International Journal of Computer Science and Information Technologies

Displaying 1-40 of 639 results

  • White Papers // Mar 2014

    Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms

    Network security is one of the significant aspects of information security. Network security is involved in various business organizations, enterprises, and other types of institutions and it has become a pivotal function in building and maintaining today's modern high-growth networks. Cryptography is a technology used to provide of information security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Implementation of Enhanced Security on Vehicular Cloud Computing

    In a Vehicular Cloud (VC), underutilized vehicular resources including computing power, data storage, and internet connectivity can be shared between rented out over the Internet to various customers. If the VC concept is to see a wide adoption and to have significant societal impact, security and privacy issues need to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Look Over on Mining Sequential Patterns in Evolving Data Stream

    Data Stream is sequence of digitally encoded coherent signals (packets of data or data packets) used to send or receive information that is in the process of being transmitted. It is a continuous, rapid and time-varying streams of data elements. A growing number of applications generate the streams of data....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    An Overview on Data Mining

    In this paper, the authors present an overview of research issues in data mining. They discuss mining with respect to web data referred here as web data mining. In particular, their focus is on web data mining research in context of their web data mining project called 'A study on...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Review of QoS Based Service Populating for Cloud Based Mobile Apps

    Popularity of mobile devices network technologies increases day by day. Mobile devices always maintain network connectivity by different network providers. So if user moves around then they can access cloud services without any disadvantages. In current model when user moves from one geographical area to another he will keep accessing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    International Vulnerability Database Alliance as an Effective Vulnerability Disclosure Technique

    Vulnerability is one of the key factors that cause security incidents and has become a major international threat to network security. Vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability disclosure or the disclosure of a vulnerability is the revelation of a vulnerability to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Cloud-Based Multimedia Storage System with QoS Provision

    Recently, there are new trends in the way the authors use computers and access networks due to advanced mobile devices and network technologies. One of trend is cloud computing where resources are stored and processed on network. The other is mobile computing, where mobile devices such as smart phones and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Nymble:The Blocking System

    Unidentified systems permit users to get access to Internet services privately by utilising a series of routers to hide the client's IP address from the server. The achievement of such networks, although, has been restricted by users employing this anonymity for abusive purposes such as defacing well liked websites. Website...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Live Devices: Insider Threat to Resources

    Gray Hat hackers/Insider can use Live Linux distribution to get into the resources of primary/secondary installed Operating system. By using such devices and distributions they can access the critical point of an Operating system which make them able to control User/Critical files that cannot be accessed within the operating system...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Operating System Virtualization for Ubiquitous Computing

    The basic concept of virtualization is to provide the benefits of the services and components irrespective of its physical presence. Operating System (OS) virtualization describes the abstraction of an operating system from any underlying hardware architecture. OS virtualization is needed as it provides feature of transparent migration of applications. Ubiquitous...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Auditing Windows 7 Registry Keys to Track the Traces Left Out in Copying Files From System to External USB Device

    Today in the world of big data, information is critical and corporate professional firms are adopting the digital forensic technique for detecting the action timeline of the activities carried out. Digital forensics is an important subdivision of data and network security. With the increase in technology, attacks on data are...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Survey on Opinion Mining and Summarization of User Reviews on Web

    Large amount of user generated data is present on web as blogs, reviews tweets, comments etc. This data involve user's opinion, view, attitude, sentiment towards particular product, topic, event, news etc. Opinion mining (sentiment analysis) is a process of finding users' opinion from user-generated content. Opinion summarization is useful in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Survey on Reducing Features to Improve Bug Prediction by Using Cos-Triage Algorithm

    Bugs are nothing but Software defects, present a serious challenge for system consistency and dependability. It is very difficult task to predict bugs. To detect the bugs from the software bug prediction is useful way. Machine learning classifiers have emerged newly as a way to envisage the existence of a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Detection of Routing Misbehavior Nodes Using Improved 2-ACK in MANET'S (Simulation through NS-2)

