International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

Displaying 321-360 of 2419 results

  • White Papers // Nov 2014

    Streaming MPEG-4 Compressed Video Over DiffServ Network

    Multimedia file size is large compare to other type of file because it contains text, graphics, audio and video. Efficient Peer-To-Peer (P2P) video streaming is a challenging task due to bursty nature of video data and bandwidth scarcity. Differentiated Services (DiffServ) is one of the leading architectures for providing quality...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Link Analysis In Ad-Hoc Wireless Network Using Pro-Active Protocol

    Ad hoc network is consisting of nodes without any centralized assistance. There are several problems such as power issues, link failure, security issues, etc. These were found already in such a network because of its mobility and completely wireless. Link failure is one of the major problems in an ad...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Reduction of Energy Dissipation in WSNs Using Multi-Chain PEGASIS

    In wireless sensor networks, sensor nodes have limitation of energy so the lifetime of the networks is very important design factor. The chain-based routing scheme is one of the famous routing schemes that are proposed for reducing energy dissipation of communication in the networks. The chain-based routing schemes construct the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Design and Implementation of Mobile Context-Aware Systems Platform for User Application

    The recent convergence of mobile and context-aware systems has seen a considerable rise in interest in applications that exploit aspects of the operating environment to offer services, tailor application behavior or trigger adaptation. One area of ubiquitous computing is composed by the context-aware systems, systems where applications are designed to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    An Overview and Survey on Image Steganography Technique

    Steganography is a one of the technique for information hiding. With the help of steganography people can communicate secretly. It involves communicating secret data in an appropriate multimedia carrier such as text, image, audio, and video files. The main motive of steganography is to ensure that the transmitted message is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Study and Simulation of Quasi Orthogonal Space Time Block Codes in MIMO systems for Rician Fading Channel

    Diversity is the technique used in wireless communications systems to improve the performance over a fading radio channel, simple transmit diversity scheme was given by Alamouti, which used two transmit antennas to combat flat fading by increasing diversity at the receiver while maintaining the same transmission rate as on a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Steer and Obeservation of a Vehicle Theft by ARM7

    Today's automobiles, invariably comply with digital control systems as a consequence of constant growth in technology. Recent vehicles contains large number of electronic control systems and already there are large numbers of electronic control units present. The growth of automotive electronics is the result parties of the customers wish for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Evaluation of Gray Hole Attack in Mobile Ad-hoc Network and proposed Solution

    The mobile ad-hoc networks are vulnerable to Denial of Service (DoS) attacks. MANET has features like self organizing, working as router as well as host having dynamic topology. In MANET, nodes have limited resources like bandwidth, battery power and storage capacity. Gray hole attack is a kind of Denial of...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    A Secure Data Forwarding Approach for Cloud Storage System

    Cloud computing is a concept that treats the resources on the Internet as a unified entity a cloud Users just use services without being concerned about how computation is done and storage is managed. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2014

    Steganography Using PSO Based Hybrid Algorithm

    In this paper, the authors have presented the steganography by using PSO based hybrid algorithm. As steganography is the process of hiding the data in the cover media but it suffers from security problems. For hiding the data effectively in the images they will apply the PSO algorithm which will...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Comparison of 1 Bit Low Power-High Speed Designs Leakage Minimization Full Adder

    Low power design has become one of the primary focus in Deep Sub-Micron technology (DSM). Optimization of speed, power & area can be achieved by using Gated Diffusion Input (GDI) technique. In paper a 11T based Adder with 8 & 16 input using GDI technique is proposed and it compared...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Verification and Validation of Embedded Systems - The Good, the Bad and the Ordinary

    Verification and validation are two major parts of a product's life cycle. Combined, they ensure that the product meets requirements and that the software and hardware are built correctly. For embedded applications, it is important that the systems pass verification and validation not only for quality purposes, but for safety...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Windows User Workspace: Quality Considerations and User Satisfactory Measurement

    In this paper, the authors describe the notion of Windows User Workspace (WUW) as a state-of the-art representative of Human Computer Interface (HCI) design. The aim is to provide understanding on important supportive tools and quality considerations that must be addressed by windows workgroup as well as measuring user's satisfaction...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    A Data Mining Clustering Approach for Traffic Accident Analysis of National Highway-1

