International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 281-320 of 1896 results

  • White Papers // Feb 2014

    High-performance Execution of Scientific Multi-Physics Coupled Applications in a Private Cloud

    Scientists are increasingly interested in simulating complex chemical systems and physical phenomenon by coupling distinct individual physical models of different phenomena in order to provide an accurate simulation of the system under study. In computational terms, coupled model applications are distributed applications, in which the components of the application are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    A Review on Techniques for Horizontal Aggregations in SQL to Prepare Data Sets for Data Mining

    Preparing a data set for analysis is the most time consuming task in a data mining project, which requires many complex SQL queries, joining tables and aggregated columns. Existing SQL aggregations have limitations to prepare data sets as they return one column per aggregated group. Manual effort is required to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Implementation of Image Segmentation Using Window Based Method Through K-Means Algorithm

    The key step of segmentation in previous to the stage other operations like depiction, appreciation, prospect thoughtful, indexing. Image segmentation is the classification of all the same regions in the image. This is proficient by segmenting a picture into subsets and presently handover the entity pixels to module. Now the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Comparative Study of Open Nebula, Eucalyptus, Open Stack and Cloud Stack

    Presently, many cloud Infrastructure as a Service (IaaS) platforms exist. Cloud consumer, developer and cloud providers needs to make decision about which platform is well suited for them. Since, last decades open-source technology help people who do not wish to use commercial infrastructure for cloud. Among them different open-source platform...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    A Survey on Virtual Machine Scheduling in Cloud Environment

    In cloud environment multiple cloud users can demand for a number of cloud services simultaneously. So there must be a provision that all resources are made available to requesting user in efficient manner to satisfy their need. To get the maximum benefit from cloud services, developers must design mechanisms that...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    A Study over Problems and Approaches of Data Cleansing/Cleaning

    Data cleaning is mostly required when integrating heterogeneous (similar) data sources and should be addressed together with schema-related data transformations. This paper identifies the data quality problems that are inscribed by data cleaning and provides an overview of the main approaches as a solution. Also in data warehousing, the data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    A Survey Report on Route Allocation for Guaranteed Data Delivery in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANET) carried out multi-hop communication in an environment with no fixed infrastructure, by means of mobile nodes and changing network topology. In the earlier period, hundreds of new routing protocols were designed for the various scenarios of MANET. Most existing ad hoc routing protocols are liable...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Effective Scheduling Algorithm for Load balancing (SALB) using Ant Colony Optimization in Cloud Computing

    In today's environment, the day to day business operations of organizations heavily rely on the automated processes from enterprise IT infrastructures. The cloud computing is an internet based concept which are dynamically scalable in nature and provide the virtualized resources, which are provided as service over the internet. Load balancing...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Load Balancing in Cloud Computing

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and web services. A cloud consists of several elements such as clients, datacenter and distributed servers. It includes fault tolerance, high availability, scalability, flexibility, reduced overhead for users, reduced cost of ownership, on demand services etc. Central to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Distributed Cloud Multi Tier Intrusion Detection System

    Cloud computing refers to the deliverance of computing resources over the Internet. In its place of holding data in the users own hard drive or updating applications for their requirements, they utilize a service over the Internet, at a different location, to accumulate their data or utilize its applications. By...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Exploring Cloud Computing for Naive

    Cloud computing is a convergence of technologies and trends that are making IT infrastructures and applications more dynamic, more modular, and more consumable. It lets organizations ramp up new services and reallocate computing resources rapidly, based on business needs. It gives users self-service access to computing resources, while maintaining appropriate...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    An Emerging Security Issues in Cloud Computing

    Now-a-days everybody ask about cloud computing. Cloud technology is an emerging technology and many organization uses this technology for operating many crucial work. Here the authors are investigating the cloud security management service. Cloud gives relevant facility to access the storage on network from anywhere with variety of security. In...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Analysis of Public Cloud Load Balancing using Partitioning Method and Game Theory

