International Journal Of Computer Architecture And Mobility

Displaying 1-38 of 38 results

  • White Papers // Sep 2014

    Identity Theft-Problem on a Rise

    Identity theft has become one of the most lucrative criminal endeavors. Identity theft occurs when a criminal obtains enough personal information (driver's license, social security number, credit/debit card number, etc.) to impersonate someone else. While the stolen information can be used for a number of fraudulent purposes, financial gain -...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2014

    Dependable Fault-Tolerant Based Software Architectures

    Dependable software architectures determine the method of integrating a fault tolerance technique with a given system in order to make the system dependable. Dependable architectures demonstrably possess properties such as safety, security, and fault tolerance. Enriching software architecture descriptions by including dependability attributes will enable and facilitate the reuse of...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2014

    An Enhancing Approaches Using Digital Signature and Delphi Against Wormhole Attacks Detection in MANET

    Wireless network is at its peak now-a-days to be connected anytime and anywhere popularity is desired. Mobile Ad hoc NETwork (MANET) is a former and existing infrastructure to determine the topology of wireless mobile nodes that do not need, have been distributed. In this paper, the authors through the wormhole...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2014

    A Study on Designing Robust 4G - Wireless Services

    As the mobile communication is continuously one of the hottest areas that are developing tremendously, with advanced techniques emerging in all the fields of mobile and wireless communications. In this paper, the authors will sketch the interaction between technology & society that will help to develop 4G in a way...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2014

    Rushing Attacks Against the Attacks of the Routing Protocol Approach

    A Mobile Ad-hoc NETwork or MANET nodes forward the packets of information or a wired connection node of the mobile nodes without covers. For routing packets in a central control there, topology changes rapidly and is unproductively. Communication is also on mutual trust. Many proposed routing protocol, its overhead is...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2014

    En Review: - Strengthening in AODV Routing Protocol by Flooding Attacks Discrepancy of TTL Parameters to Improve Overall Recital

    Mobile Ad hoc NETworks (MANETs) mobile nodes connected by wireless links to self - configuring the network. Self configurability and rapid deployment of MANET feature enables user the most attractive option. Routing in the network decides the network performance which is an important issue. Ad hoc On-demand Distance Vector (AODV)...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2014

    Data Organization for SQL Injection Attacks Using Classifier

    Web application is the user interaction or supporting layer or interface platform providing easy or flexible accesses. Several services are available on web for their smooth working, it may be in the respect of application design or may be security framework. Web accessing is a platform for users, they may...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2014

    Evaluation of RIP and OSPF Routing Protocols Using OPNET

    Recently, a lot of developments have been taken place in computer networks and now it is the necessity that the computer in one geographical location must communicate with another computer located at different geographical location. For the sake of communication various routing protocols are used in which a routing table...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Mar 2014

    CRP - Routing Protocol for Cognitive Radio Ad Hoc Networks

    Cognitive radio is used to solve the spectrum scarcity problem in wireless networks, by using the existing wireless spectrum when they are not in use. But routing in such a network is very much problematic as many challenges arises in cognet network like collaboration between the route selection and spectrum...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Feb 2014

    System Security Design Framework

    Millions of web applications techniques are available in respect of hardware design or by software design, several software's are following general principles and their own defining rules for keeping and monitoring data flow. Web application is the biggest designed modules contains most intelligibly defined software, comprises millions of principle, rules,...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Feb 2014

    SQL-Injection Design Generalization

    Web applications are facing more unauthorized access by illegitimate users, several tools, designs, and approaches has been designed to get fraudulent work done. The most devastating attacks found on web applications are phishing attacks, surfing, DoS attack etc. among all these attack SQL-injection is found to be the disastrous attack...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Feb 2014

    Attacking and Security Techniques Scenario Design

    Web application tools designing and creation requires different approaches, algorithms, constraints and procedures but skilled attackers follows different self evaluated methods designed on the basis of previous evaluated cases or data operating techniques and generated way to fetch loopholes in system. Millions of websites are susceptible to these vulnerabilities may...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Nov 2013