    Classifying the main causative aspects to traffic accidents and their harshness will assist highway safety development ingenuities by better capability design and learning program to address the needs due to the changes in demographics. The traffic accidents data used in this paper has been together over the last 6 months...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Implementation of Distribution Transparency in Heterogeneous Distributed Database System Using Aglet

    The definition of DDBMS states that the system should make the distribution transparent to the end user and application programmer. Purpose of transparency in DDBMS is to hide implementation details of distributed database system. The main objective of implementing distribution transparency in heterogeneous distributed database system is to offer transparent...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Generating Maximum Utility of Item-Sets from Transactional Databases

    Mining high utility thing sets from a transactional database suggests the finding of thing sets with high utility like profits. By and large used two computations, to be particular utility illustration advancement (UP-Growth) and UP-Growth+, for mining high utility thing sets with a set of compelling strategies for pruning contender...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Warehousing and OLAP Analysis of Students Data-A Case Study

    Educational data is incremental in nature. The large amount of data in educational institutions is generated in the form of personal information, academic data, placement data, fee payment data and much more. The problem is whenever there is a need to analyze or refer data for students' performance this turns...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Reduce Torque Ripple Using Novel Torque Distribution Function for High-Speed Applications Using Embedded System Technology

    In this paper, presents real-time simulation results of a Switched Reluctance Motor (SRM) drive with a novel Torque distribution function for high-speed applications, in order to reduce torque ripple. The SRM is fed by a 3- phase unidirectional power converter having three legs, each of which consist of two IGBTs...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Advancement in Efficiency of Online Transaction Mechanism in E- Business System

    Internet is the most important channel for selling and purchasing the goods and services. In this paper, the authors provide an approach, that how users feel the improvement in online e-business transaction processing system design and services, and standard procedures that should be considered the quality attributes in design and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Information System Using Active Database- a Novel Approach

    Active DataBase Management Systems (ADBMSs) have been developed to support applications with sensing changes in databases. Database driven information systems are divided into two integrity concerns: static and dynamic integrity. Static integrity is one that is based on the situations within a particular database state and dynamic integrity addresses situations...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    A Survey of Efficient Periodicity Mining Techniques for Time-Series Data

    Research on periodic pattern mining has attained a great focus on now-a-days. Periodicity mining or discovering the periodic patterns from the time series has always been a problem for fully automated periodicity mining. A time series is a collection of data values gathered generally at uniform interval of time to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Implementation of Modified Booth Recoded Wallace Tree Multiplier for fast Arithmetic Circuits

    Power consumption has become a critical concern in today's VLSI system design. The growing market for fast floating-point co-processors, digital signal processing chips, and graphics processor has created a demand for high speed and area-efficient multipliers. The modified booth recoding method is widely used to generate the partial products for...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Analyze Different Data Structure for Weighted Frequent Patterns Mining

    There are various algorithms for the frequent pattern mining in the current trends but only frequency of item is not so essential for the data mining. Weight is very important for the business analysis. Weight is nothing but the specific value of the item. So the authors want new techniques...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Parallel Graph Projection and Pruning for Frequent Item Set Mining

    Recent observations have revealed that a frequent item set mining algorithm be supposed to mining the congested ones as the end gives a condensed and a complete evolution set and better efficiency. Anyway, the latest closed item set mining algorithms mechanism with candidate protection combined by means of test paradigm...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    QoS Analysis and Enhancement in OFDM Systems

    The Orthogonal Frequency Division Multiplexing (OFDM) technique is a next generation wave technology in wireless communication. The emergence of OFDM and its manifold pros has led to the creation of various wireless standards and made it possible to transmit the larger digital data over radio waves. Based on OFDM is...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Review of Ad-Hoc on Demand Distance Vector and Optimized Link State Routing Protocol for Mobile Ad-Hoc Network

    Ad hoc network is a collection of mobile nodes without the need of central access point. This paper provides the detail explanation of routing, its types and working of MANET routing protocols that are proactive (Optimized Link State Routing (OLSR)), Reactive (Ad hoc On-demand Distance Vector (AODV)) and hybrid (Zone...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Network Security Using Double Symmetric Key: Algorithm SKG 2.3