    Cloud computing is a provision of providing networked, online, on-demand services pay per use basis. Several issues as scalability, security, performance etc. are discussed so far by many researchers for the cloud computing. Cloud partitioning is an optimal approach for public cloud. In public cloud environment various nodes are used...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Impact of Technology Scaling on Leakage Power in CMOS Circuit Design

    Leakage power dissipation has become major portion of total power consumption in the integrated device and is expected to grow exponentially in the next decade as per International Technology Roadmap for Semiconductors (ITRS). This directly affects the battery operated devices as it has long idle times. Thus by scaling down...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Review on Existing Load Balancing Techniques of Cloud Computing

    Cloud computing is an emerging paradigm of the computing world which aims to share data over a single platform. Since 2007, cloud computing has emerged as a buzzwords in ICT industry. Two players in cloud computing environments, cloud providers and cloud users, pursue different goals; providers want to maximize revenue...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Energy Efficient Cluster Head Selection for Data Aggregation in Wireless Sensor Networks

    Data gathering is a common but critical operation in many applications of wireless sensor networks. However, a WSN is a power constrained system, since nodes run on limited power batteries which shorten its lifespan. Clustering is an effective topology control approach in wireless sensor networks, which can increase network scalability...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    A Novel Approach for Web Usage Mining with Clicking Pattern in Grid Computing Environment

    An important task of web usage mining is to analyze users browsing sequences. It can help the web administrators or designers to improve the web structure or tune the performance of the web servers. Web mining can be defined to find out the useful information form www. The analysis of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Midori-A Cloud Based Operating System

    Cloud computing is the use of computing resources that are delivered as a service over internet. Cloud computing allows consumers and business to use application without installation and access their personal files at any computer without internet access. Microsoft Corporation is planning to introduce a new cloud based operating system...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Optimal Component Software Development based on Meta Data Repositories

    Component reuse process is always play important role in software component reuse which uses the existing component in software. The components that are identified as reusable are stored in a repository so that other teams can use them to serve in to get quality product. In this paper, a component...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Automated Installation of Multiple Linux Operating System Using Fast Reboot Technology

    Time has become an important aspect of life for every individual on this planet. Machines that take a lot of time to complete, proves to be redundant in the society and people would generally not prefer to use that machine in time critical aspect. It's a true fact that each...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Evaluation of Student Classification Based On Decision Tree

    In this paper the authors put forward a simple approach for categorizing student data using decision tree based approach. In this discussion one can identify several different alternatives used for categorization followed by simple architecture. In this paper, a database for five subjects' marks of 100 students for each four...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2014

    Metastability in CMOS Transmission Gate Base Interface Circuits

    The authors' paper proposed metastability measurement system in which asynchronous data input and sampling clock frequencies trigger metastability, they demonstrate that dynamic memory cells present an anomalous behavior referred to as metastable operation with characteristics similar to those of static latches. During every cycle, the relative time of the two...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Security and Reliability Analysis of Routing Protocols Under Low Rate Tcp-Target Dos Attack Over Manets

    A Mobile Ad hoc NETwork (MANET) is a dynamic multi-hop wireless network that is established by a group of mobile stations without necessarily using pre-existing infrastructure or centralized administration. It can be easily deployed which makes it very attractive for civilian and military applications. Because of its decentralized property, these...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Security Perspective for Agent Based Computing

    Agents were developed as representatives of a user, which a program could \"Spawn\" and delegate to perform a task independently of the program within a network. Security is an important issue for deployment of applications based on software agent technology. However, not all applications require the same set of countermeasures,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    3d Password - A Secure Tool

    To protect the authors' system from intrusion is to use alphanumeric username as well as password. Hacking is very common now days. It becomes very easy for hackers to hack computer system. When user will type password the hacker can trace the number of keystrokes which the user do. By...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Analysis of Security Threats Over TLS/SSL

    Secure Socket Layer (SSL) also known as transport layer security is de facto standard for web security. It provide confidentiality and integrity of information in transit across the public networks using their powerful cipher suites but still it contains some loopholes or flaws in its foundation. In this paper the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Anomaly-Based Intrusion Detection Systems Using Neural Network

