International Journal of Emerging Technology and Advanced Engineering (IJETAE)

Displaying 241-280 of 956 results

  • White Papers // Mar 2014

    Detection Of Routing Misbehaviour in MANET

    Ad hoc On-demand Distance Vector (AODV) is one of the most suitable routing protocols for the MANETs and it is more vulnerable to black hole attack by the malicious nodes. A malicious node that incorrectly sends the RREP (Route REPly) that it has a latest route with minimum hop count...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Real-Time Intrusion Detection System using Artificial Neural Networks (ANN)

    An intrusion can be defined as any practice or act that attempt to crack the integrity, confidentiality or availability of a resource. This may consist of a deliberate unauthorized attempt to access the information, manipulate the data, or make a system unreliable or unusable. With the expansion of computer networks...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    An Analytical Study of Enhancing Energy Efficiency of Wireless Sensor Network through Relay Nodes Placement

    Power consumption of a node in the wireless sensor network increases with the increment of distance between the transmitter and the receiver i.e. the sensor and the base-station. Many published papers have been covered in this paper, which suggests various approaches to minimize power consumption of wireless sensor networks. One...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Android-Based Mobile Payment System Using 3 Factor Authentication

    In this paper, the authors making transaction such as doing payment, transferring funds/money, doing online transaction via android Smartphone platforms for prominent mobile payment. This paper combines a pair of Smartphone for apparent transaction, server and paying client. These devices are featuring 3 types of authentication in this paper to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Simulation Study of Collusion and Network Partition Denial of Service Attack in IEEE 802.11 and FAIRMAC Protocol

    Denial of service is a constant concern in the world of networking. By DoS attack, the authors mean any effort to \"Prevent or impair the legitimate use of computer or network resources\", interrupting or delaying services which can cause a node or an entire network to become unavailable. The industry...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    Survey Of Cross Layer Based TCP Congestion Control Techniques in MANET

    In Mobile Ad hoc NETwork (MANET), congestion is one of the most important limitations that affect the performance of the whole network. TCP (Transmission Control Protocol) are the reliable protocol for communication because of their connection oriented behavior. Multi-path routing protocol can balance and share the load better than the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    GPS Based Tour Guide Assistance with Voice Announcement

    GPS is the acronym for Global Positioning System. It is employed to find the position of the location on the earth. This information is provided by the GPS with the help of the data it receives from the satellites. Micro controller is the heart of the device. It stores the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2014

    A Review on Energy Efficient Routing Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) attract the researchers more these days due to their accepted applications in environment monitoring, radiation and nuclear-threat recognition structure, weapon sensors for ships, battlefield investigation and observation, army intelligence, communications, power, control and targeting systems and biomedical aspects. WSNs can provide cheap solutions to a range...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Analysis of Challenges in the Design and Development of Multi-Level Secure Databases

    Database security mainly deals with the secrecy, integrity and availability of data stored in a database. The common threats to the databases involve privilege abuse, weak authentication, weak audit trails and operating system vulnerabilities. To make the security least compromised; all users are required to follow the rules set up...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Leverage Data Mining Techniques in Intrusion detection

    Data mining techniques have been successfully applied in many fields including marketing, manufacturing, process control, fraud detection and network management. In recent years, data mining-based Intrusion Detection Systems (IDS) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. In data mining...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secured Multiple-keyword Search over Encrypted Cloud Data

    As cloud computing become more flexible & effective in terms of economy, data owners are motivated to outsource their complex data systems from local sites to commercial public cloud. But for security of data, sensitive data has to be encrypted before outsourcing, which overcomes method of traditional data utilization based...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Novel Method for Data Hiding In Encrypted Image And Video

    Now-a-days the data security and data integrity are the two challenging areas for research. This paper describes the concept of separable reversible data hiding technique that is related with internet security. When it is desired to send the confidential/important/secure data over an insecure and bandwidth-constrained channel it is customary to...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Achieve Fine Grained Data Access Control in Cloud Computing using KP-ABE along-with Lazy and Proxy Re-encryption

    The emerging cloud technologies, due to their various unique and attractive properties, are rapidly being adopted throughout the IT industry. In this paper, the authors identify security challenges that arise in incorporation of cloud-based services, and present a set of solutions to address them. To assure the user control over...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Advance XML Search Engine

    Internet work in distributed environment different serves is located at different places. Web users retrieve information from internet by firing query. XML search engine is a strong & easy search engine for searching XML content. Advance XML search engine is very efficient and very easy search engine. And this is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    SoftServe (Software Server)

    Software as a service, sometimes referred to as \"On-demand software,\" is a software delivery model in which software and its associated data are hosted centrally (typically in the (Internet) cloud) and are typically accessed by users using a thin client, normally using a web browser over the Internet. The authors'...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Fault Analysis in Reversible Sequential Circuits

