International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 281-320 of 2341 results

  • White Papers // Oct 2014

    An Integrated Mining Framework using Dynamic Query Forms

    Modern applications are based on huge very huge data. Working with such a vast data requires more efforts in forming queries for analyzing the data, this being the major issue in the existing systems implemented based on static predefined queries in the present day. Even though there are fixed number...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Descriptive Data Mining for Educational Environment

    In recent years, there has been increasing interest in the use of data mining to investigate scientific questions within educational environment. Such type of investigation comes under Educational Data Mining (EDM). Educational Data Mining (EDM) focuses around the e development of methods for making discoveries within the unique kinds of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    A Survey on Cloud Mining with Privacy Protection

    The integration of data mining techniques with cloud computing allows the users to extract the useful information from a data warehouse that reduces the cost of infrastructure and storage. But security and privacy of data is a big concern in data mining on cloud. In current cloud architecture, a client...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Personal Big Data Usage and Controls - Review

    Personal big data plays a vital role in today's digital world. There are many opportunities and challenges that big data is providing. The need to protect personal big data has escalated alongside the rise of information age and mobile usage. The risk is quite high as typical user online today...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Comparison of DSR and OLSR Routing Protocols in MANET

    Mobile Ad hoc Network (MANET) is a collection of mobile nodes that are arbitrarily located so that the interconnections between nodes are dynamically changing. MANET is the special type of wireless network, where mobile nodes are connected through wireless interfaces forming a temporary network. They don't need fixed infrastructure. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Privacy-Process Public Auditing & Documents Purity for Secure Cloud Storage

    Using cloud storage, users can remotely store their documents and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local documents storage and maintenance. However, the fact that users no longer have physical possession of the outsourced documents makes...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Object Detection and Extraction of Moving Human Silhouettes in Video Surveillance System

    Compared to the past decades, the growth in the use of video cameras has rapidly changed. Also, the use of video cameras specifically for surveillance has seen a rapid increase on a day-by-day basis. Video surveillance has become a budding approach for prevention of crimes as it facilitates the ability...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    QoS Analysis and Enhancement in OFDM Systems

    The Orthogonal Frequency Division Multiplexing (OFDM) technique is a next generation wave technology in wireless communication. The emergence of OFDM and its manifold pros has led to the creation of various wireless standards and made it possible to transmit the larger digital data over radio waves. Based on OFDM is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Review of Ad-Hoc on Demand Distance Vector and Optimized Link State Routing Protocol for Mobile Ad-Hoc Network

    Ad hoc network is a collection of mobile nodes without the need of central access point. This paper provides the detail explanation of routing, its types and working of MANET routing protocols that are proactive (Optimized Link State Routing (OLSR)), Reactive (Ad hoc On-demand Distance Vector (AODV)) and hybrid (Zone...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Network Security Using Double Symmetric Key: Algorithm SKG 2.3

    In this paper, named algorithm SKG 2.3, the author has used double symmetric key for network security. For encryption and decryption of any text file, the symmetric keys are used at four stages: shifting N1 leftmost characters to rightmost in a circular queue or vice versa, converting each of N...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Bitcoin: A Step Ahead in Technology

    Every now and then the authors come across one or the other technology, one surpassing the other. Bitcoin is a new revolution in the banking sector which has helped in creating an E wallet which will be carrying a currency that can be used worldwide. Though this has not been...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    A Novel System to Enhance Cloud Data Security

    Cloud computing, even though known to have a malicious behavior, is an environment which enables convenient, efficient, and ready to use on demand network access to a pool of shared data resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud is basically...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Towards Mitigation of Phishing: The State of Web Client Anti-phishing Technologies

    To adapt to the fast growing and evolving nature of phishing attacks, new web client based anti-phishing solutions are being adopted while old ones improved over the years. Recently introduced multifactor authentication methods are becoming popular in e-commerce in mitigating credentials hacking and man-in-the-middle attacks. Extended validation SSL certificate was...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Auditing of Cloud Logs by Forensic-based SOA Framework

