International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 281-320 of 1713 results

  • White Papers // Nov 2013

    An Exemplary Study of Privacy Preserving Association Rule Mining Techniques

    The Privacy Preserving Data Mining (PPDM) has become an important issue in recent years because of abundance of sensitive information on the internet. In this paper, the authors present taxonomy and a survey of recent approaches that have been applied to PPDM .Subsequently; they present taxonomy on Association Rule hiding...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Novel Encoding Technique of Broadcasting XML Data Using Twig Patterns in Wireless Environment

    This paper is to improve energy and latency efficiency of XML dissemination scheme for the mobile computing, which is based on Lineage Encoding, G-node and scheduling algorithm for streaming XML data in the wireless environment. It uses the advantages of the structure indexing and attribute summarization methods. The Lineage Encoding...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Performance Evaluation: A Comparative Study of Various Classifiers

    Real-world knowledge discovery processes typically consist of complex data pre-processing, machine learning, evaluation, and visualization steps. Hence a data mining platform should allow complex nested operator chains or trees, provide the transparent data managing, comfortable constraint handling and optimization, be flexible, extendable and easy-to-use. Modern machine learning techniques have encouraged...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Challenges Toward Achieving Privacy and Secure Searchable Outsource Cloud Data Storage Services

    Cloud data have to be encrypted to protect data privacy, before outsourced to the commercial public cloud. The encryption process makes effective data utilization service a very challenging task. Traditional searchable encryption techniques allow users to securely search over encrypted data through keywords. They support only Boolean search and are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Enhancing the Secure Data Transmission for Routing Attacks in MANET

    Mobile Ad-hoc NETworks (MANET) are utilized to set up wireless communication in improvised environments without a predefined infrastructure or centralized administration. MANET has been normally deployed in adverse and hostile environments where central authority point is not necessary. MANET has been normally deployed in the network to avoid the routing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    An Effective Approach to Understand the Graph Database with Shortest Path Algorithm

    A graph database is a database that uses graph structure with nodes, edges, and properties to represent and store data. By definition, a graph database is any storage system that provides index-free adjacency. This means that every element contains a direct pointer to its adjacent element and no index lookup...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Implementation of Intrusion Detection System Using Genetic Algorithm

    In recent years, Intrusion Detection System (IDS) has become one of the hottest research areas in computer security. It is an important detection technology and is used as a countermeasure to preserve data integrity and system availability during an intrusion. When an intruder attempts to break into an information system...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    An Improved Flood Forecasting and Warning System Using Data Mining

    Hydrological modeling of large river catchments has become a challenging task for water resources engineers due to its complexity in collecting and handling of both spatial and non-spatial data such as rainfall, gauge-discharge data. With changes of surface in lukus river basin and the climatic and meteorological changes in morocco...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    An Efficient SDRP with Elliptic Curve Integrated Encryption Scheme

    Wireless reprogramming in a Wireless Sensor Network (WSN) is the process of propagating a new code image or relevant commands to sensor nodes. As a WSN is usually deployed in hostile environments, so for security reasons every code update must be authenticated to prevent an adversary from installing malicious code...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Scalable and Secure Decentralized Information Sharing in the Cloud

    Cloud computing is fast becoming the face of the IT industry. Cloud services are provided on accordance to the user need. In cloud environment user's data is generally processed in distant locations in unknown machines that are not in the order of the user. Control of user's data is marginalized...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Comparative Analysis & Performance of Different Sorting Algorithm in Data Structure

    An algorithm is precise specification of a sequence of instruction to be carried out in order to solve a given problem. Sorting is considered as a fundamental operation in computer science as it is used as an intermediate step in many operations. Sorting refers to the process of arranging list...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Survey Paper on Secure Key Distribution in Multicasting

    Modifications of Arithmetic Coding (AC) are proposed to boost the protection of ancient AC. Chosen-plaintext attacks have been projected for these two ways once a similar key is used to cipher totally different messages. A tendency to provides a definition for security of cryptography mistreatment AC that's supported the shortcoming...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Enhanced Secured Cloud Oriented Detection Mechanism for Android Applications

