International Journal of Computer Science & Engineering Technology (IJCSET)

Displaying 1-40 of 349 results

  • White Papers // Aug 2014

    ERA -An Enhanced Ripper Algorithm to Improve Accuracy in Software Fault Prediction

    The data mining techniques are used and applied in the various fields of science. The software mining is an application of data mining, which describes investigation into the examination of software repositories, such as software assurance, reuse, fault, effort or cost prediction and detection of incomplete changes. Fault in software...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2014

    A Survey on Secure Transmission on Vechicles and Signal Devices

    Vehicular Ad hoc NETworks (VANETs) enable vehicles to communicate with each other but require efficient and robust routing protocols for their success. In this paper, it makes use of the infrastructure of Road Side Units (RSUs) to efficiently and reliably route packets in VANETs. In the Vehicular Ad hoc NETworks...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2014

    Performance of I-LEACH Routing Protocol for Wireless Sensor Networks

    In wireless sensor networks, sensor node always has a limited power resource. The energy consumed by sensor nodes to transfer the data to its destination becomes critical issue in designing WSN routing protocols. In this paper, the authors propose a cluster routing protocol named I-LEACH to enhance the routing protocol...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2014

    Effect of Enhancing MAC Layer Security and Power Saving Mode on Mobile Ad Hoc Network

    Mobile ad hoc network is the wireless network with no centralized monitoring system. The nodes are free to move anywhere in the network. These mobile nodes also act as routers and make the routes for any data transmission on their own. They take the responsibility of route discovery and packet...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2014

    Fingerprint Biometric System: A Survey

    Fingerprint recognition is one of famous biometric system that is mostly used in various authentication techniques. Human fingerprint exhibit some certain details marked on it, categorized it as minutiae, which can be used as a unique identity of a person if recognize it in a well manner. This paper discusses...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    A Novel Approach for Reversible Data Hiding in Encrypted Images Using Key Based Pixel Selection

    In this paper a new steganographic approach is proposed to increase the confidentiality of the hidden data in RGB images by placing the data randomly across the encrypted images. By using the secret key provided to the users, key based pixel selection approach is applied in order to randomize the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    Location Based Routing Protocols for Wireless Ad-Hoc Networks: A Survey and Comparison

    Routing in wireless ad-hoc networks is a very exigent task. Conventional routing protocols are not appropriate for these networks due to inherent nature of such networks such as dynamic topology, no fixed infrastructure, resource constraints and lack of centralized control. One of the most promising routing schemes in ad-hoc networks...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    Analysis of Trust in Wireless Sensor Networks

    Trust is an important factor in Wireless Sensor Network (WSN) that enables the sensor node to cooperate each other for their application. It makes the nodes in the wireless sensor networks to cope with uncertainty caused by the other nodes in the network. Managing the trust in the wireless sensor...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    A Review on Localization Algorithms in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), nodes are deployed in sensor fields for monitoring and controlling the physical environments. Node localization is fundamental challenge in wireless sensor networks as without knowing the location of nodes sensed information will have no value. Therefore, it is vital that nodes must know their location....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    A Robust Method for Reducing Routing Overhead Using High Signal Strength in Manets

    A Mobile Ad hoc NETwork (MANET) is a continuously self configuring, infrastructureless network of mobile devices connected without wires, forming a temporary network. This feature leads to frequent path failures and route reconstructions that cause increase in the routing control overhead. Broadcasting is an effective data dissemination mechanism for route...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    Secure Authentication Protocol to Detect Sybil Attacks in MANETs

    Mobile Ad-hoc NETworks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In this paper, the authors focus on preventing Sybil attack and Intruder nodes (malicious node). They are presenting a...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    Cluster Head Selection Mechanisms in Homogeneous and Heterogeneous WSNs: A Survey

    Wireless sensor networks are energy constrained networks that are deployed to sense an environment. The battery of the nodes in these networks depletes with the network operational time and eventually the nodes die out of battery. It becomes very important to minimize the energy consumption in these networks as it...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    Network Security Issues and Solutions

    Network security is now-a-days becoming more and more important because people like to connect with each other all the time via internet. Personal computer users, employees of professional organizations, government servants, academicians, social workers, students, military peoples etc are very familiar to use network currently and all these people use...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    A Review Study on Fingerprint Image Enhancement Techniques