    Design of an Optimized System for Joining Tables in WSN Using Optimized DNLJP Algorithm

    Sensor networks are multi-hop wireless networks of resource-constrained sensor nodes used to realize high-level collaborative sensing tasks. To query or access data generated by the sensor nodes, the sensor network can be viewed as a distributed database. In this paper, the authors are developing application for communication-efficient implementation of join...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Oct 2013

    An Application of Information Security through Hybrid Approach in Cryptography Technique

    Networks like internet applications are growing very high, so the needs to secure such type of applications are increased. Encryption techniques play an important role in information systems for security. On the other end, those technique which consume a significant amount of computing resources such as execution time, memory, and...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Oct 2013

    Review:- EN-efficient Approaches for MANETs in Rushing Attacks

    This network is very widely efficient to use when the mobile ad hoc network is a self-organizing system of mobile nodes that communicates with each other via wireless links with no fixed infrastructure or centralized administration such as base stations or Access Points (AP) and can be rapidly deployed. The...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Aug 2013

    Challenges to MAC Layer in Mobile Ad-Hoc Networks & its Routing Protocols

    Mobile Ad-hoc NETwork (MANET) are a new paradigm of wireless wearable devices enabling instantaneous person-to-person, person-to-machine or machine-to-person communications immediately and easily. In this paper, an overview and history of MANET is given. The authors discuss the challenges which should keep in mind for designing of MAC layer at network...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2013

    Interrupt Mechanism for Hybrid Operating System

    Real time performance analysis is critical during the design and integration of embedded software to guarantee that application time constraints will be met at run time. To select an appropriate operating system for an embedded system for a specific application, OS services needs to be analyzed. These OS services are...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2013

    A New Modified Decision Tree Algorithm Based on ID3

    Decision tree is an important method of classification in data mining, it is used for prediction and forecasting from historical data. ID3 is one of the popular decision tree algorithm. In this paper, a new modified decision tree algorithm is proposed which combines the concept of similarity measure and decision...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2013

    A Study on 4G Network and Its Security

    With increasing user demands for wider service due to rapid growth & variety of IT (Information Technology) industry, the service with the data rate of 30 mbps cannot accommodate the future mobile multimedia environment. Therefore, with the advent 4th Generation communication system or 4G, there will be the certain path...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2013

    A Survey of Frequent Itemsets Mining for Network Traffic

    Today's digital life is based on network as the network grows the amount of data on network also increases rapidly. Due to this highly efficient algorithm is required for data mining and for accessing data from large datasets. In frequent itemsets are produced from very big or huge data sets...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Concept and techniques of transaction processing of Distributed Database management system

    A Distributed DataBase (DDB) is a collection of multiple, logically interrelated databases distributed over a computer network. A Distributed DataBase Management System (distributed DBMS) is the software system that permits the management of the distributed database and makes the distribution transparent to the users. There are 2 processes in distributed...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Concurrency Control issues in Mobile Database

    Mobile computing is a revolutionary technology, born as a result of remarkable advances in computer hardware and wireless communication. Mobile applications have become increasingly popular in recent years. Today, it is not uncommon to see people playing games or reading mails on handphones. With the rapid advances in mobile computing...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Research Domain & Technologies Generalization of A.I.

    The technology has enhanced & captured every aspect of life, artificial intelligence has proven its magic in every field, it may be in security systems, home appliances, intelligence system for automation processes, simulation systems for predictive purposes, biological observations & symptoms for recognitions, knowledge base systems for data classification &...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Mobile Web Architecture: A Survey

    The mobile Web refers to the use of Internet-connected applications, or browser-based access to the Internet from a mobile device, such as a Smartphone or tablet computer, connected to a wireless network. Traditionally, access to the Web has been via fixed-line services. The Web is becoming more accessible by portable...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    New TCP Corruption Control Mechanism For Wireless Network