    As in recent era of computers and internets, mobiles devices, Smartphone's plays a vital role in human day-to-day life. Also nowadays Smartphone's, tablets are becoming very popular especially android OS based Smartphone's are gaining much more popularity as compared to Apple's iOS. These Smartphone's having various apps and features based...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Ensuring Data Storage Security in Cloud Using Two Way Integrity Check Algorithm

    In this paper, a new scheme has been introduced, \"Two way integrity algorithm\". The paper presents a way to implement Third Party Auditor (TPA) which not only checks the reliability of Cloud Service Provider (CSP) but also checks the consistency and accountability of data. This paper addresses this challenging open...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Secure and Data Dynamics Storage Services on Cloud

    Cloud storage allows users to store their data and enjoy high quality of services. It enables highly scalable, on demand and only pay per use services to be easily consumed over the Internet on an as needed basis. Cloud stores data on remote machine, so necessary to need more security...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Survey on Mobile ADHOC Network and Security Attacks on Network Layer

    Mobile ad-hoc network is gaining popularity today because of their mobility support through which any node can move to any where as long as in the range of radio signal. Topological network is fully dynamic where any node can easily added into network. Every node sends packet to his neighbors'...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Comparative Survey on Various Encryption Techniques for Information Security

    There are many security aspects in data communication, while transferring data in a distributed network. Encryption is also a way to provide security in data communication using a key. Several techniques are already introduced for encryption as well as decryption. Some of them do not provide so much security as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Optimized Cloud Partitioning Technique to Simplify Load Balancing

    Cloud computing environment still has some issues in resource management and load balancing. Load balancing is the process of balancing the workload among multiple nodes. This paper proposes an optimized load balancing technique and cloud clustering technique over cloud environment. The public cloud environment which has enormous nodes over large...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Cloud Computing for Media Storage and Performance Analysis

    Cloud computing is a network of computing resources which can be shared, any application can get integrated into the cloud environment and any services may get exposed in cloud. In this paper, the authors develop a cloud computing environment using Windows Microsoft Azure platform which provides a platform for data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Secure Improved Location Aided Cluster Based Routing Protocol in MANETs

    MANET is a network of mobile nodes that interconnect, interact with and collaborate with each other. Security is the main challenge for MANETs. Many attempts were made to secure a cluster based routing protocol, but due to lack of fixed infrastructure and central management, the security solution is challenging research....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Database Security by Preventing SQL Injection Attacks in Stored Procedures

    With widespread adoption of the web as an instant means of information dissemination and various other transactions, including those having financial consequences like e-banking, e-shopping, online payment of bills etc, the authors are becoming more and more dependent on web applications. An unauthorized access to this much of confidential data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Layer-7 DDOS Flood Attack Detection Based on Document Rank

    Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for 11certain application domains, while others are more generic. In this paper, the authors used a different Page Rank algorithm at peak in proximity graph...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Convergence of CRM, BPM, DM & Cloud Computing for SME's

    Several customer relationship management software's are available in the market. In the present scenario the market demand is changing dynamically. To handle this demand and to keep up the growth, many large-scale enterprises have developed their own software's. Business process management and data mining tools have integrated with CRM systems...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Survey on Web Search Results Personalization Techniques

    Web has become the best source of information throughout the world. Search engines play a key role in finding out the information, which is abundant. As such search engines are enhanced with new technology. Though search engines find much information with one key word, fail to provide the accurate, exact...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    LSB Steganography Based on Encryption

    Steganography, introduced in 2003, is a techniques employed for concealed message transfer among two secret parties. It is an ability of hidden message transfer. It also relates to the areas like network protocols and security for practical data hiding in communication networks using Transmission Control Protocol/Internet Protocol. The distinctive steganographic...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Survey on Overview of Clustering Techniques for Data Mining

    Clustering is the unconfirmed categorization of patterns into groups. This groups are known as clusters. Group consists of objects that are very similar among themselves whereas less similar compared to objects of the other cluster. This paper provides a Review of the existing literature on clustering techniques for data mining....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Survey on Mining Actionable Clusters from High Dimensional Datasets