    To improve network security different steps has been taken as size and importance of the network has increases day by day. Then chances of a network attacks increases Network is mainly attacked by some intrusions that are identified by network intrusion detection system. These intrusions are mainly present in data...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Sensitive Data Protection Using Bio-Metrics

    With the developing digital era, the use of internet applications has increased a lot. With the increase in the internet usage, the need of security has increased because of the increase in the hacking and phishing procedures. Moreover, every user has some sensitive and confidential data, which needs more security....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Providing Security to Web Applications in Anonymizing Networks Using Nymble

    With web applications remaining a popular target for attackers, ensuring security in web application has become very crucial especially when the attacker is trying to access the applications through anonymizing network. Tor is a well known and most commonly used anonymizing network. An anonymizing network is a network in which...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Encryption Using Elliptic Curve Cryptography Using Java as Implementation Tool

    Cryptography is the technique of hiding a message in some unintelligible format so that the message lies hidden in plain sight of an unintended person. The techniques of cryptography are centuries old. With technological advancement, techniques have evolved significantly. Public key cryptography offers a wide range of security over the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Performance Enhancement of K-Means Clustering Algorithms for High Dimensional Data sets

    Data mining has been defined as \"The nontrivial extraction of implicit, previously unknown, and potentially useful information from data\". Clustering is the automated search for group of related observations in a data set. The K-means method is one of the most commonly used clustering techniques for a variety of applications....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Improving Fuzzy Network Profiling for Intrusion Detection System in Cognitive Radio Network

    A cognitive radio network is an intelligent system that can be changed vigorously. It detects the available channel in the radio spectrum automatically. According to that it can changes the transmission parameter to allow concurrent communication in a given spectrum. The operational aspects of cognitive radio are being explored and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Cloud Computing Security Algorithm

    In this paper the authors elucidate a security model that can be implemented for a cloud computing infrastructure, which can ensure security at top level of architecture while maintaining the integrity of the system. The data encrypted by the proposed algorithm will only allow data file to open in the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    A Review on Privacy Preserving in Location Proof System

    Privacy is the most considered factor for the people and is the most important feature the developers to keep in mind while developing the applications. Over the last few decades many research focus on the location privacy but still contradiction and challenges in conquer these risk. The techniques and methodology...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Geometrical Normalization and Its Effects on Facial Recognition

    It is obvious that face recognition performance is greatly affected by the face cut. There are major databases for the face recognition evaluation, which use their own cut models. Therefore, there is no standard method for the face cut. There are many face recognition researches, which focus on feature extraction,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Message Security Using Armstrong Numbers and Authentication Using Colors

    The people are living in the information age. Hence data security plays an important role. Hackers are becoming more active now-a-days. Hence it is increasingly becoming more important to protect their data. There are some techniques used to make data transmission with protection. Cryptography is one of them. This paper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    Fingerprint Identification Using Fractal Geometry

    Fingerprints have been used for personal identification for long time. The fingerprints of any individual are unique and do not change throughout their life. The proposal research is using fractal geometry as a tool for fingerprint identification. The system has two main phases: training phase and test phase. For each...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    An Efficient Anomaly Detection System Using Featured Histogram and Fuzzy Rule Mining

    Anomaly detection is a concept widely applied to numerous domains. A number of techniques are used for finding the anomalous attacks. As the network traffic increases the people need an efficient system to monitor packet analysis of network flow data. Due to this frequent item set mining is foremost problem...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    A Robust Data Preserving Technique by K-Anonymity and Hiding Association Rules

    With the development of data mining technology, an increasing number of data can be mined out to reveal some potential information about user. While this will lead to a severe problem, which is users' privacy may be violated easily. The goal of privacy preserving is to mine the potential valuable...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2014

    The Effect of Varying Resolution on the Recognition Performance of a Palm Vein Recognition System