    TCP congestion control is end to end control mechanism. Which is implemented through controlling some important parameter change comparing to wire networks, there are many different characteristics in wireless environments. In this paper, new mechanism for TCP corruption control is presented. It considers the influences to TCP sender's packet sending...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2013

    Intelligent Data Security - Efficient Way to Store the data

    Data security has always been the need of many business sectors. Especially in banking area's where the critical information of the customer's is there with the banks. Increasing cyber-attacks, network spoofing, key logging, malwares and viruses are the threats to data. In this paper author proposed an algorithm which will...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2013

    Prediction of Results in Education By Data Mining

    Now-a-days, a lot of information is available everywhere but the user need to use it smartly and apply it wisely. Here, the authors want to focus on the basic terminology of data mining can be used to predict the final year results by using students academic information since 1st standard...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2013

    An Efficient Approach Based On Cluster system on MANETs Routing Protocol

    In this paper, is a very efficient work have done with the several computing environments it can be expected based on the recent progresses and advances in computing and communication technologies. And the next ways of mobile communications will include both prestigious infrastructure wireless networks and novel infrastructure less Mobile...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Wireless Vision Sensor Node Based on FPGA

    The low-power consumption remote Industrial security alarm system developed by applying WSN, FPGA and GSM technology is presented. The recent advances in the embedded system, semiconductor and sensor system have made it possible to develop an efficient, low power vision sensor. Security and surveillance are one of the most popular...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Defended Cloud Data Storage

    Cloud computing is the next stage in providing the means through which everything from computing power to computing infrastructure, applications, business processes to personal collaboration can be delivered to the user as a service, internet evolution wherever and whenever they need. There are three main service offered by cloud such...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Obscure Surveillance and Server Monitoring

    Obscure surveillance and server monitoring is a technique to administrate a remote server and monitor the logs of client's work. It's a browseable method through which the authors can administrate the server from any platform. It contains a two level encryption one at the browser side and another at the...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Role of RFID Blocking Wallets

    In this paper, the authors provide a prudent analysis of the RFID blocking wallets-checking its feasibility. The research paper starts with an introduction of RFID devices and blocking wallets. This is followed by the working of blocking wallets and its need for protecting RFID devices. Then the paper gives by...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Mar 2013

    Study and Comparison of Iris Edge Detection Technique

    In present era, biometric systems are getting more attention as security is the most important and essential criteria. The security systems demands for more authenticate, reliable and fast algorithms to implement biometric system. To deal with the security, physical and behavioral characteristics play an important role than Personal Identification Number...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jan 2013

    Phishing Attack Generalization

    Most of the attacks on web application occur by hits and trial methods, analysis of previous methods, misguiding users etc. User's are intelligent but could see only, that, which are visible. Internal configuration or working are hidden by the user, even by designer also, because web application has to cross...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Dec 2012

    Web Security Designing Algorithm: A Protective Shield

    Web attack has been increased to much extend, with every security technique counter attack has been designed to get unauthorized access for malfunctioning, but security designer has presented their best approaches or tools to protect web application and its components from attacks, various techniques and tools are available based on...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Dec 2012

    Web Attacking Methods : A Malfunctioning Approach

    Web application comprises different components like language, database, scripting language, HTTP or HTTPS connection procedure, validation, error generation. If all components are 100% secure, it will become impossible to attack web application, but still because of improper designing, implementation, use etc. these all are made susceptible to variety of attacks,...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Nov 2012

    Firewall as a Portable Embedded System

    The firewall is defined as a set of components that restricts an access between a protected network & an unprotected network. Problem with firewall are it does not provide full protection against virus, prevention against previously unknown attack type and protection against insider/connection that do not go through it. A...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Nov 2012

    Graphical Password (Puzzles) Authentication System

    In this paper, a graphical password system with a puzzle to increase the remembrance of the password is discussed. In proposed paper, a block-based graphical password scheme called Image Block Change (IBC) is presented. In this system a password consists of puzzles of some images in which user can select...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Wireless Vision Sensor Node Based on FPGA