    In this paper, named algorithm SKG 2.3, the author has used double symmetric key for network security. For encryption and decryption of any text file, the symmetric keys are used at four stages: shifting N1 leftmost characters to rightmost in a circular queue or vice versa, converting each of N...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Bitcoin: A Step Ahead in Technology

    Every now and then the authors come across one or the other technology, one surpassing the other. Bitcoin is a new revolution in the banking sector which has helped in creating an E wallet which will be carrying a currency that can be used worldwide. Though this has not been...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    A Novel System to Enhance Cloud Data Security

    Cloud computing, even though known to have a malicious behavior, is an environment which enables convenient, efficient, and ready to use on demand network access to a pool of shared data resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud is basically...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Towards Mitigation of Phishing: The State of Web Client Anti-phishing Technologies

    To adapt to the fast growing and evolving nature of phishing attacks, new web client based anti-phishing solutions are being adopted while old ones improved over the years. Recently introduced multifactor authentication methods are becoming popular in e-commerce in mitigating credentials hacking and man-in-the-middle attacks. Extended validation SSL certificate was...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Auditing of Cloud Logs by Forensic-based SOA Framework

    Cloud computing log digital investigations relate to the investigation of a potential crime using the digital forensic evidence from a Virtual Machine (VM) host operating system using the hypervisor event logs. In cloud digital log forensics, work on the forensic reconstruction of evidence on VM hosts system is required, but...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Secure Mobile Ad hoc Routing Using Clusters Confrontations (SMARUC2) with Genetic Algorithm (GA)

    Data routing among nodes in a wireless network is pretty complex when compared to traditional centralized network architecture. The wireless networks face quite a lot of threats due to open medium. The genuinity of the neighboring nodes must be known a priori to the transmission or routing of data packets....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Privacy-Preserving Public Verifying and Data Dynamics for Secure Cloud Storage Using TPV

    Cloud computing is mainly used for storing client information in the server as the cloud storage without overhead of storage and maintenance, which is very helpful for clients because it is pay per use process. Here security is main problem for both client and server. In this paper, the authors...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Managing Password Authentication Scheme for Secure Cloud Storage

    Cloud computing is the future of the next generation architecture of IT solutions. Cloud provides computing resources on subscription basis over the internet. The cloud data storage network includes a third party auditor which has the power and capabilities that a client does not have. It is a trusted entity...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    BER and PAPR Analysis by Estimating the Channel in OFDM System

    Fourth Generation (4G) wireless technology is totally based on worldwide interoperability for microwave access (WiMAX) systems. WiMAX systems have attracted significant interests from all the fields of wireless communication including students, engineers, researchers and operators. High BER (Bit Error Rate) and PAPR (Peak-to-Average Power Ratio) are the main drawbacks in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Implementation of Ad-hoc on Demand Distance Vector and Optimized Link State Routing Protocol for Mobile Ad-hoc Network with QoS

    A mobile ad hoc network is formed without the central administration that consist of mobile nodes they can use a wireless interface to send a packet data. MANET stands for Mobile Ad hoc NETwork in which two or more mobile nodes connects through a wireless links so that they can...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    An Adaptive AODV Routing Protocol for Load balancing and Delay Recovery in Mobile Ad hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network collected of mobile nodes without any fixed Environment. Energy efficiency is a major problem of mobile ad hoc networks as mobile nodes rely on batteries, which are insufficient sources of energy, and in several environments, it is relatively an unmanageable task...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Survey on Security of Information at Cloud Storage in Cloud Environment

    Cloud computing has emerged as a new computational platform in Information Technology (IT) enterprises. Cloud computing is a rent-based service where user can storage space and computing resources or services which are dynamically scalable. It reduces the purchasing cost of computational resources and delivered it as per demand of user...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    Survey on Methods for Credit Card Fraud Detection Systems

    Technology has developed tremendously. The technology has been developed in such a way that it keeps in mind the new inventory will be comfortable and will be easy to use for the human beings. One such invention is the credit card. The usages of credit cards are for the online...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2014

