International Journal of Computer Applications

Displaying 1-40 of 4116 results

  • White Papers // Jun 2014

    Improvement of Pre-processing Capacity of Support Vector Clustering using Neural Network Kernel Functionfor Stream Data Classification

    Pre-processing of data before generation of pattern or classification is major steps. In the phase of pre-processing reduces the noise level of data using different technique of data mining. In current research trend support vector clustering is used for efficient data processing for noise reduction and pattern generation. Support vector...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Assortment of Materialized View: A Comparative Survey in Data Warehouse Environment

    Data warehouse is a repository of large amount of data collected from multiple heterogeneous and distributed data sources. Data warehouse stores lots of data in the form of views, referred as materialized views which provide a base for decision support or OLAP queries. Materialized views store the result of queries...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Analytical Approach in Terms of Lead and Lag Parameter to Tune Database Performance

    Performance tuning in database management system means escalating the performance of database by reducing time. For enhancing performance, analysis is important and analysis can be performed by neural network learning to save time spent in doing repeated work because neural network has ability to adapt dynamically varying environment. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Tuning in Database Management System based on Analysis of Combination of Time and Cost Parameter through Neural Network Learning

    Performance tuning in database management system means enhancing the performance of database, i.e. minimizing the response time at a very optimum cost. Query optimization is one of the important aspects of performance tuning. Lots of research work has been done in this field but it is still ongoing process. To...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Enhanced Secured Multi cloud using Technical Environment and Regulatory Framework

    Cloud computing is the rising generation key platform for sharing the resources like software as a service, infrastructure as a service, and platform as a service. In future all IT enterprises migrate into cloud platform. Cloud server exchanges the messages for remote location users with the help of multi cloud...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    An Energy Efficient Cooperative MISO Transmission Scheme for Cluster-based Wireless Sensor Network

    Wireless sensor network becomes an attractive choice for different applications because of their multitasking nature such as sensing the data, computing the data, and transmitting that data to the main location. But wireless sensor network have a number of tiny sensor nodes which are operate on small batteries. So it...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Various Architectural Approaches in Cloud Computing Environment for Energy and Bandwidth Minimization

    Cloud computing is one of the mainly admired subject in the computational world. It is support to processing the data that was emerged by profitable infrastructure. Cloud computing consist of large number of servers comprising of both virtual and physical servers in order to provide the resources in an optimal...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Improved Task Scheduling Algorithm in Cloud Environment

    Cloud computing is one of the hottest word in IT world and it having huge demand in these days. Some big IT companies like Google, IBM, Microsoft, Amazon, Yahoo and others develop cloud computing systems and products related to it for customers. But still customers are having difficulties for adopting...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Solution to Security and Secrecy in Cloud Environment using PAKE Protocol - A Bibliographic Survey

    Cloud computing is an emerging technology that provide people a way to share large amount of hardware and software resources that belong to different organizations. Maintaining privacy and security in cloud environment is more complicated. Mitigating threats in a distributed computing environment is a difficult task as it requires constant...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Novel Approach towards Tourism Recommendation System with Collaborative Filtering and Association Rule Mining

    In the tourism recommendation system, the number of users and items is very large. But traditional recommendation system uses partial information for identifying similar characteristics of users. Collaborative filtering is the primary approach of any recommendation system. It provides a recommendation which is easy to understand. It is based on...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Analysis and Verification of Multi-Core Enabled ESL Model using SystemC and VLang

    Today most of the System-on-Chip (SoC) integrate multiple processing cores, digital signal processors, as well as dedicated hardware accelerators, etc. This results into large and complex systems which pose challenges to conventional design and verification flow. This raises the need for higher level of abstraction (i.e. electronics system level abstraction)....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Direct Discrimination Aware Data Mining

    With the advent of data mining, in many applications the automated decision making systems are used to make fair decision, but there can be discrimination hidden in the decision made by system. Discrimination refers to treating person or entity unfairly based on their membership to a certain group. Discrimination can...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Survey on Various Techniques of Data Storage on Cloud using Third Party Auditor

    In present scenario cloud computing emerges as one of the most powerful computing technology to provide dynamic service on demand on very large scale over the internet. Cloud computing offers various features like scalability, pay on use, using these features giants companies use cloud to store their data, In cloud...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Hybrid Approach for Recommendation System in Web Graph Mining

