International Journal of Computer Applications in Engineering Sciences (IJCAES)

Displaying 1-40 of 70 results

  • White Papers // Mar 2014

    An Approach to Cloud Workflow System and its Different Layered Models of Execution

    Cloud computing is an emerging area in the field of Information Technology (IT). Cloud computing adopts a market oriented resource model like cloud resource computing, storage and network are charged as per the usage. The cost for supporting QoS (including both time overheads and monetary cost) can be managed effectively...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2013

    Cloud Access Security On File System Using Secure Policies For Jelastic Cloud

    Now-a-days, the authors can outsource data backups offsite to third-party cloud storage services (Jelastic cloud) by which they can reduce data management costs. However, they need to provide security guarantees for the outsourced data, maintained by third parties. In this paper, they design and implement FADE, a secure overlay cloud...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2013

    Android - A Cloud Computing for Vehicle Tracking System Using GPS

    Tracking systems were first developed for the shipping industry because they wanted to determine where each vehicle was at any given time. Passive systems were developed in the beginning to fulfill these requirements. For the applications which require real time location information of the vehicle, these systems can't be employed...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Aug 2013

    Biometric Monitoring System for Multi Sensor Multi-Modal Node Architecture

    Biometric monitoring and healthcare using wireless sensor networks is an active area of applied research. The general network topology used for wireless body area networks is the star topology with the sensor nodes sending their data to a central processing node for data fusion. Reliability of these networks is very...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Aug 2013

    VLSI Implementation of Robust Secure Scan Based Design for Differential Cryptanalaysis

    Cryptography plays a key role in ensuring the privacy and integrity of data. Cryptanalysis is the study of how to crack encryption algorithms and their implementations. Differential cryptanalysis is a plain text attack which occurs in the cryptographic system. Testing can control and observe the internal states of the system....

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Aug 2013

    K-Anonymity Based Privacy-Preserving Location Monitoring Services for Wireless Sensor Networks

    Wireless sensor technologies gave rise to many new applications widely used by general citizens as well as military operations. Numerous cases of these applications are based on the information of personal locations. Observations of these locations with untrusted server cause privacy threats to the individuals being monitored. To deal with...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Aug 2013

    Design of Wireless Home Automation and Security System Using PIC Microcontroller

    The development of the new technologies in the field of electronics has brought tremendous changes in the day-to-day life of every human being. They have entered the fields like industry, medicine, telecommunication and also home automation. This paper introduces the Intelligent Home Automation System (IHAM) which is developed using PIC...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2013

    Perplexities in Discovering Navigation Patterns from Server Log

    Web navigation patterns discovered from usage data can be used to build prediction model to recommend interesting web pages to the users. A user session may have one or more transactions. Identification of transactions or user behaviors from session data is difficult because web pages cannot be classified strictly as...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // May 2013

    A Novel Approach for Block-Based Data Encryption

    With the growth of data communication over the internet, the need for security has obtained utmost importance. Data needs to be kept hidden from all the internet users apart from the authorized ones. Data should be encrypted before sending it through the internet. Here, an algorithm based on Block-Based data...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2013

    Comprehensive Cloud Incremental Data-Application Migration - A Proposed Model for Cloud Migration

    The cloud is still in its early days as a computing environment, with new technologies and vendors evolving rapidly to address the many issues being faced in the migration and connectivity between traditional computing environments and cloud services. Migrating enterprise InfoTech systems and infrastructure to a private or public cloud...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2013

    The Role of Security Techniques in Biometric System

    A biometric system essentially is a pattern recognition system that makes a personal identification on the basis of a specific physiological or behavioral characteristic possessed by the user. As biometric system provides the users' many advantages over traditional methods but still there are pros and cons of every developed system....