    Cloud computing log digital investigations relate to the investigation of a potential crime using the digital forensic evidence from a Virtual Machine (VM) host operating system using the hypervisor event logs. In cloud digital log forensics, work on the forensic reconstruction of evidence on VM hosts system is required, but...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Secure Mobile Ad hoc Routing Using Clusters Confrontations (SMARUC2) with Genetic Algorithm (GA)

    Data routing among nodes in a wireless network is pretty complex when compared to traditional centralized network architecture. The wireless networks face quite a lot of threats due to open medium. The genuinity of the neighboring nodes must be known a priori to the transmission or routing of data packets....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Privacy-Preserving Public Verifying and Data Dynamics for Secure Cloud Storage Using TPV

    Cloud computing is mainly used for storing client information in the server as the cloud storage without overhead of storage and maintenance, which is very helpful for clients because it is pay per use process. Here security is main problem for both client and server. In this paper, the authors...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Managing Password Authentication Scheme for Secure Cloud Storage

    Cloud computing is the future of the next generation architecture of IT solutions. Cloud provides computing resources on subscription basis over the internet. The cloud data storage network includes a third party auditor which has the power and capabilities that a client does not have. It is a trusted entity...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    BER and PAPR Analysis by Estimating the Channel in OFDM System

    Fourth Generation (4G) wireless technology is totally based on worldwide interoperability for microwave access (WiMAX) systems. WiMAX systems have attracted significant interests from all the fields of wireless communication including students, engineers, researchers and operators. High BER (Bit Error Rate) and PAPR (Peak-to-Average Power Ratio) are the main drawbacks in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    A Study of Cloud Computing: Opportunities, Challenges and Resource Utilization

    Cloud computing represents a new paradigm with an architectural shift from traditional distributed computing. It presents computing resources like hardware, software, platform or infrastructure as utility oriented services to the consumers. Cloud computing is the means through which computing resources such as applications, infrastructures, business processes, hardware etc. can be...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Impact of Caching the Performance of Dynamic Source Routing Protocol for Mobile Ad Hoc Network

    In recent years mobile ad hoc networks have become very popular and lots of research is being done on different aspects of MANET. Mobile ad hoc networks a system of mobile nodes communicate with each other over wireless links and behave as a distributed manner. There are different aspects are...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Caching the Performance of Dynamic Source Routing Protocol for Mobile Ad Hoc Network: A Review

    Mobile ad hoc network is the important topic of research. A mobile ad hoc network is a collection of mobile devices that communicate with each other with the help of wireless links and behave as a distributed manner. Dynamic source routing protocol is used to find out the performance of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Implementation of Ad-hoc on Demand Distance Vector and Optimized Link State Routing Protocol for Mobile Ad-hoc Network with QoS

    A mobile ad hoc network is formed without the central administration that consist of mobile nodes they can use a wireless interface to send a packet data. MANET stands for Mobile Ad hoc NETwork in which two or more mobile nodes connects through a wireless links so that they can...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Verification and Validation of Embedded Systems - The Good, the Bad and the Ordinary

    Verification and validation are two major parts of a product's life cycle. Combined, they ensure that the product meets requirements and that the software and hardware are built correctly. For embedded applications, it is important that the systems pass verification and validation not only for quality purposes, but for safety...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Windows User Workspace: Quality Considerations and User Satisfactory Measurement

    In this paper, the authors describe the notion of Windows User Workspace (WUW) as a state-of the-art representative of Human Computer Interface (HCI) design. The aim is to provide understanding on important supportive tools and quality considerations that must be addressed by windows workgroup as well as measuring user's satisfaction...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    A Data Mining Clustering Approach for Traffic Accident Analysis of National Highway-1

    Classifying the main causative aspects to traffic accidents and their harshness will assist highway safety development ingenuities by better capability design and learning program to address the needs due to the changes in demographics. The traffic accidents data used in this paper has been together over the last 6 months...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Implementation of Distribution Transparency in Heterogeneous Distributed Database System Using Aglet

    The definition of DDBMS states that the system should make the distribution transparent to the end user and application programmer. Purpose of transparency in DDBMS is to hide implementation details of distributed database system. The main objective of implementing distribution transparency in heterogeneous distributed database system is to offer transparent...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Generating Maximum Utility of Item-Sets from Transactional Databases