    Large amount of information is available on web and information extraction takes place in huge volume. When queries are submitted to search engines they are generally in natural languages and contain just one or two words. Search engine are unable to recognize natural language and thus it becomes difficult to...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Ancient Indian Vedic Mathematics based 32-Bit Multiplier Design for High Speed and Low Power Processors

    The use of Vedic mathematics lies in the fact that it reduces the typical calculation in the conventional mathematics to very simple once. This is so because the Vedic formulae have claimed to be building on the natural principles on which the human mind works. Vedic mathematics is a several...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Implementation of USB 3.0 SuperSpeed Physical Layer using Verilog HDL

    In this proposed design it mainly includes USB 3.0, physical layer along with USB 2.0 functionality with super speed functionality. Physical layer mainly contains PCI express and PIPE interface. This proposed design transferred data from transmitter to receiver serially. This design manages to transfer data either on 2.5GT/s or on...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Job Scheduling Algorithms in Cloud Computing: A Survey

    Cloud computing is the new IT paradigm that makes the delivery of computing resources (hardware and software), applications and data as a service over the internet to its users. Cloud computing mainly intended to provide reliable, dynamic and virtualized services in terms of resources for doing computation, storage and knowledge...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Survey on MapReduce Scheduling Algorithms

    MapReduce is a programming model used by Google to process large amount of data in a distributed computing environment. It is usually used to perform distributed computing on clusters of computers. Computational processing of data stored on either a file system or a database usually occurs. MapReduce takes the advantage...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Comparison of Search based Techniques for Automated Test Data Generation

    One of the essential parts of the software development process is software testing as it ensures the delivery of a good quality and reliable software. Various techniques and algorithms have been developed to carry out the testing process. In this paper, the authors deal with utility of the nature based...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    FPGA Implementation of Area Efficient and Delay Optimized 32-Bit SQRT CSLA with First Addition Logic

    Binary addition is a fundamental operation in most digital circuits. There are a variety of adders, each has certain performance. Parallel adders are used for fast binary addition which plays a crucial impersonation in majority of digital circuit designs including Digital Signal Processors (DSP) and microprocessor data path unit. In...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Develepment of Real Time Application Platform for Linux Kernel with Preempt-RT

    The On Board Computer (OBC) of an aerospace vehicle carries out control, guidance and navigation operations during the flight. It consists of a processor and IO board to execute the real time embedded software and to read input data from other subsystems & send commands to control system. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Hybrid TB-LEACH Energy Based Multihop Protocol

    Wireless sensor network is defined as the network composed of tiny and energy restricted sensor nodes. Sensor nodes collect the useful information from surrounding environment and deliver it to the base station. Sensor nodes have limited energy. Routing protocols must consume minimum energy in order to prolong the network lifetime....

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Recent Trends in Energy-Efficient Clustering in WSNs

    Tremendous growth has been observed in the use of Wireless Sensor Networks (WSNs) in the last decade. WSNs behave like an interface between the virtual and physical worlds. Sensor nodes sense the changes in external environment and send the data to other nodes in the network or the sink, also...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparison of Clustering and Modification based Graph Anonymization Methods with Constraints

    In this paper a comparison is performed on two of the key methods for graph anonymization and their behavior is evaluated when constraints are incorporated into the anonymization process. The two methods tested are node clustering and node modification and are applied to Online Social Network (OSN) graph datasets. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization

    Load balancing can be done at two levels, the HTTP level and the network level. It refers to the distribution of the HTTP request made by the user across the web server in a server cluster and is achieved by various algorithms such as random selection, round robin, weighted round...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A State-of-Art Load Balancing Algorithms in Cloud Computing

    Cloud computing is the ultimate technology in internet. It is a means of acquiring computing possessions, making do and delivering software and services. Cloud computing allows the customers to apply the application without set up and access their own files on any device with internet. Cloud services can be acquired...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Using Kerberos with Digital Signature and AES Encryption to Provide Data Security in Cloud Computing

    The cloud computing is the next generation platform that provides dynamic resources pools, virtualization, and high availableness. Today, with the assistance of those computing, the authors are able to utilize ascendable, distributed computing environments among the boundary of the web, It provides several edges in terms of low value and...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Prototyped LEACH Routing Algorithm for the Enhancement of Energy Efficiency in Wireless Sensor Network