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2013

    Creation of Datasets for Data Mining Analysis by Using Horizontal Aggregation in SQL

    Data mining is widely used domain for extracting trends or patterns from historical data. In a relational database, especially with normalized tables, a significant effort is required to prepare a summary data set that can be used as input for a data mining algorithm. In general, a significant manual effort...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2013

    Hybrid Model for Preprocessing and Clustering of Web Server Log

    With increased rate in the usage of the World Wide Web (www) is growing both in its complexity and the volume of traffic of web site, it has become very important to analyze this web traffic and the usage of the web site by the users. Web usage mining is...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2012

    Rank Based Web Service Aggregation

    Without doubt, Web is known as a source of information whatever, be the domain. With increasing unexpected experimental growth of web image, web service retrieval and selection be the one of the major issues. In the present scenario, ontology is applied for knowledge description and formalization especially in aggregating personalized...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2012

    Ontology Based Web Crawler

    The Web, the largest unstructured database of the world has greatly improved access to the documents. As the number of Internet users and the number of accessible web pages grow, it is becoming increasingly difficult for users to find documents that are relevant to their particular needs. Users must either...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2012

    Green Cloud Computing

    Cloud computing is offering utility oriented IT services to users worldwide. It enables hosting of applications from consumer, scientific and business domains. However data centers hosting cloud computing applications consume huge amounts of energy, contributing to high operational costs and carbon footprints to the environment. With energy shortages and global...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2012

    Enhancing the Performance of Data Mining Algorithm in Letter Image Recognition Data

    The paper image recognition is a challenging problem for knowledge worker, the basic objective of this data set is to identify each of a large number of black-and-white rectangular pixel displays as one of the 26 capital letters in the English alphabet. The character images were based on 20 different...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2012

    Text Steganography Using Public Key Cryptosystem in CSS

    Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation semantics of a document written in a markup language. In recent years, the programming world has been using CSS together with HTML to develop a web interface for designing websites. As a client-side scripting, CSS is...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2012

    Mobile Agent Based Distributed Intrusion Detection System: A Survey

    Network security is a large and growing area of concern for every network. Intruders always search for vulnerabilities or flaws in target system and attack using different techniques. An Intrusion Detection System (IDS) is needed to detect and respond effectively whenever the confidentiality, integrity, and availability of computer resources are...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2012

    Modification in 'KNN' Clustering Algorithm for Distributed Data

    Clustering has become an increasingly important task in modern application domains such as marketing and purchasing assistance, multimedia, molecular biology etc. The goal of clustering is to decompose or partition a data set into groups such that both the intra-group similarity and the inter-group dissimilarity are maximized. In many applications,...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    Effective Development of Andriod Applications Using Andriod Services

    Android is the most popular operating system for mobile devices like smart phones and tablets. Android is developed on top of Linux with some modifications suitable for mobile devices. Gartner survey stated that android shares 43% of smart phone market, while apple is only 18%. There are 400,000+ apps available...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    RSA Algorithm Modular Multiplication

    This paper presents the architecture and modeling of modular multiplication for RSA public key algorithm. It supports multiple lengths like 128 bits, 256 bits, 512 bits of data. In this paper simple shift and add algorithm is used to implement the modular multiplication. It makes the processing time faster and...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    Performance Comparison of Fast Multipliers Implemented on Variable Precision Floating Point Multiplication Algorithm

    The multiplication is the basic arithmetic operation in any typical processor. The multiplication process requires more hardware resources and processing time when compared with addition and subtraction. The accuracy of a multiplication mostly relies on the precision of the multiplication; a variable precision multiplier will have more accuracy than single...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    A New Model of Fingerprint Retrieval Based on Features of Minutiae and Gabor

    Fingerprint is the commonly used biometric property in security, commerce and forensic application. One common problem in pattern recognition is lack of samples, only a few fingerprint samples from each individual are available for training a classifier. This paper proposes an approach of fingerprint retrieval based on Bayes classifier by...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    Enhanced AES Algorithm

    The advanced encryption standard can be programmed in software or built with pure hardware. However Field Programmable Gate Arrays (FPGAs) offer a quicker, more customizable solution. This research investigates the AES algorithm with regard to FPGA and the Very High Speed Integrated Circuit Hardware Description Language (VHDL). Software is used...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    Detection of Node Replication Attack Using Distributed Multicast Approach in Wireless Sensor Networks

    Wireless Sensor Network (WSN) has become a growing research area due to its tremendous number of applications which can benefit from it. WSN are often deployed in unfavourable environments where an attacker can capture various nodes and replicate them to take over the network. The defence against node replication attacks...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    An Evaluation of GET to Secure Data Trans-Mission Using DH Routing Approach Against NLA in MANETs