    A Survey of Security in Mobile Ad-Hoc Networks using Cryptography

    Security in Mobile Ad-hoc NETworks (MANETs) continues to attract attention after years of research. Recent advances in Identity-Based Cryptography (IBC) sheds light on this problem and has become popular as a solution base. The authors present a comprehensive picture and capture the state of the art of IBC security applications...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    A Hybrid Level Access Control Mechanism for Secure Medical Data Sharing in Cloud Platform

    Information technology is increasingly recognized as an important tool for improving patient safety and quality of treatment. Medical records are sharing among hospitals for getting more information of physician diagnosis and reduce costs from duplicate examinations. Cloud platform can form an exchange platform that all hospitals and clinics can use...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    A Novel Approach to Data Integrity Proofs in Cloud Storage

    Next generation computing is basically a development of the Cloud computing. It has been envisioned as the de-facto standard to mounting storage costs of IT Enterprises. Cost of data storage devices increases at a rapid rate which raises the burden of enterprises or individual users to frequently update their hardware...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    PAPR Reduction in OFDM Systems Using a Non-Linear Polynomial Function

    In recent years, Orthogonal Frequency Division Multiplexing (OFDM) has gained significant attention and is preferred for transmission over a dispersive channel. It is because of its several advantages such as high spectral efficiency, low implementation complexity, less vulnerability to echoes and non - linear distortion. However, it has few limitations...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Mitigation of Crosstalk in Optical Network Using Modulation Techniques

    To transmit data from one point to another, some signal path is needed between those points. To create such path a medium is needed to transfer the data. The choice of this medium depends on the requirements and available infrastructure. Examples of media which can be used are air, copper...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Study of Cloud Setup for College Campus

    Cloud Storage is an attractive concept in IT field since it allows the resources to be provisioned according to the user needs. It provides services on virtual machines whereby the user can share resources, software and other devices on demand. Cloud services are supported both by Proprietary and Open Source...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Monitoring and Controlling of Bank Security System

    In today's real time modern industrialized world security systems place a vital role. This bank security system is mainly designed to meet the requisite of the security of valuables things (jewels) which are hard earned. Unlike the present system involving the physicals locks which can be easily forged this has...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Enhancing Security of Caesar Cipher by Double Columnar Transposition Method

    Cryptography is an art and science of converting original message into non-readable form. There are two techniques for converting data into non-readable form: transposition technique and substitution technique. Caesar cipher is an example of substitution method. As Caesar cipher has various limitations so this talk will present a perspective on...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Oct 2012

    Intruder Proof and Authenticated Cryptography

    Cryptography is a method of storing and transmitting data in a form that only those it is intended for can read and process. It is a science of protecting information by encoding it into an unreadable format. Although, the ultimate goal of cryptography, and the mechanisms that make it up,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Comprehensive Analysis on Intrusion Detection Using Neural Network

    Intrusion detection is the process of detecting intrusion in network which it compromises the confidentiality integrity and availability of a resource. In this paper, the authors mainly focused on neural network algorithm applied for detecting intrusion. Aim of their research paper is to determine which neural network classifies the attacks...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Networking Devices and Topologies: A Succinct Study

    A network can be defined as a group of computers and other devices connected in some ways so as to be able to exchange data. Now in real life scenario several networks with different protocols and architectures are need to be interconnected for efficient communication. To support this feature there...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Securing Iris Templates Using Double Encryption Method

    The important aspect of all verification system is authentication and security. This aspect necessitates the development of a method that ensures user security and privacy. The traditional methods such as tokens and passwords provide security to the users. Uncertainly, the attackers can easily compromise these techniques. In recent years, the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Investigation of Various Throughput Improvement Techniques in DWDM Optical Networks

    When the information is transmitted over the network there are various reasons due to which there is loss of information. Some time due to congested networks the loss is more in the optical networks. As a result the authors need an intellectual algorithm or process which is applied to the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    A Combined Credit Risk and Collaborative Watchdog Method for Detecting Selfish Node over Mobile Ad-Hoc Network

    MANET is a peer-to-peer multihop mobile wireless network that has neither a fixed infrastructure nor a central server. The resource and mobility constraints of mobile nodes in mobile ad hoc network may lead to network partitioning or performance degradation. Several data replication techniques have been proposed to minimize performance degradation....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Nov 2012

