uses two different types of protocols. They are proactive protocol and reactive protocol. Proactive protocol maintains routing table information. Reactive protocol is a path between source and destination and also called as on-demand protocol. Genetic Algorithm (GA) is used to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Architectural Design Approaches for Wireless Sensor Networks

    With ever-increasing interest in remote monitoring, and advances in embedded and sensing technologies, the Wireless Sensor Networks (WSN) research domain has experienced a great progress in recent years. The architectural design is an important concern in wireless sensor networks. This paper discusses the four different architectural approaches and protocols associated...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Load Balancing On Cloud Data Centres

    Clouds are high configured infrastructure delivers platform, software as service, which helps customers to make subscription for their requirements under the pay as the users go model. Cloud computing is spreading globally, due to its easy and simple service oriented model. The numbers of users accessing the cloud are rising...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Comprehensive Study of Applications of Wireless Sensor Network

    There have been immense advancements in field of technology over the past years. Small size, low cost sensor networks have been developed which are capable of collecting, analyzing and transmitting information to a central processor node for further analysis and report generation. Wireless sensor network is a term for densely...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Comparative Assessment on the Jammers and Defensive Mechanisms in Wireless Sensor Networks

    The global applicability of the wireless technology for communication between devices has altered the entire framework for networks. Mobility of the devices yet allowed to access the services and flexibility are the stated advantages. But still the security measures need additional methodologies to prevent the illegitimate usage and attack to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Improved Chain Based Routing Protocol for WSN

    A WSN is a specialized wireless network made up of a large number of sensors and at least one base station. Recent technological advances in communications and computation have enabled the development of low-cost, low-power, small in size, and multifunctional sensor nodes in a Wireless Sensor Network (WSN). Since the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Novel caching strategy for time varying data for Mobile Networks

    The improvements in the computational and communication capabilities of mobile devices has made them all pervasive and is leading to Ubiquitous computing in which all computations will fade into the background. Much of research has gone into improving the functionality, computational power, size and power constraints of mobile devices such...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    An Improved PEGASIS Protocol to Enhance Energy Utilization in Wireless Sensor Network

    Wireless sensor network is an ad hoc network. Each sensor is defined with limited energy. Wireless sensor node deployed into the network to monitor the physical or environmental condition such as temperature, sound, vibration at different location. Each node collected the information than transmit to the base station. The data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Service Discovery in ADHOC Networks

    Service discovery dilemma creates new confront in ad-hoc networks. Due to the highly energetic nature of these networks and their bandwidth, energy these networks pose new challenges during service discovery. Traditional resolutions used in the Internet are hence not well suited for ad-hoc networks. In wireless ad-hoc networks, the system...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Automated Call Transfer Technique for Heterogeneous MANET

    Call Transferring is the essential functionality for dealing with the mobility of the mobile users in mixed or heterogeneous network. Compared with the conventional handover employed in the mobile networks, the complete call transfer is being proposed for 3G/4G for better performance on both link and system level. Previous work...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Security Issues and Security Algorithms in Cloud Computing

    Cloud Computing is the use of activity of using Computer hardware and software. Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third party provider who owns the infrastructure. It is often provided "As a service"...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    A Survey of Key Management Technique for Secure and Reliable Data Transmission in MANET

    A Mobile Ad-Hoc NETwork (MANET) is a self-configuring network of mobile nodes connected by wireless links to form an arbitrary topology without the use of existing infrastructure. Due to the nature of Unreliable Wireless medium Data Transfer is a major Problem in MANET and it lacks Security and Reliability of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Design and Architectural Issues in Wireless Sensor Networks

    With the help of recent researches in micro-electro-mechanical technology, wireless communication and digital electronics low cost, low power multipurpose sensors nodes of small size have been developed. Wireless sensor node's major steps in their work are sensing, processing of data, and communicating with other nodes. There are large varieties of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Collusive Piracy Prevention in P2P Network

    The primary cause of violation to intellectual property law is collusive piracy. Unpaid clients may get copyright contents from colluders illegally. Such kind of piracy causes to damage to content delivery in P2P network. The authors propose a system which prevents colluders from pirating the copyright contents in P2P.The firm...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Optimal Residual Energy Clustered Data Aggregation Protocol (ORECDA) in WSNs

    WSN consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. As sensor nodes are deployed in sensing field, they can help people to monitor and aggregate data. Researchers also try to find more efficient ways...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Energy Optimization Model for Wireless Ad-hoc Network

    Power consumption is one of the most important design criteria for ad-hoc networks as batteries provide limited working capacity to the mobile nodes. Power consumption control in ad-hoc networks is a more difficult problem due to non availability of access point and low battery power in network. Battery power of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Controlling PC Application Through Mobile Phone

    There are various limited options available to the users when they are not connected to the internet to access their workstations. Most of the options available are tedious, expensive and unsecure. Hence there was a need for an easy to use secure application that will be able to connect the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Tiny-Operating System-Software Structural Design and Implementation for Wireless Sensor Network

    In this paper, the authors present tiny operating system for wireless sensor network is a technology which has capability to change many of the information communication aspects in the upcoming era. Tiny-OS meets these challenges well and has become the platform of choice for sensor network research area. A critical...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    AAA Mechanism for Visiting Mobile Node in Network Mobility Environment

    Due to the huge demand for mobile applications and devices, many new technologies and mechanisms are being invented. NEtwork MObility (NEMO) is a kind of deployment scenario where an entire network moves from one location to another location. While changing the point of attachment, there is possibility for the hacker...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Performance Analysis of Vertical Handover between WiMAX and Wi-Fi Networks

    The efficiency and reliability are the major requirement of any network. In case of high speed network like WiMAX, or the Wi-Fi Networks, the network gives more data loss as some problem occur over the network. One of the major problems of such high speed network is handover. This problem...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Analysis of Worm Hole Attack In MANET and Avoidance Using Robust Secure Routing Method

    Mobile Ad-hoc NETworks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and no fixed infrastructure. In MANET, the more security is required in comparison to wired network. Wireless networks are susceptible to many attacks, including an attack known as the wormhole attack. The wormhole attack is very powerful,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    The Protection Mechanism against DOS and SQL Injection Attack in SIP Based Infrastructure

    Voice over Inter Protocol (also called VoIP, IP Telephony, Internet Telephony, and Broadband Phone) is the routing of voice conversations over the Internet or through any other IP-based network. VoIP allows one to use a single high speed internet connection for all voice, video, and data communications. The process of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Security in Cloud based E-Learning

    E-learning is a form of learning created by combining digitally delivered content with learning support and services. E-learning systems usually require many hardware and software resources. Educational organizations cannot afford huge investments to obtain these resources. Cloud computing is the best solution as it delivers the computing resources (hardware and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    The Quality of Service Support for Wireless Sensor Networks

    To provide trustworthy and timely information is the most important tasks of wireless sensor networks. Providing quality of service (QoS) to satisfy the end users and matching WSN constraints has become a significant research work. Nevertheless, majority of research in this area has overlooked the fact that ensures the QoS...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    Routing and Computing in Wireless Sensor Networks

    The primary function of wireless sensor networks is to predict and collect the data from the main demesne, process the data and then transmit this data to the destination node. Now, for proper functioning, it requires some energy efficient routing protocols so as to make paths between the source (sensor...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)