    A MANET (Mobile Ad hoc NETwork) is a collection of individual mobile nodes which communicate with each other vis wireless link. In some cases the node which refuses to share its resources with the other for its own benefits are called selfish or misbehaving nodes. Because of these nodes in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Query Result Caching Using Dynamic Data Cache

    Backend database system is often the performance bottleneck when running applications. The need for speed is increasing rapidly so the authors must be able to handle large amount of data in small time units like seconds or even milliseconds. The main problem that affects this to be fulfilled is the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Optimization Technique in Server Virtualization

    In this paper, the earlier literature for resource optimization and virtualization has been presented. All the ideas that are developed have been understood and review has been presented for the same. Server virtualization is a key building block that enables application isolation, mobility, and partitioning of individual servers in the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Implementation on Document Clustering using Correlation Preserving Indexing

    Document clustering is a technique for unsupervised document organization, automatic topic extraction and fast information recovery. In correlation preserving indexing, the documents are first assign into a low-dimensional semantic space. The documents with in the cluster are highly related to each other while the documents outside the cluster are dissimilar....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Accelerated Q-Learning Approach for Minutiae Extraction in Fingerprint Image

    Fingerprint recognition is a physiological biometric technique. It is most dependable as compare to other biometric technique. Fingerprint recognition involves preprocessing, minutiae extraction and post processing stages. In conventional approaches preprocessing stage include image processing steps to reduce noise. Image processing steps are extremely sensible against noise. A Q-learning approach...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Preserving Anonymity in Mixnet using AES Encryption Algorithm

    Data is one of the most important resources to organization and any loss or lack of access could lead to many problems, so the data should be transmitted with security. Although encryption was used to hide the contents of transmitted data, it does not hide the identity of the communicating...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Enhanced K-Means Clustering Algorithm to Reduce Time Complexity for Numeric Values

    Data mining is the process of using technology to identify patterns and prospects from large amount of information. In Data Mining, Clustering is an important research topic and wide range of unverified classification application. Clustering is technique which divides a data into meaningful groups. K-means clustering is a method of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    An Efficient Guarding by Detecting Intrusions in Multi-Tier Web Applications

    Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multitier design wherein the web server runs the application front-end logic and data...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Securing the Wireless Mesh Networks Against Epidemic Attack

    In recent years, Wireless Mesh Networks (WMNs) have emerged as a promising platform to provide easy Internet access. However, this increasing popularity of WMNs makes them an ideal target for different attacks. One such attack is the pollution attack/epidemic attack. Epidemic attack is a severe security problem in wireless mesh...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Survey Paper on Performance of Routing Protocols in Wireless Ad-Hoc Network

    Mobile Ad-hoc NETwork (MANET) is an imperative technology in last decade. MANETs are highly vulnerable to attacks due to infrastructure less and decentralized network. This paper provides an outline of these protocols by presenting their individuality, functionality and their relative analysis to be evaluated the performance. This study experimentally compares...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Wireless Ad hoc Sensor Network for Depletion of Node Battery Life for Denial of Service

    Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. In this paper, the author have focused on resource depletion attacks at the routing protocol...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Review and Comparative Study of Clustering Techniques

    Clustering is an automatic learning technique which aims at grouping a set of objects into clusters so that objects in the same clusters should be similar as possible, whereas objects in one cluster should be as dissimilar as possible from objects in other clusters. Document clustering aims to group in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Association Rule Mining with Security Based on Playfair Cipher Technique

    Due to the vast increase in data in the present scenario, data mining tasks and methods are in usage. The security attacks are so common day-by-day over the web. Association Rule Mining (ARM) is one of the popular data mining methods that discover interesting correlations amongst a large collection of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Intrusion Detection in Wireless Sensor Network Using Random Sensors by Implementing DES Algorithm

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Role of Sensor Virtualization in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are widely used in many real life applications due its pool of operating advantages. Such networks are mainly used for the applications like health monitoring, industrial automation, smart home monitoring, military applications etc. These applications requires heterogeneous type of WSNs. The small scale WSNs can be...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Novel Approach to Preserve the Privacy of Data