    Image enhancement techniques have become more popular among the researchers as it is widely been used in security and medical applications. There have been different image enhancement technique approaches and filters were developed to enhancement the fingerprint images. While analysis a few accesses are established in spatial domain, frequency domain...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Attacks on Security Protocols Using AVISPA

    Now-a-days, use of Internet is increased day-by-day. Both technical and non technical people use the Internet very frequently but only technical user can understand the aspects working behind Internet. There are different types of protocols working behind various parameters of Internet such as security, accessibility, availability etc. Among all these...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Modified 4-Bit Comparator Using Sleep Technique

    The development of digital integrated circuits is challenged by higher power consumption. So low power circuits have become a top priority in modern VLSI design. This paper presents layout simulations of a new improved four bit comparator design. The proposed design demonstrates its superiority against existing four bit comparator design...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    A Survey Report On Software Aging and Rejuvenation studies in Virtualized Environment

    Software aging is a phenomenon that occurs in a long running complex software system that tends to decrease in performance or increase in failure rate. This phenomenon leads to performance degradation and crash/hang failure. To counteract software aging a technique named as software rejuvenation has been proposed, which remove aging...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Highly Secured WSN Life Span Fortification with Data Compression, NNF Technique and ECC Method

    In WSN the major drawback is conservation of the energy available at each sensor node. The authors' proposed scheme consists of centralized Low-Energy Adaptive Clustering Hierarchy - Centralized (LEACH-C) which is a widespread protocol in Wireless senor networks to reduce the energy conception. Data compression is to reduce the number...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Malicious Code Detection through Data Mining Techniques

    Now-a-days computer systems and communication infrastructures are likely to be influenced by different types of attacks so there is need to put further efforts for improving the software trust. Therefore, there will be increase in necessity in the coming time, as the number of software developers and applications will likely...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Different Sanitization Techniques to Prevent Inference Attacks on Social Network Data

    In current time, social network has become one of the most powerful resources for people to connect to their friends and family members or etc. and also publish their sensitive information. Some of the information in social network is meant to be private. For different work, the social network data...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Comprehensive Study and Comparison of Information Dispersal Techniques for Cloud Computing

    Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention from industry but there are still many issues that are in their primitive stage which is hampering the growth...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    An Effeceint Multi Parameteric CPU Scheduling Algorithm for Single Processor Systems

    In today's world, computing systems serve many purposes and imagining a world without them is a nightmare. From the very beginning of the evolution of computer systems, their performance has been a subject of intense interest for computer programmers, engineers, buyers, managers and users. The measurement and optimization of computer...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Survey on Service Migration to Cloud Architecture

    Cloud computing is an emerging computation paradigm with the goal of freeing up users from the management of hardware, software, and data resources and shifting these burdens to cloud service providers. This paper contributes to the growing knowledge of how to migrate existing systems to cloud computing environment. An increasing...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    A Review: Advancement in Single Node Data Transfer Energy Protocol in WSN

    Wireless Sensor Network (WSNs) gains the importance in both research and actual user. Energy saving is the major issue that is common in both. Now-a-days, maximum work in research field on the multiple hops data transmission for congestion control to increase lifetime of wireless network. The authors proposed a new...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Trust Worthy Framework for Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consists of spatially scattered self-directed sensors to agreeably monitor physical or ecological conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Trust in networks may be defined as the degree of belief or confidence about the nodes on the past interactions and observations. So...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    A Comparative Analysis of Object Point Method with Use Case Method in Software Effort Estimation

    The important work in software development process is to develop projects within estimated time and cost. As accuracy and effort plays a vital role for software development system. Several techniques are available for effort estimation. Now it is a big question, which method is worth for the estimation. Approach: the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    An Improved Load Balancing Adaptive QoS Buffer Scheduler (I-LABS) for Streaming Services Over MANET

    Large variations in network Quality of Service (QoS) in terms of bandwidth, latency, jitter may occur during media transfer over Mobile Ad-hoc NETworks (MANETs). Researchers have identified that complex computing applications experience \"Bursty\" QoS behavior during their execution. Applications have to adapt their functions to any change in network status....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Software Maintenance Using Effective Code Clones Detection