    Palm vein recognition is one of the most desirable biometric identification techniques. It is also an important area in image processing and pattern recognition field. Several researches have been carried out on palm vein which has led to the proposition of different techniques. This paper investigates the effect of varying...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    An Overview and Study of Security Issues & Challenges in Cloud Computing

    Cloud computing is a promising technology to facilitate development of large-scale, on-demand, flexible computing infrastructures. But without security embedded into innovative technology that supports cloud computing, businesses are setting themselves up for a fall. The trend of frequently adopting this technology by the organizations automatically introduced new risk on top...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Power Aware Routing Protocols in Mobile Adhoc Networks-Survey

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network composed of mobile nodes without any fixed infrastructure. A very important and necessary issue for mobile ad-hoc networks is to find the route between source and destination that is a major technical challenge due to the dynamic topology of the network....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Complete Study on Energy Efficient Techniques for Mobile Adhoc Networks

    The process of wireless networks in the applications like transferring video files is subjected to dual constraints. Both minimization of power and other QoS requirements like delay, throughputs are have to be take care properly. Mobile Ad Hoc Networks are more perceptive to these issues where each mobile device is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Comparative Study of Routing Protocols in Wireless Sensor Network

    Wireless Sensor Networks consist of small nodes with sensing and computation, communication capabilities. Wireless network are highly dependent on specific application and are constrained by energy, storage capacity and power. To increase the lifetime of networks, energy awareness is essential consideration if the authors analyze routing protocols. Routing protocols of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Study on Various Data Mining Approaches of Association Rules

    Data mining is considered to deal with huge amounts of data which are kept in the database, to locate required information and facts. Innovation of association rules among the huge number of item sets is observed as a significant feature of data mining. The always growing demand of finding pattern...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Review on Security Issues of Routing Protocols in Mobile Ad-Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Systematic Software Architecture Based Testing Approach A Case Study

    Software Architecture can be used as reference model for code conformance testing and to check if implementation fulfills to its specification at the SA level. Previous work have shown that how suitable test can be "Selected" from SA specification and how they may "Refined" into concrete tests executable at the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Performance Comparison of Routing Protocols in MANETs

    A Mobile Ad-Hoc NETwork [MANETs] is a collection of wireless mobile nodes forming a temporary network without any centralized access point, infrastructure, or centralized administration. To establish a data transmission between two nodes, typically multiple hopes are required due to the limited transmission range. In a MANET network topology can...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Classification of QoS Routing for MANET -A Summary

    MANETs is a special kind of wireless networks. It is a collection of mobile node without having aid of established infrastructure. A MANET is an autonomous system of mobile nodes. The system may operate in isolation, or may have gateways to and interface with a fixed network. MANET includes easy...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    SQL and NoSQL Databases

    NoSQL (Not only SQL) is a database used to store large amounts of data. NoSQL databases are distributed, non-relational, open source and are horizontally scalable (in linear way). NoSQL does not follow property of ACID as the authors follow in SQL. In this research paper, they are surveying about NoSQL,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Comparison of Processor Scheduling Algorithms Using Genetic Approach

    Operating system efficiency is affected by several factors. Scheduling of CPU is one of the critical factors that affects the efficiency. In case of process scheduling the authors allocate processes to processor in a specified sequence so that efficiency of the system is maximized. In this paper genetic algorithm is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Development of Data Acquisition and Analysis System on Virtex 5

    This paper presents the development of Virtex5, Field Programmable Gate Array (FPGA) FPGA based data acquisition and analysis system. The system consists of data sampling and acquisition followed by Fast Fourier Transform Processor. The output Transformed data is read on host PC via RS232 for plotting and analysis. 'C' and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2010

    VHDL Implementation of a MIPS RISC Processor

    The implementation of 32 bit RISC processor with Microprocessor without Interlocked Pipeline Stages (MIPS) is presented. It was implemented in VHDL so as to reduce the instruction set present in the programmable memory. As the result the processor will contain the necessary logics for the implementation that requires fewer gates...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    A Survey of Ant Based Routing Algorithms for Mobile Ad-Hoc Network