    A widely studied perturbation-based PPDM approach introduces random perturbation to individual values to conserve privacy before data are published. The data owner before publishing the data first perform changes to the data into n number of copies based on the access privilege and publishes. In that the high privilege data...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Electronic Payment in Grocery Shop Using Passive RFID and Cloud Computing

    Radio Frequency IDentification (RFID) is a technology that uses radio waves to transfer data from an electronic tag which is also called as RFID tag or label attached to an object through a reader for the purpose of identifying and tracking the object. This paper focuses on an electronic payment...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Watermarking of Dataset Using Usability Constraints Model

    In the emerging field of \"Sharing dataset\" with the deliberate recipients, protecting ownership on the datasets is becoming a challenge in itself. Watermarking is the commonly used mechanism to enforce and prove ownership for the digital data in different formats like text, database, software, image, video, audio, image and relational...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Extraction of Query Interfaces for Domain-Specific Hidden Web Crawler

    Web databases are now permeative. Such a database can be retrieved via its query interface (only HTML query forms).Extracting HTML query forms is a major task in Deep Web. This task can be accomplished by two methods: positioned HTML forms on the web and recognizing domain-specific forms. For positioning query...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Graph Databases- An Overview

    For a long time, data has been typically stored in tabular form so as to increase the indexing and readability. Now-a-days, the trends are changing as graph databases are quickly gaining popularity. In fact, it would not be wrong to call them \"The future of DBMS\". The representation of data...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Comparison of Firewall and Intrusion Detection System

    Today firewalls have become the staple of network security architectures, primarily providing access control to network resources, and they have been successfully deployed in the large majority of networks like government organization and individual users. Firewall has many shortages, such as it cannot keep away interior attacks, it cannot provide...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Analysis of Security Techniques Applied in Database Outsourcing

    Database outsourcing is a nascent data management paradigm in which the data owner stores the confidential data at the third party service provider's site. The service provider is responsible for managing and administering the database and allows the data owner and clients to create, update, delete and access the database....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    RaajHans: A Data Mining Tool Using Soft Computing Techniques

    Current research focuses on emerging technique of soft computing in the domain of Data Mining. Effective utilization of Soft Computing techniques for mining bulk amount of data can make Data mining task powerful. As there are several tools available for data mining in market a l o n g with...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Preservation of the Sample Data With Help of Unrealized Training Datasets and Later Classifying It Using Modified C4.5 Algorithm

    In order to protect the data centrally when they are being transferred from one party to another party so, that it cannot be used for secondary purposes unrealized training dataset is an important technique used to prevent data. With help of Unrealized training dataset algorithm it divides the sample data...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Mining Suggestions for Recommender Systems

    Recommender systems are systems that suggest items to the users of the web to help them find most relevant items of interest. These recommended items could include a movie, an image, query suggestions, tag recommendation etc. Data sources are modeled as graphs and are subjected to a naive diffusion method...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Comparative Study of Abstraction in Cyber Physical System

    Recent trends in computing include increases in both distribution and wireless connectivity, leading to highly dynamic, complex environments on top of applications that must be built. The way of designing and ensuring the correctness of applications in these environments is becoming more complex. The goal of the research in wireless...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Identification of Aliases from Web

    Many celebrities and experts from various fields may have been referred by not only their personal names but also by their aliases on web. Aliases are very important in information retrieval to retrieve complete information about a person from the web. Various methods have been used before to extract the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    Node Localization in Wireless Sensor Networks

    Awareness of location is one of the important and critical issue and challenge in wireless sensor network. Knowledge of Location among the participating nodes is one of the crucial requirements in designing of solutions for various issues related to Wireless sensor networks. Wireless sensor networks are being used in environmental...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    Secure Employee Information System to Manage Integrated Network Services

    Automation of network administration activities is essential for large network architecture maintenance. This paper carried out here with is supported by network administrator for automation of their regular activities. It provides a database that can store all employees' information in NGRI. Network administrator uses this database to create user accounts...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    An Inference Routing Tree Topology Algorithm for Reducing Overhead in Packet Probing

