International Journal of Computer Science Engineering and Technology

Displaying 1-40 of 125 results

  • White Papers // Dec 2014

    Detail and Comparative Study on WSN Security Architectures

    Wireless Sensor Network (WSN) most widely growing technology in network due to this WSN well known technology among the research community people. WSN having enormous sensing devices to sensing the necessary information from current environmental scenario and transmit it to particular place or user. In WSN transmitting the obtained data...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2014

    Assessment of Manifestation of Agile Methodology and Computing

    Agile methodology is a modern approach in software process to achieve a common business goal. In today's business environment, normally organizations choose to deliver the projects very fast. They also require adjusting as well as adapting to changing environments. In this regard, traditional software methodologies fail to achieve these requirements....

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2014

    Comparative Study on SPOON and SimBet Routing in Disconnected MANETs

    Recent advances in portable computing and wireless technologies are opening up exciting possibilities for the future of wireless of wireless mobile networking. A Mobile Ad hoc NETwork (MANET) consist of mobile platform which are free to move arbitrarily. They are mainly developed for connected MANETs, in which end-to-end connectivity among...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2014

    Performance Comparison Between IPV4 AND IPV6

    The enormous growth of the internet and the way the addresses were assigned (classes A, B and C), resulted in a serious lack of addresses. There are several methods that avoid the total run out of addresses: PPP/DHCP (address sharing), CIDR (Classless Inter-Domain Routing) and NAT (Network Address Translation), but...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2014

    Network Evolution in 3G / 4G: Applications and Security Issues

    During the 20th century, the key technology was information gathering, processing and distribution. This total technology will depend based on the network systems which are nothing but grouping of systems that should be controlled by a server. In business and home applications, mobile users, and in all social issues the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2014

    Approaches and Scenarios to Combat Cyber Crime

    In the recent day's usefulness and importance of the internet has become a new crime tool. This paper focuses on different types of cyber crimes namely: phishing, email spoofing and cyber pornography. It provides a review of cyber crimes and the means to protect from such crimes. The paper looks...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2014

    A Case Based Study to Identify Malicious Node in Packet Routing

    MANET is a standalone ad hoc network with a system of mobile nodes interfacing without any centralized infrastructure. Generally, in the network layer of such a network, there are more possibilities for an attacker to observe traffic and inject themselves into the transmission path between the source and destination. Hence,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2014

    A Survey on Approaches to Improve Quality of Fingerprint Image and Template Security

    A biometric is a distinct biological trait that can be used to recognize a person. Fingerprints have been used for over a century and are the most widely used for user identification. Fingerprint identification is commonly employed in forensic science to support criminal investigations and in biometric systems such as...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2014

    Trust Computation Model for Secure Data Aggregation (TCMSDA) in Wireless Sensor Networks

    A wireless sensor network consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. In the wireless sensor networks, data aggregation scheme is used to reduce the large amount...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2014

    Performance Evaluation of LTE-Advanced Channel Estimation Techniques in Vehicular Environments

    In this paper; two linear channel estimation techniques, Least Square (LS) and Minimum Mean Square Error (MMSE), are studied for the downlink of 3GPP LTE-A system which is based on MIMO-OFDM technology. The performance of the system is evaluated using different transmission schemes (Transmit Diversity (TxD) and Open Loop Spatial...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Oct 2014

    Survey on CPAL: A Conditional Privacy Preservation Authentication with Access Linkability for Roaming Service

    Owing to tremendous development in wireless technology, user mobility has become an important network features. Roaming service helps to enable the wireless device kept connected to a network without breaking connections. With this new emerging technology the requirement of ubiquitous accessing can be successfully achieved, for example IOT (Internet Of...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Oct 2014

    Android L - The Latest Android Version 5.0

    Lollipop is the 13th major version of Android. Android 5.0 i.e. Lollipop release on 15th October 2014. It's the latest version of Android. It has gone through lot of enhancements and many API's is included in it. One of the most prominent changes in the Android Lollipop is the redesigned...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Oct 2014

    A Study on Primary User Emulation Attack in Cognitive Radio Networks

    The Federal Communication Commission (FCC) defined Cognitive Radio (CR) as the radio that can change its transmission parameters based on interaction with the environment in which it operates. CR is an emerging technology in wireless communications. Based on their operating environment CRNs can dynamically reconfigure their characteristics. So that many...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2014