    The topic of discussion and research is wireless sensor network and it just because it is an always application based. The research on wireless sensor networks has recently received much attention by offering an advantage of monitoring different kinds of environments by sensing their physical phenomenon. There are some important...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Built in Self-Test for 4

    Built In Self-Test (BIST) is a technique or a method which allow the circuit to test itself. BIST increases the controllability and observability of integrated circuit therefore it is easier to apply inputs and then detect faults from it. BIST also decreases the time of testing integrated circuits & gives...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    High Imperceptible Data Hiding using Remainder Method

    In this paper the authors will propose a high quality image steganography technique which can hide secret data within an image in such a way so that it is imperceptible to human eye. This method solves the overlapping problem of remainder and use modulo operator efficiently for hiding purpose. First,...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Performance Analysis of Multiple Keys used for Data Security

    Data security is an essential component of an organization in order to keep the information safe from various competitors. It helps to ensure the privacy of a user from others. Secured and timely transmission of data is always an important aspect for an organization. The use of strong encryption algorithms...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Application of Factor Analysis to k-means Clustering Algorithm on Transportation Data

    Factor analysis is a very useful linear algebra technique used for dimensionality reduction. It is also used for data compression and visualization of high dimensional datasets. This technique tries to identify from among a large set of variables, a reduced set of components which summarizes the original data. This is...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Energy Efficient Hierarchy-based Clustering Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consisting of a large number of sensor nodes is effective for gathering data in a variety of environments. Since the sensors operate on battery of limited power, it is a challenging task to design an efficient routing scheme which can minimize the delay while offering high...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Multilevel Security and its Application to Enhance Data Protection

    A vast amount of information available on the internet along with the increased use of internet as a communication medium served a great deal in making the information available vulnerable. The number as well as the technique of attacks has become more and more sophisticated with time. This paper focuses...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Supporting Ranking Queries for Search-As-You-Type in Databases using WIP

    Most of the search engines in Internet have simplified keyword-based search concept. The relational database management systems do not allow keyword-based search while they offers powerful query languages. Existing search systems that are based on keyword in relational database require users to submit a complete query to compute answers. Often...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Reliable Data Aggregation using Ant Colony Optimization with State Transition Ant Rule in Sensor Network

    Data aggregation plays a vital role as the Wireless Sensor Network (WSN) is highly susceptible to attacks. In WSN, data aggregation correlates the sensing data and aggregates at the intermediate nodes by reducing the time taken for message transfer. Works conducted on Concealed Data Aggregation scheme for Multiple Applications (CDAMA)...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Data Mining in Web Search Engine Optimization and User Assisted Rank Results

    In the fast moving world, the use of web is been increasing day-by-day so that the requirement of users relative to web search are also increasing. The content search over the web is one of the important research area comes under the web content mining. According to a traditional search...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    A Comparative Study on LEACH Routing Protocol and its Variants in Wireless Sensor Networks: A Survey

    Wireless sensor network consists of sensor nodes which are powered by battery; to communicate with each other for environment monitoring. Energy efficiency is the main issue in wireless sensor networks. Therefore, to maximize network lifetime and achieve maximum reliability and scalability, routing techniques have been developed. Leach is the conventional...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Productivity Improvement in the Pride's Spare Parts Manufacturing using Computer Simulation and Data Envelopment Analysis

    Generally, improving production rate is a typical crucial problem in any manufacturing system. To cope with the problem, different kinds of scientific method stems from trial and error may be applied which imposes high costs. Rottenly testing any proposed scenarios may have significant effect on both operational management and manufacturing...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2014

    Big Data: The Next-Gen Google

    It is rightly said that invention is the mother of necessity. Big data - A new word in the information world. This paper describes the concept of big data and its research areas have been explored. This paper presents what all changes big data can bring to day-to-day lives. There...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Security Engineering in G-Cloud: A Trend towards Secure e-Governance

    Government is now-a-days trying to improve efficiency using technologies from IT industry to stimulate its processes more efficiently and faster. Hence, e-Governance was brought into existence, e-governance provided services like e-banking, fund transfer, e-billing, online registration etc, online. To ameliorate things further and introduce more advantages, it was proposed to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Enhancing Security in VANET in Terms of Confidentiality and Authentication

