International Journal of Computer Science & Engineering Technology (IJCSET)

Displaying 1-40 of 286 results

  • White Papers // May 2014

    Modified 4-Bit Comparator Using Sleep Technique

    The development of digital integrated circuits is challenged by higher power consumption. So low power circuits have become a top priority in modern VLSI design. This paper presents layout simulations of a new improved four bit comparator design. The proposed design demonstrates its superiority against existing four bit comparator design...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    A Survey Report On Software Aging and Rejuvenation studies in Virtualized Environment

    Software aging is a phenomenon that occurs in a long running complex software system that tends to decrease in performance or increase in failure rate. This phenomenon leads to performance degradation and crash/hang failure. To counteract software aging a technique named as software rejuvenation has been proposed, which remove aging...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Highly Secured WSN Life Span Fortification with Data Compression, NNF Technique and ECC Method

    In WSN the major drawback is conservation of the energy available at each sensor node. The authors' proposed scheme consists of centralized Low-Energy Adaptive Clustering Hierarchy - Centralized (LEACH-C) which is a widespread protocol in Wireless senor networks to reduce the energy conception. Data compression is to reduce the number...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Malicious Code Detection through Data Mining Techniques

    Now-a-days computer systems and communication infrastructures are likely to be influenced by different types of attacks so there is need to put further efforts for improving the software trust. Therefore, there will be increase in necessity in the coming time, as the number of software developers and applications will likely...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Different Sanitization Techniques to Prevent Inference Attacks on Social Network Data

    In current time, social network has become one of the most powerful resources for people to connect to their friends and family members or etc. and also publish their sensitive information. Some of the information in social network is meant to be private. For different work, the social network data...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Comprehensive Study and Comparison of Information Dispersal Techniques for Cloud Computing

    Cloud systems refer to the collection of interconnected servers that are provisioned dynamically on demand, for execution of applications, to the customer like electricity grid. Cloud computing has gained great attention from industry but there are still many issues that are in their primitive stage which is hampering the growth...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    An Effeceint Multi Parameteric CPU Scheduling Algorithm for Single Processor Systems

    In today's world, computing systems serve many purposes and imagining a world without them is a nightmare. From the very beginning of the evolution of computer systems, their performance has been a subject of intense interest for computer programmers, engineers, buyers, managers and users. The measurement and optimization of computer...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2014

    Survey on Service Migration to Cloud Architecture

    Cloud computing is an emerging computation paradigm with the goal of freeing up users from the management of hardware, software, and data resources and shifting these burdens to cloud service providers. This paper contributes to the growing knowledge of how to migrate existing systems to cloud computing environment. An increasing...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    An Impact of Implementing Various Cryptographic Techniques Efficiently in a Public Centric Cloud

    It is very important to provide security to the users own data in a public storage like cloud. Here the authors address various cryptographic techniques which produce higher order and efficient data security in cloud. Here the authors survey various architecture that provide some core traditional mechanisms for addressing privacy...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Best Mechanism for Increasing the Data Method for Controlling and Maintaining Efficient Technique in MANET

    A high performance and low power architecture is devised for a 8Mbps infrared wireless communication system dedicated to the mobile ad hoc network in this architectured, 8PPM (4-Pulse Position Modulations) infrared is signals detected by an infrared receiver are digitized pulses are demodulated by a 2-bit digital demodulator. To improve...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Gathering Web Information for Personalized Ontology Model

    In a personalized web information gathering, for the knowledge description ontology term is use. Mainly ontology used for acquires knowledge, share, reuse and increase relations description of knowledge. Paper shows different problems and searching techniques also related work shows working of different authors on ontology. Main work of ontology is...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Data Center Transmission Control Protocol an Efficient Packet Transport for the Commoditized Data Center

    Cloud data centers host diverse applications, mixing in the same network a plethora of workflows that require small predictable latency with others requiring large sustained throughput. In this environment, today's state-of-the-art TCP protocol falls short. The authors present measurements of a 6000 server production cluster and reveal network impairments, such...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Linear Time Sorting Algorithm for Large Integer Data-set