    The datasets which are in the form of object-attribute-time format is referred to as Three-Dimensional (3D) data sets. Clustering these Three Dimensional (3D) data sets is a difficult task. So the subspace clustering method is applied to cluster the Three-Dimensional (3D) data sets. But finding the subspaces in the these...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Shifting VANET to Cloud - Survey

    Vehicular networking has become a significant research area due to its specific features and applications such as standardization, efficient traffic management, road safety and infotainment. Vehicles are expected to carry relatively more communication systems, on board computing facilities, storage and increased sensing power. Hence, several technologies have been deployed to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Energy Efficient Data Dissemination Protocols under Various Transmission Range for Wireless Sensor Network

    Wireless Sensor Networks (WSNs) consists of numerous tiny sensors deployed at high density in regions requiring surveillance and monitoring. Data dissemination protocols are used to transfer the data from source node to sink node. The most important issue in wireless sensor network is to save sensor node's energy. Because sensor...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Performance Analysis on Direct and Indirect Discrimination in Data Mining

    Discrimination is a presuppose privileges where provide to the each separate group for the safety of the data which is stored .discrimination is two type direct and in direct discrimination is based on sensitive information. Direct discrimination is based on sensitive information .In direct discrimination is based on non sensitive...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Layered Issues in Wireless Mesh Networks

    With the use of wireless sensor networks in industrial settings, a new type of network topology, mesh networks, has emerged in today's market. Wireless mesh network is a promising technology is providing the last mile broadband access. Wireless mesh networks has the potential to deliver Internet broadband access, wireless local...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Hierarchical Window Centric Method of Modeling Spatial Co-Location Patterns on Spatial Database

    With the growing technology, most of the focus is on spatial data mining. Spatial data mining refers to the extraction of unknown and unexpected information from spatial data sets of massive, high dimensionality and complex spatial databases. Spatial data mining is a process to discover related knowledge, potentially constructive and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A Survey on Web Usage Mining with Clicking Pattern in Grid Computing Environment

    Web usage mining is a current and drastic research area in web usage mining focused on learning about web users and their interaction about web sites. The aim of web usage mining is to find user's access moves frequently and quickly from the massive web log data such as through...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Gait Recognition System for Improved Human Identification using ENN and NN

    Recognition of any individual is a task to identify people. Human identification using Gait is method to identify an individual by the way he walk or manner of moving on foot. Gait recognition is a type of biometric recognition and related to the behavioral characteristics of biometric recognition. Gait recognition...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    The Complete Reference and an Overview of Cloud Computing

    Cloud computing is a paradigm shift in which computing is moved away from personal computers and even the individual enterprise application server to a cloud of computers. A cloud is a virtualized server pool which can provide the different computing resources of their clients. The data and the services provided...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    A New and Efficient K-Means Clustering Algorithm

    A cluster is a collection of data objects that are similar to one another within the same cluster and are dissimilar to the objects in other clusters. Since K-means is widely used for general clustering, its performance is a critical point. This performance depends highly on initial cluster centers since...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Variants of Wormhole Attack in MANET and their Counter Measurements

    Mobile ad hoc network is a network that is organized by itself, adaptive in nature and on an ad hoc basis. As a results of decentralized infrastructure several security problems are arise and malicious activity performed by offender. MANET routing disrupts if participating node do not perform its intended function...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Implementation of Energy Aware Routing Protocol for Mobile Ad Hoc Networks

    In this paper, the authors proposes an Energy Aware Routing Protocol (E-AODV) based on AODV which incorporates local routing of intermediate nodes to increase the lifetime of the network .NS2 (Version 2.34) simulator is used for the simulation of new protocol and AODV protocol for the performance parameters packet delivery...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Clustering with Multi-view Point Based Similarity Measure

    All clustering methods have to assume some cluster relationship among the data objects that they are applied on. Similarity between a pair of objects can be defined either explicitly or implicitly. In this paper, the authors introduce a novel multi-viewpoint based similarity measure and two related clustering methods. The major...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2013