    Review of CBIR System

    With the advent of technology and multimedia information, digital images are increasing very quickly. Various techniques are being developed to retrieve/search digital information or data contained in the image. Traditional text based image retrieval system is not plentiful. Since it is time consuming as it require manual image annotation. Also,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2014

    Expert System to Troubleshoot the Wireless Connection Problems

    Expert system is an important method to help using the expertise of the human in more than one place in high demanding fields. In this paper, an expert system was designed to troubleshoot the wireless connection problems and reach an accurate decision about the cause. Java and Prolog used connected...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jul 2014

    A Secure Routing Protocol for MANET

    Mobile Ad hoc NETworks (MANETs) have become a remarkable technology for wireless communication in recent years because of its critical and emergency situations that may cover. Routing protocols for ad hoc network are vulnerable to various types of attack. Security is an essential issue in MANET due to open medium...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jul 2014

    A Study on Web Services Security

    A Web services have appeared as a new Web-based technology concept for trading information on the Internet using platform-neutral standards, such as XML and adopting Internet-based procedure. In recent times, Web services have initiate vast attractions in both merchants and researchers. It has become a promising technology to design and...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jul 2014

    Performance Testing and Improvement in Agile

    Web performance testing is a must for every application in almost all the cases where reliability, scalability and turnaround time is at stake. Not considering these parameters related to the user application can translate to heavy losses in terms of brand and finances. The generic model of process to follow...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jul 2014

    Efficient Security Solution for Privacy-Preserving Cloud Services

    The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies In this paper, the authors present a novel privacy-preserving security solution for cloud services. They deal with user identification and secure communication. Their solution provides...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2014

    Documenting Agile Project Knowledge: A Review of Knowledge Capture for Agile Practices

    In the current agile project management environment of fast-paced, iterative changes, capturing appropriate project knowledge without affecting the light, iterative method is critical. The goal is matching light, streamlined documentation approaches to agile practice while avoiding excessive documentation. This intent includes knowledge capture specifically designed for a specific audience. This...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2014

    Enhance the Data Security Using PGP & DES in MANET

    The goal of security solutions is to provide security services, such as authentication, confidentiality, integrity, and availability to mobile users. In order to enhance the security various algorithms were proposed, such as International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES) & Pretty Good Privacy (PGP) etc. Individually each algorithm...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2014

    Virtualization, Resource Allocation and Security Measures in Cloud Computing

    Cloud computing mainly aims for the next generation data centers and it also enables the application service providers to lease data center capabilities for deploying applications depending on user QOS requirements and different composition configuration as well as deployment requirements, these are related cloud applications. Cloud computing also provides virtualization,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Data Sharing in the Cloud Using Distributed Accountability

    Cloud computing enables highly scalable services which to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Integration of Security Issues in Multi Cloud Computing Environment

    A proposed multi-cloud computing framework allows dynamic resource sharing among cloud-based system, addressing trust, policy, and privacy issues without pre-established collaboration agreement. Multi-cloud typically consists of service providers (or admin), infrastructure providers, and service users (or clients). Service provider (or admin) delivers applications as services to the service users (or...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Frameworks of Privacy-Utility Tradeoffs in Databases

    Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify the privacy of personally identifiable information while still providing a quantifiable benefit (utility) to multiple legitimate information consumers. Online offerings such...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Transversal Design for Wireless Sensor Networks Using Security Enhanced Key

    Security is an indispensable concern in Wireless Sensor Network (WSN) due to the presence of potential adversaries. For secure communication in infrastructure less sensor nodes various key predistribution have been proposed. In this paper, the authors have evaluated various existing deterministic, probabilistic and hybrid type of key pre-distribution and dynamic...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Reconfigurable Multi- Band Antenna Using RF MEMS

    The design methodology, analysis and characterization of a Radio Frequency Micro ElectroMechanical Systems (RF MEMS) based on reconfigurable antenna operating in wireless communications are been presented in this paper. Now-a-days, multi-band antennas have became very important in the applications of Wireless Local-Area Networks (WLANs) which are been employed for different...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Security of Graphical Passwords Using PCCP