    Dealing with the data is the basic task of almost every computer application. When the authors want to manipulate data sets then it is always easy to do that with sorted data sets. Today's computer applications are dealing with big data sets and sorting these big data sets is a...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    ETL Scheduling in Real-Time Data Warehousing

    As the pace of today's business grows and with business getting more aligned with good customer relationships, decisions that are made based on the most recent data are required. These decisions that are based on the most currently available data improve customer expectations and hence customer relationships, increase revenue and...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Network Capacity Improvement through Efficient Data Delivery in Mobile Ad-Hoc Networks

    Mobile ad hoc networks are being increasingly used in wireless communication with many technological enhancements. One of the major issues in such an infrastructure less network is the delivery of the data packets in an energy efficient manner, taking into account the highly dynamic topology of the network. Many of...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Exploration of Cloud Computing and its Essential Facets

    Cloud computing is all about how the authors can use external services over network by various resources provided by many different companies that share and access through the internet to perform many commercial essentialities. Cloud computing is combination of software and hardware applications as well as resources. Technological and non-functional,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    An Efficient Approach to Minimize Data Collection Delay in Wireless Sensor Networks

    Data assortment latency might become higher attributable to the comparatively slow travel speed of mobile components. Thus, the planning of mobile components, i.e., however they traverse through the sensing field and once they collect knowledge from that device, is of final importance and has attracted increasing attention from the analysis...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Multi-Authentication for Cloud Security: A Framework

    Cloud computing is a multi-tenant computational paradigm that offers an efficient, elastic and scalable business model for organizations to adopt various Information Technology (IT) resources i.e. software, hardware, network, storage, bandwidth etc. There are various aspects of security problem in cloud computing field which include data security, privacy and users'...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    A Comparative Study of cloud and mCloud Computing

    Cloud computing is one of the latest technology. It makes many changes in industry. It is a platform which includes technology, resources and infrastructure. It is a concept of sharing resources to achieve economical benefit. It allows to store and retrieve files and folders in cloud area from anywhere in...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Methodology and Analysis for Various SQL Injection Techniques

    Now-a-day's online transaction is done by most of web applications. These applications have vulnerabilities which make its security weak. Every application has provided authentication and authorization functionality, security remains an issues. SQL injection is a technique which gives access to backend database without valid credentials. SQL injection technique has been...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2014

    Building Client Server Based Application in Genode Operating System Framework

    This paper briefs about new free and open source microkernel based Operating system framework, Genode. It shows the building of a SMTP (Simple Mail Transfer protocol) based Mail client application and further porting the same inside Genode Operating system framework. The application is developed using Qt user interface design application...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2014

    An Implementation of Load Balancing Policy for Virtual Machines Associated With a Data Center

    The main aspect of any cloud application is to provide simultaneous access to number of users by reducing the cost of maintenance. This is mainly achieved by the process of implementing virtualization effectively. Virtualization is considered to be the core of cloud computing and it mainly deals with the process...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2014

    A Study on Mining for Semantic Web Personalization

    With the explosive growth of information on the Web, it has become more difficult to access relevant information from the Web. One possible approach to solve this problem is web personalization. In semantic Web, user access behavior models can be shared as ontology. Agent software can then utilize it to...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2014

    Survey on Improving Frequent Pattern mining in Spatial Database

    Spatial database system as a database system that offers spatial data types in its data model and query language and supports spatial data types in its implementation, providing at least spatial indexing and spatial join methods. Spatial database systems offer the underlying database technology for geographic information systems and other...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2014

    ABE Enforced Triple DES With Outsourced Decryption in Cloud

    Attribute-based encryption allows user to encrypt data using public-key then it decrypt data using private-key in the cloud. ABE provide the public-key one-to-many encryption. Access polices and user attributes are associated with private keys and cipher-texts. The drawbacks of the existing ABE schemes are that decryption involves expensive pairing operations,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2014

    A Survey of Tools for Extracting and Aligning the Data in Web

    The world-wide keywords-data extraction, automatic wrapper generation, data record alignment web is rapidly growing day by day in all fields, mining the data from multiple websites is necessary to filter the relevant contents. Although many approaches developed for extracting the data, there were some difficulties found when using such tools....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Feb 2014