    A Mobile Ad-hoc NETworks (MANETs) is a collection of mobile node which communicate each other through wireless link to give a stationary infrastructure network without any centralized administration. With increase in number of attacks strategies on MANETs there is need to propose best routing approach with efficient encryption technique which...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2012

    Incorporated File Replication and Consistency Maintenance in P2P Systems With Sanctuary

    In peer-to-peer file sharing systems, file replication and consistency maintenance are broadly used techniques for high system recital. Despite significant interdependencies between them, these two issues are typically addressed separately. This paper presents an Integrated file Replication and consistency Maintenance mechanism (IRM). Integrated file Replication and consistency Maintenance mechanism integrates...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    A Novel Approach for Intrusion Detection System in Distributed Networks Using Mobile Agents

    The rise of the networked workplace has been the most remarkable change in the last three decades of information technology. As networks of computing resources have become common, the concept of distributing related processing among multiple resources has become increasingly important. The authors have seen an explosion in information availability...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Exploring the Web Caching Method to Improve the Web Efficiency

    In this paper, discuss about the Web caching technique, Web caching is a familiar technique for reducing access latencies and bandwidth consumption. It is reducing server loads, client request latencies, and network traffic. The paper described the basic cache models like front-end, data end and distributed cache application design scenario....

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Secured Routing and QoS Using DSR in MANET

    A Mobile Ad Hoc NETworks (MANET) is a collection of mobile nodes that can communicate with each other using multi hop wireless links without utilizing any fixed based-station infrastructure and centralized management. Each mobile node in the network acts as both a host generating flows or being destination of flows...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Inventory Optimization in Efficient Supply Chain Management

    Optimal inventory control is one of the significant tasks in supply chain management. The optimal inventory control methodologies intend to reduce the supply chain cost by controlling the inventory in an effective manner, such that, the SC members will not be affected by surplus as well as shortage of inventory....

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Font Level Tainting: Another Approach for Preventing SQL Injection Attacks

    The font level tainting is the another new approach for preventing SQL injection attacks, that involves comparing the meta strings library with the SQL statements that includes the characters including the different font levels in the user input, to prevent them if found any and protecting the web applications against...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Hybrid Intrusion Detection With Weighted Signature Generation

    An Intrusion Detection System (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system IDS. Since IDS only works by matching the incoming transaction record with its predefined attack patterns...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Multipath Routing Scheme for Link Failures in Broadband Communications

    Broadband communications are concerned with various types of failures, varying from single link failures such as fiber cuts, inline equipment breakdown to multiple network failures which significantly affects the backbone of the Internet. Alternative routing schemes and backup methodology is needed to recovery from link failures. In this paper, the...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Uncloud the Cloud of Cloud Computing

    Cloud computing has become a scalable service consumption and delivery platform in the modern IT infrastructure. Cloud computing is a style of computing which must cater to the following computing needs: dynamism, abstraction and resource sharing. In this paper, architecture, types of cloud, barriers to cloud, and creating an instance...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2011

    Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

    Cognitive radio is a transforming and revolutionary technology that represents a paradigm shift in the design of wireless systems, as it allows agile and efficient utilization of the radio spectrum by offering the ability of radio sensing, self-adaptation, and dynamic spectrum sharing. In this paper the use of cooperative spectrum...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2011

    Remedial Measure in Cryptography

    Cryptography is one the most important areas of the computer networks. Encryption and decryption allows an application to secure its data from being accessed by hackers. This paper presents a new proposed solution in RSA (Rivest, Shamir and Adleman). Many of its characteristics (applications domain, performance and implementation structure) are...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2011

    Comparison of DDOS Attacks and Fast ICA Algorithms on the Basis of Time Complexity

    In Distributed Denial Of Service (DDOS) attack, an attacker may use the user computer to attack another computer by taking security weakness an attacker could take control of their computer. They could then force the computer to send huge amounts of data to a website or send spam particular email...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2011

    SBLOCK - A Closed Sequential Pattern Mining Algorithm

    Many applications are involved in sequence data. Typical examples include customer shopping sequences, web click streams, biological sequences, sequences of events in science and engineering and in nature and social development. Sequential pattern mining is the mining of frequently occurring ordered events or subsequences as patterns. In industry the sequential...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    Effective Development of Andriod Applications Using Andriod Services