    In this paper, the authors described about the code clone detection using the fine granularity technique called frequent pattern growth algorithm. Here it used for detecting that the type clones which are known as functional clones. In software project it mainly detects the software code. It helps to extract the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    A Secure and Privacy Preserving Technique in Distributed Information Sharing Using AES Encryption and Genetic Algorithm

    In many organizations distributed information sharing is used to share data in a large network. In distributed Information sharing there are many chances to hack the technical and personal information of client and server in a network. Earlier Information Brokering methods are used where brokers are used to share the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Analyze the Impact of Transmission Rate on the Performance of AODV and DSR Protocols in MANETs Under Responsive and Non-Responsive Traffic

    The massive boom in the wireless technology has led to heavy utilization. Due to the heavy utilization and shared nature of resources causes QoS problems in ad hoc networks. Providing QoS is a severe problem in Mobile Ad hoc NETworks (MANETs). The main focus of this paper is to analyze...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    An Impact of Implementing Various Cryptographic Techniques Efficiently in a Public Centric Cloud

    It is very important to provide security to the users own data in a public storage like cloud. Here the authors address various cryptographic techniques which produce higher order and efficient data security in cloud. Here the authors survey various architecture that provide some core traditional mechanisms for addressing privacy...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Best Mechanism for Increasing the Data Method for Controlling and Maintaining Efficient Technique in MANET

    A high performance and low power architecture is devised for a 8Mbps infrared wireless communication system dedicated to the mobile ad hoc network in this architectured, 8PPM (4-Pulse Position Modulations) infrared is signals detected by an infrared receiver are digitized pulses are demodulated by a 2-bit digital demodulator. To improve...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Gathering Web Information for Personalized Ontology Model

    In a personalized web information gathering, for the knowledge description ontology term is use. Mainly ontology used for acquires knowledge, share, reuse and increase relations description of knowledge. Paper shows different problems and searching techniques also related work shows working of different authors on ontology. Main work of ontology is...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Data Center Transmission Control Protocol an Efficient Packet Transport for the Commoditized Data Center

    Cloud data centers host diverse applications, mixing in the same network a plethora of workflows that require small predictable latency with others requiring large sustained throughput. In this environment, today's state-of-the-art TCP protocol falls short. The authors present measurements of a 6000 server production cluster and reveal network impairments, such...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    An Efficient Approach to Minimize Data Collection Delay in Wireless Sensor Networks

    Data assortment latency might become higher attributable to the comparatively slow travel speed of mobile components. Thus, the planning of mobile components, i.e., however they traverse through the sensing field and once they collect knowledge from that device, is of final importance and has attracted increasing attention from the analysis...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    ETL Scheduling in Real-Time Data Warehousing

    As the pace of today's business grows and with business getting more aligned with good customer relationships, decisions that are made based on the most recent data are required. These decisions that are based on the most currently available data improve customer expectations and hence customer relationships, increase revenue and...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Linear Time Sorting Algorithm for Large Integer Data-set

    Dealing with the data is the basic task of almost every computer application. When the authors want to manipulate data sets then it is always easy to do that with sorted data sets. Today's computer applications are dealing with big data sets and sorting these big data sets is a...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Exploration of Cloud Computing and its Essential Facets

    Cloud computing is all about how the authors can use external services over network by various resources provided by many different companies that share and access through the internet to perform many commercial essentialities. Cloud computing is combination of software and hardware applications as well as resources. Technological and non-functional,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Network Capacity Improvement through Efficient Data Delivery in Mobile Ad-Hoc Networks

    Mobile ad hoc networks are being increasingly used in wireless communication with many technological enhancements. One of the major issues in such an infrastructure less network is the delivery of the data packets in an energy efficient manner, taking into account the highly dynamic topology of the network. Many of...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    A Comparative Study of cloud and mCloud Computing

    Cloud computing is one of the latest technology. It makes many changes in industry. It is a platform which includes technology, resources and infrastructure. It is a concept of sharing resources to achieve economical benefit. It allows to store and retrieve files and folders in cloud area from anywhere in...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2012

    Detection and Prevention of SQL-Injection Attacks of Web Application Using Comparing the Length of SQL Query Length

