International Journal of Computer Science and Information Technologies

Displaying 1-40 of 646 results

  • White Papers // May 2014

    Categorize and Efficient: Top K Keyword Search of Spatial-Textual Data on the Road Network

    Spatio-textual information nowadays becomes so popular and mandatory for each searching application. Many organization have shown their concern regarding importance of using spatial information (\"Latitude\" & \"Longitude\") along with Textual data (i.e. Keyword Query \"Hospital\"). In parallel study, of searching trend and getting Top k result out of Spatio-Textual search...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Towards Secure Cloud Infrastructure with Cloud Validation

    Cloud computing is an emerging standard with various computing ideas and technologies for the Internet, supporting cost-effective organization applications and IT infrastructure. The acceptance of cloud computing demand is gradually increasing over the years and the development of the global market is regularly rising. Security is the major issue often...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Cloud Based Managed File Transfer Services

    In today's era there is a need for managed file transfer services over trivial one's mainly due to the outsourcing done in product lifecycle management and a need to get files from source to the destination (through a chain of people) in a faster, more reliable way. By making use...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    TBDS- A New Data Security Algorithm in Cloud Computing

    Currently many organizations and companies are facing potential threats to their data management systems and these security concerns provide a basis to conduct research in this particular area. In this paper, the authors are proposing an algorithm comprising digital signature with auto generated token ID allotted by the cloud service...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2014

    Enhancing Security and Concurrency in Distributed Database with 6 Bit Encryption Algorithm

    Distributed database is the collection of data which are distributed on different network on different computer due to which the authors eliminate single site failure. Since in previous paper RSA is used widely to provide security but in this paper discussion is based on the NTRU. NTRU is superior security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Enhancing Data Security by Adapting Network Security and Cryptographic Paradigms

    Network security is one of the significant aspects of information security. Network security is involved in various business organizations, enterprises, and other types of institutions and it has become a pivotal function in building and maintaining today's modern high-growth networks. Cryptography is a technology used to provide of information security...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Implementation of Enhanced Security on Vehicular Cloud Computing

    In a Vehicular Cloud (VC), underutilized vehicular resources including computing power, data storage, and internet connectivity can be shared between rented out over the Internet to various customers. If the VC concept is to see a wide adoption and to have significant societal impact, security and privacy issues need to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Look Over on Mining Sequential Patterns in Evolving Data Stream

    Data Stream is sequence of digitally encoded coherent signals (packets of data or data packets) used to send or receive information that is in the process of being transmitted. It is a continuous, rapid and time-varying streams of data elements. A growing number of applications generate the streams of data....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    An Overview on Data Mining

    In this paper, the authors present an overview of research issues in data mining. They discuss mining with respect to web data referred here as web data mining. In particular, their focus is on web data mining research in context of their web data mining project called 'A study on...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Review of QoS Based Service Populating for Cloud Based Mobile Apps

    Popularity of mobile devices network technologies increases day by day. Mobile devices always maintain network connectivity by different network providers. So if user moves around then they can access cloud services without any disadvantages. In current model when user moves from one geographical area to another he will keep accessing...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    International Vulnerability Database Alliance as an Effective Vulnerability Disclosure Technique

    Vulnerability is one of the key factors that cause security incidents and has become a major international threat to network security. Vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability disclosure or the disclosure of a vulnerability is the revelation of a vulnerability to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Live Devices: Insider Threat to Resources

    Gray Hat hackers/Insider can use Live Linux distribution to get into the resources of primary/secondary installed Operating system. By using such devices and distributions they can access the critical point of an Operating system which make them able to control User/Critical files that cannot be accessed within the operating system...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Cloud-Based Multimedia Storage System with QoS Provision

    Recently, there are new trends in the way the authors use computers and access networks due to advanced mobile devices and network technologies. One of trend is cloud computing where resources are stored and processed on network. The other is mobile computing, where mobile devices such as smart phones and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Nymble:The Blocking System

    Unidentified systems permit users to get access to Internet services privately by utilising a series of routers to hide the client's IP address from the server. The achievement of such networks, although, has been restricted by users employing this anonymity for abusive purposes such as defacing well liked websites. Website...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Mar 2014