    Android is the most popular operating system for mobile devices like smart phones and tablets. Android is developed on top of Linux with some modifications suitable for mobile devices. Gartner survey stated that android shares 43% of smart phone market, while apple is only 18%. There are 400,000+ apps available...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    RSA Algorithm Modular Multiplication

    This paper presents the architecture and modeling of modular multiplication for RSA public key algorithm. It supports multiple lengths like 128 bits, 256 bits, 512 bits of data. In this paper simple shift and add algorithm is used to implement the modular multiplication. It makes the processing time faster and...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    Performance Comparison of Fast Multipliers Implemented on Variable Precision Floating Point Multiplication Algorithm

    The multiplication is the basic arithmetic operation in any typical processor. The multiplication process requires more hardware resources and processing time when compared with addition and subtraction. The accuracy of a multiplication mostly relies on the precision of the multiplication; a variable precision multiplier will have more accuracy than single...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    A New Model of Fingerprint Retrieval Based on Features of Minutiae and Gabor

    Fingerprint is the commonly used biometric property in security, commerce and forensic application. One common problem in pattern recognition is lack of samples, only a few fingerprint samples from each individual are available for training a classifier. This paper proposes an approach of fingerprint retrieval based on Bayes classifier by...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2012

    Enhanced AES Algorithm

    The advanced encryption standard can be programmed in software or built with pure hardware. However Field Programmable Gate Arrays (FPGAs) offer a quicker, more customizable solution. This research investigates the AES algorithm with regard to FPGA and the Very High Speed Integrated Circuit Hardware Description Language (VHDL). Software is used...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    A Software Engineering Approach for Vulnerability Analysis

    Due to the increasing dependency on networked computer system, it is important to make a network reliable and dependent. This is even more relevant as new threats of attack are constantly being revealed, compromising the security of systems. This paper addresses this problem by presenting an attack injection methodology for...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Decoupling IPv6 From Operating Systems in Write-Ahead Logging

    Unified certifiable information has led to many intuitive advances, including DNS and the producer-consumer problem. In this paper, the authors validate the understanding of systems. This technique is continuously an appropriate objective but fell in line with their expectations. In order to achieve this ambition, they explore a relational tool...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Chaos Function Based - Secure Deniable Authentication Protocol

    The deniable authentication protocol is a new technique of modern cryptography, compared with traditional authentication, it has two characteristics; first, a receiver can verify the SCE of the message as in the traditional authentication protocol. Second, a receiver cannot prove the SCE of the message to a third party. In...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Issues in IPv4 to IPv6 Migration

    This paper contains concepts of IP addresses and the migration of IPv6 from IPv4. Till date the most commonly and widely used protocol is IPv4 for internetwork and intra network communication in both wired and wireless environment. But due to the advancement of Internet usage the availability of IP addresses...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Reusable Key Management Technique for Secured Wireless Computer Communication

    Wireless communication is used to transfer information over short distances that is a few meters as in television remote control or long distances for thousands or millions of kilometers for radio communications. It includes GPS units, garage door openers and or garage doors, wireless computer mice, keyboards and headsets, satellite...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Detecting the Replay Attack in Key-Management Over SCADA Communication Network

    Supervisory Control And Data Acquisition (SCADA) systems are control systems for many national infrastructures. In the past, SCADA systems were designed without security functionality because of the closed operating environment. However, the security of SCADA systems has become an issue with connection to open networks becoming more common. Any damage...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Enhanced Greedy Routing With Anti-Void Traversal for Wireless Sensor Networks

    In this paper the solution to the void problem is taken up as the issue. This situation which exists in the currently existing greedy routing algorithms has been studied for the wireless sensor networks. The GAR protocol is a new protocol proposed here to guarantee the delivery of packets and...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Delay Analysis for Maximal Scheduling Algorithms to Minimize the Queue Overflow Probability

    Scheduling is an important functionality in wireless networks due to both the shared nature of the wireless medium and the variations of the wireless channel over time. To focus on wireless scheduling algorithm for a downlink of a single cell that can minimize the queue overflow probability. In the past,...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Methods for Spectrum Assignment, Pricing and Access in Dual Technologies

    In India, mobile service operators have always had to scramble for more spectrum allocation. However, in the last two years, the fight for spectrum has further intensified, mainly because the mobile subscriber base has grown at a very fast pace. Spectrum is like oxygen for mobile operators and lack of...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Timestamped Key Management for Mission-Critical WAHNETs