    Now-a-days, the authors are using the web applications, but the application code is not secured so there is existence of the SQL injection attacks. In web applications with the help of the internet explorer the user tries to access the information. But most of the web applications are affected by...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2012

    Semiconductor Optical Amplifiers (SOA) Performance Optimization in Optical Communication System

    The paper has been focused on the XOR, AND, OR logic gate implementation, since it is a very versatile approach for implementing many functions in optical networks. The development and study of a novel architecture based on cascaded SOA-MZIs to perform the logic XOR operation between two input binary sequences....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2012

    Enhanced Energy Conserving Improved and Balanced LEACH for Heterogeneous Wireless Sensor Networks

    Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor nodes where each sensor node has very low battery life. Main goal is to conserve the transmitted energy from various sensor nodes. Various energy efficient algorithms have been designed for this. LEACH uses distributed cluster...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2012

    An Evolutionary Algorithm for the Processing of Fuzzy Quantified Queries Using Clustering

    This paper is about to make a contribution in the field of fuzzy query processing. The authors are mainly interested in query mechanism for evaluation of fuzzy quantified queries on the relational database. They restrict their work to fuzzy quantified sentences of form S1, involving linguistic quantification of fuzzy conditions...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2012

    Alternative System for Data Communication Based on Organic Devices and Links for Local Area Network

    Organic devices and links offer considerable potential for data communication by virtue of their ability to transmit, modulate and detect light in an architecture that is low cost, flexible, lightweight and robust. Here, the authors have discussed an all organic optical communication system comprising of organic optoelectronic devices such as...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2012

    Effect of Different Modulation on PAPR and Its Reduction

    As the technology grow in wireless communication, the concept of multicarrier modulation come into picture. Orthogonal Frequency Division Multiplex (OFDM) proves itself invaluable for multicarrier modulation. OFDM subcarriers can overlap to make full use of the spectrum but at the peak of each subcarriers spectrum, the power in all the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2012

    Cosine Similarity Function for the Temporal Dynamic Web Data

    Cosine similarity function is one of the most popular similarity function for handling the web data in various applications such as recommender system, collaborative filtering algorithms, classification algorithms, etc. Cosine similarity function calculates the similarity between the items as an angle between the vectors representing the two items. The smaller...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    Optimal Data Gathering Paths and Energy-Balance Mechanisms in Wireless Networks

    A wireless sensor network faces special challenges due to its inherent features, such as the limited energy. The energy constraint drives research on how to utilize energy efficiently to prolong the lifetime of the network. Because a sink node takes the responsibility of collecting data from other nodes, a usual...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    Modified AODV to Eliminate the Effects of Black Hole Node in MANET

    Mobile Adhoc NETwork (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    Compact Wide Band Microstrip Line Feed Microstrip Patch Antenna for Wireless Application

    This paper presents the increase in bandwidth of a Microstrip Antenna using a simple slotted structure fed by Microstrip line. The main aim of proposed work is to obtain a large bandwidth antenna with reduced size. The proposed microstrip antenna has a wide bandwidth covering the range from 1.806-2.978 GHz....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    Classification Techniques Applied for Intrusion Detection

    Intrusion Detection System (IDS) was designed to monitor the network activity and it identifies the normal and abnormal behavioral pattern in the network. If there was any abnormal pattern, it indicates the system is in attack by compromising the confidentiality, availability or integrity of the computer system. IDS perform three...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Modified Reliable Energy Aware Routing Protocol for Wireless Sensor Network

    In this paper, a novel reliable energy aware routing protocol is proposed, which is based on reliability and energy efficiency. Since in the wireless environment, link quality is difficult to guarantee, the reliable routing protocol is quite important issue to study. In this protocol, a backup path, alternative path and...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    Easy E-Commerce Using XML Data Source Without External Database

    Usually customers buy the goods of their desire from the store using internet. Administrator sell the goods with the help of external databases like oracle, mysql, etc., at administrator side. But in the authors' proposed system, end user is a departmental store where the application is hosted on the web...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    A New VLSI Architecture of Parallel Multiplier Based on Radix-4 Modified Booth Algorithm Using VHDL