    Network structure (Topology) and Node dynamics (Links) are essential components of a secure robust network monitoring and application design. Packet probing is an important network measurement technique, used to understand packet delays, paths, and loss. In this paper, the authors propose an RNJ (Route Neighbor Joining) algorithm which is a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    Throughput Enhancement by Robust Routing in MANET

    An ad hoc wireless network is highly impacted by the dynamic stochastic process of its underlying links which leads to link breaks during data transaction. Hence, to provide uninterrupted data transaction many routing algorithms have link recovery and maintenance procedures to minimize the loss of data. However, these procedures do...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    A Mechanism for Recognition & Eradication of Gray Hole Attack Using AODV Routing Protocol in MANET

    MANET has no clear line of defense, so, it is accessible to both legitimate users and malicious attackers. Availability of network services, confidentiality and integrity of the data can be achieved by assuring that security issues have been met. In this paper, the authors develop a security based technique using...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    Analysis of Optimal Route Algorithms Under Constraint Conditions

    The shortest path problem is the problem of finding a path between two vertices (or nodes) such that the sum of the weights of its constituent edges is minimized. Clearly, the choice of shortest-path algorithm for a particular problem will involve complex tradeoffs between flexibility, scalability, performance, and implementation complexity....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    Network Delay: Network Analyzer and OPNET Simulation Tool

    This paper presents a complete network analyzer development for network delay in campus environment. The purpose of this paper is to define the accuracy of network analyzer development with independent data, real network and OPNET simulation tool. The network delay will measure based on transmission delay and propagation delay. This...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    A Review of Security Metrics in Software Development Process

    Security level, security performance, and security indicators have become standard terms to define security metrics. The data derived from these metrics helps in measurement of software security. The metrics help achieve security objectives - confidentiality, integrity and availability. The security can be assessed for further improvement during development process of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2012

    Performance Evaluation of ATM Networks in Computer Simulation

    One of the principal phases in the design process of the information systems is the performance evaluation of these systems. Queuing networks and Markov chains are commonly used for performance and reliability evaluation of computer, communication, and systems manufacturing. In the context of this paper, this phase of analysis is...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    Comparitive Study of Probabilistic Neural Network and Radial Basis Functional Link Neural Network in Time Series Data Mining

    This paper proposes a comparative analysis between Radial Basis Functional Link Network (RBFLN) - a combination of radial basis functions with the random vector functional link nets with Probabilistic Neural Network (PNN).The novel Stransform based neural classifier scheme is used for time series data mining of power quality events occurring...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    Reducing End to End Per Packet Energy Consumption

    A Mobile Ad-hoc NETwork (MANET) consists of mobile nodes which cooperate in forwarding information in mobile ad-hoc network. In this paper, the authors focus mainly on the end to end per packet energy consumption. They first find the destination address in the network, find all the possible paths to reach...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    Reduced-Reference Image Quality Assessment

    Image Quality Assessment (IQA) has been recognized as an effective and efficient way to predict the visual quality of distorted images. Various wavelet transforms based methods are used to extract singularity structures, but they fail to explicitly extract the image geometric information, e.g., lines and curves. In this paper, the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    A Controller Based Approach for Web Services Virtualized Instance Allocation

    Few Service providers provide compute intensive and data intensive services over web platform; where in applications can be deployed on demand. These service providers usually employ machine virtualization for providing cost effective solution. At the time of infrastructure purchase, one may opt for a particular instance, assuming that this will...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Nov 2011

    Solution of Time Constrained Vehicle Routing Problems Using Multi-Objective Hybrid Genetic Algorithm

    Vehicle Routing Problem with Time Windows (VRPTW) is an example of scheduling in constrained environment. It is a well known NP hard combinatorial scheduling optimization problem in which minimum number of routes have to be determined to serve all the customers within their specified time windows. So far different analytic...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Privacy-Preserving Public Auditing in Cloud Storage Security

