International Journal of Computer Science & Engineering Technology (IJCSET)

Displaying 1-40 of 379 results

  • White Papers // Nov 2014

    Enhancement of Image Quality in MATLAB Environment - Super-Resolution

    The super-resolution is one of main topics in image processing many applications in past, recent today's and future. This paper focuses on super resolution of images using different type of enhancement of image quality in MATLAB environment - super-resolution algorithms. The authors have improved the performance of involved stages such...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Nov 2014

    A Literature Survey on Multithreading Techniques to Avoid Data Loss in Cloud Storage

    Security is a one of the important issues in cloud computing environment. Cloud computing is used to deliver software, storage and processing for millions of users across the world. In the user environment, it is the cyberspace based service which provides storage for users by using the delivery model. Cloud...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Nov 2014

    Enhancing the Data Security of Simple Columnar Transposition Cipher by Caesar Cipher and Rail Fence Cipher Technique

    Cryptography is an art and science of converting original message into no readable form. There are two techniques for converting data into no readable form: transposition technique and substitution technique. In recent years there is drastic progress in Internet world. Sensitive information can be shared through internet but this information...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    A Survey on New Cryptographic System Techniques for Data Sharing in Cloud Storage

    Cryptography is the art and science of achieving security by encoding the message or data to make them unreadable. It is related to the aspects of network security such as privacy, reliability and accessibility of the data. A cryptosystem or cryptographic system is only the authenticated way in which user...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    A Survey of Defect Prediction on Software Leads to Quality Product

    Software team always tries to produce a product with zero defects. Defect prediction leads to high quality product and quality assurance. Software defects prediction aims to reduce software testing efforts by guiding the testers through the defect classification of software systems. If the defective product released to customer, at customer...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    A Survey of Various Load Balancing Techniques and Proposed Load Balancing Method in Cloud Computing

    The cloud computing data centre has abundant hosts as well as solicitation requests. A cloud computing platform is that maneuver behind the corporate firewall and within control of an organization IT department. Cloud deals numerous aids such as self-service, agility, efficiency, security, better resource utilization and faster time to market....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    Survey on Data Sharing in the Cloud Using Distributed Accountability

    In cloud computing, resources are share among multiple clients and it is important for cloud service provider to allocate these resources for such clients. Cloud computing is an infrastructure that provides on demand network services. In this technology, user fears about loss of the users' own personal data. To solve...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    Enhancing Efficiency and Accuracy of Imbalanced Datasets Using Fuzzy Neural Network

    In data mining the class Imbalance classification problem is considered to be one of the emergent challenges. This problem occurs when the number of examples that represents one of the classes of the dataset is much lower than the other classes. To tackle with imbalance problem, preprocessing the datasets applied...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    A Survey on Securing MANETs From Malicious Behavior by Detection Mechanism

    There is a migration from wired network to wireless network in last few years due to the property of mobility and scalability. Mobile Ad hoc NETwork (MANET) is an infrastructure less network. Each node in Mobile Ad hoc NETwork (MANET) acts as both the sender and the receiver. Nodes can...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    Survey on Simulation and Emulation Tools in Wireless Sensor Network

    Sensor networks are dense wireless networks of small, low-cost sensors which collect and propagate environmental data. Wireless Sensor Networks (WSNs) assist monitoring and controlling of physical environments from remote location with better accuracy. They have applications in a variety of fields such as environmental monitoring, military applications, and water or...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    A Survey on Infrastructure Abstraction of Wireless Sensor Network

    Wireless Sensor Network (WSN) is an autonomous sensor. Several abstractions are harnessed to ease out the difficult WSN application development. Various parameters have been developed to satisfy the different requirements of the infrastructure requirements. The objective of the authors' survey is to provide the analysis and description of the major...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    A Prototypical Solution for Cyber Space

    Many things have been written and told about cyber security and its importance around the world during these recent years. To establish secure cyber space an effective communication network is needed. The Cognitive Networks (CNs) are effective networks for communication. These networks are also changeable. This network is constructed of...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    Survey on a Novel Approach for Reversible Data Hiding: Principles, Techniques and Recent Studies

    Today data hacking is a very big problem in networking field. There are many security techniques are available for solving the problem. One of these data-hiding, using this concept the users can provide security, authentication to the system. Data-hiding technique has un-able to recover original message. A novel concept known...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    Analysis of Simulation Tools for Underwater Wireless Sensor Networks