    The people are well aware about problems persists in typically text-based passwords. Users generally choose memorable passwords, that are easy for attackers to guess, but the strong system generated passwords are difficult to remember. So a password authentication system should emphasis on maintaining high password strength on one hand and...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Review on DDoS Attack Traceback Mechanism in MANET

    Mobile ad-hoc network is a collection of node which is self-configuring, decentralized, framework-less mobile network. Due to open nature of the network it is easily vulnerable to various attacks. The major security threat on MANET is a DDoS attack. DDoS attack has the ability to create huge amount of unwanted...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Reliable Transport Protocol Design for Energy- Efficient Wireless Sensor Networks

    New wireless sensor network applications (e.g., military surveillance) require higher reliability than a simple best effort service could provide. Classical reliable transport protocols like Transmission Control Protocol (TCP) are not well suited for wireless sensor networks due to both the characteristics of the network nodes (low computing power and strong...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Hamming Code Detecting and Correcting Errors in Credit Cards Using Neural Networks

    In this paper, the authors discuss about hamming code detecting and correcting errors in credit card information such as card number, expiry date and CVV number. Card can store the card holder information in chip. Chip transmit the card holder's information in binary form. The detection and correction of error...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Theoretical Study of Ambient Noise Cancellation for Mobile Phones

    All of the people have experienced trying to make a mobile phone call from a noisy street, crowded restaurant or train station where the background noise can make it impossible to hear the incoming call. It can be worse when the person next to the user in these situations is...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Performance Analysis of TCP Congestion Control Algorithms

    The demand for fast transfer of larger volume of data, and the deployment of the network infrastructures is ever increasing. However, TCP is the dominant transport protocol of today, does not meet this demand because it favors reliability over timeliness and fails to fully utilize the network capacity due to...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Private Content Based Multimedia Information Retrieval Using Map-Reduce

    Today's large amount of variety multimedia information like audio, video and images are massively produced through mic, digital camera, mobile phones and photo editing software etc. In these paper the authors proposed a solution for a large database of images which provides secure, efficient and effective search and retrieve the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    A Survey Based on Fingerprint, Face and Iris Biometric Recognition System, Image Quality Assessment and Fake Biometric

    A biometric system is a computer system, which is used to identify the person on their behavioral and physiological characteristic (for example fingerprint, face, iris, key-stroke, signature, voice, etc). A typical biometric system consists of sensing, feature extraction, and matching modules. But now-a-days biometric systems are attacked by using fake...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Secure SMS System for E-Commerce Applications

    SMS is a very popular wireless service throughout the world. In this paper, a simple e-commerce application for shopping is presented with implementing a new version of Diffie-Hellman protocol, to insure mutual authentication between client and server along with exchanging key securely through unsecure channel. The proposed system provides the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    A Proposed Modified Approach to Corruption Control for TCP in Mobile Ad-Hoc Networks

    Among the two transport layer protocols, TCP is the reliable protocol that performs well in traditional networks where the main reason for packet loss is congestion. Wireless networks also suffer from some losses due to bit errors, hidden terminals etc. In response to all these losses TCP invokes congestion control...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Mesh based and Hybrid Multicast Routing Protocols for Mobile Ad hoc Networks: Current State of the Art

    Producing multi-hop routing in multicast routing protocols for MANETs under host mobility and bandwidth constraint is critical challenge. Multicast routing plays a significant role in MANETs. In recent years, various multicast routing protocols with distinguishing feature have been newly proposed. In order to provide a comprehensive understanding of these multicast...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2014

    Enhancement LTE-A Using MIMO Technology

    MIMO is one of the techniques proposed to 3G and 4G LTE-A systems for its added benefits of higher data rates and low bit error rates. The gist of MIMO working is its ability to increase number of channels; thus increasing diversity gain. Correspondingly, more users are accommodated in one...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2014

    Streaming Video Content over NGA (Next Generation Access) Network Technology

    Operators throughout the developed world are rolling out IP-based Next Generation Networks (NGNs) with different application. This paper is to examine the performance of NGA network by integrating between both wireless technologies (WiMax IEEE 802.16 / WiFi IEEE 802.11g) and fixed line technologies ADSL architecture to support video services by...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Improve the Performance of LBAC-IAPP by Using Proactive Context Caching