    The Cloud Computing is the new vision of computing utility, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing technologies can be implemented in a wide variety of architectures, under different...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Dynamic Congestion Control for TCP in Peer-To-Peer Network

    The data transmission carries throughout the internet using TCP protocol, the internet traffic, performance depends on the Transmission control protocol. The congestion control and adaptive routing in isolation, much less attention has been paid to whether these two resource allocation mechanisms work well together to optimize user performance. The characteristics...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Route Management Protocol for Misbehavior in Ad Hoc Networks

    Ad hoc wireless networks have emerged as one of the key growth areas for wireless networking and computing technology. Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Implementation Study of Hybrid Caching Scheme in Wireless P2P Networks With Asymmetric Cooperative Caching

    As the day to day applications in mobile computing are increasing, different wireless peer-peer networks came into existence. There are several protocols and schemes are implemented to increase the network performance. The most implemented technique used to improve the performance of data access is Caching. Cooperative caching, which allows the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Face Detection by Fine Tuning the Gabor Filter Parameter

    Face detection technique recognition is developed by using and fine tuning the Gabor Wavelet parameters. An extensive study of these parameters have been made and checked on a large acquired data set of face images, for extracting the features. The Facial data consists of 320 frontal face 180 non-face images....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    RSVP Protocol in Multimedia Networks

    Contrary to the high bandwidth, real-time and bursty traffic of multimedia data, in real life, networks are shared by thousands and millions of users, and have limited bandwidth, unpredictable delay and availability. The ReSource ReserVation Protocol (RSVP) is a network-control protocol that enables Internet applications to obtain differing Qualities of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Design and Performance Evaluation of Transmitted Reference BPSK UWB Receiver Using SIMULINK

    Ultra wideband systems find applications in indoor and high speed applications. Being baseband transmission, it exhibits properties like low power and low cost design. Especially, IR-UWB systems demonstrate such characteristics. The performance of IRUWB system is mainly dependent on LNA design. In this paper, the authors have designed three LNA's,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Ant Colony Optimization Routing to Mobile Ad Hoc Networks in Urban Environments

    In this paper, the authors present on-demand routing algorithm Enhanced Ant Colony Optimization (ACO) for Mobile Ad-hoc NETworks (MANETs). Ant Colony Optimization, a swarm intelligence based optimization technique, is widely used in network routing. These approaches try to map the solution capability of swarms to mathematical and engineering problems. The...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Efficient Way of Detecting Malicious Packet Losses

    The authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some Victim. Unfortunately, it is quite challenging to attribute a missing packet...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    A Review of Security and Privacy Issues in Social Networking

    Online Social Networks have become an important part of daily digital interactions for more than half a billion users around the world. The various personal information sharing practices that online social network providers promote have led to their success as innovative social interaction platforms. At the same time, these practices...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    ESDPMANT: Efficient Service Discovery Protocols for Mobile Ad Hoc Networks

    A few years ago there has been increasing research in service discovery protocols (system of rules governing affairs of state or diplomatic occasions) for Mobile Ad Hoc NETworks (MAHNET). The most capable a way of dealing so far addresses energy efficiency by integration the service discovery process with the routing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Network Security Through SSL in Cloud Computing Environment

    Cloud Computing is a style of computing in which business provides application data and any type of IT resource as a services to client. To gain access to services of cloud computing the people only need Internet access. Cloud computing is clearly one of today's most enticing technology areas due...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Comparative Study of DECIM-128 and DECIMV2 in Relation to Compact Hash-Based Message Authentication Code

    A constructing compact HMAC (Hash-based Message Authentication Code) is required to maintain integrity and authentication in computationally constrained environments like Wireless sensor networks and RFID. DECIM is a hardware oriented stream cipher submitted to the ECRYPT stream cipher project. It is highly scrutinized stream cipher and is portable to implement...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    A Mobile IPv6-Based Architecture for Mobility of Mobile Terminals in Heterogeneous Networks