    The earth is enclosed by 75% of water that could be a river or sea or ocean. The underwater sensor network becomes more and more conventional for monitoring huge areas of the oceans where manual intervention is not possible. Underwater sensor networks consist of an inconsistent number of sensors that...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    A Comparative Study of Classification Algorithm Using Accident Data

    Road traffic accidents are the majority and severe issue, it results death and injuries of various levels. The traffic control system is one of the main areas, where critical data regarding the society is noted and kept as secured. Various issues of a traffic system like vehicle accidents, traffic volumes...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Oct 2014

    An Analytic Report on Ontology Based Search Engine

    Ontology based search engine is a tool that helps the users in retrieving required information from the web by only considering the logical denotation of the submitted query. The semantic based search engines are the annotated form of the ontology based search engines. The paper identifies various methods involved in...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    Survey on Big Data Mining Platforms, Algorithms and Challenges

    Big data is coined to address massive volumes of data sets usually huge, sparse, incomplete, uncertain, complex or dynamic, which are mainly coming from multiple and autonomous sources. The primary sources for big data are from business applications, public web, social media, and sensor data and so on. \"Big data...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    How Accountability Improves Software Reliability?

    In this paper, the author encourages accountability as a principle for software reliability. There are various techniques to estimate software reliability which is tested. This paper treats to identify the faults which are put in the design into the system. It facilitates to detect, isolate and prevent such faults to...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    An Incremental Sanitization Approach in Dynamic Databases

    In most organizations the historical dataset is dynamic which means it is periodically updated with fresh data. In such an environment, when the counterpart organizations need to share their information for a decision making strategy in a periodical way, the protection of sensitive knowledge need to be done as a...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    Spoofing Attack Detection and Localization in Wireless Sensor Network: A Review

    Device identity is perhaps one of the most challenging problems in any network for security. Localizing node is necessary for many higher level network functions such as tracking, monitoring and geometric-based routing and also used in broad area. Spoofing attack is an identity based attack through which a malicious user...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    A Similarity Function with Pruning Strategy for Tree Structured Data

    Although several distance or similarity functions for trees have been introduced, their performance is not always satisfactory in different applications. In the base paper the Extended Sub Tree (EST) function, where a new sub tree mapping is proposed. This similarity function is to compare tree structured data by defining a...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    One Dominant Graph Topology for Heterogeneous Wireless Sensor Networks

    The integration of different wired and wireless access technologies constitute the next-generation heterogeneous network. A typical wireless sensor network configuration consists of sensors sensing and transmitting their observation values to some control center, the so-called sink node, which serves as a user interface. Due to the limited transmission range, sensors...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    A New Multi-Hop Approach for Sensing Coverage in Wireless Sensor Network

    Sensor networks provide a strong combination of distributed sensing, computing and communication. Wireless Sensor Networks (WSNs) are recently rapidly growing research area in wireless communications. WSNs are studied widely and usefully applied in many applications like military surveillance, environmental monitoring etc. This paper deals with the coverage problem of wireless...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    A Survey on Cyber Terrorism

    Cyber terrorism is a major issue by which an individual or group of people use digitalized method to attack physically or attack on any information for their various reasons. Recent years have seen a rapid growth in the target through cyber terrorism. Computing technology is available to the whole world....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    A Comparative Study of Fuzzy Logic and Weighted Association Rule Mining in Frequent Datasets

    Mining of frequent patterns in transaction databases has been a fashionable area of research. Many methods are being used to solve the trouble of discovering association rules among items in large databases. Transaction pattern base have been introduced to reduce the number of passes over the database. Here considers the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    Outdoor Dynamic Scene Video Object Segmentation Using SRM Algorithm

    In video surveillance, image segmentation in outdoor scenes is a most important and complex task. A novel approach for video object segmentation in outdoor environment is described by using SRM (Statistical Region Merging) algorithm in this paper. Here the authors are going to identify both structured (e.g. persons, buildings, car,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    A Review on the Factors that have Driven E-Commerce in Modern Day Business

    E-commerce has advanced quickly in a very short span and is changing the face of business. It deals with carrying out business transactions with the aid of Internet through linked computer systems of host, buyer and the vendor. Due to its low time consumption and ease of usage, E-commerce is...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2014