    Low power consumption and smaller area are some of the most important criteria for the fabrication of DSP systems and high performance systems. Optimizing the speed and area of the multiplier is a major design issue. However, area and speed are usually conflicting constraints so that improving speed results mostly...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2012

    A Non-Linear Scheme for PMEPR Reduction in MC-CDMA System

    The main feature of the next-generation wireless systems will be the convergence of multimedia services such as speech, audio, video, image, and data. This implies that a future wireless terminal, by guaranteeing high speed data, will be able to connect to different networks in order to support various services: switched...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jan 2012

    Security Against Attacks in TOR Networks

    TOR(The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traffic analysis or network surveillances impossible by the intruders, and hence TOR is widely used network for purpose...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Dec 2011

    Performance Evaluation of BST Multicasting Network Over ICMP Ping Flood for DDoS

    The paper evaluates the performance of Bi-directional Shared Tree (BST) multicasting network with two sources and four receivers, attacked by five attackers. These attackers attack the source 1 in network by ICMP Ping Flood. Here, the authors execute the simulation and draw network throughput between source 1 and source 2,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Nov 2011

    Computing in the Cloud: An Effective Paradigm for Business

    Information Technology has been affecting nearly every facet of human endeavor including the domain of Business. The use of information technology in organizations is inevitable, be it any type of organization. At the same time, the cost of these resources is a constraint for a large number of organizations. The...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    The Implementation of Programmable Wireless Router Using Java

    Now-a-days available wireless routers do have extra levels of embedded security. Existing Wireless routers can be configured for invisible mode. So that wireless network cannot be scanned by outside wireless clients. If there is no configuration for wireless router, bandwidth of the Wi-Fi signal will be shared among all the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Various Aspects of Minutia as a Fingerprint Feature

    Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. Minutiae are local discontinuities in the fingerprint pattern, mainly terminations or end points and...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Issues and Challenges of Quality of Service in Mobile Adhoc Network

    A Mobile Adhoc Network is a self configuring network of wireless devices connected by wireless links. Quality of service is more difficult to guarantee in ad hoc networks than in most other type of networks, because the network topology changes as the nodes move and network state information is generally...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Automated Feedback System for Multimedia in Multiprocessors

    In spite of many real times scheduling algorithms available it is not clear that these scheduling algorithms support fully the problems in the real time system in multiprocessors. There are certain "Open loop" algorithm that can support only some set of characteristics such as the deadlines, precedence constraints, shared resources...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Base Station Driven Routing Protocol Evaluation Using Tossim

    Routing protocols play an important role in wireless sensor networks. There are primarily two types of protocols viz., data collection and data dissemination protocols. This paper compares two collection protocols: Base Station (BS) driven routing protocol and a modified version of Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. The simulation...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Pragmatics of Wireless Sensor Networks

    Wireless sensor network composed of infrastructureless, small, low-power, low cost, dynamic nature, application oriented, and multi-hoping wireless nodes, design for the purpose of collecting information by environment sensing, processing and communication. Designing of these networks become more complicated due to deploy nodes characteristics, maintenance of database, security, authentication and its...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Comparison of Software Test Data for Automatic Path Coverage Using Genetic Algorithm

    This paper discusses genetic algorithms that can automatically generate test cases to test selected path. This algorithm takes a selected path as a target and executes sequences of operators iteratively for test cases to evolve. The evolved test case can lead the program execution to achieve the target path. An...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2011

    Co-Operative Scheduled Energy Aware Load-Balancing Technique for an Efficient Computational Cloud

    Cloud Computing in the recent years has been taking its evolution from the scientific to the non scientific and commercial applications. Power consumption and load-balancing are very important and complex problem in computational Cloud. A computational Cloud differs from traditional high-performance computing systems in the heterogeneity of the computing nodes,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2012

    Exploratory Data Analysis of Turbulent Flows

    Large Eddy Simulations (LES) contains 3D instantaneous velocity fields as well as passive scalar concentration field describing the coherent flow structures. The study of coherent flow structures has a major impact on the mixing of the fuel and the oxidizer. The analysis of these structures in a turbulent jet is...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2012