    VANET is very useful for solving traffic related problems and provide safety to lives of drivers and passengers moving on the road. In this paper, the proposed algorithm is helpful in authenticating a user and solving traffic related problems and provide more efficient broadcast system by covering large distance. According...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2012

    A Multilevel Security Scheme Based on UNICODE and RGB Color Model Using DNA Cryptography

    RGB color oriented DNA based computing is a new research area in cryptography. In this paper, a formal approach to encrypt and decrypt information using colors is proposed. An information or message consists of set of characters, symbols, and digits. Encoding is done using UNICODE, so that any language can...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Implementation of Security Services in LMA Based Multicast Key Management Scheme for Proxy Mobile Ipv6 Networks

    Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol to support Mobile Nodes (MNs) for IP with mobility, without requiring the participation of MNs in any mobility-related signaling. Network based mobility management protocol is more advanced from the host based mobility protocol. Recently, multicast issues in PMIPv6 networks have...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Security in Wireless Sensor Networks using Frequency Hopping

    A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. These networks are vulnerable to internal and external attacks due to the lack of tamper-resistant packaging and the insecure nature of wireless communication channels. Since most...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    Improving Security of E-Commerce Application by Using Multifactor Authentication

    All e-commerce environments require support for security properties such as authentication, authorization, data confidentiality, and non -repudiation. The most common method of authentication or protection against intrusion in a computer system is to use alphanumeric usernames and password. Choosing a strong password and protecting the chosen password has always been...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2013

    Towards an Approach for Improved Security in Wireless Networks

    With increase in the use of internet there has been an increased opportunity in identity fraud, organized crime and various other forms of cyber-crime. For high security transmission over a network, high randomness is required in the seed used for generating a key. This paper deals with two phenomena: biometric...

    Provided By International Journal of Computer Applications

  • White Papers // May 2011

    Implementation of Highly Efficient Authentication and Transaction Security

    Kerberos is a network authentication protocol & is designed to provide strong authentication for client/server applications by using secret-key cryptography. The authors' was aimed at enhancing the security of transactions over a network. In this paper, they used Kerberos Encryption Technique for authentication and transaction security in the network. Further,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Architecting the Network for the Cloud using Security Guidelines

    Cloud computing is the latest emerging technology which offers reduced capital expenditure, complexity, operational risks, maintenance, and increased scalability while providing the services at different abstraction levels, namely Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). A new approach called cloud networking that enables and adds the networking functions and resources...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Secure Routing in Wireless Sensor Networks: A State of the Art

    Wireless Sensor Networks (WSNs) have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. Recently, there is a great interest related to routing process in WSNs. Security aspects in routing protocols have not been given enough attention, since most of the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2013

    Enhancing Data Security in Cloud Using Shuffling and Distribution Algorithm

    Cloud computing is a technology which is used to provide service over internet by means of computing resources (hardware and software). This paper describes conversion of data into images and the numbered images are shuffled using fisher Yates shuffling algorithm which randomly shuffles the image until nothing is left. However,...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Different Aspect Grid Security; Based on User Authenticity and Message-Based Security Service: A Review

    Today, individuals and institutions in science, research organization and industry are increasingly forming virtual organizations to pool resources and tackle a common objective. Massive amount of information has been passed not only confined into particular country but also spread out across the globe. Participants in virtual organizations commonly need to...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    An Approach to Enhance Security of Cloud Computing Services Using Software Engineering Model

    Cloud computing has great prospective of benefitting rigorous computational supremacy to the civilization society at reduced price. It facilitates consumers amid restricted computational assets to subcontract their bulky computational work assignments to the cloud, and cost-effectively have the benefit of the immense computational supremacy, bandwidth, storage, and even suitable software...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Analysis of Mobile IP Protocols Security

    After the evolution from 2G to 3G and now 3G to 4G, 4G will be based on the transmission of IP packets only, using an architecture known as mobile IPv6. This paper describes the route optimization between Mobile IPv6 nodes which introduced several vulnerabilities in mobile environment. The authors first...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Distributed Combined Authentication and Intrusion Detection in High-Security Mobile Ad Hoc Networks to Reduce the Computation Complexity

    Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security Mobile Ad-hoc NETworks (MANETs). This paper studies distributed combined authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics is deployed to work with Intrusion Detection Systems (IDS) to alleviate the shortcomings of unimodal biometric...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Optimized Secure Data Delivery Based on Randomized Routing in Wireless Sensor Networks

    Security and energy restriction are of most concern in pushing the success of Wireless Sensor Networks (WSNs) for their wide deployment. Despite years of much intensive research, deploying secure communication between wireless nodes remains the cumbersome setup process. Due to the deprived physical layout of sensor nodes, it is generally...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    Network Security Vulnerabilities Heading for Malicious Attack

    An organization requires that WLAN must address three critical areas: data confidentiality and integrity, authentication and access control and intrusion detection and prevention. By the growth of wireless network, so many security threats have also been raised that does not require much expertise and expensive equipment to launch an attack...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2012

    A Novel Time Based Authentication Technique for Enhancing Grid Computing Security

    Secure data communication is the most vital and crucial concern in Grid computing environment, where data flows across multiple components in different organizational domains that are not under control of the single data proprietor. An appropriate authentication mechanism is the very basic requisite for building a protected grid environment. In...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2013

    APSAR: Anonymous Position Base Security Aware Routing Protocol for MANETs

    In major scenarios of Mobile Ad-hoc NETworking (MANET), nodes communicate to each other based on public identities. But while considering applications such as military and law enforcement domains nodes should not expose their identities and node movements should be untraceable. So, alternately, nodes need to communicate based on their current...

    Provided By International Journal of Computer Applications

  • White Papers // May 2012

    Secure Sensor Node Authentication in Wireless Sensor Networks

    Wireless sensor networks are usually installed in rough environments and sometime when the traditional network fails to deploy on that environments. The nodes in the network collect data and information from its environment. These data are moves from one node to another. All the data are not publicly accessible; some...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Mining DoS Attack Sequences on Network Traffic Using Fuzzy Time Interval

    Intrusion of network which couldn't be analyzed, detected and prevented may make whole network system paralyze while the abnormal detection can prevent it by detecting the known and unknown character of data. Many intrusions aren't composed by single events, but by a series of attack steps in chronological order. Analyzing...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones

    Mobile technology and Internet is becoming an integral part of the people daily life. Widespread usage of smart phones and its greater in-built functionality have provided portability to perform transaction like shopping, ticket booking and banking transactions on the fly. In mobile computing, the characteristic like context awareness allows to...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Comparative Analysis of Existing Dynamic Load Balancing Techniques

    The anticipated uptake of Cloud computing, built on well-established research in Web Services, networks, utility computing, distributed computing and virtualization, will bring many advantages in cost, flexibility and availability for service users. Cloud is based on the data centers which are powerful to handle large number of users. As the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    A Novel Approach for Selection of Appropriate Software as a Service in Cloud Computing

    Cloud Computing is an awesome technology. It has to go-ahead and annexes the computing world. The development of cloud computing embed its sprouting continually in the recent era. Cloud Computing have contrived clan very lavish comfortable to perform their chore. As its fundamental definition says that as-you-pay-as-you-go. In this paper,...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    An Approach to Security, Performance and Bandwidth Issues in ASP.NET Websites

    The global presence of ASP.NET websites is increasing with each passing day. With increase in the number of ASP.NET websites, issues pertaining to website's security vulnerabilities, performance and bandwidth have come up to the surface. The security vulnerabilities in a website enable access to critical data and resources of the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    A Certificateless Authentication Key Agreement Protocol to Mitigate MITM and Key-Compromise Impersonation Attacks

    To overcome the key escrow issues of the identity based cryptography, the researchers proposed a new CertificateLess Two-party Authentication Key Agreement (CL-2AKA) protocol. In this paper an improved CL-2AKA Protocol has been proposed. The proposed protocol CAKA (Certificateless Authentication Key Agreement Protocol) is based on the algebraic properties of the...