    In wireless networks, continuous connectivity which allows user mobility and maintains the secured network utilization is one of the most important requirements. WLANS are widely used in business, governments, education and public. In order to establish wireless LAN with continuous connectivity, the authors need to employ additional mechanisms like IAPP,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Simulation Based Performance Analysis of Ad Hoc Routing Protocols in Various Moving Trajectories

    Few characteristics of a Mobile Ad hoc Network, such as dynamic topology and shared wireless medium, pose various security challenges. This paper focuses on the performance investigation of reactive and proactive MANET routing protocols, namely, AODV and OLSR, under various the paths and trajectories. Network performance is evaluated in terms...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Improved Receiver-Based Algorithm for Resourceful Broadcasting in Portable ADHOC Networks

    Two efficient broadcasting algorithms based on 1- hop neighbor information is implemented here, i.e. Sender-based broadcasting algorithm and receiver-based broadcasting algorithm. The sender-based broadcasting algorithm selects a subset of nodes to forward the message. An efficient sender-based broadcasting algorithm proposed here is based on 1-hop neighbor information where the number...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Data Sharing in the Cloud Using Distributed Accountability

    Cloud computing enables highly scalable services which to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Integration of Security Issues in Multi Cloud Computing Environment

    A proposed multi-cloud computing framework allows dynamic resource sharing among cloud-based system, addressing trust, policy, and privacy issues without pre-established collaboration agreement. Multi-cloud typically consists of service providers (or admin), infrastructure providers, and service users (or clients). Service provider (or admin) delivers applications as services to the service users (or...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Frameworks of Privacy-Utility Tradeoffs in Databases

    Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify the privacy of personally identifiable information while still providing a quantifiable benefit (utility) to multiple legitimate information consumers. Online offerings such...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2013

    Detection of DDoS Attacks Using Source IP Based Entropy

    There are about nine hundred million people, who use internet now-a-days. They use the internet to communicate with each other and all over the world, business-men can do their work over the internet, and there is much more to it. One of the major security problems in the current Internet,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2012

    An Approach of Cryptography for Web User Authentication Using Secure Remote Password Protocol

    In this paper, the authors describe generation of a crypt key for user of web application using SRP techniques for the purpose of secure authentication in web. A numbers of web sites offer different kinds of users in worldwide to access web application using unique user name and corresponding a...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Transversal Design for Wireless Sensor Networks Using Security Enhanced Key

    Security is an indispensable concern in Wireless Sensor Network (WSN) due to the presence of potential adversaries. For secure communication in infrastructure less sensor nodes various key predistribution have been proposed. In this paper, the authors have evaluated various existing deterministic, probabilistic and hybrid type of key pre-distribution and dynamic...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Reconfigurable Multi- Band Antenna Using RF MEMS

    The design methodology, analysis and characterization of a Radio Frequency Micro ElectroMechanical Systems (RF MEMS) based on reconfigurable antenna operating in wireless communications are been presented in this paper. Now-a-days, multi-band antennas have became very important in the applications of Wireless Local-Area Networks (WLANs) which are been employed for different...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Hamming Code Detecting and Correcting Errors in Credit Cards Using Neural Networks

    In this paper, the authors discuss about hamming code detecting and correcting errors in credit card information such as card number, expiry date and CVV number. Card can store the card holder information in chip. Chip transmit the card holder's information in binary form. The detection and correction of error...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Theoretical Study of Ambient Noise Cancellation for Mobile Phones

    All of the people have experienced trying to make a mobile phone call from a noisy street, crowded restaurant or train station where the background noise can make it impossible to hear the incoming call. It can be worse when the person next to the user in these situations is...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Performance Analysis of TCP Congestion Control Algorithms

    The demand for fast transfer of larger volume of data, and the deployment of the network infrastructures is ever increasing. However, TCP is the dominant transport protocol of today, does not meet this demand because it favors reliability over timeliness and fails to fully utilize the network capacity due to...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2014

    Documenting Agile Project Knowledge: A Review of Knowledge Capture for Agile Practices

    In the current agile project management environment of fast-paced, iterative changes, capturing appropriate project knowledge without affecting the light, iterative method is critical. The goal is matching light, streamlined documentation approaches to agile practice while avoiding excessive documentation. This intent includes knowledge capture specifically designed for a specific audience. This...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2014