    Mining high utility thing sets from a transactional database suggests the finding of thing sets with high utility like profits. By and large used two computations, to be particular utility illustration advancement (UP-Growth) and UP-Growth+, for mining high utility thing sets with a set of compelling strategies for pruning contender...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Warehousing and OLAP Analysis of Students Data-A Case Study

    Educational data is incremental in nature. The large amount of data in educational institutions is generated in the form of personal information, academic data, placement data, fee payment data and much more. The problem is whenever there is a need to analyze or refer data for students' performance this turns...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Reduce Torque Ripple Using Novel Torque Distribution Function for High-Speed Applications Using Embedded System Technology

    In this paper, presents real-time simulation results of a Switched Reluctance Motor (SRM) drive with a novel Torque distribution function for high-speed applications, in order to reduce torque ripple. The SRM is fed by a 3- phase unidirectional power converter having three legs, each of which consist of two IGBTs...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Advancement in Efficiency of Online Transaction Mechanism in E- Business System

    Internet is the most important channel for selling and purchasing the goods and services. In this paper, the authors provide an approach, that how users feel the improvement in online e-business transaction processing system design and services, and standard procedures that should be considered the quality attributes in design and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Information System Using Active Database- a Novel Approach

    Active DataBase Management Systems (ADBMSs) have been developed to support applications with sensing changes in databases. Database driven information systems are divided into two integrity concerns: static and dynamic integrity. Static integrity is one that is based on the situations within a particular database state and dynamic integrity addresses situations...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    A Survey of Efficient Periodicity Mining Techniques for Time-Series Data

    Research on periodic pattern mining has attained a great focus on now-a-days. Periodicity mining or discovering the periodic patterns from the time series has always been a problem for fully automated periodicity mining. A time series is a collection of data values gathered generally at uniform interval of time to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Implementation of Modified Booth Recoded Wallace Tree Multiplier for fast Arithmetic Circuits

    Power consumption has become a critical concern in today's VLSI system design. The growing market for fast floating-point co-processors, digital signal processing chips, and graphics processor has created a demand for high speed and area-efficient multipliers. The modified booth recoding method is widely used to generate the partial products for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Comparison of 1 Bit Low Power-High Speed Designs Leakage Minimization Full Adder

    Low power design has become one of the primary focus in Deep Sub-Micron technology (DSM). Optimization of speed, power & area can be achieved by using Gated Diffusion Input (GDI) technique. In paper a 11T based Adder with 8 & 16 input using GDI technique is proposed and it compared...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Analyze Different Data Structure for Weighted Frequent Patterns Mining

    There are various algorithms for the frequent pattern mining in the current trends but only frequency of item is not so essential for the data mining. Weight is very important for the business analysis. Weight is nothing but the specific value of the item. So the authors want new techniques...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Parallel Graph Projection and Pruning for Frequent Item Set Mining

    Recent observations have revealed that a frequent item set mining algorithm be supposed to mining the congested ones as the end gives a condensed and a complete evolution set and better efficiency. Anyway, the latest closed item set mining algorithms mechanism with candidate protection combined by means of test paradigm...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2014

    Comparative Analysis of Eight Different Cryptographic Algorithms with Fourteen Factors

    As the people know that, era of today is totally based on computer. They can say that, nowadays much of the work is done by computer. Behind the wide use of computer, one important technology is used. And that technology is network. But in the current era, it is very...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2014

    A Parametric Analysis Approach for Improved Clustered Communication in WSN

    Clustering is the base architecture of any sensor network. To improve the communication and the life of such network, there is the requirement to improve the clustering approach. In this present paper, an effective clustering approach is presented under different parameters. The parameters considered in this paper for the cluster...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2014

    Use of Business Intelligence to Improve the Effectiveness of Enterprise Resource Planning: A Literature Survey

    Milk industry is very sensitive and their operations are very time bounding. Milk unions always find great difficulty in quickly making out required information because of voluminous data, improper segrartion, departmental arrangements and unprecedented delays. ERP - Enterprise Resources Planning is important tool to manage these resources. For any organization...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2014