    The evaluation toward next-generation wireless networking brought life to the concept of technology and services integration. The success attained by the Internet, on one side, and by cell phone networks, on the other, led to visions of "Next-generation networks," integrating the two different philosophies. On one hand, Internet Protocol (IP)...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Provably Secure Quantum Key Distribution Protocols in 802.11 Wireless Networks

    The fact that wireless networks have become one of the most extensively used communication systems in the world. Though, providing secure communication for wireless networks has become one of the main concerns. Wireless local area networks are more and more popular, more and more place of work buildings, airports, and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Wireless Communication Networks - A Study & Emergence of Multipath Dissemination

    Mesh topologies are large scale peer-to-peer systems that use low-bandwidth wireless links to achieve the application objectives. The quality of service in such system is known to decrease as scale increase. Uniform spreading algorithm is spreading messages over all the shortest paths. This is a straightforward strategy where the source,...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Network Evolution in 3G/4G: Applications and Security Issues

    During the 20th century, the key technology was information gathering, processing and distribution. This total technology will depend based on the network systems. Which are nothing but grouping of systems that should be controlled by a server. In business and home applications, mobile users, and in all social issues the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Node Localization for Wireless Sensor Networks

    Awareness of location is one of the important and critical issue and challenge in wireless sensor network. Knowledge of Location among the participating nodes is one of the crucial requirements in designing of solutions for various issues related to Wireless sensor networks. Wireless sensor networks are being used in environmental...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Scheduling in Wi-MAX Networks

    In wireless LANs, WiMAX networks incorporate several Quality of Service (QoS) mechanisms at the Media Access Control (MAC) level for guaranteed services for data, voice and video. The problem of assuring QoS is basically that of how to allocate available resources among users in order to meet the QoS criteria...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Analysis and Automation of Security Management System for Remote Terminals Based on Advanced Finger Print Reorganization Algorithm

    Security Management at the industries or remote terminals like ATM centers is very essential. Security can be provided with man power but in practice this traditional methods are not up to the demand. As increasing number of people needs, number of ATMs increasing and there is no enough man power...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    A Process for Data Storage Security in Cloud Computing

    Cloud computing can be defined as a new style of computing in which dynamically scalable and often virtualized resources are provided as services over the internet. With cloud computing technology, users use a variety of devices, including PCs, laptops, smart phones, and PDAs to access programs, storage, and application development...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Security Issues on Inter-Vehicle Communications

    The continuous increase in the number of vehicles in the transportation system calls for an improvement of traffic safety and efficiency of Inter vehicle communication. To achieve this demand, the vehicular communications have been considered to enable various security issues on vehicles is to obtain the traffic safety. Effective implementation...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Warehouse Management for Improved Efficiency in a Small Warehouse

    Recently new innovative warehouse layouts are suggested that do not follow usual restrictions of ubiquitous traditional designs. One of them, called fishbone layout, showed potential to reduce travel distances in unit-load warehouses by more then 20%. In manual-pick order-picking systems with case and item picking from multiple locations different routing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Revocation and Self Healing of Keys in Hierarchical Wireless Sensor Network

    In this paper, the authors have discussed a key distribution scheme with revocation and self healing mechanism. Self healing key distribution scheme enables a group of users to establish a group of keys over an unreliable network. In their scheme cluster header distributes session keys to the group nodes for...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Software Quality Assurance in CMM and XPA Comparative Study

    Software Quality Assurance is a planned and systematic set of activities necessary to provide adequate confidence that requirements are properly established and products or services confirm to specified standards. Successful software engineering strongly depends on the delivery of high quality software. In the present paper, the authors compare Capability Maturity...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2012

    Broadcasting Through UDG in Manets by GPS Assistance

    Adhoc networks are useful in many Application Environments and do not need any infrastructure support. Collaborative computing and communication in smaller areas can be setup by using Adhoc networking technologies. Broadcast protocols play an important role in building wireless multihop Adhoc networks .Because of high mobility in the network, rapid...

    Provided By International Journal of Computer Science and Information Technologies