    Data Synchronization Using Cloud Storage

    Cloud computing usually consists of front-end user devices and back-end cloud servers. This gives users to access a large volume of storage on cloud. In this project, the user can upload file from mobile or PC to the cloud storage. These files will be automatically synchronized to the user's devices...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    An Enhanced Secure Route Formation Using Secure Key Management Mechanism for MANETS (SCRFKM)

    To enhance security in distributed networks, such as ad hoc networks, it is important to evaluate the trustworthiness of participating entities since trust is the major driving force for collaboration especially in route formation from source to destination. Wireless broadcast is an effective approach to find route information among number...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    A Study of TORDES With Other Symmetric Key Algorithms

    For secure communication over computer network, data can be protected by the method of encryption (Stallings, 2007). Encryption converts original text data by using some encryption algorithm with its key. The selective application of technological and related procedural safeguard is an important responsibility of every cryptographic algorithm in providing adequate...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Aug 2012

    A Model Proposed for Reducing the False Positive Alarm Rate Using the Feature of Event Correlation

    As the network based computer system plays an important role in modern society they have become target of the people enemies and criminals. Therefore, the authors need to find the best possible ways to protect their IT System. Different methods and algorithms are developed and proposed in recent years to...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Wireless Sensor Network for Electric System Automation

    In today's competitive electric utility marketplace, reliable and real-time information become the key factor for reliable delivery of power to the end-users, profitability of the electric utility and customer satisfaction. The operational and commercial demands of electric utilities require a high-performance data communication network that supports both existing functionalities and...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    A Survey on Neighbor Discovery in Asynchronous Wireless Sensor Network

    The Neighbor Discovery is a process of identifying the nearest node. So the identification can done through Neighbor Discovery Protocol (NDP) is a protocol in the Internet Protocol Suite used with IPv6. It is responsible for address auto-configuration of nodes, discovery of other nodes on the link, and maintaining reachability...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Usage of Distributed Identities and Decentralized Recommendation Chains in Peer to Peer Reputation Mgt

    One of the world habituated system is P2P in this Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client. The authors describes the Reputation...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Performance Issues and Evaluation Considerations of Web Traffic for RIP & OSPF Dynamic Routing Protocols for Hybrid Networks Using OPNETTM

    In this paper, performance analysis of the Wireless and Wired computer networks for combination of conventional model of RIP and OSPF is evaluated through simulation which has been attempted using OPNET as simulating tool. For networks, the performance parameters like wireless LAN media access delay and throughput have been investigated...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Network Security Management in Wireless Networks Through Zero Knowledge Proof

    Wireless Sensor Networks (WSNs) will provide an excellent opportunity to control environments. Even WSNs have lot of applications, some of them quite sensitive in nature and require full proof secured environment. The wireless security mechanism is not same as in wired networks. Because there is no user-controlling for each individual...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Preliminary Approach on Ad-Hoc Networks and Its Paradigms

    An ad-hoc wireless network is a collection of wireless mobile nodes that self-configure to construct a network without the need for any established infrastructure or backbone. Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. With the advancement in wireless communications, more and more wireless networks...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Performance Comparison of Routing Protocols in MANET

    A Mobile Ad-Hoc NETworks [MANETs] is a collection of wireless mobile nodes forming a temporary network without any centralized access point, infrastructure, or centralized administration. To establish a data transmission between two nodes, typically multiple hopes are required due to the limited transmission range. In a MANET network topology can...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Classification of QoS Routing for MANET - A Summary

    MANETs is a special kind of wireless networks. It is a collection of mobile node without having aid of established infrastructure. A Manet is an autonomous system of mobile nodes. The system may operate in isolation, or may have gateways to and interface with a fixed network. Manet includes easy...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Sep 2012

    Query Decomposition and Data Localization Issues in Cloud Computing

    The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data storage is efficiently used to store the out-sourced data (data that is not stored/retrieved from the customers own servers). In this paper,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Jan 2012

    Detection and Recovery of Malicious Node in Mobile Ad Hoc Networks

    In MANETs to protect a network layer from malicious attacks is an important and challenging security issue. In this paper, a security algorithm has been proposed to identify and deactivate a cooperative black hole attack. The proposed algorithm has been incorporated on AODV routing protocol. The proposed algorithm does not...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Network Security Using Cryptographic Techniques