    Efficient use of System Metrics for IDS Design

    Security and protection of highly sensitive and private data are the major concern in the present era of Information Technology. In the present paper, various intrusion detection and prevention system are studied. This paper is to provide a crucial solution for critical evaluation of variant attacks and their classification. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Power Sensitive Framework for Energy Efficient Wireless Ad-Hoc Network

    Ad hoc mobile devices today operate on batteries. Hence, power consumption becomes an important issue. To maximize the lifetime of ad hoc mobile networks, the power consumption rate of each node must be evenly distributed, and the overall transmission power for each connection request must be minimized. In this paper,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Enhanced Clustering Algorithm on Academic Activities

    Clustering analysis method is one of the main analytical methods in data mining, the method of clustering algorithm will influence the clustering results directly. This paper discusses the traditional clustering algorithms and analyzes the shortcomings of standard algorithm, such as the k-means clustering algorithm has to calculate the distance between...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Database Security Based on Human Authentication Using Facial Recognition

    Data is the most significant and essential entity to every organization. Companies invest millions of dollars in order to protect and manage the access to their data. The privacy and confidentiality of any data could be easily determined from the fact that the sensitivity of organizational data is because of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Performance Evaluation of Variants of Stable Election Based WSN protocols

    Wireless Sensor Networks (WSNs) contain a large number of sensor nodes that sense the environment they are employed in; and gather the data and forward it to the Base Station (BS). The sensing and transmission of data involves a huge amount of energy. While WSNs are equipped to handle complex...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Accountability and Security of Data Stored in the Cloud

    Cloud computing is Internet based computing on a pay-as-you-use basis where-in virtualized servers provide software, infrastructure, platform, devices and other resources in a shared environment to customers. The most important feature of the cloud services is that users' data are processed in remote, unknown machines that users do not possess...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Enhanced Receiver Based Stateless Multicasting Routing Protocol for Ad-hoc Network

    Mobile ad-hoc network consist of individual mobile nodes communicating via wireless link and provides multicasting with the aid of multicast routing protocols. These protocols are typically stateful, where each node in the group maintains the state information which requires more communication cost between the nodes. In dynamic network topology, communication...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Review on Clustering Techniques in Data Mining

    Data mining is referred to as the process of discovering hidden patterns and trends from massive databases. The main motive of data mining process is to extract novel knowledge and use it. Data mining has been defined as the nontrivial extraction of implicit, previously unknown and potentially useful information from...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Survey on Congestion Control Technique in MANET/Review Paper

    In this paper, the authors study and analyze various congestion control mechanisms using a number of routing protocols in Mobile Ad hoc NETwork (MANET). As MANET is infrastructure less network so node movement and data load traffic which exceeds the network capacity, cannot be predicted which leads to problem of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Protective Model of Distributed Denial-of-Service in Internet For Lack of Variations

    Now-a-days Internet is essential part of the people's life but due to Distributed Denial-of-Service (DDoS) attacks its have some critical problems. Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The memory less feature of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Optimization of Job Scheduling in Cloud Computing Environment

    In this paper, the authors address parallel machine scheduling problems with Practical Swarm Optimization (PSO). A PSO approach embedded in a simulation model is proposed to minimize the maximum completion time (make span). The results are compared with those obtained by using the \"Longest processing time\" rule, which is known...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Authentication for securing network Using Passwords with Tree

    In this paper, the authors aim to enhance authorization and authentication process by using multilevel authentication to protect network from spiteful user and unauthorized access, implement security measure to protect data. It will also provide service level security. They provide a simple yet powerful demonstration of how a sturdy change...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Performance of AODV under Flooding Attack

    A Mobile Ad-hoc NETwork (MANET) is a type of ad hoc network that switches the locations and or it can rearrange itself on the fly. Because MANETS are mobile, it uses wireless connections to connect to various networks. This can be a standard LAN connection, or another medium, such as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Privacy Preserving using Homomorphic Encryption