    Ensure Software Growth a Survey

    Technology and its applications are arousing day-by-day fashion, in the people daily life they are several times acted with different kinds of computer and its application that shows consequences of technology in their daily life. To design and spread an application that helps one on different utilities are made possible...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Job Scheduling Algorithm for Computational Grid in Grid Computing Environment

    Grid computing has emerged as a distributed methodology that coordinates the resources that are spread in the heterogeneous distributed environment. Grid Computing allow sharing of resources from heterogeneous and distributed locations. Grid Computing has wide variety of application areas including science, medical and research areas. But there are also some...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Database Security: Threats and Challenges

    Data is the most valuable asset in today's world as it is used in day-to-day life from a single individual to large organizations. To make the retrieval and maintenance of data easy and efficient it is stored in a database. Databases are a favorite target for attackers because of the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Online Multiplex Using Cloud Content Delivery Network

    The online multiplex offers a Real Movie Theatre kind of experience online using cloud based content delivery networks and offers this technological platform to Regional movie makers to release their movies worldwide online in a theatre like atmosphere. It will be providing a cloud based platform for streaming high quality...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Data Compression on Columnar-Database Using Hybrid Approach (Huffman and Lempel-Ziv Welch Algorithm)

    Columnar Oriented Database is an enhance approach to service to service the needs of Business Intelligence. A Columnar Oriented Database Management system that stores content by columns rather than the row. This type of data differs from traditional database with regards to performance, storage requirements and easy to modification of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Performance Analysis of Cloud Computing under Non Homogeneous Conditions

    Cloud computing is an evolutionary technology that differs from traditional parallel computing, distributed computing and grid computing as it provides solutions to many problems related to web based resource allocation by efficient and economical way of pay-per-use services. With tremendous increase in cloud services utilization, the allocation of resources to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Protection of Databases by Using Policy Based Mechanism: A Survey

    In many organizations Database Security plays an important issue for their safe & secure environment. Performance of the organization or any enterprise should depends on Database Security i.e. Insider attack detection. In this paper mainly insider attack detection technique is studied which is based on user policy. Each user has...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Exploring Cloud Computing and Identification of its Security Issues

    Cloud computing is now a new emerging catchphrase which provide services to the customer over the internet. Now it is the future of the internet where users can pay according to usage. It is one of the productive grounds which are attracting many global investments. Cloud computing is providing a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2013

    Cloud Computing: Taxonomy and Architecture

    Cloud computing, the long-held dream of computing as a utility, has finally came to realization. Cloud computing has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Developers with innovative...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Software as a Service: Cost Effective Strategic Model to Manage Cloud Services

    Cloud Computing technology has redefined the utility of modern web-based software. It has amazingly improved data accessibility and has also effectively reduced web-based software development cost. These flaws are evident in the strategies on which they have been designed, developed and deployed. Cloud computing supports a web infrastructure where computing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2013

    A Review on Web Application Security Vulnerabilities

    Web applications are important, common distributed systems whose current security relies primarily on server-side mechanisms. Web applications provide end users with client access to server functionality through a set of Web pages. These pages often contain script code to be executed dynamically within the client Web browser. Most Web applications...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Hierarchical Approach of Discriminative Common Vectors for Bio Metric Security

    Face recognition research still facing challenges in some specific areas such as identification and illumination changes. Although lots of methods have been proposed to solve such problems and have given good results, the difficulties still remain. The matching performance in current linear face recognition systems is relatively poor compared to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Data Mining: A Prediction for Performance Improvement in Online Learning Systems

    Data mining in education slowly evolves from the need of simple discovery of frequent patterns and regularities in large data sets toward interactive, user-oriented, on-demand decision supporting. In this paper, the authors show how using data mining techniques can help discovering pedagogically relevant knowledge contained in databases obtained from Web-based...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Enhanced Approach for Reliable & Secure Wireless Sensor Network