    Operating System Virtualization for Ubiquitous Computing

    The basic concept of virtualization is to provide the benefits of the services and components irrespective of its physical presence. Operating System (OS) virtualization describes the abstraction of an operating system from any underlying hardware architecture. OS virtualization is needed as it provides feature of transparent migration of applications. Ubiquitous...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Auditing Windows 7 Registry Keys to Track the Traces Left Out in Copying Files From System to External USB Device

    Today in the world of big data, information is critical and corporate professional firms are adopting the digital forensic technique for detecting the action timeline of the activities carried out. Digital forensics is an important subdivision of data and network security. With the increase in technology, attacks on data are...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Survey on Opinion Mining and Summarization of User Reviews on Web

    Large amount of user generated data is present on web as blogs, reviews tweets, comments etc. This data involve user's opinion, view, attitude, sentiment towards particular product, topic, event, news etc. Opinion mining (sentiment analysis) is a process of finding users' opinion from user-generated content. Opinion summarization is useful in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Survey on Reducing Features to Improve Bug Prediction by Using Cos-Triage Algorithm

    Bugs are nothing but Software defects, present a serious challenge for system consistency and dependability. It is very difficult task to predict bugs. To detect the bugs from the software bug prediction is useful way. Machine learning classifiers have emerged newly as a way to envisage the existence of a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Detection of Routing Misbehavior Nodes Using Improved 2-ACK in MANET'S (Simulation through NS-2)

    A MANET (Mobile Ad hoc NETwork) is a collection of individual mobile nodes which communicate with each other vis wireless link. In some cases the node which refuses to share its resources with the other for its own benefits are called selfish or misbehaving nodes. Because of these nodes in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Query Result Caching Using Dynamic Data Cache

    Backend database system is often the performance bottleneck when running applications. The need for speed is increasing rapidly so the authors must be able to handle large amount of data in small time units like seconds or even milliseconds. The main problem that affects this to be fulfilled is the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Review on Optimization Technique in Server Virtualization

    In this paper, the earlier literature for resource optimization and virtualization has been presented. All the ideas that are developed have been understood and review has been presented for the same. Server virtualization is a key building block that enables application isolation, mobility, and partitioning of individual servers in the...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Preserving Anonymity in Mixnet using AES Encryption Algorithm

    Data is one of the most important resources to organization and any loss or lack of access could lead to many problems, so the data should be transmitted with security. Although encryption was used to hide the contents of transmitted data, it does not hide the identity of the communicating...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Accelerated Q-Learning Approach for Minutiae Extraction in Fingerprint Image

    Fingerprint recognition is a physiological biometric technique. It is most dependable as compare to other biometric technique. Fingerprint recognition involves preprocessing, minutiae extraction and post processing stages. In conventional approaches preprocessing stage include image processing steps to reduce noise. Image processing steps are extremely sensible against noise. A Q-learning approach...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Implementation on Document Clustering using Correlation Preserving Indexing

    Document clustering is a technique for unsupervised document organization, automatic topic extraction and fast information recovery. In correlation preserving indexing, the documents are first assign into a low-dimensional semantic space. The documents with in the cluster are highly related to each other while the documents outside the cluster are dissimilar....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Survey Paper on Performance of Routing Protocols in Wireless Ad-Hoc Network

    Mobile Ad-hoc NETwork (MANET) is an imperative technology in last decade. MANETs are highly vulnerable to attacks due to infrastructure less and decentralized network. This paper provides an outline of these protocols by presenting their individuality, functionality and their relative analysis to be evaluated the performance. This study experimentally compares...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Wireless Ad hoc Sensor Network for Depletion of Node Battery Life for Denial of Service

    Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. In this paper, the author have focused on resource depletion attacks at the routing protocol...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Review and Comparative Study of Clustering Techniques

    Clustering is an automatic learning technique which aims at grouping a set of objects into clusters so that objects in the same clusters should be similar as possible, whereas objects in one cluster should be as dissimilar as possible from objects in other clusters. Document clustering aims to group in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Enhanced K-Means Clustering Algorithm to Reduce Time Complexity for Numeric Values