    In the recent time, privacy preserving has been studied extensively, because of the extensive explosion of sensitive information. Privacy preserving is one of the important areas that aim to provide security for secret information from unsolicited or unsanctioned disclosure. This has triggered the development of much privacy preserving technique using...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Security Framework - A Case Study of a Higher Education Institution

    Security consideration is a very important issue in every organization today. It is the main concern today to have a very secure information system in place so that hackers from outside and the websites hosted on the servers cannot be attacked or disfigured or the contents cannot be changed by...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Survey of Different Approaches in Biometric Iris Recognition System

    Biometrics is an automated system that measure physical and behavioral uniqueness to identify an individual. Instead of requiring personal identification cards, keys or passwords, biometrics can identify fingerprints, face, iris, signature, or retinas of an individual for easy and convenient verification. Iris recognition is an automated method of biometric identification...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Data Transmission Using Efficient FEC over CDMA Channel

    Still image/video is one of the most important and also one of the most challenging types of traffic on communication networks. One of the challenges arises because communication networks can insert errors into still image/video, and also compressed image or compressed video is fragile in the presence of errors; that...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    Survey Paper on PAPR Reduction Techniques in WiMax OFDM MODEL

    Orthogonal Frequency Division Multiplexing (OFDM) is a method of digital modulation. Multipath reflects the signal with different phases and time arrivals .The best solution of the multipath fading is OFDM. Orthogonal Frequency Division Multiplexing (OFDM) is a multicarrier modulation technique for high speed data transmission over multipath fading channels for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jul 2014

    A Review on Attack in MANET

    Mobile Ad hoc NETworks (MANETs) has become one of the most prevalent areas of research in the recent years because of the challenges it pose to the related protocols. MANET is an infrastructure less network with mobile nodes. Due to mobility provided to the node i.e. dynamicity of the network...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Review Paper on Security Challenges and Attacks in Mobile Ad-Hoc Networks

    Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead hosts rely on each other to keep the network connected. The military tactical and other security sensitive operations are the main applications...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Review Paper on 4-Neighbour Parametric Route Selection Approach to Reduce Communication in Mobile Networks

    Routing is about to generate the optimum communication path in terms of energy and distance. But in an ad hoc network, the network is having limitations. It has limitations such as congestion, the attack over some particular nodes. In such case to perform the effective communication there is the requirement...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    More Efficient Energy Management System Using ZigBee Communication Through Comparison of Energy Usage

    In this paper, the authors describe more efficient home energy management system to reduce power consumption in home area. Home Energy Management System (HEMS) is a technology to reduce and manage home energy use. The feedback on energy consumption to energy users is known to be effective to reduce total...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    An Overview of Black Box Web Vulnerability Scanners

    Web application users and web application vulnerabilities are increasing. Today web applications turning out to be tools of everyday use by many users with the growing popularity of the web. With this web application users are more prone to malicious attacks consequently the need of web security testing arises as...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Enhancement of BF, DYMO and ZRP Protocols Using New Cost Functions

    One of the biggest issues in routing is to providing satisfactory performance while scaling the wireless mesh network. It is interesting, however to investigate what happens when routing nodes are expanded in different propagation environment and how that affects routing metrics. In this paper, the authors examine the usage of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Comparative Study of Localization Techniques for Ad-Hoc Sensor Network

    Wireless sensor networks consist of sensor nodes that are required to move around to complete their job assignments like collecting data or sampling the environment. Through fully, the location of sensor nodes is important information for core operation. So, localization is most fundamental problems in WSN. The exact and accurate...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Fingerprint Recognition Using Orientation Features

    In this paper, the authors study and implement a fingerprint recognition system based on minutiae based matching quite frequently used in various fingerprint algorithms and techniques. The approach mainly involves extraction of features from the sample fingerprint images using orientation features and local direction pattern and then using Euclidean classifier....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    LEACH Enhancement to Improve the Life Time of Wireless Sensor Networks

    Advances in the fields of computer hardware and software technologies have led to the development of the small wireless devices that will provide access to the information that was difficult to get or really impossible, some decades before. The Wireless Sensor Networks (WSNs) have now become one of the most...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Comparative Analysis of Tabu Search and Genetic Algorithms for Software Effort Estimation