    Routing is an important issue in a mobile ad hoc network because it is infrastructureless. In a mobile ad hoc network a node acts both as host and router. Agents play an important role in routing the packets in the mobile ad hoc network. They improve the latency of the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols

    Intrusion Detection System (IDS) has been used as a vital instrument in defending the network from this malicious or abnormal activity. It is still desirable to know what intrusions have happened or are happening, so that the authors can understand the security threats and risks and thus be better prepared...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Paging in Mobile Terminals Using Mobility Management in Fixed and Mobile Networks

    Terminal Mobility (TM) and Personal Mobility (PM) should work together to provide mobility to mobile users in fixed and mobile networks. TM supports movement between different areas with in the same region. In mobility management, an MT (Mobile Terminal) updates its location when it changes its location and all calls...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Investigating the Web Application of AOP Using Aspect.Net Framework

    Aspect-Oriented Programming (AOP) Methodology has been investigated in the design and implementation of a web application: online music Store. The Aspect.NET Framework is implemented as an add-in to visual studio.NET. That means, the user can use Aspect.NET in combination to the integration development environment provided by Visual Studio.NET and its...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    BHAPSC: A New Black Hole Attack Prevention System in Clustered MANET

    Black hole attack is one kind of routing disturbing attacks and can bring great damage to all clusters of a MANET. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, and infrastructure-less property. As a result, an efficient algorithm to detect...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Secure Communications Over Wireless Broadcast Networks Using Shortest Seek First Algorithm

    Wireless telecommunications is the transfer of information between two or more points that are not physically connected. Distances can be short, such as a few meters for television remote control, or as far as thousands or even millions of kilometers for deep-space radio communications. In this paper Wireless Broadcast Network...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm

    In asymmetric key cryptography, also called Public Key cryptography, two different keys (which forms a key pair) are used. One key is used for encryption & only the other corresponding key must be used for decryption. No other key can decrypt the message - not even the original (i.e. the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Analysis of Cooperative Black Hole Attack Using Dynamic Source Protocol

    A Mobile Ad hoc NETworks (MANET) is a collection of mobile nodes that can communicate with each other in absence of any fixed based-station infrastructure and centralized management over multi hop links. MANET has no fixed topology as the nodes are moving constantly form one place to another place. Mobile...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Efficient Communication and Allocation of Mobile Robots in Rescue Systems

    Several real life scenarios, such as fire fighting, search and rescue, surveillance, etc., need multiple mobile robot coordination and task allocation. Such scenarios generally include distinct regions of interest that require the attention of some robots. Multi-robot systems require efficient and accurate planning in order to perform mission-critical tasks. However,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Aggregations in SQL Using Data Sets for Data Mining Analysis

    Preparing a data set for analysis is generally the most time consuming task in a data mining project, requiring many complex SQL queries, joining tables and aggregating columns. Existing SQL aggregations have limitations to prepare data sets because they return one column per aggregated group. In general, a significant manual...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Study of Attack Prevention Methods for DDOS Attacks in Manets

    Ad-hoc network is the network comprised of wireless nodes. It is basically infrastructure less network which is self configured i.e. the connections are established without any centralized administration. MANET has no clear line of defense so it is accessible to both legitimate network users and malicious attackers. In the presence...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Developing a Novel and Effective Clone Detection Using Data Mining Technique

    A code clone is a code portion that is identical or similar to another in a source files. These code clones are called simple clones. And higher level similarities are called structural clones. Since, several techniques have been proposed to detect this simple clone, still they occur in large software...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    Performance Analysis of WDM Link Using Different DCF Techniques

    Fiber-optic dispersion and its effect on optical transmission system are analyzed. The most commonly used Dispersion Compensation Fiber (DCF) technology is studied in this paper. Three schemes (pre-compensation, post-compensation, mix-compensation of dispersion compensation) of dispersion compensation with DCF are proposed. In this paper, the authors propose three DCF compensation scheme,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Uncertain Data Algorithms and Applications