    Secure Routing Backup Protocol for MANET From Selective Forwarding Attack

    In the recent years, wireless technology has enjoyed a tremendous rise in popularity and usage, thus opening new fields of applications in the domain of networking. One of the most important of these fields concerns Mobile Ad hoc NETworks (MANETs), where the participating nodes do not rely on any existing...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Human Computer Interface Through Biometric Iris Recognition System

    Biometric recognition system is better reliable, robust technique than traditional recognition system. Biometric iris recognition system is most secure and reliable than other biometric recognition system. Hence, the authors use biometric iris recognition system is used to identify the human. In this paper, the proposed new segmentation methods described as:...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    A Survey of Various Routing Protocols in Mobile Ad-Hoc Networks (MANET)

    Mobile ad hoc networks is a collection of mobile nodes that dynamically change the topology of MANETs, that allows nodes to join and leave the network at any point of time. In MANET mobile nodes are communicate each other without any infrastructure. MANET is widely used in many applications such...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Intrusion Detection System With Data Stream Modeling Using Conditional Privileges

    IDS for computer network is capable of detecting and alerting the systems administrator on potential intrusion, providing guidance against any potential loss of integrity and confidentiality to the enterprise's valuable intellectual assets. In this paper, the layered model for IDS and alert aggregation technique is used. In this layered IDS...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    A Novel Cache Update Algorithm for Consistency Maintenance Over Cluster Based MANET

    Data Caching improves data availability among the Mobile Nodes (MNs) that are connected together through unreliable wireless links. The MNs are often updating the cached data due to its dynamism. The query access rate of cached data is varied based on neighbor nodes requirements. The caching nodes must ensure the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Comparative Study of Reactive/On Demand Routing Protocols for Mobile Adhoc Network

    In an ad hoc network, mobile nodes communicate with each other using multi-hop wireless links. There is no stationary infrastructure such as base stations. The routing protocol must be able to keep up with the high degree of node mobility that often changes the network topology drastically and unpredictably. Most...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Implementing Secure Data Accumulation by Ant Agents in Wireless Sensor Network Using Randomized Dispersive Routes

    In this paper, the authors discuss the implementation of data accumulation in wireless sensor networks and also the methods to increase the security of the accumulated data using dispersive routing techniques like NRRP (Non Repetitive Random Propagation). The data accumulation is accomplished by the concept of Honey Ants and ant...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    State-of-Art in Statistical Anonymization Techniques for Privacy Preserving Data Mining

    With the increased and vast use of online data, security in data mining has now become very important. Anonymity techniques have proved very useful in distributed computation. More techniques are still under research and improvements for achieving higher level of security in sensitive data. In this paper, the authors provide...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Swarm Intelligence Based Faster Public-Key Cryptography in Wireless Communication (SIFPKC)

    In this paper a particle swarm organization guided faster version of public-key cryptography in wireless communication has been proposed by minimizing total number of modular multiplication, so that faster exponentiation can efficiently implemented which in turn progress the time requirements of the encryption/decryption of large number of plain or cipher...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Network Topology Discovery Using SNMP

    In this paper, the authors discuss the method to find out topology of the network using SNMP protocol. They are trying to develop a client server Application where client sends a request for topology server to Discover the topology. Connection between nodes will be found out using SNMP MIBs stored...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2012

    Routing Protocols in Underground Coal-Mine Environment: A Review

    Researchers have worked on routing issues for ad hoc-networks, VANET's, and Wireless Sensor Networks in a normal scenario; recently there has been a recent trend towards the study on underground wireless networks and proposals for design and development for Wireless Underground Sensor Networks. This paper highlights the concept of wireless...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2012

    Performance Comparison of Analog and Digital Radio Over Fiber Link

    In order to meet the ever increasing demand for larger transmission bandwidth, Wireless network based on radio-over-fiber technologies is a very beneficial solution. Various disadvantages of Analog Radio over Fiber link such as non-linearity, chromatic Dispersion can be mitigated by use of Digital Radio over Fiber link. A digitized RF-over-Fiber...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2012

    A Novel Authentication Protocol Based on Elliptic Curves

    Authentication is the process of determining whether someone or something is, in fact, who or that it is declared to be. It is a client-server based protocol by which a server identifies the identity of a remote client when it logs on to the server through unsecured network. In private...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)