    As with the growth of technology, competition level increases at a frequent rate. Each software company wants to develop its software in estimated time and budget. So, correct software effort estimation model is required. In this paper, COCOMO II is used for estimation of effort in person month for the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Application Security in Android-OS VS IOS

    In modern computer world security is most important facets of mobile application development. And it is also the most complex and most of the time overlooked facet of mobile computing. It is because mobile computing is cloud enabled and highly network in nature. This paper will emphasize on security issues...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Enhanced Security Approach for Centralized and Distributed Social Network by Sequential Clustering

    As the people know the social media has grown-up rapidly in the past few years. The different social media sites Facebook, Twitter, LinkedIn, and several holds public and confidential information about their users. In order to provide security to the users' social network graphs are anonymized before being published to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Multicast Routing Protocols in Wired Networks: A Comprehensive Study

    Multicast routing is a group oriented communication whose objective is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently, it also reduces the communication cost and saves the network resources. In this paper, multicast...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Survey of Botnet Based DDoS Attack and Recent DDoS Incidents

    DDoS attacks are becoming a major headache for IT professionals because of DDoS attacks are regularly launched by well organized and widely spread botnet computers that are concurrently and accordingly sending large amount of traffic or service request to the target system. The target system either responds so slowly or...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    A Cryptography Based Method for Preventing Selective Jamming Attack in Wireless Network

    The open nature of the wireless network makes it vulnerable to intentional interference attacks, commonly referred to as jamming. This jamming with wireless transmissions can be used as a launch pad for mounting denial-of-service attacks on wireless networks. Typically, the jamming has been addressed under an external threat model. The...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Enhancing K-Means Clustering Algorithm and Proposed Parallel K-Means Clustering for Large Data Sets

    Clustering is one of the wide fields of data mining. Cluster analysis is one of the significant data analysis methods and the k-means clustering algorithm is widely used for many practical applications. But the original k-means algorithm is computationally expensive and the quality of the resulting clusters heavily depends on...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Review Paper on Comparative Study of IEEE Protocols Suite

    IEEE 802.11 provides high bandwidth connectivity in a Local Area Network (LAN) environment that is suitable for most data applications. Wireless LAN (WLAN, also known as Wi-Fi) is a set of low tier, terrestrial, network technologies for data communication. It is called 802.11 after the name of the group formed...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Emotional Speech Recognition with Gaussian Mixture Model with Reference to Bodo Language

    In this paper, the authors basically with emotion recognition of Bodo speech using Gaussian Mixture Model (GMM) which allows training the desired data set from the main databases. Since GMM are suitable for developing emotion recognition model when large number of feature vector is available and hence GMM are known...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Load Balancing in MANETs: A Review

    Mobile Ad hoc NETwork (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. In this paper, current challenges in an ad hoc environment which...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Survey of Energy Efficient Algorithm Using WSN

    In wireless sensor networks, sensor nodes always have a limited power resource. The energy consumed by transferring data from the sensor node to its destination raises as a critical issue in designing reasonable wireless sensor network routing protocols. LEACH was the first protocol for balancing the energy consumption among nodes,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Survey of Mobile Ad Hoc Network Using Clustering and Fault Detection

    Mobile Ad-hoc NETworks (MANETs) are a form of wireless networks which do not require a base station for providing network connectivity. Many MANETs' characteristics that distinguish MANETs from other wireless networks also make routing a challenging task. Cluster based routing is a MANET routing schemes in which various clusters of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Study of Malicious Activities & Challenges in MANET's

    Mobile ad hoc network comprises of a group of wireless nodes that can be set up anywhere and anytime without using any pre-existing network infrastructure. These allow people and devices to seamlessly internetwork in areas lacking any communication infrastructure. The communication between two nodes is peer to peer and the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // May 2014

    Credit Card Fraud Recognition by Modifying K-Means

    Credit card is now-a-days used by many people. No one is having time, so most of the people rely on online shopping. Online shopping is the best way for shopaholic people. But problem is many people try to use other credit cards by just altering the digits. To avoid this...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)