    The low-power consumption remote Industrial security alarm system developed by applying WSN, FPGA and GSM technology is presented. The recent advances in the embedded system, semiconductor and sensor system have made it possible to develop an efficient, low power vision sensor. Security and surveillance are one of the most popular...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Defended Cloud Data Storage

    Cloud computing is the next stage in providing the means through which everything from computing power to computing infrastructure, applications, business processes to personal collaboration can be delivered to the user as a service, internet evolution wherever and whenever they need. There are three main service offered by cloud such...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2013

    Intelligent Data Security - Efficient Way to Store the data

    Data security has always been the need of many business sectors. Especially in banking area's where the critical information of the customer's is there with the banks. Increasing cyber-attacks, network spoofing, key logging, malwares and viruses are the threats to data. In this paper author proposed an algorithm which will...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Obscure Surveillance and Server Monitoring

    Obscure surveillance and server monitoring is a technique to administrate a remote server and monitor the logs of client's work. It's a browseable method through which the authors can administrate the server from any platform. It contains a two level encryption one at the browser side and another at the...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Nov 2012

    Firewall as a Portable Embedded System

    The firewall is defined as a set of components that restricts an access between a protected network & an unprotected network. Problem with firewall are it does not provide full protection against virus, prevention against previously unknown attack type and protection against insider/connection that do not go through it. A...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Concept and techniques of transaction processing of Distributed Database management system

    A Distributed DataBase (DDB) is a collection of multiple, logically interrelated databases distributed over a computer network. A Distributed DataBase Management System (distributed DBMS) is the software system that permits the management of the distributed database and makes the distribution transparent to the users. There are 2 processes in distributed...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2013

    Prediction of Results in Education By Data Mining

    Now-a-days, a lot of information is available everywhere but the user need to use it smartly and apply it wisely. Here, the authors want to focus on the basic terminology of data mining can be used to predict the final year results by using students academic information since 1st standard...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2013

    Interrupt Mechanism for Hybrid Operating System

    Real time performance analysis is critical during the design and integration of embedded software to guarantee that application time constraints will be met at run time. To select an appropriate operating system for an embedded system for a specific application, OS services needs to be analyzed. These OS services are...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Concurrency Control issues in Mobile Database

    Mobile computing is a revolutionary technology, born as a result of remarkable advances in computer hardware and wireless communication. Mobile applications have become increasingly popular in recent years. Today, it is not uncommon to see people playing games or reading mails on handphones. With the rapid advances in mobile computing...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jan 2013

    Phishing Attack Generalization

    Most of the attacks on web application occur by hits and trial methods, analysis of previous methods, misguiding users etc. User's are intelligent but could see only, that, which are visible. Internal configuration or working are hidden by the user, even by designer also, because web application has to cross...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2014

    An Enhancing Approaches Using Digital Signature and Delphi Against Wormhole Attacks Detection in MANET

    Wireless network is at its peak now-a-days to be connected anytime and anywhere popularity is desired. Mobile Ad hoc NETwork (MANET) is a former and existing infrastructure to determine the topology of wireless mobile nodes that do not need, have been distributed. In this paper, the authors through the wormhole...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2014

    Rushing Attacks Against the Attacks of the Routing Protocol Approach

    A Mobile Ad-hoc NETwork or MANET nodes forward the packets of information or a wired connection node of the mobile nodes without covers. For routing packets in a central control there, topology changes rapidly and is unproductively. Communication is also on mutual trust. Many proposed routing protocol, its overhead is...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2014

    En Review: - Strengthening in AODV Routing Protocol by Flooding Attacks Discrepancy of TTL Parameters to Improve Overall Recital

    Mobile Ad hoc NETworks (MANETs) mobile nodes connected by wireless links to self - configuring the network. Self configurability and rapid deployment of MANET feature enables user the most attractive option. Routing in the network decides the network performance which is an important issue. Ad hoc On-demand Distance Vector (AODV)...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2014