    Data mining is the process of using technology to identify patterns and prospects from large amount of information. In Data Mining, Clustering is an important research topic and wide range of unverified classification application. Clustering is technique which divides a data into meaningful groups. K-means clustering is a method of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    An Efficient Guarding by Detecting Intrusions in Multi-Tier Web Applications

    Internet services and applications have become an inextricable part of daily life, enabling communication and the management of personal information from anywhere. To accommodate this increase in application and data complexity, web services have moved to a multitier design wherein the web server runs the application front-end logic and data...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Securing the Wireless Mesh Networks Against Epidemic Attack

    In recent years, Wireless Mesh Networks (WMNs) have emerged as a promising platform to provide easy Internet access. However, this increasing popularity of WMNs makes them an ideal target for different attacks. One such attack is the pollution attack/epidemic attack. Epidemic attack is a severe security problem in wireless mesh...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Association Rule Mining with Security Based on Playfair Cipher Technique

    Due to the vast increase in data in the present scenario, data mining tasks and methods are in usage. The security attacks are so common day-by-day over the web. Association Rule Mining (ARM) is one of the popular data mining methods that discover interesting correlations amongst a large collection of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Intrusion Detection in Wireless Sensor Network Using Random Sensors by Implementing DES Algorithm

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is defined as a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Role of Sensor Virtualization in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are widely used in many real life applications due its pool of operating advantages. Such networks are mainly used for the applications like health monitoring, industrial automation, smart home monitoring, military applications etc. These applications requires heterogeneous type of WSNs. The small scale WSNs can be...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    A Novel Approach to Preserve the Privacy of Data

    A widely studied perturbation-based PPDM approach introduces random perturbation to individual values to conserve privacy before data are published. The data owner before publishing the data first perform changes to the data into n number of copies based on the access privilege and publishes. In that the high privilege data...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Electronic Payment in Grocery Shop Using Passive RFID and Cloud Computing

    Radio Frequency IDentification (RFID) is a technology that uses radio waves to transfer data from an electronic tag which is also called as RFID tag or label attached to an object through a reader for the purpose of identifying and tracking the object. This paper focuses on an electronic payment...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Watermarking of Dataset Using Usability Constraints Model

    In the emerging field of \"Sharing dataset\" with the deliberate recipients, protecting ownership on the datasets is becoming a challenge in itself. Watermarking is the commonly used mechanism to enforce and prove ownership for the digital data in different formats like text, database, software, image, video, audio, image and relational...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Extraction of Query Interfaces for Domain-Specific Hidden Web Crawler

    Web databases are now permeative. Such a database can be retrieved via its query interface (only HTML query forms).Extracting HTML query forms is a major task in Deep Web. This task can be accomplished by two methods: positioned HTML forms on the web and recognizing domain-specific forms. For positioning query...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Comparison of Firewall and Intrusion Detection System

    Today firewalls have become the staple of network security architectures, primarily providing access control to network resources, and they have been successfully deployed in the large majority of networks like government organization and individual users. Firewall has many shortages, such as it cannot keep away interior attacks, it cannot provide...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Analysis of Security Techniques Applied in Database Outsourcing

    Database outsourcing is a nascent data management paradigm in which the data owner stores the confidential data at the third party service provider's site. The service provider is responsible for managing and administering the database and allows the data owner and clients to create, update, delete and access the database....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Feb 2014

    Graph Databases- An Overview

    For a long time, data has been typically stored in tabular form so as to increase the indexing and readability. Now-a-days, the trends are changing as graph databases are quickly gaining popularity. In fact, it would not be wrong to call them \"The future of DBMS\". The representation of data...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    An Approach to Find Out at Which Maintainability Metric, Software Maintenance Cost is Less

    In this paper, the authors introduce a new process to obtain the maintenance cost by taking release-level model and retrieve values from previous projects and find out software maintenance costs of current project. They come across three parameters in which the main issue is to find software maintenance cost lies...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Cross Lingual Query Dependent Snippet Generation

    The paper describes the development of a cross lingual query dependent snippet generation module. It is a language independent module, so it also performs as a multilingual snippet generation module. It is a module of the Cross Lingual Information Access (CLIA) system. This module takes the query and content of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Resource Allocation Method Using Scheduling Methods for Parallel Data Processing in Cloud