    Ad hoc Network and its Security Essentials

    In this paper, the authors present an analysis of ad hoc network and how the attacks are prominence on the ad hoc network. Basically ad hoc network is a combination of several nodes which are linked over without wires which means wireless medium is used for this topology. In addition,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Feb 2014

    Improved UP Growth Algorithm for Mining of High Utility Itemsets from Transactional Databases Based on Mapreduce Framework on Hadoop

    Now-a-days mining of high utility itemsets especially from the big transactional databases is required task to process many day to day operations in quick time. There are many methods presented for mining the high utility itemsets from large transactional datasets are subjected to some serious limitations such as performance of...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Feb 2014

    Survey on Traffic Redundancy and Elimination Approach for Reducing Cloud Bandwidth and Costs

    Cloud computing is a fast growing field which is arguably a new computing paradigm. In cloud computing, computing resources are provided as services over the internet and users can access resources on based on their payments. Transmission cost plays an important role when trying to minimize cloud cost. However for...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jan 2014

    Security Challenges in Cloud Computing: A Comprehensive Study

    In today's advanced computing era, where all the organizations are looking to cut their operational cost, alongside increasing their efficiency and productivity, cloud computing is the most viable solution to their needs. Cloud computing offers prominent and efficient services in terms of software, hardware, server, databases, etc., in a more...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jan 2014

    Algorithms for Mining Association Rules: An Overview

    In an researched techniques of data mining was presented called Association rule mining. It aims to extract interesting frequent patterns, correlations, associations among sets of items in the transaction databases or other data repositories. Various association mining algorithms will be briefly review and compared later. In this paper, the authors...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jan 2014

    Using Queuing Theory the Performance Measures of Cloud With Infinite Servers

    Cloud computing has got enormous popularity as it offers dynamic, low-cost computing solutions. To get the service of cloud the user has to be in queue until he is served. Each arriving Cloud Computing User (CCU) requests Cloud computing Service Provider (CCSP) to use the resources, if server is available,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jan 2014

    Self Learning Hand Recognition System Using Soft Computing

    As the day to day security is a major concern the authentication problem is very crucial. The hand recognition system provides efficient way to produce the authentication using image processing. Hand recognition geometry as the name suggest uses the shape of the hand to identify the person. Unlike iris, face...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Dec 2013

    Quick Convergence of FFNN by Weight Optimization Technique in Data Mining

    In this paper, the authors present a new method that provides quick convergence for a feed forward neural networks system using feature selection and weight optimization techniques. A neural networks system functions on the basis of weights presented to the neurons. These weights are fine tuned to the most possible...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Dec 2013

    Tree Structured Web Template Matching for Deep Web Extraction

    Usually, deep web contains more accurate and valuable information than based on users' requests. But, making use of such combined structure of extracted information needs significant efforts because they obtained web pages are utilized for revelation not for exchanging the data. So, extracting the relative data from Web pages from...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Dec 2013

    Credential Proactive Protection Guard: A Proactive Password Checking Tool

    Over the internet, user profiling is one of the key activity in which user is asked to provide personal as well as professional information. The user is not aware about the misuse of profiling. It has been observed that user choose password from the users' profile unintentionally which create serious...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Dec 2013

    QoS and Energy Consumption by Symmetric and Asymmetric key Schemes against Blackhole attack in Wireless Sensor Network

    Wireless Sensor Network (WSN) consists of a number of spatial distributed sensor devices that combines with each other to accomplish a task of environment monitoring, object tracking, etc. and report the gathered data to a sink node through wireless interface. The unique properties of sensor networks such bounded power, stringent...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Dec 2013

    An Efficient Approach to Store and Share Sensitive Information In Cloud

    Cloud computing has emerged as a new type of commercial paradigm in which resources are provided as services via network. The word cloud is very popular and has drawn attention from both education and research. With the character of low maintenance and ease of use cloud services are attracted by...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Dec 2013

    Enhancement of E-learning Using Cloud Computing and Information Technology

    E-learning is a concept in which user can teach as well as learn through electronic media. Now-a-days e-learning is a very new and innovative technique, and has a great future due to its credibility and extra ordinary efficiency. E-learning is a new education system in which different types of technologies...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Nov 2013