    Image Encryption and Decryption Using Selective Block Encryption Technique

    In the recent world, the need of information security has became a necessity with the progress in data exchange and communication by electronic system. Because of the growth of multimedia application, security becomes an important issue of communication, storage and transmission of data. Cryptography is an art which is defined...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2014

    ERA -An Enhanced Ripper Algorithm to Improve Accuracy in Software Fault Prediction

    The data mining techniques are used and applied in the various fields of science. The software mining is an application of data mining, which describes investigation into the examination of software repositories, such as software assurance, reuse, fault, effort or cost prediction and detection of incomplete changes. Fault in software...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2014

    A Survey on Secure Transmission on Vechicles and Signal Devices

    Vehicular Ad hoc NETworks (VANETs) enable vehicles to communicate with each other but require efficient and robust routing protocols for their success. In this paper, it makes use of the infrastructure of Road Side Units (RSUs) to efficiently and reliably route packets in VANETs. In the Vehicular Ad hoc NETworks...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2014

    Performance of I-LEACH Routing Protocol for Wireless Sensor Networks

    In wireless sensor networks, sensor node always has a limited power resource. The energy consumed by sensor nodes to transfer the data to its destination becomes critical issue in designing WSN routing protocols. In this paper, the authors propose a cluster routing protocol named I-LEACH to enhance the routing protocol...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2014

    Effect of Enhancing MAC Layer Security and Power Saving Mode on Mobile Ad Hoc Network

    Mobile ad hoc network is the wireless network with no centralized monitoring system. The nodes are free to move anywhere in the network. These mobile nodes also act as routers and make the routes for any data transmission on their own. They take the responsibility of route discovery and packet...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2014

    Fingerprint Biometric System: A Survey

    Fingerprint recognition is one of famous biometric system that is mostly used in various authentication techniques. Human fingerprint exhibit some certain details marked on it, categorized it as minutiae, which can be used as a unique identity of a person if recognize it in a well manner. This paper discusses...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2014

    Enhancing The Security of Caesar Cipher Using Double Substitution Method

    Cryptography comes from the Greek words for \"Secret writing\". The plain text is encrypted into the corresponding cipher text, using an algorithm and a key. Substitution and transposition are two techniques used for converting data into non-readable form. Caesar cipher is an example of substitution technique. In this paper, the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    A Novel Approach for Reversible Data Hiding in Encrypted Images Using Key Based Pixel Selection

    In this paper a new steganographic approach is proposed to increase the confidentiality of the hidden data in RGB images by placing the data randomly across the encrypted images. By using the secret key provided to the users, key based pixel selection approach is applied in order to randomize the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    Location Based Routing Protocols for Wireless Ad-Hoc Networks: A Survey and Comparison

    Routing in wireless ad-hoc networks is a very exigent task. Conventional routing protocols are not appropriate for these networks due to inherent nature of such networks such as dynamic topology, no fixed infrastructure, resource constraints and lack of centralized control. One of the most promising routing schemes in ad-hoc networks...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    Analysis of Trust in Wireless Sensor Networks

    Trust is an important factor in Wireless Sensor Network (WSN) that enables the sensor node to cooperate each other for their application. It makes the nodes in the wireless sensor networks to cope with uncertainty caused by the other nodes in the network. Managing the trust in the wireless sensor...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    A Review on Localization Algorithms in Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), nodes are deployed in sensor fields for monitoring and controlling the physical environments. Node localization is fundamental challenge in wireless sensor networks as without knowing the location of nodes sensed information will have no value. Therefore, it is vital that nodes must know their location....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    A Robust Method for Reducing Routing Overhead Using High Signal Strength in Manets

    A Mobile Ad hoc NETwork (MANET) is a continuously self configuring, infrastructureless network of mobile devices connected without wires, forming a temporary network. This feature leads to frequent path failures and route reconstructions that cause increase in the routing control overhead. Broadcasting is an effective data dissemination mechanism for route...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2014

    Secure Authentication Protocol to Detect Sybil Attacks in MANETs

    Mobile Ad-hoc NETworks (MANETs) are well known to be susceptible to various attacks, due to features such as lack of centralized control, dynamic topology, limited physical security and energy constrained operations. In this paper, the authors focus on preventing Sybil attack and Intruder nodes (malicious node). They are presenting a...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2012

    Detection and Prevention of SQL-Injection Attacks of Web Application Using Comparing the Length of SQL Query Length