    Data Organization for SQL Injection Attacks Using Classifier

    Web application is the user interaction or supporting layer or interface platform providing easy or flexible accesses. Several services are available on web for their smooth working, it may be in the respect of application design or may be security framework. Web accessing is a platform for users, they may...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Sep 2014

    Identity Theft-Problem on a Rise

    Identity theft has become one of the most lucrative criminal endeavors. Identity theft occurs when a criminal obtains enough personal information (driver's license, social security number, credit/debit card number, etc.) to impersonate someone else. While the stolen information can be used for a number of fraudulent purposes, financial gain -...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2014

    Dependable Fault-Tolerant Based Software Architectures

    Dependable software architectures determine the method of integrating a fault tolerance technique with a given system in order to make the system dependable. Dependable architectures demonstrably possess properties such as safety, security, and fault tolerance. Enriching software architecture descriptions by including dependability attributes will enable and facilitate the reuse of...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Nov 2013

    Design of an Optimized System for Joining Tables in WSN Using Optimized DNLJP Algorithm

    Sensor networks are multi-hop wireless networks of resource-constrained sensor nodes used to realize high-level collaborative sensing tasks. To query or access data generated by the sensor nodes, the sensor network can be viewed as a distributed database. In this paper, the authors are developing application for communication-efficient implementation of join...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Oct 2013

    An Application of Information Security through Hybrid Approach in Cryptography Technique

    Networks like internet applications are growing very high, so the needs to secure such type of applications are increased. Encryption techniques play an important role in information systems for security. On the other end, those technique which consume a significant amount of computing resources such as execution time, memory, and...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Oct 2013

    Review:- EN-efficient Approaches for MANETs in Rushing Attacks

    This network is very widely efficient to use when the mobile ad hoc network is a self-organizing system of mobile nodes that communicates with each other via wireless links with no fixed infrastructure or centralized administration such as base stations or Access Points (AP) and can be rapidly deployed. The...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Aug 2013

    Challenges to MAC Layer in Mobile Ad-Hoc Networks & its Routing Protocols

    Mobile Ad-hoc NETwork (MANET) are a new paradigm of wireless wearable devices enabling instantaneous person-to-person, person-to-machine or machine-to-person communications immediately and easily. In this paper, an overview and history of MANET is given. The authors discuss the challenges which should keep in mind for designing of MAC layer at network...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2014

    Evaluation of RIP and OSPF Routing Protocols Using OPNET

    Recently, a lot of developments have been taken place in computer networks and now it is the necessity that the computer in one geographical location must communicate with another computer located at different geographical location. For the sake of communication various routing protocols are used in which a routing table...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Feb 2014

    System Security Design Framework

    Millions of web applications techniques are available in respect of hardware design or by software design, several software's are following general principles and their own defining rules for keeping and monitoring data flow. Web application is the biggest designed modules contains most intelligibly defined software, comprises millions of principle, rules,...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Feb 2014

    SQL-Injection Design Generalization

    Web applications are facing more unauthorized access by illegitimate users, several tools, designs, and approaches has been designed to get fraudulent work done. The most devastating attacks found on web applications are phishing attacks, surfing, DoS attack etc. among all these attack SQL-injection is found to be the disastrous attack...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Feb 2014

    Attacking and Security Techniques Scenario Design

    Web application tools designing and creation requires different approaches, algorithms, constraints and procedures but skilled attackers follows different self evaluated methods designed on the basis of previous evaluated cases or data operating techniques and generated way to fetch loopholes in system. Millions of websites are susceptible to these vulnerabilities may...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Research Domain & Technologies Generalization of A.I.