    A Study on Data Security in MANETS

    A Mobile Ad hoc NETwork (MANET) is a self-configuring infrastructure-less network of mobile devices connected by wireless. Ad hoc is Latin and means \"For this purpose\". Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2013

    Mobile Cloud Computing: A Tool for Future

    In this paper, the authors are presented Introduction, future scope, and advantages of mobile cloud computing. Mobile cloud computing is a universal term for anything that involves delivering hosted any kind of services which includes cloud computing as a middleware, like as mobile-healthcare, mobile-learning, mobile-entertainment, etc. over the Internet. Mobile...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2013

    Web Application Security - Cross-Site Request Forgery Attacks

    Cross-Site Request Forgery (CSRF) is an attack outlined in the OWASP Top 10 whereby a malicious website will send a request to a web application that a user is already authenticated against from a different website. This way an attacker can access functionality in a target web application via the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2013

    Cloud Computing with Big Data as a Service

    Big data management is becoming crucial now-a-days because of the evolution of large number of social networking websites, powerful mobile devices, sensors, and cloud computing. According to IDC analysis, the global data volume is going to grow 44 times between 2009 and 2020. It may also go beyond limits such...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2013

    Lock-Free FIFO Based Parallel HTB in Cloud Computing

    Cloud computing is becoming more and more popular in IT industry nowadays. Those famous companies including Amazon, IBM, HP, Google and Microsoft are creating and deploying Clouds in various locations around the world. Technically, Cloud Computing refers to both the applications delivered as services over the Internet. In the cloud,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2013

    A Novel 2 Step Random Colored Grid Graphical Password Authentication System

    Security in the computer is largely supported by passwords for authentication process. Use of alphanumeric passwords is the most common Authentication method. This conventional authentication method has been shown to have significant drawbacks. To overcome the vulnerabilities of traditional methods, numerous graphical password authentication systems have been proposed. These graphical...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2013

    Mobile Malware Detection Techniques

    The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Currently, in the Smartphone market, Android is the platform...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2013

    Database Privacy- Issues and Solutions

    Data Mining, fourth and analytical step of Knowledge discovery in database process is a process of discovering new and interesting patterns in the large datasets. For example, data miner can derive different patterns based on age, countries or continents on HIV-AIDS if they get suitable dataset to be mined. However,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2013

    Routing and Security in Self Organizing Mobile Ad Hoc Networks (MANET): Challenges and Solutions

    Ad hoc networks in general have to deal with a highly decentralized as well as a continuously changing topology due to the mobility of the nodes. MANET is not a new paradigm in wireless community. The technology is quite old but still practical implementation is difficult due to security and...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2013

    Intrusion Aware Group Management Scheme for MANET

    MANET security has long been an issue for its infrastructure-less nature. The sort of networks gives rise to authentication and key-management problems in MANETs. The authors have proposed a scheme where the nodes having common interests, once authenticated through external resources, form a group with a single key shared for...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2013

    A Brief Introduction of Different Type of Security Attacks Found in Mobile Ad-hoc Network

    A structure less network is called the Mobile Ad-hoc NETwork (MANET), where all the nodes are independent. In MANET, there is a collection of mobile nodes that from temporary network. Those nodes are act like a host or like a router. The security issue is the main problem of MANET,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2013

    Mining Full Functional Dependency to Answer Null Queries and Reduce Imprecise Information Based on Fuzzy Object Oriented Databases

    Object oriented databases are considered better than the relational and other databases due to increasing demand of new approaches to deal with complex data, complex relationship existing among such data and large data intensive applications. A major goal for database research has been the corporation of additional semantics into the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Feb 2013

    Secure Socket Layer Implementations-A Review

    Secure Socket Layer (SSL), is the protocol developed by Netscape for transmitting private documents securely over the Internet. SSL can be effectively used to protect the data in transmission. SSL protocol comes in between the application layer protocol (e.g., HTTPS (Hyper Text Transfer Protocol Secure)) and the Transport layer protocol....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Feb 2013

    A Key Management Protocol for Hierachical Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential data. Accordingly, designing key management protocols that can securely distribute secret keys among sensor nodes becomes an important...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Feb 2013