    Now-a-days, the authors are using the web applications, but the application code is not secured so there is existence of the SQL injection attacks. In web applications with the help of the internet explorer the user tries to access the information. But most of the web applications are affected by...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2012

    Semiconductor Optical Amplifiers (SOA) Performance Optimization in Optical Communication System

    The paper has been focused on the XOR, AND, OR logic gate implementation, since it is a very versatile approach for implementing many functions in optical networks. The development and study of a novel architecture based on cascaded SOA-MZIs to perform the logic XOR operation between two input binary sequences....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2012

    Enhanced Energy Conserving Improved and Balanced LEACH for Heterogeneous Wireless Sensor Networks

    Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor nodes where each sensor node has very low battery life. Main goal is to conserve the transmitted energy from various sensor nodes. Various energy efficient algorithms have been designed for this. LEACH uses distributed cluster...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Sep 2012

    An Evolutionary Algorithm for the Processing of Fuzzy Quantified Queries Using Clustering

    This paper is about to make a contribution in the field of fuzzy query processing. The authors are mainly interested in query mechanism for evaluation of fuzzy quantified queries on the relational database. They restrict their work to fuzzy quantified sentences of form S1, involving linguistic quantification of fuzzy conditions...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2012

    Alternative System for Data Communication Based on Organic Devices and Links for Local Area Network

    Organic devices and links offer considerable potential for data communication by virtue of their ability to transmit, modulate and detect light in an architecture that is low cost, flexible, lightweight and robust. Here, the authors have discussed an all organic optical communication system comprising of organic optoelectronic devices such as...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2012

    Effect of Different Modulation on PAPR and Its Reduction

    As the technology grow in wireless communication, the concept of multicarrier modulation come into picture. Orthogonal Frequency Division Multiplex (OFDM) proves itself invaluable for multicarrier modulation. OFDM subcarriers can overlap to make full use of the spectrum but at the peak of each subcarriers spectrum, the power in all the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2012

    Cosine Similarity Function for the Temporal Dynamic Web Data

    Cosine similarity function is one of the most popular similarity function for handling the web data in various applications such as recommender system, collaborative filtering algorithms, classification algorithms, etc. Cosine similarity function calculates the similarity between the items as an angle between the vectors representing the two items. The smaller...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    Optimal Data Gathering Paths and Energy-Balance Mechanisms in Wireless Networks

    A wireless sensor network faces special challenges due to its inherent features, such as the limited energy. The energy constraint drives research on how to utilize energy efficiently to prolong the lifetime of the network. Because a sink node takes the responsibility of collecting data from other nodes, a usual...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    Modified AODV to Eliminate the Effects of Black Hole Node in MANET

    Mobile Adhoc NETwork (MANET) consists of a collection of wireless mobile hosts without the required intervention of any existing infrastructure or centralized access point such as base station. The dynamic topology of MANET allows nodes to join and leave the network at any point of time. Wireless MANET is particularly...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    Compact Wide Band Microstrip Line Feed Microstrip Patch Antenna for Wireless Application

    This paper presents the increase in bandwidth of a Microstrip Antenna using a simple slotted structure fed by Microstrip line. The main aim of proposed work is to obtain a large bandwidth antenna with reduced size. The proposed microstrip antenna has a wide bandwidth covering the range from 1.806-2.978 GHz....

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    Classification Techniques Applied for Intrusion Detection

    Intrusion Detection System (IDS) was designed to monitor the network activity and it identifies the normal and abnormal behavioral pattern in the network. If there was any abnormal pattern, it indicates the system is in attack by compromising the confidentiality, availability or integrity of the computer system. IDS perform three...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Modified Reliable Energy Aware Routing Protocol for Wireless Sensor Network

    In this paper, a novel reliable energy aware routing protocol is proposed, which is based on reliability and energy efficiency. Since in the wireless environment, link quality is difficult to guarantee, the reliable routing protocol is quite important issue to study. In this protocol, a backup path, alternative path and...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    Easy E-Commerce Using XML Data Source Without External Database

    Usually customers buy the goods of their desire from the store using internet. Administrator sell the goods with the help of external databases like oracle, mysql, etc., at administrator side. But in the authors' proposed system, end user is a departmental store where the application is hosted on the web...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Apr 2012

    A New VLSI Architecture of Parallel Multiplier Based on Radix-4 Modified Booth Algorithm Using VHDL