    The technology has enhanced & captured every aspect of life, artificial intelligence has proven its magic in every field, it may be in security systems, home appliances, intelligence system for automation processes, simulation systems for predictive purposes, biological observations & symptoms for recognitions, knowledge base systems for data classification &...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2013

    A New Modified Decision Tree Algorithm Based on ID3

    Decision tree is an important method of classification in data mining, it is used for prediction and forecasting from historical data. ID3 is one of the popular decision tree algorithm. In this paper, a new modified decision tree algorithm is proposed which combines the concept of similarity measure and decision...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2013

    A Study on 4G Network and Its Security

    With increasing user demands for wider service due to rapid growth & variety of IT (Information Technology) industry, the service with the data rate of 30 mbps cannot accommodate the future mobile multimedia environment. Therefore, with the advent 4th Generation communication system or 4G, there will be the certain path...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jul 2013

    A Survey of Frequent Itemsets Mining for Network Traffic

    Today's digital life is based on network as the network grows the amount of data on network also increases rapidly. Due to this highly efficient algorithm is required for data mining and for accessing data from large datasets. In frequent itemsets are produced from very big or huge data sets...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2014

    A Study on Designing Robust 4G - Wireless Services

    As the mobile communication is continuously one of the hottest areas that are developing tremendously, with advanced techniques emerging in all the fields of mobile and wireless communications. In this paper, the authors will sketch the interaction between technology & society that will help to develop 4G in a way...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // May 2013

    An Efficient Approach Based On Cluster system on MANETs Routing Protocol

    In this paper, is a very efficient work have done with the several computing environments it can be expected based on the recent progresses and advances in computing and communication technologies. And the next ways of mobile communications will include both prestigious infrastructure wireless networks and novel infrastructure less Mobile...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    Mobile Web Architecture: A Survey

    The mobile Web refers to the use of Internet-connected applications, or browser-based access to the Internet from a mobile device, such as a Smartphone or tablet computer, connected to a wireless network. Traditionally, access to the Web has been via fixed-line services. The Web is becoming more accessible by portable...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Jun 2013

    New TCP Corruption Control Mechanism For Wireless Network

    TCP congestion control is end to end control mechanism. Which is implemented through controlling some important parameter change comparing to wire networks, there are many different characteristics in wireless environments. In this paper, new mechanism for TCP corruption control is presented. It considers the influences to TCP sender's packet sending...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Dec 2012

    Web Security Designing Algorithm: A Protective Shield

    Web attack has been increased to much extend, with every security technique counter attack has been designed to get unauthorized access for malfunctioning, but security designer has presented their best approaches or tools to protect web application and its components from attacks, various techniques and tools are available based on...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Mar 2014

    CRP - Routing Protocol for Cognitive Radio Ad Hoc Networks

    Cognitive radio is used to solve the spectrum scarcity problem in wireless networks, by using the existing wireless spectrum when they are not in use. But routing in such a network is very much problematic as many challenges arises in cognet network like collaboration between the route selection and spectrum...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Mar 2013

    Study and Comparison of Iris Edge Detection Technique

    In present era, biometric systems are getting more attention as security is the most important and essential criteria. The security systems demands for more authenticate, reliable and fast algorithms to implement biometric system. To deal with the security, physical and behavioral characteristics play an important role than Personal Identification Number...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Apr 2013

    Role of RFID Blocking Wallets

    In this paper, the authors provide a prudent analysis of the RFID blocking wallets-checking its feasibility. The research paper starts with an introduction of RFID devices and blocking wallets. This is followed by the working of blocking wallets and its need for protecting RFID devices. Then the paper gives by...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Nov 2012

    Graphical Password (Puzzles) Authentication System

    In this paper, a graphical password system with a puzzle to increase the remembrance of the password is discussed. In proposed paper, a block-based graphical password scheme called Image Block Change (IBC) is presented. In this system a password consists of puzzles of some images in which user can select...

    Provided By International Journal Of Computer Architecture And Mobility

  • White Papers // Dec 2012

    Web Attacking Methods : A Malfunctioning Approach

    Web application comprises different components like language, database, scripting language, HTTP or HTTPS connection procedure, validation, error generation. If all components are 100% secure, it will become impossible to attack web application, but still because of improper designing, implementation, use etc. these all are made susceptible to variety of attacks,...

    Provided By International Journal Of Computer Architecture And Mobility