    Multi Clouds Model for Service Availability and Security

    Cloud computing can and does mean different things to different people. The common characteristics most share are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere, and dislocation of data from inside to outside the organization in terms of low cost...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2012

    Remote Based Security System

    The development of monitoring is a major trend in future, it is the important research content of security field, recently, monitoring system has became commonplace. So, study on its related technology has great significance. Extracting the moving objects, in particularly, are interesting and important in monitoring system, because that it...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2012

    Cloud Storage: Keep Your Data on Clouds

    Information Technology always needs a way to increase capacity or add capabilities without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities. Cloud computing is at an early stage,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Feb 2013

    Accessing Distributed Services with One Time Token Generation

    Many services which users use today require them to login to ensure security and confidentiality. As the number of services increase, it has become quite difficult to remember the username and password for each of them. In this system, user can access different services in which he can log in...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2013

    A Literature Review: Cryptography Algorithms for Wireless Sensor Networks

    Cryptography is that the observe and study of techniques for secure communication within the presence of third parties. Cryptography plays a vital role in wireless sensor networks and its efficient it very large, compared to that found in review on various cryptography algorithm and its effective various wireless sensor networks....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2013

    Progressive Analysis on Twitter-Social Data Using Cloud

    As the rise of social networking, people started share information through different kinds of social media. Among all of them, twitter is an important resource. Twitter is a micro-blogging service that enables its users to send and read text-based messages of up to 140 characters, known as \"Tweets\". It was...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2013

    Shortest Path Geographic Routing for Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a network in which contains nodes that are dynamic, which means their positions are not fixed or they are can move. Since the positions are not fixed they do not have a permanent infrastructure. So the communication between the mobile nodes should be taken cares...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2013

    Implementation of Multicloud Computing Deployment System of SAAS & IAAS for Effective Resource Utilization on MTC Application

    Cloud computing is gaining acceptance in several IT organizations. In this paper, the authors have a tendency to explore this state of affairs to deploy a computing cluster on the highest of a multi cloud infrastructure, for resolution loosely coupled Many-Task Computing (MTC) applications. The cluster nodes will be provisioned...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2013

    Privacy Preserving Based on PCA Transformation Using Data Perturbation Technique

    Maintain confidentiality, Privacy-Preserving Data Mining (PPDM) is one of the biggest trends. Recent advances in data collection, data dissemination and related technologies have inaugurated a new era of research where existing data mining algorithms should be reconsidered from a different point of view, this of privacy preservation. The authors propose...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2013

    An Efficient Node Authentication Scheme Based on Elliptic Curve Cryptography for Wireless Sensor Networks

    Recent technology advances in low-cost, low-power chip design have made the deployment of large-scale sensor networks economically feasible. Data forwarding algorithms and protocols have been among the first set of issues explored in sensor networking. The primary goal of current routing protocols for wireless sensor network is to improve the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2013

    Face Recognition System Based on 2DFLD and PCA

    An automated system is used for fast human face recognition. The 2DFLD algorithm is tested on the various databases. PCA algorithm is tested on various databases. As the face system is totally nonintrusive, existing security of face recognition system are more effective without bothering the user in any way. The...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2013

    A Survey on Privacy Preservation in Data Publishing

    Privacy-maintaining data release is one of the most important challenges in an information system, because of the wide collection of sensitive information on the internet. A number of solutions have been designed for privacy-maintaining data release. This paper provides an inspection of the state-of-the-art methods for privacy protection. The paper...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2013

    State of the Art : Security in Wireless Body Area Networks

    Advances in wireless communication technologies and sensors have scepter development of Wireless Body Area Network (WBAN). The wireless nature of network and sort of sensors provide various new, sensible and innovative applications to enhance health observance and alternative health care applications system. Within the past few years, several researches targeted...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2013

    Energy Cost and QoS Based Management of Data Centers Resources in Cloud Computing

    Cloud computing is the evolutionary step to transform a large part of the Information and Communication Technology industry. In this paper, the authors summarize previous offerings to the discussion of energy cost of cloud computing, provide a working definition of energy cost of cloud computing and discuss its importance. In...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2013