    Modern wireless sensor networks require specific and high degree of security due to their limitation and versatility tasks. The absence of permanent infrastructure makes these networks suitable for many civilian applications. But their limited computational ability and battery resources restrictions makes them vulnerable to many kinds of attacks. This paper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Review of Diffie-Hellman Key Exchange

    Deffie-hellman key exchange algorithm is an asymmetric key cryptosystem. It is designed for only exchanging the secret keys. The purpose of this algorithm is to enable the two entities, who want to communicate, to jointly establish the shared secret key, also called session key, over an insecure communication channel, example...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Efficient Cloud Mining Using RBAC (Role Based Access Control) Concept

    Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. In this dissertation the authors main objective...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    A Survey on Association Rule Mining Using Apriori Based Algorithm and Hash Based Methods

    Association rule mining is the most important technique in the field of data mining. The main task of association rule mining is to mine association rules by using minimum support thresholds decided by the user, to find the frequent patterns. Above all, most important is research on increment association rules...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Introduction to Query Processing and Optimization

    Query processing is the scientific art of obtaining the desired information from a database system in a predictable and reliable fashion. Database systems must be able to respond to requests for information from the user i.e. process queries. In large database systems, which may be running on un-predictable and volatile...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Monitoring and Controlling Multi Level SLA in Cloud Environment Using Agent

    Cloud Computing is mainly used as utility where cloud user hires services on pay-per usage mode. The understanding between user and service provider is through Service Level Agreement (SLA) where all the terms and conditions are mentioned. The service provider is responsible for providing Quality of Service (QoS) as per...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Critical Evaluation of Cloud Computing for Transactional and Analytical Databases

    Data Management applications are the potential candidate to extract the benefit of the cloud. Cloud computing attributes such as pay per use, elasticity in self-provisioning through software, scalable services, virtualized physical resources are very attractive to the business (especially SMEs and Start Ups). Using the database over the cloud has...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2013

    Secure Reference Based Data Aggregation Protocol for Wireless Sensor Networks

    In many sensor applications, the data has been collected from the individual nodes and it is aggregated at a base station or host computer. To reduce the energy consumption, many systems also can perform in-network aggregation of sensor data at the intermediate nodes enroute to the base station. The most...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Investigate and Improving Routing Mobility Based on Random Way Point Mobility Model Using FTP Traffic in MANET

    A Mobile Ad hoc NETwork (MANET) is a set of wireless mobile nodes forming a dynamic autonomous network. MANET is that which allows the mobile nodes to communicate with each other via a wireless medium without any infrastructure i.e., forms a temporary network. The main classes of MANET routing protocols...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Data Security: Cloud Data Storage in Organization

    Cloud computing is the use of computing resources, including both hardware and software, that are made available over the Internet by a subscription-based service provider. Because cloud computing is Internet-based, it offers several advantages over more traditional access to a company's data and software. Cloud computing delivers the potential for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Logical Data Model for Cloud Computing

    Cloud computing creates virtual Computing Environment in typical network computing pattern for sharing data and computation. Data is huge and multiple data center need collaboration in deployment and implementation of data intensive application because it is inevitable to transmit data across the different data centers. This Paper introduce cloud computing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Study on Information Retrieval Proficiencies for Mining the Network

    Internet has issued as one of the spiritualist for acquiring information regardless of the query submitted by search engines. There exist several commercial web search engines to capitalize the demand of such information learning task. Such programs crawl the web and retrieves twisty information in much faster way. In-spite the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Review of Peer to Peer Grid Load Balancing Model Based on Ant Colony Optimization with Resource Management

    Grid Systems allow applications to assemble and use collections of resources on an as-needed basis, without regard to its physical location. Grid middleware and other software architecture that manage resources have to locate and allocate resources according to application requirements. They also have to manage other activities like authentication and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Review on Security Issues and Attacks in Wireless Sensor Networks