    Cryptographic key management is challenging due to the dynamicity and the unreliable communications. Moreover, in wireless ad-hoc the number of ad-hoc wireless devices deployed at an incident scene depends on the specific nature of the incident. It is computationally infeasible to design a key management scheme in current mission-critical networks...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Computer Application in Post Processor Development of an Indigenous CAD/CAM Package

    CollabCAD is an indigenous 3D CAD/CAM software system for collaborative design and development of Industrial Designs for strategic use. This paper is for CAM module of the indigenous software, in which the development of post-processor is the task that is accomplished. The CAD model is created in CollabCAD and the...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    Analysis QOS Parameters for Single Path and Multipath Routing Protocols of MANETs

    In this paper, the authors compared single path and multipath routing protocols over mobile ad hoc wireless networks using ns-2 simulator. Simulation results are presented by varying number of source, pause time and node mobility. Multipath routing protocols for MANETs main objectives are to provide reliable communication and to ensure...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2011

    Artificial Neural Network Based Node Location Prediction for Applications in Mobile Communication

    Present generation cellular networks provide different services to the mobile users. The movement of the users is highly dependent on individual characteristics. To offer an uninterrupted service to the mobile users, continuous tracking of its location is very important. This can be achieved by the proper location management schemes. In...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2011

    Architecture for Automatic Semantic Annotation to Discover Knowledge From Heterogeneous Sensor Data

    Sensor description represented through semantic technologies in heterogeneous sensor network is a better interoperability mechanism. Through semantic annotation, it is possible to provide context awareness information from sensor networks. This will useful to improve to extract knowledge from sensor data streams and discover new sensor capabilities. The authors propose an...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2011

    Safe Semantic Web and Security Aspect Implication for Social Networking

    Web 3.0 is one of the terms used to describe the evolutionary stage of web that follow 2.0. World Wide Web is a system of interlinked hypertext documents accessed via the internet. The last few years have seen the rise of a new trend on the Internet: online social networks,...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2011

    A Multi Sensor Flood Sequencing Protocols in Sensor Networks

    Wireless sensor networks are potentially one of the most important technologies of this century. Recent advancement in wireless communications and electronics have enabled the development of low-cost, low-power, multifunctional miniature devices for use in remote sensing applications Flood is a communication primitive that can be used by the base station...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2011

    Secure SIP From DoS Based Massage Flooding Attack

    Over IP network the SIP-based VoIP system build, so it is precious by the IP network security problem. In this paper, the authors concentrate on the issue of Denial of Service (DoS) attacks which targeting the hardware and software of voice over IP servers .In this situation, they mainly identify...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Mar 2011

    SIP Security Mechanism Techniques on Voice Over Internet Protocol (VoIP) System

    SIP-based VoIP system has many security problems because of the security mechanism of VoIP system and other external factors. These effects relate to the following three aspects: confidentiality, integrity and availability. The sip security mechanism technique on VoIP system and the components of SIP have been analyzed in this paper....

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2011

    Power Aware Methodologies for Wireless Microsensors

    Microsensors are used in monitoring functions in several hazardous and non reachable places. At such places human intervention is impossible so battery replacement is impossible and hence nodes do not have access to unlimited energy. Thus, designing fault-tolerant wireless microsensor networks with long system lifetimes can be challenging. In order...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2011

    Cooperative Spectrum Sensing and Spectrum Sharing in Cognitive Radio: A Review

    Cognitive radio is a transforming and revolutionary technology that represents a paradigm shift in the design of wireless systems, as it allows agile and efficient utilization of the radio spectrum by offering the ability of radio sensing, self-adaptation, and dynamic spectrum sharing. In this paper the use of cooperative spectrum...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2011

    Remedial Measure in Cryptography

    Cryptography is one the most important areas of the computer networks. Encryption and decryption allows an application to secure its data from being accessed by hackers. This paper presents a new proposed solution in RSA (Rivest, Shamir and Adleman). Many of its characteristics (applications domain, performance and implementation structure) are...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jun 2011

    Development of Data Leakage Detection Using Data Allocation Strategies

    A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). If the data distributed to third parties is found in a public/private domain then finding the guilty party is a nontrivial task to distributor. Traditionally, this leakage of data is handled by water marking...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Sep 2011