    Network security is the most vital component in information security because it is responsible for securing all information passed through networked computers. Network security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required to provide an acceptable level...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Intrusion Detection System Using Fuzzy Logic and Data Mining Technique

    IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence,...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Buffers in 802.11-Based Networks

    Buffers play a key role in 802.11/802.11e Wireless networks.802.11 is a set of standards for implementing Wireless Local Area Networks (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by IEEE LAN/MAN Standards Committee (IEEE 802).Buffers are used to accommodate short-term packet...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Dec 2012

    Modeling and Detection of Concealing Worm

    As Internet and its technologies are improving with rapid pace, there are security threats growing with same pace. The malicious software such as worm is causing such threats to IT systems linked to information super highway. A worm is a self-replicating virus that does not alter files but resides in...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Study of BER for BPSK and DPSK (Coherent and Non-Coherent) Modulation in Turbo-Coded OFDM with Channel Estimation

    Orthogonal frequency division multiplexing is a popular modulation method in high speed wireless transmission. It removes the detrimental effect of multipath fading by partitioning the wideband fading channel into flat narrow band channels. For this purpose adaptive equalizer is used here. In this paper, the authors will design the OFDM...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Mar 2013

    Guaranteed QOS in Real-Time Traffic for Dynamic Subcarrier Allocation Over Multiuser OFDM Systems

    A dynamic resource allocation algorithm to satisfy the packet delay requirements for real-time services, while maximizing the system capacity in multiuser Orthogonal Frequency Division Multiplexing (OFDM) systems is introduced. The authors' proposed cross-layer algorithm, called Dynamic Subcarrier Allocation algorithm for Real-time Traffic (DSA-RT), consists of two interactive components. In the...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    Comparative Study of Multiclass Classification Techniques for Intrusion Detection

    Now-a-days, with the rapid development of the Internet, Internet security is becoming an important problem recently. Everyone wants to protect their data from both the internal and external attacks. In this initiative firewall, encryption and authentication serve as the first line of defense. And intrusion detection serves as the second...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Feb 2013

    A Survey on Various Solutions of ARP Attacks

    The Address resolution protocol is the protocol is used to map the Internet Protocol (IP) address into the hardware address (MAC).When the host machine wants to know a physical address for any host in the network, it broadcasts the ARP request and the host that owns the IP address sends...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    AODV & DSR Reactive Routing Protocols with a Comparative Study

    For any kind of network i.e. wired or wireless, routing is an important function. In routing process a node i.e. source transmit the data packets to another node i.e. destination. Routing in wireless networks have great challenges due to mobility, limited transmission range, limited bandwidth, battery constraints, and broadcast nature....

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Green Cloud Computing: A Virtualized Security Framework for Green Cloud Computing

    In the IT industry's there is forcefully demand of the technology known as Cloud computing. It is an emerging trend in computing. There are huge data centers are used in big industries. Environmentally, these systems can produce e-wastes, harmful gases with heat. This paper focuses on security in such a...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Interference Cancellation in Heterocell Configuration Using Channel Allocation Mechanism

    Femtocell networks, consisting of a conventional macro cellular deployment and overlaying femtocells, forming a hierarchical cell structure, constitute an attractive solution to improving the macrocell capacity and coverage. This paper treats the uplink interference problem in Orthogonal Frequency-Division Multiple-Access (OFDMA)-based femtocell networks with partial cochannel deployment. First propose an inter-tier...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Efficient Interactive Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

    Cloud computing is an online computing within which info is keep and accessed employing a remote third party server known as cloud, comparatively than being keep regionally on the authors' mechanism and also the resources, software's, and knowledge are provided to users on demand. In cloud computing background knowledge protection...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)

  • White Papers // Apr 2013

    Enhanced Amalgam Encryption Approach for Grid Security: A Review

    Grid computing is about several processors distributed globally and sharing the computational resources to solve various problems. Grid computing has become an increasingly important research topic within computer science as in academic educational purpose and industrial research to government sector. Grid computing is concerned how to share and coordinated use...

    Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)