    Low power consumption and smaller area are some of the most important criteria for the fabrication of DSP systems and high performance systems. Optimizing the speed and area of the multiplier is a major design issue. However, area and speed are usually conflicting constraints so that improving speed results mostly...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2012

    A Non-Linear Scheme for PMEPR Reduction in MC-CDMA System

    The main feature of the next-generation wireless systems will be the convergence of multimedia services such as speech, audio, video, image, and data. This implies that a future wireless terminal, by guaranteeing high speed data, will be able to connect to different networks in order to support various services: switched...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jan 2012

    Security Against Attacks in TOR Networks

    TOR(The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traffic analysis or network surveillances impossible by the intruders, and hence TOR is widely used network for purpose...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Dec 2011

    Performance Evaluation of BST Multicasting Network Over ICMP Ping Flood for DDoS

    The paper evaluates the performance of Bi-directional Shared Tree (BST) multicasting network with two sources and four receivers, attacked by five attackers. These attackers attack the source 1 in network by ICMP Ping Flood. Here, the authors execute the simulation and draw network throughput between source 1 and source 2,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Nov 2011

    Computing in the Cloud: An Effective Paradigm for Business

    Information Technology has been affecting nearly every facet of human endeavor including the domain of Business. The use of information technology in organizations is inevitable, be it any type of organization. At the same time, the cost of these resources is a constraint for a large number of organizations. The...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    The Implementation of Programmable Wireless Router Using Java

    Now-a-days available wireless routers do have extra levels of embedded security. Existing Wireless routers can be configured for invisible mode. So that wireless network cannot be scanned by outside wireless clients. If there is no configuration for wireless router, bandwidth of the Wi-Fi signal will be shared among all the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Various Aspects of Minutia as a Fingerprint Feature

    Biometrics is one of the biggest tendencies in human identification. The fingerprint is the most widely used biometric. Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. Minutiae are local discontinuities in the fingerprint pattern, mainly terminations or end points and...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Issues and Challenges of Quality of Service in Mobile Adhoc Network

    A Mobile Adhoc Network is a self configuring network of wireless devices connected by wireless links. Quality of service is more difficult to guarantee in ad hoc networks than in most other type of networks, because the network topology changes as the nodes move and network state information is generally...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Automated Feedback System for Multimedia in Multiprocessors

    In spite of many real times scheduling algorithms available it is not clear that these scheduling algorithms support fully the problems in the real time system in multiprocessors. There are certain "Open loop" algorithm that can support only some set of characteristics such as the deadlines, precedence constraints, shared resources...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Base Station Driven Routing Protocol Evaluation Using Tossim

    Routing protocols play an important role in wireless sensor networks. There are primarily two types of protocols viz., data collection and data dissemination protocols. This paper compares two collection protocols: Base Station (BS) driven routing protocol and a modified version of Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. The simulation...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Pragmatics of Wireless Sensor Networks

    Wireless sensor network composed of infrastructureless, small, low-power, low cost, dynamic nature, application oriented, and multi-hoping wireless nodes, design for the purpose of collecting information by environment sensing, processing and communication. Designing of these networks become more complicated due to deploy nodes characteristics, maintenance of database, security, authentication and its...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Comparison of Software Test Data for Automatic Path Coverage Using Genetic Algorithm

    This paper discusses genetic algorithms that can automatically generate test cases to test selected path. This algorithm takes a selected path as a target and executes sequences of operators iteratively for test cases to evolve. The evolved test case can lead the program execution to achieve the target path. An...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Mar 2011

    Co-Operative Scheduled Energy Aware Load-Balancing Technique for an Efficient Computational Cloud

    Cloud Computing in the recent years has been taking its evolution from the scientific to the non scientific and commercial applications. Power consumption and load-balancing are very important and complex problem in computational Cloud. A computational Cloud differs from traditional high-performance computing systems in the heterogeneity of the computing nodes,...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2012

    Exploratory Data Analysis of Turbulent Flows

    Large Eddy Simulations (LES) contains 3D instantaneous velocity fields as well as passive scalar concentration field describing the coherent flow structures. The study of coherent flow structures has a major impact on the mixing of the fuel and the oxidizer. The analysis of these structures in a turbulent jet is...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Aug 2012