    Enhance the Data Security Using PGP & DES in MANET

    The goal of security solutions is to provide security services, such as authentication, confidentiality, integrity, and availability to mobile users. In order to enhance the security various algorithms were proposed, such as International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES) & Pretty Good Privacy (PGP) etc. Individually each algorithm...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Security of Graphical Passwords Using PCCP

    The people are well aware about problems persists in typically text-based passwords. Users generally choose memorable passwords, that are easy for attackers to guess, but the strong system generated passwords are difficult to remember. So a password authentication system should emphasis on maintaining high password strength on one hand and...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Review on DDoS Attack Traceback Mechanism in MANET

    Mobile ad-hoc network is a collection of node which is self-configuring, decentralized, framework-less mobile network. Due to open nature of the network it is easily vulnerable to various attacks. The major security threat on MANET is a DDoS attack. DDoS attack has the ability to create huge amount of unwanted...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Reliable Transport Protocol Design for Energy- Efficient Wireless Sensor Networks

    New wireless sensor network applications (e.g., military surveillance) require higher reliability than a simple best effort service could provide. Classical reliable transport protocols like Transmission Control Protocol (TCP) are not well suited for wireless sensor networks due to both the characteristics of the network nodes (low computing power and strong...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2014

    Enhancement LTE-A Using MIMO Technology

    MIMO is one of the techniques proposed to 3G and 4G LTE-A systems for its added benefits of higher data rates and low bit error rates. The gist of MIMO working is its ability to increase number of channels; thus increasing diversity gain. Correspondingly, more users are accommodated in one...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2014

    Streaming Video Content over NGA (Next Generation Access) Network Technology

    Operators throughout the developed world are rolling out IP-based Next Generation Networks (NGNs) with different application. This paper is to examine the performance of NGA network by integrating between both wireless technologies (WiMax IEEE 802.16 / WiFi IEEE 802.11g) and fixed line technologies ADSL architecture to support video services by...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2014

    A Secure Mobile Network Environments Using Biometrics

    A security of computers network system depends upon real time face recognition technique is considered. The proposed paper is consisting of two sections. The first section represents the computers network system, and the second section represents the face recognition technique as a type of biometrics. Computers network system is consisting...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Feb 2014

    Real-time and Reliable Video Transport Protocol (RRVTP) for Visual Wireless Sensor Networks (VSNs)

    Recent progress of Visual Sensor Networks (VSNs) has been resulted from great development in cameras techniques that has been enabled the development of single chip camera modules that could easily be embedded into inexpensive transceivers. The interconnection of multimedia sources with inexpensive communication devices has enhanced research in the networking...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Feb 2014

    Earthquake Evaluation of Concrete Buildings Using Low Power Wireless Sensor Networks

    Analysis of the stability of the building is a needed measurement process for all buildings in the cities. Periodic monitoring of the structure for such damage is therefore a key step in rationally planning of safety and serviceability. However, in order for the installation of a permanently installed sensing system...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Feb 2014

    Improvement of AODV Routing Protocol Algorithm with Link Stability and Energy Efficient Routing for MANET

    Mobile Ad hoc NETworks (MANETs) are infrastructure less networks consist of wireless mobile nodes which dynamically exchange data among themselves. A major challenge that lies in MANET (Mobile Ad hoc NETwork) communication is the unlimited mobility and more frequent failures due to link breakage. Conventional routing algorithms are insufficient for...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Private Content Based Multimedia Information Retrieval Using Map-Reduce

    Today's large amount of variety multimedia information like audio, video and images are massively produced through mic, digital camera, mobile phones and photo editing software etc. In these paper the authors proposed a solution for a large database of images which provides secure, efficient and effective search and retrieve the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    A Survey Based on Fingerprint, Face and Iris Biometric Recognition System, Image Quality Assessment and Fake Biometric

    A biometric system is a computer system, which is used to identify the person on their behavioral and physiological characteristic (for example fingerprint, face, iris, key-stroke, signature, voice, etc). A typical biometric system consists of sensing, feature extraction, and matching modules. But now-a-days biometric systems are attacked by using fake...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Secure SMS System for E-Commerce Applications