    Comparison of DDOS Attacks and Fast ICA Algorithms on the Basis of Time Complexity

    In Distributed Denial Of Service (DDOS) attack, an attacker may use the user computer to attack another computer by taking security weakness an attacker could take control of their computer. They could then force the computer to send huge amounts of data to a website or send spam particular email...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    A Novel Approach for Intrusion Detection System in Distributed Networks Using Mobile Agents

    The rise of the networked workplace has been the most remarkable change in the last three decades of information technology. As networks of computing resources have become common, the concept of distributing related processing among multiple resources has become increasingly important. The authors have seen an explosion in information availability...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Exploring the Web Caching Method to Improve the Web Efficiency

    In this paper, discuss about the Web caching technique, Web caching is a familiar technique for reducing access latencies and bandwidth consumption. It is reducing server loads, client request latencies, and network traffic. The paper described the basic cache models like front-end, data end and distributed cache application design scenario....

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Secured Routing and QoS Using DSR in MANET

    A Mobile Ad Hoc NETworks (MANET) is a collection of mobile nodes that can communicate with each other using multi hop wireless links without utilizing any fixed based-station infrastructure and centralized management. Each mobile node in the network acts as both a host generating flows or being destination of flows...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Inventory Optimization in Efficient Supply Chain Management

    Optimal inventory control is one of the significant tasks in supply chain management. The optimal inventory control methodologies intend to reduce the supply chain cost by controlling the inventory in an effective manner, such that, the SC members will not be affected by surplus as well as shortage of inventory....

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Font Level Tainting: Another Approach for Preventing SQL Injection Attacks

    The font level tainting is the another new approach for preventing SQL injection attacks, that involves comparing the meta strings library with the SQL statements that includes the characters including the different font levels in the user input, to prevent them if found any and protecting the web applications against...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Dec 2011

    Hybrid Intrusion Detection With Weighted Signature Generation

    An Intrusion Detection System (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system IDS. Since IDS only works by matching the incoming transaction record with its predefined attack patterns...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jul 2011

    A Novel Communication Model to Improve Mobile Ad Hoc Network Routing Reliability

    Mobile Ad hoc NETworks (MANETs), are comprised of wireless nodes equipped to receive, transmit, and route information without necessarily using a preexisting infrastructure. Most of routing algorithms in MANETs only focus on routing hops. The direct consequence of using number of hops in rout selection is that routes will be...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jul 2011

    Dynamic Spectrum Access in Cognitive Radio: A Brief Review

    Today's wireless networks are characterized by fixed spectrum assignment policy. The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm, referred to as Dynamic Spectrum Access (DSA) and cognitive radio networks. The dynamic spectrum access technology can allow unlicensed secondary systems to share the...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jul 2011

    Mechanism to Optimize the Bandwidth Cost of the IP Multicast Tree

    In this paper, the authors propose a bandwidth-efficient multicast mechanism for heterogeneous wireless networks. The reduction in the bandwidth cost of an internet protocol (ip) multicast tree by adaptively selecting the cell and the wireless technology for each mobile host to join the multicast group. This enables more mobile hosts...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jul 2011

    The Security Risks Associated With Cloud Computing

    Security in cloud computing is evolving as a sub-domain of computer security, information security and network security. In addition to the security risks already present in IT, cloud computing also includes risks related to privacy, compliance regulations, identity, use of virtual machines, security of data and the security of the...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jul 2011

    Implementation of INS Using TMS320f2812 DSP Processor

    Inertial Navigation System (INS) is used in accurate attitude, position and velocity determination in wide range of applications. Usage of high performance INS is limited by its relatively high cost. Inertial sensors based on MEMS technology have recently become commercially available at lower costs. MEMS based INS is also immune...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)

  • White Papers // Jul 2011

    Optimized Architecture of Low Power, High Performance Multiplier for Crypto Chips

    The paper presents unified Architecture of an efficient and Low Power Multiplier that can support multiplication based on Galois Fields GF (2m). Cryptography Algorithms involve extensive multiplication for encryption and decryption of data using Diffe-Hellman (DH) Key exchange protocol, RSA and Elliptical Curves cryptography. These can be effectively achieved by...

    Provided By International Journal of Computer Applications in Engineering Sciences (IJCAES)