    Infrastructure as a Service (IaaS) clouds have emerged as a promising new platform for massively parallel data processing. By eliminating the need for large upfront capital expenses, operators of IaaS clouds offer their customers the unprecedented possibility to acquire access to a highly scalable pool of computing resources on a...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Extended Ad hoc On demand Distance Vector Multipath Routing (EAODVMR) Protocol for Mobile Ad Hoc NETwork(MANET)

    Mobile Ad hoc NETworks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among them without the need of fixed infrastructure. Due to limited transmission range of wireless network nodes, multiple hops are usually needed for a node to exchange information with any other node in...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Experimental Analysis and Demonstration of the NS2 Implementation of Dynamic Buffer Sizing Strategies for 802.11 Based Wireless Networks

    All Internet routers contain buffers to hold packets during the time of congestion. Buffers are used to reduce the packet loss and to ensure high link efficiency. The widely used general rule-of-thumb is to have buffers size as the Bandwidth-Delay Product (BDP) of the network. The use of the fixed...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Ensuring Security in Resource Centers of Cloud Environment by Using Trusted Pools

    Now a day's cloud computing is one of the emerging Technologies. This created a new era in the IT Industry With its Service Oriented Architecture. As the services of Organization Increases manganese of these services also becoming one of the problems. Management of resources will create some of security issues...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    A Novel Approach Based Wireless Intrusion Detection System

    Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection is a mechanism for a WSN to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this paper, the authors consider this issue...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Software Simulation of Unequal Error Protection Based Demodulator (Burst Mode) for Onboard Application

    This paper describes the algorithm and implementation details of a new DSP based 64 Kbps Demodulator developed for onboard application. This demodulator has the capability of Unequal Error P(UEP) based on Multiple Block Coded Modulation (MBCM). The software is run on ADSP-21020 simulator and MATLAB. The demodulator is tested by...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Bandwidth Optimization, Recycling In IEEE 802.16 Networks by Using Call Admission Control & Scheduler

    The IEEE 802.16 Working Group and was designed to support the bandwidth demanding applications with Quality of Service (QoS). Bandwidth is reserved for each application to ensure the QoS. For Variable Bit Rate (VBR) applications, however, it is difficult for the Subscriber Station (SS) to predict the amount of incoming...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Fault Prediction OO Systems Using the Conceptual Cohesion of Classes

    High cohesion is desirable property in software systems to achieve reusability and maintainability. In this paper, the authors are measures for cohesion in Object-Oriented (OO) software reflect particular interpretations of cohesion and capture different aspects of it. In existing approaches the cohesion is calculate from the structural information for example...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Fractal Based Management of Heterogeneous Data Streams

    Efficient handling of huge amount of data stream is become mandatory in various domains such as business, finance, sensor networks, etc. Come through these data streams poses challenges those are distinct from those addressed by orthodox database management systems. The enormous increase of Sensor Networks, GPS enabled devices and RFIDs...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Effective Performance Analysis of Bin -Periodic Algorithm for Wireless Sensor -Actor Network

    In wireless sensor-actor network, to transmit the data efficiently for long distance sensor-actor network is used. It will improves the performance in terms of energy consumed and end to end delay between sensor nodes compare to wireless sensor network. In this paper, the authors proposed the protocol for wireless sensor-actor...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Web Service Quality Composition Determination Using Genetic Algorithm in Sematic Web

    Ranking and optimization of web service compositions represent challenging areas of research with significant implications for the realization of the "Web of Services" vision. "Semantic web services" use formal semantic descriptions of web service functionality and interface to enable automated reasoning over web service compositions. To judge the quality of...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Secure Group Key Transfer Protocol Based on Secret Sharing

    Group key establishment is an important mechanism to construct a common session key for group communications. Key transfer protocols rely on a mutually trusted Key Generation Center (KGC) to select session keys and transport session keys to all communication entities secretly. Most often, KGC encrypts session keys under another secret...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Apr 2012