    In recent years, a number of indirect data collection methodologies have led to the proliferation of uncertain data. Such databases are much more complex because of the additional challenges of representing the probabilistic information. In this paper, the authors provide uncertain data mining and management applications. They will explore the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Reactive Address Allocation and Duplicate Address Detection Techniques in MANET

    A Mobile Ad hoc NETwork (MANET) consists of a set of identical mobile nodes communicating with each other via wireless links. The network's topology may change rapidly and unpredictably. Typically, dynamic configuration in a wired network is accomplished by using the Dynamic Host Configuration Protocol (DHCP). In mobile ad hoc...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Signature Verification Using Morphological Features Based on Artificial Neural Network

    For identification of a particular human being signatures prove to be an important biometric. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However, human signatures can be handled as an image and recognized using computer vision...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Comparative Analysis & Evaluation of Euclidean Distance Function and Manhattan Distance Function Using K-Means Algorithm

    Clustering is division of data into groups of similar objects. Each group, called a cluster, consists of objects which are similar between themselves and different as compared to objects of the other groups. In cluster, analysis is the organization of a collection of patterns into cluster based on similarity. This...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Forensics Computing-Technology to Combat Cybercrime

    The advent of technological revolution in communications and information exchange has created sophisticated form of crime, cyber crime. Cybercrimes have more severe economic impacts than many conventional crimes and like any other crime, these cyber crimes should be brought to justice. The process of gathering electronic evidence of a cyber...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Energy Efficient Clustered Georouting in Ad-Hoc Networks

    In wireless ad-hoc networks, there are several characteristics different with wired networks. The differences are frequently changing of network topology, limited resources like bandwidth and energy and so on. In this network, the mobile nodes become important composer in the ad-hoc networks and get a role of host or router....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Comparative Analysis of Routing in MANET

    Mobile ad-hoc network is one of the most encouraging research areas. However, due to high mobility involved, routing becomes of the most critical factor and need to be improved in terms of communication. Being a stand alone network, infrastructure less that includes collection of mobile devices communicating over wireless links...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Cluster Based Approach for Selection of Materialized Views

    A Data Warehouse (DW) is a database used for reporting and decision support services of an organization. A thousand of queries are fired in every second to actual database or data warehouse and replying each query in quick time with accuracy is a great concern. Queries to DW are critical...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    A Simple Taxonomy Survey of Firewall Policies

    Any data passes through an internal network to an external network there are lot of vulnerable attacks are possible to hack or damage the data. One type of network attack is unauthorised penetration in to network due to openness of networks. It is possible to hack the data and resources...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Social Dimension Extraction for Scalable Learning of Collective Behaviour

    Online social networks play an important role in everyday life for many people. Social media has reshaped the way in which people interact with each other. The rapid development of participatory web and social networking sites like YouTube, Twitter, and Face book also brings about many data mining opportunities and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Computer Science and Software Engineering: A Change in Archetype

    A set of characteristics that increasingly distinguish today's complex software systems from "Traditional" ones. The authors identify and analyze these by several examples in different areas show that these characteristics are not limited to a few application domains but are widespread. These characteristics are likely to impact dramatically the way...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Survey on MANET Routing Protocol and Proposed Multipath Extension in AODV

    MANET is a self-organized, decentralized wireless network with mobility as core functionality. Routing is key in to enhance MANET performance. Routing in mobile ad hoc networks and some fixed wireless networks use multiple-hop routing. Routing protocols for this kind of wireless network should be able to maintain paths to other...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Energy Optimization Routing Techniques in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is a wireless network consists of base station and hundreds to thousands of small sensor nodes with sensing, computation, and wireless communications capabilities. Each sensor collects data from the monitored area and routes data back to the base station or sink. These sensor nodes have some...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2012

    Palmprint Recognition System Using Enhanced Eigenpalms Features

    This paper is based on the field of biometrics with concentration on Palmprint as Secured biometric template for Computer Authentication. The authors propose a Palmprint Recognition method based on an enhanced EigenPalm Feature using Gaussian Pyramid decomposition. Their method introduces Gaussian Decomposition of images to test the effects of resolution...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)