    SMS is a very popular wireless service throughout the world. In this paper, a simple e-commerce application for shopping is presented with implementing a new version of Diffie-Hellman protocol, to insure mutual authentication between client and server along with exchanging key securely through unsecure channel. The proposed system provides the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2014

    A Review of 3G-WLAN Interworking

    The 3rd Generation Partnership Project (3GPP) standard is developing System Architecture Evolution (SAE)/Long Term Evolution (LTE) architecture for the next generation mobile communication system. The SAE/LTE architecture provides secure service and 3G-WLAN interworking. To provide secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible Authentication Protocol-Authentication and Key Agreement (EAPAKA) is...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2013

    A Review of Lightweight Security Mechanism for ATM Networks

    The IP converge the multi-applications over Internet, and ATM will construct global networks for IP development. It is a significant research to associate those projects. The vision is that company or enterprise will have ATM switches on their own site to transfer bulk data across Internet. In this paper, the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2013

    Design and Implementation of Web-Based GPS-GPRS Vehicle Tracking System

    In this paper, an integrated cost effective web-based GPS-GPRS vehicle tracking system was designed and implemented. The system enables enterprises owners to view the present and past positions recorded of the target vehicle on Google Map through purpose designed web site. The current position of the vehicle was acquired by...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2013

    Secure Messaging System using ZKP

    Websites are now the number one target of choice for attacks by hackers. In this paper, a web-based messaging system is presented with implementing a new version of Diffie-Hellman protocol, to insure mutual authentication between client and server along with exchanging key securely without sending it through the channel. The...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2013

    A Critical Review for Developing Affinity Set Method for Multi Classification and Prediction

    Machine learning, a branch of artificial Intelligence targets to make predictions more accurate. Machine Learning methods have been widely used. The notion of affinity set which is one of the machine learning methods can be defined as the distance or closeness between two objects. Unlike the fuzzy set and rough...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2013

    A Review of Wireless Sensor Networks: Attacks and Countermeasures

    The authors consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. They propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2013

    Modeling and Analysis of General Internet Signaling Transport Protocol (GIST) using Coloured Petri Nets

    The NSIS (Next Steps In Signaling) working group has standardized a General Internet Signaling Transport (GIST) as the base protocol component of NSIS protocol stack to support a variety of signaling applications. The GIST basically provides the routing and transport service to the upper layer. GIST is not designed to...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2014

    A Review of I-SEAD Routing Protocol for Mobile Ad Hoc Networks

    Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of a centralized access point. Secure Efficient Ad hoc Distance vector (SEAD) is a proactive routing protocol, based on the design of Destination Sequenced Distance Vector routing protocol (DSDV). SEAD provides...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2014

    The Implementation of FOAF Ontology for an Academic Social Network

    In this paper, develop a semantic web application based on FOAF ontology as a part of an academic social network where researchers can find collaborators and share research results with others. Ontology has been used to describe users and their profiles and skills, their activities and their relations to other...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2013

    Energy Efficiency in MANET

    The need to exchange digital information outside the typical wired office environment is growing. A mobile ad-hoc network which does not use a wired network and base station system is composed of a group of mobile and wireless nodes. There are various types of restrictions. The biggest restriction is the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2013

    An Overview of PAPR Reduction Technique for OFDM Signals by using Selective Mapping Technique (SLM)

    Orthogonal Frequency Division Multiplexing (OFDM) is a promising technique used in the wireless broadband communication systems these days. It is a form of multi-carrier modulation technique. High spectral efficiency, robustness to channel fading, immunity to impulse interference, uniform average spectral density, capacity to handle very strong echoes and very less...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2013

    A Review of One-Pass Key Establishment Model and Protocols for Wireless Roaming

    Two novel mutual authentication and key exchange protocols with anonymity are proposed for different roaming scenarios in the global mobility network. The new features in the proposed protocols include identity anonymity and one-time session key renewal. Identity anonymity protects mobile user's privacy in the roaming network environment. One-time session key...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2013

    Classification of Routing Protocols in Wireless Ad hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a wireless network without infrastructure. Self configurability and easy deployment feature of the MANET resulted in numerous applications in this modern era. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. Routing protocols used in wired...

    Provided By International Journal of Computer Science Engineering and Technology