    Provided By International Journal of Computer Applications

  • White Papers // May 2013

    Generic Software Risk Management Framework for SCADA System

    Supervisory Control And Data Acquisition(SCADA) systems is one of important software systems which are used for monitoring and controlling industrial systems that are geographically spread over thousands of kilometers. These systems need to monitor and control so many field sites through thousands of devices that are varying in type, technology...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    Iris Biometric Recognition for Person Identification in Security Systems

    The security is an important aspect in the people daily life whichever the system the authors consider security plays vital role. The biometric person identification technique based on the pattern of the human iris is well suited to be applied to access control and provides strong e-security. Security systems having...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2011

    Security Analysis in Hierarchical Resource Arrangements in Grid Computing

    As the days going on, desires of netizens increases to meet unforeseen emergency online demands for accessing the services, owning the resources for required period which exists in the e-pool distributive. The needs met by the on-the-fly framed infrastructure (i.e.) virtual organization which assimilates the dynamic collection of diverse resources...

    Provided By International Journal of Computer Applications

  • White Papers // Apr 2013

    Security Testing in Requirements Phase of SDLC

    The importance and real potential of security in Requirements Engineering (RE) is now being well recognized. The inclusion of security controls and measures during the requirements phase helps to design, implement, develop and maintain secure and cost effective software. Security testing is one of the prominent techniques to reveal defects...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2012

    Use of Digital Signature and Rijndael Encryption Algorithm to Enhanced Security of Data in Cloud Computing Services

    Cloud computing is an amazing technology above all other types of computing. Cloud computing implies sharing of computing resources rather than having local servers or personal individual devices to handle the applications. The goal of cloud computing is to increase the speed of computations per second by applying traditional supercomputing,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Trust Certificate Sequence Exchange (TCSE) for Black Hole Detection in MANET: Reliability Value Based Approach

    A mobile ad hoc network is a temporary network based on movable nodes within a specific range. Due to this motion the information related to nodes is continually changes likewise the addition of new node and its deletion from network is required. Due to this the authenticity of node must...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    An Investigation on the Issues in Cloud Data Security

    Cloud computing is one of the most fascinating technologies which attract the users to outsource their data from local to remote cloud servers using Internet. A large number of cryptographic schemes are available to encrypt the sensitive information and to protect data. Even though it protects the data but it...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    CDTRB: QoS Based Dynamic Topology Control for Ad-Hoc Network

    MANET is an infrastructure less ad hoc network in which nodes can move freely between specific regions. In this region multiple nodes can communicate with each other. Due to this heavy movement of nodes the topology of the connections is continuously changing within a specific transmission range of the network....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Approach Towards Optimum Data Transfer with Various Automatic Variable Key (AVK) Techniques to Achieve Perfect Security with Analysis and Comparison

    In all cryptosystem the key challenge of the designer is to make key unbreakable. Shannon proposed that key would be impossible to break if the key is made time variant. The time variant key can be implemented by changing key from session to session. AVK was one of the noble...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Surface EMG Signal Amplification and Filtering

    ElectroMyoGraphic (EMG) signals have been widely employed as a control signal in rehabilitation and a means of diagnosis in health care. Signal amplification and filtering is the first step in surface EMG signal processing and application systems. The characteristics of the amplifiers and filters determine the quality of EMG signals....

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Enabling Indirect Mutual Trust for Cloud Storage Systems

    Cloud computing is a forthcoming revolution in Information Technology (IT) industry because of its performance, accessibility, low cost and many other luxuries. It provides gigantic storage for data and faster computing to customers over the internet. It essentially shifts the database and application software to the large data centers, i.e.,...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    Analyzing the Efficiency of the Packet Hiding Methods Based on the Strong Hiding Commitment Scheme (SHCS)

    In this paper the authors describes about analyze the packet hiding methods. These methods are efficiently hiding the data packets while transferring in the network Medias. To protect the system from the unauthorized users, unauthorized programs, threaten the confidential matters and confirm the system availability to the legal users. The...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    A Novel Method to Access BIOS Through Client Server Technology

    Everyone has secrets and some have more than others. Each and every one wanted to have their data and information to be more secure and confidential. There are many ways to maintain the data and information to be safe. This paper is to be maintained the file or data to...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2013

    An Efficient Security Mechanism to Detect the Packet Droppers in a MANET Under Individual and Collusive Adversarial Models

    Most of the existing security mechanisms for detecting the packet droppers in a mobile ad hoc network generally detect the adversarial nodes performing the packet drop individually wherein false accusations upon an honest node by an adversarial node are also possible. In this paper, the authors propose a security mechanism...

    Provided By International Journal of Computer Applications