    Secure Routing Backup Protocol for MANET From Selective Forwarding Attack

    In the recent years, wireless technology has enjoyed a tremendous rise in popularity and usage, thus opening new fields of applications in the domain of networking. One of the most important of these fields concerns Mobile Ad hoc NETworks (MANETs), where the participating nodes do not rely on any existing...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Human Computer Interface Through Biometric Iris Recognition System

    Biometric recognition system is better reliable, robust technique than traditional recognition system. Biometric iris recognition system is most secure and reliable than other biometric recognition system. Hence, the authors use biometric iris recognition system is used to identify the human. In this paper, the proposed new segmentation methods described as:...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    A Survey of Various Routing Protocols in Mobile Ad-Hoc Networks (MANET)

    Mobile ad hoc networks is a collection of mobile nodes that dynamically change the topology of MANETs, that allows nodes to join and leave the network at any point of time. In MANET mobile nodes are communicate each other without any infrastructure. MANET is widely used in many applications such...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Intrusion Detection System With Data Stream Modeling Using Conditional Privileges

    IDS for computer network is capable of detecting and alerting the systems administrator on potential intrusion, providing guidance against any potential loss of integrity and confidentiality to the enterprise's valuable intellectual assets. In this paper, the layered model for IDS and alert aggregation technique is used. In this layered IDS...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    A Novel Cache Update Algorithm for Consistency Maintenance Over Cluster Based MANET

    Data Caching improves data availability among the Mobile Nodes (MNs) that are connected together through unreliable wireless links. The MNs are often updating the cached data due to its dynamism. The query access rate of cached data is varied based on neighbor nodes requirements. The caching nodes must ensure the...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Comparative Study of Reactive/On Demand Routing Protocols for Mobile Adhoc Network

    In an ad hoc network, mobile nodes communicate with each other using multi-hop wireless links. There is no stationary infrastructure such as base stations. The routing protocol must be able to keep up with the high degree of node mobility that often changes the network topology drastically and unpredictably. Most...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Implementing Secure Data Accumulation by Ant Agents in Wireless Sensor Network Using Randomized Dispersive Routes

    In this paper, the authors discuss the implementation of data accumulation in wireless sensor networks and also the methods to increase the security of the accumulated data using dispersive routing techniques like NRRP (Non Repetitive Random Propagation). The data accumulation is accomplished by the concept of Honey Ants and ant...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    State-of-Art in Statistical Anonymization Techniques for Privacy Preserving Data Mining

    With the increased and vast use of online data, security in data mining has now become very important. Anonymity techniques have proved very useful in distributed computation. More techniques are still under research and improvements for achieving higher level of security in sensitive data. In this paper, the authors provide...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Swarm Intelligence Based Faster Public-Key Cryptography in Wireless Communication (SIFPKC)

    In this paper a particle swarm organization guided faster version of public-key cryptography in wireless communication has been proposed by minimizing total number of modular multiplication, so that faster exponentiation can efficiently implemented which in turn progress the time requirements of the encryption/decryption of large number of plain or cipher...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jul 2012

    Network Topology Discovery Using SNMP

    In this paper, the authors discuss the method to find out topology of the network using SNMP protocol. They are trying to develop a client server Application where client sends a request for topology server to Discover the topology. Connection between nodes will be found out using SNMP MIBs stored...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2012

    Routing Protocols in Underground Coal-Mine Environment: A Review

    Researchers have worked on routing issues for ad hoc-networks, VANET's, and Wireless Sensor Networks in a normal scenario; recently there has been a recent trend towards the study on underground wireless networks and proposals for design and development for Wireless Underground Sensor Networks. This paper highlights the concept of wireless...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2012

    Performance Comparison of Analog and Digital Radio Over Fiber Link

    In order to meet the ever increasing demand for larger transmission bandwidth, Wireless network based on radio-over-fiber technologies is a very beneficial solution. Various disadvantages of Analog Radio over Fiber link such as non-linearity, chromatic Dispersion can be mitigated by use of Digital Radio over Fiber link. A digitized RF-over-Fiber...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)

  • White Papers // Jun 2012

    A Novel Authentication Protocol Based on Elliptic Curves

    Authentication is the process of determining whether someone or something is, in fact, who or that it is declared to be. It is a client-server based protocol by which a server identifies the identity of a remote client when it logs on to the server through unsecured network. In private...

    Provided By International Journal of Computer Science & Engineering Technology (IJCSET)