    False Data Detection in Wireless Network Using Dynamic Security Protocol

    In the Wireless sensor networks often consists of a large number of low-cost sensor nodes that have strictly limited sensing, computation, and communication capabilities. The security of wireless sensor networks is a challenging problem in the process of data aggregation. As data are send though sensor network confidentiality plays and...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Detection of Intrusion Using Alert Aggregation in DataStream Modelling With Constructive Basis

    Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts - produced by low-level intrusion detection systems, firewalls, etc. - belonging to a specific attack instance which has been initiated by an attacker at a certain point in time. Thus, meta-alerts...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2012

    Improving Security By Quantum Cryptography in P2P Reputation Management in Distributed Identities and Decentralized Recommendation Chains

    Peer-To-Peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics which make this problem different from traditional secure group communication. Authentication...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Theoretical Analysis and Optimization of Circular Sector Microstrip Antenna

    A study of the radiated field, the resonant frequency, polarization and the different components of a Circular Sector Microstrip Antenna (CSMA) are presented in this paper. The proposed antenna is simulated using HFSS and the results were compared with those in the literature. The CSMA proposed is characterized by its...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2011

    Design and Implementation of Architectural Framework of Recommender System for e-Commerce

    The rapid development of internet technologies in recent decades has imposed a heavy information burden on users. The popularity of recommender systems has evolved to provide suggestions and recommendations to the user for relevant information from web according to their preferences. Most recommender systems use collaborative-filtering or content based methods...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    A Data Cache Invalidation Strategy for Internet Vehicular Ad Hoc Network on Highway

    Internet Vehicular Ad hoc NETwork (IVANET) is a combination of wired Internet and Vehicular Ad hoc NETwork (VANET) through roadside infrastructure for universal communication among vehicles. A key optimization technique in IVANET is to cache frequently accessed data items in local storage of vehicles. A critical design issue is how...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Flow Control Packet Marking Scheme: To Identify the Sources of Distributed Denial of Service Attacks

    Flow Control Packet Marking Scheme is a tracing technique, to identify the sources of Distributed Denial of Service (DDOS) attacks. DDOS attacks reduce the quality of the system. While a number of other tracing techniques exist, Flow Control Packet Marking Scheme can obtain better tracing capability than the others. FCPM...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    Sensing Malicious Packet Losses

    In this paper, the authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jul 2011

    A New Scheme to Check ARP Spoofing: Prevention of MAN-IN-THE-MIDDLE Attack

    The Address Resolution Protocol (ARP) is a computer networking protocol for determining a network host's Link Layer address when only its Internet Layer (IP) or Network Layer address is known. Address Resolution Protocol (ARP) spoofing is a technique used to attack an Ethernet wired or wireless network. It is also...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2011

    The Foot Step of Mobile Network - Wireless Network Architecture

    In this paper the authors discuss a modal of embedded Linux system support wireless network and its management. Wireless networks spread over a large physical area. Physical access of each node in other words signal sending place and accepting place is very difficult. To operate this type of networks there...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jan 2011

    Ultra Wideband Channel Model for IEEE 802.15.4a and Performance Comparison of DBPSK/OQPSK Systems

    Ultra WideBand (UWB) is a radio technology that can be used at very low energy levels for short-range high-bandwidth communications by using a large portion of the radio spectrum. Ultra WideBand (UWB) systems transmit signals across a much wider frequency than conventional systems and are usually very difficult to detect....

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Comparative Analysis of Energy Efficient Routing Protocols in MANETS (Mobile Ad-Hoc Networks)

    Mobile Ad hoc NETworks (MANET) represent distributed systems that consist of wireless mobile nodes that can freely and dynamically organize itself into temporary ad hoc network topologies. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Manets are...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2010

    Optical Wireless Communication Link Design

    Modern Optical Wireless Communication (OWC) was an offshoot of the development of laser technologies in the 1960s. The main aim then was to develop communication between satellites and submarines beneath the surface of the sea. In the communication world, Optical Wireless Communication (OWC) is the only area that remains to...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2010

    Simulator to Analyze QoS for IEEE 802.11b/a/g Standards

    The author has developed a simulator that simulates the behavior and performance of distinct wireless local area network standards IEEE 802.11b, IEEE 802.11a and IEEE 802.11g in terms of few Quality of Service Parameters. Simulation measures the Quality of Service in terms of media access delay, network throughput, network bandwidth...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Dec 2010