    Wireless sensor networks consist of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. Due to the reason that the sensor nodes are highly distributed, there is a need of security in the network. Security is an important issue nowadays in almost every network....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Survey on Privacy Issues and Security Attacks in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) is considered as a promising solution for offering self-healing, self-configuring capabilities, low-cost access in broadband services. Wireless mesh networks continue to receive significant interest in an existing new technology that has application in defense, metro-area Internet access, and transient networks (e.g.: disaster recovery and conventions). In...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Various Techniques Involved in Detection and Controlling IP Spoofing

    The Internet protocol suite is commonly known as TCP/IP protocol suite, because of its two important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP). IP spoofing, also known as IP address forgery is a technique in which an attacker attacks on a host by masquerading as a trusted host....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    QoS-Aware Approaches to Real-Time Task Scheduling on Heterogeneous Clusters

    A QoS guarantee on heterogeneous clusters has become very important need in today's real time system. Many of real time applications have different Quality of Service (QoS) requirements including reliability, security, data accuracy, data quality and so on. This paper gives study Self-Adaptive QoS-Aware (SAQA) algorithm with QoS requirement of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Confidential and Reliable Data Storage in WSN

    The authors consider two-tiered sensor networks, where data storage node serves as an intermediate tier between sensors and a sink for storing data and processing queries. This architecture has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Routing Issues in Wireless Sensor Networks: A Survey

    Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communications capabilities. Many routing, power management, and data dissemination protocols have been specifically designed for WSNs where energy awareness is an essential design issue. The focus, however, has been given to the routing protocols which might differ...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Proactive and Reactive Routing Protocols in Multihop Mobile Ad Hoc Network

    Mobile Ad hoc NETwork (MANET) allows portable devices to establish communication independent of a central infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes. Therefore, routing in MANET is a critical task due to highly dynamic environment. Efficient...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    AODV & DSR Reactive Routing Protocols with a Comparative Study

    For any kind of network i.e. wired or wireless, routing is an important function. In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, limited bandwidth, battery constraints, and broadcast nature....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Green Cloud Computing: A Virtualized Security Framework for Green Cloud Computing

    In the IT industry's there is forcefully demand of the technology known as Cloud computing. It is an emerging trend in computing. There are huge data centers are used in big industries. Environmentally, these systems can produce e-wastes, harmful gases with heat. This paper focuses on security in such a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Interference Cancellation in Heterocell Configuration Using Channel Allocation Mechanism

    Femtocell networks, consisting of a conventional macro cellular deployment and overlaying femtocells, forming a hierarchical cell structure, constitute an attractive solution to improving the macrocell capacity and coverage. This paper treats the uplink interference problem in Orthogonal Frequency-Division Multiple-Access (OFDMA)-based femtocell networks with partial cochannel deployment. First propose an inter-tier...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Efficient Interactive Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

    Cloud computing is an online computing within which info is keep and accessed employing a remote third party server known as cloud, comparatively than being keep regionally on the authors' mechanism and also the resources, software's, and knowledge are provided to users on demand. In cloud computing background knowledge protection...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Enhanced Amalgam Encryption Approach for Grid Security: A Review

    Grid computing is about several processors distributed globally and sharing the computational resources to solve various problems. Grid computing has become an increasingly important research topic within computer science as in academic educational purpose and industrial research to government sector. Grid computing is concerned how to share and coordinated use...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    A Survey on IP Fast Rerouting Schemes Using Backup Topology

    This paper describes the different IP fast rerouting schemes using backup topology. This paper describes the scheme which comes under complete IPFRR frame work as according to IETF (Internet Engineering Task Force).The first section gives the basic idea about the IPFRR used for the rerouting purpose. The second section deals...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Analysis of Different Security Issues and Attacks in Distributed System A-Review

    Now-a-days so many people are connected to the internet to access the different resources of their use and different companies are using distributed environment to provide their services to the customers. All these activities affect the economy of the country or world. So there is a need of more secure...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Intrusion Detection and Prevention in Wireless Adhoc Networks

    Intrusion detection over the last few years, assumed top importance in the world of network security and as in the case of wireless ad hoc networks also. These are the networks that do not have an underlying infrastructure, network topology which are constantly changing. Because of increased vulnerabilities, Threats and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)