    IP Network Recovery Based on Security Managements

    Computer networks are complex systems, often routing hundreds, thousands, or even millions of data packets every second. Therefore, in order for networks to handle large amounts of data, it is important that the data routes efficiently. So, the need for security management and protecting data become evident in networks. IP...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2013

    Enhanced Double Layer Security Using RSA Over DNA Based Data Encryption System

    In this paper, the authors propose an enhanced algorithm to communicate data securely for communication and information security. The DNA cryptography is a new and promising area in cryptography. Here, they propose techniques that use the objectives of cryptographic encryption and steganography i.e. Encryptions to make the message unreadable to...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2013

    Black Hole Attack and Its Mitigation Techniques in AODV and OLSR

    MANET is a self configurable, self deployable and infrastructure less network in which nodes are continuously moving and creates dynamic topology. For routing the main protocols using are AODV, OLSR, DSDV, DSR etc. AODV and DSR are reactive protocols, where DSDV and OLSR are proactive protocols. This paper deals with...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Feb 2013

    Bluetooth Security Threats

    Bluetooth technology has become an integral part of this modern society. The availability of mobile phones, game controllers, Personal Digital Assistant (PDA) and personal computers has made Bluetooth a popular technology for short range wireless communication. However, as the Bluetooth technology becomes widespread, vulnerabilities in its security protocols are increasing...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2013

    Security Services for Securing Network, Host, and Application

    The very nature of web applications - their ability to collate, process and disseminate information over the Internet - exposes them in two ways. First and most obviously, they have total exposure by nature of being publicly accessible. Second, they process data elements from within HTTP requests - a protocol...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2013

    A Comparative Study on ATM Security With Multimodal Biometric System

    Security is a major issue in Automated Teller Machine (ATM) with the wide spread utilization of electronic transactions it is necessary to increase customers recognition accuracy. Biometric systems can offer convenient and secure mode of authentication to the customers. This paper proposes a survey of how multimodal biometric system enhances...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2013

    Security Algorithm in Cloud Computing: Overview

    Network security is becoming more and more important as people spend more and more time connected. It is a specialized field in computer networking that involves securing a computer network infrastructure. It is typically handled by a network administrator or system administrator who implements the security policy, network software and...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2013

    EFS: Enhanced FACES Protocol for Secure Routing in MANET

    Mobile Ad-hoc NETwork (MANET) is an autonomous system of mobile hosts equipped with wireless communication devices. These mobile nodes can form a network anywhere and at anytime. But the topology of the network thereby formed will be unpredictable due to frequent node movement. For sending data to destination, source node...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // May 2013

    Vulnerabilities in Existing GSM Technology that causes Exploitation

    Global System for Mobile communications (GSM system) has become the most popular standard for digital cellular communication for day to day communication in the world. Cellular phones have become a ubiquitous means of communications with over 6 billion users worldwide in 2013, of which 80% are GSM subscribers. It has...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2013

    Detection of Packet Dropping and Modification in Wireless Sensor Network

    Security is crucial for wireless sensor networks deployed in hostile environments. The packet droppers and packet modifiers may be random. Identifying such attacks is very difficult and sometimes impossible. In this paper the identification and filtering of packet droppers and packet modifier nodes is done using packet marks and ranking...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2013

    Stegocrypto - A Review Of Steganography Techniques Using Cryptography

    The information security has become essential part of today's world due to extensive use of internet. The privacy of secret data can be achieved with two classical methods of data security namely Cryptography and Steganography. Cryptography results in scrambling of data into cipher text which is in unreadable or in...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2013

    A Survey on Quality of Service and Congestion Control

    Several techniques have been developed to meet the demand for faster and more efficient access to the Internet. Different applications have different networking requirements. For example, real-time interactive voice requires a low latency network path, but does not require high bandwidth. QoS refers to the ability of a network to...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2013

    A Survey of Desktop Grid System Scheduling

    Grid Computing forms virtual, collaborative organizations that share applications and data in an open heterogeneous server environment in order to work on common problems. Desktop Grid is a named collection of machines in a shared network where resource providers have heterogeneous properties such as CPU, network, memory complicated by various...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)