    A Novel Approach of Linear Parallel Interference Cancellation in Uplink OFDMA Systems With Carrier Frequency Offsets

    In uplink Orthogonal Frequency Division Multiple Access (OFDMA) systems, Multi-User Interference (MUI) occur due to different Carrier Frequency Offsets (CFO) of different users at the receiver. Here, the authors present a multistage Linear Parallel Interference Cancellation (LPIC) approach to mitigate the effect of this MUI in uplink OFDMA. The proposed...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2011

    Combined Security Model Tool for Adhoc Networks

    There has been a number of access control models. Under the RBAC framework, users are granted membership into roles based on their responsibilities. XML based Security Labels using a guard prototype for data transfer and web services based applications. This model tool is evolving together embedding roles within databases. This...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2011

    Application of Web Mining With XML Data Using XQuery

    In recent years XML has become very popular for representing semi structured data and a standard for data exchange over the web. Mining XML data from the web is becoming increasingly important. Several encouraging attempts at developing methods for mining XML data have been proposed. However, efficiency and simplicity are...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2011

    Fusion of Web Structure Mining and Web Usage Mining

    Web mining a hot research area of data mining can be classified into three main areas: Web Usage Mining, Web content Mining and Web Structure Mining. Web usage mining is a kind of web mining, which exploits data mining techniques to discover valuable information from navigation behavior of World Wide...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // May 2011

    Detection of Attacks in an Intrusion Detection System

    Intrusion detection is the act of detecting unwanted traffic on a network or a device. A Intrusion Detection System (IDS) provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Intrusion detection faces a number...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2011

    Assessing Deviations of Empirical Measures for Temporal Network Anomaly Detection: An Exercise

    The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. In this paper, anomaly-based network detection techniques are a valuable technology to protect target systems and networks against...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2011

    A Suggestive Evaluation of System Test Cases in OO Systems Through Carving and Replaying Differential Unit Test Cases: A Metric Context

    In this paper an attempt is made to implement system test cases and software metrics with aid of GUI and several applications were developed to calculate the metrics and performance of the each test case, which can also be used as a stand alone method. Further an emphasis is made...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2011

    Geographical Routing Algorithms in Asynchronous Wireless Sensor Network

    In wireless sensor network, the network lifetime depends upon the battery of the sensor nodes. As the Sensor nodes are small in physical size the battery power is also limited .To conserve the energy, sensor nodes operate in sleep wake mode, when a sensor node is in idle state it...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2011

    A Survey on Performance Analysis of TCP Variants in IEEE 802.11 Based Ad-Hoc Networks

    In order to allow programmers to follow conventional techniques while creating applications that uses an internet, software in the internet must provide the same semantics as a conventional computer system, it means it must guarantee reliable communication. Transport protocol provides reliability, which is fundamental for all the applications. The Transmission...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2011

    Five Layer Security Architecture & Policies for Grid Computing System

    In this paper, the authors described four layer architecture of Grid Computing System, analyzes security requirements and problems existing in Grid Computing System. This paper presents a new approach of five layer security architecture of Grid Computing System, defines a new set of security policies & gives the representation. State...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Jun 2011

    Performance Improvement of IEEE 802.16/Wimax Using Elliptic Curve Cryptography

    The IEEE Standard 802.16 (WiMax) promises to provide wireless broadband access to homes, businesses and core telecommunication networks worldwide. However, security is a key concern to the success of IEEE Standard 802.16. Wireless networking is not as secure as other networking technologies. But IEEE 802.16 provides much higher security as...

    Provided By International Journal of Computer Science and Information Technologies

  • White Papers // Sep 2011

    Intrusion Detection in Wireless Networks Using Selected Features

    Intrusion detection is a process of identifying and responding to malicious activity targeted at computing and networking resources. A wireless IDS is unique in that it detects attacks against the 802.11 frame at layer two of the wireless network. There are three different types of 802.11 MAC frames; data, control,...

    Provided By International Journal of Computer Science and Information Technologies