    In this paper, the researchers propose the design of reversible circuits using reversible gates. Reversible logic is implemented in reversible circuits. Reversible logic is mostly preferred due to less heat dissipation. Conservative logic gates can be designed in any sequential circuits and can be tested using two test vectors. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Software Testing, Mythology & Methodologies

    It is generally believed that testing phases of software development consume 30% to 50% of the entire software development time and resources. The cost and time of testing should get reduced to increase the productivity of the software development process. To achieve these goals, different levels and tools of automated...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Review Techniques of Data Privacy in Cloud Using Back Propagation Neural Network

    Back propagation is the scheme for neural network learning. This learning accuracy gained by collaborative learning. In existing system support this kind of learning on limited dataset and between two parties. It cannot protect intermediate result. In the authors' proposed system multiple parties perform collaborative learning on arbitrarily partitioned data...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Digitally Controlled Delay Lines Based On NAND Gate for Glitch Free Circuits

    The traditional analog signal processing is expected to progressively substituted by the processing times of the digital domain in the VLSI. Within this novel paradigm, digitally controlled delay lines should play the vital role in the digital-to-analog converters, and in analog intensive circuits. From a practical point of view, now-a-days,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Interative Services of College Databases

    Now-a-day when there is mobility in every aspect of life, people do not wish to visit different places in order to gather information. Information retrieval is the science of locating from a large documentation collection, those documents that satisfy a specified information need. As the number of users using internet...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Hiding in Motion Vectors of Compressed Video

    In this paper the authors aim to explain the data hiding concept in motion vector of compressed video. In this data hiding in motion vector is done by stenography technique, data is compressed in different frames of video. The process starts with mailing system such as sending and receiving secret...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    (Mcicpl Protocol): Mobile And Computer Interactive Communication Protocol on Linux

    GPRS network supports to the communication of data or transferring of data, even though GPRS (General Packet Radio Services) is allow transmitting data to the Internet and it is used for communication. The GPRS services provide a packet switch data transmission within GSM network and packet access to data networks....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    A Survey on QoS Ranking in Cloud Computing

    QoS (Quality-of-Service) is an important topic in cloud computing. It is very difficult to make a decision on choosing the cloud services depending on QoS requirements. These requirements have to be satisfied by both cloud service providers and cloud users. So, optimal service selection is needed to obtain high quality...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    ANT Algorithm for Load Balancing Problem in FTP Server

    The system describes a method of achieving load balancing in distributed networks. A network models a typical distribution of files between nodes; nodes carrying an excess of traffic can become congested, causing data to be lost. The network also supports behaviors modeled on the trail laying abilities of ants. The...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Review Of Various GDI Techniques For Low Power Digital Circuits

    Now-a-days in digital circuit design low power and small area are main issues of concern for VLSI designers. GDI (Gate Diffusion Input)-a technique of low power digital combinational design. This technique as compare to other currently used logic design styles, allows less power consumption and reduced propagation delay for low-power...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Shared Cryptographic Scheme with Efficient Data Recovery and Compression for Audio Secret Sharing

    Present scenario suggests many audio files are needed to be transmitted over internet for various important purposes. Earlier cryptographic schemes for secret sharing lead to high computational complexity during both secret sharing and secret reconstruction phase. Today, various cryptographic methods for secret sharing are there to protect secret data but...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Adaptive Genetic Algorithm for Efficient Resource Management in Cloud Computing

    Cloud is one of the emerging technologies in computer industry. Several companies migrate to this technology due to reduction in maintenance cost. Several organizations provide cloud service such as SaaS, IaaS, and PaaS. Different organization provides same service with different service charges and waiting time. So customers can select services...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    DualGuard: Detecting Intrusions in Multitier Web Applications

    In the people day to day life internet plays very important role, in terms communication and management of personal information from anywhere. Therefore for increase in application and complexity of data, web-services take interest in multi-tiered design like 1-tier, 2-tier and 3-tier design. By the use of these design web...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Effective Data Structure for Mining Frequent Itemset in Cloud Databases

    Due to increase of data in cloud computing environment over the past few years, retrieving required data from the huge database with lesser amount of time becomes tedious. Hence without having a proper cache management framework the retrieval of required data from the cloud data servers becomes difficult. This paper...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Data Migration in Heterogeneous Databases (ETL)

    Development of economic systems presents rapid growth trend and requires establishing a rapid trans-regional clearing system in banks. The authors are studying the approaches and processes of data migration and take a bank's database as an example. The process of data migration has three methods. Data migrated by tools beforehand,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    M-Score and K-Anonymity: A Model for Detection and Protection of Data

    Conversely, limiting access to the information in the interests of preserving secrecy might damage their ability to implement the actions that can best serve the organization. Therefore, data leakage and data misuse detection mechanisms are essential in identifying malicious insiders. One of the emerging concepts in micro data protection is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Research Caricature Based on Semantic Web Mining

    Research caricature is an analysis method used to scan the contextual literature information and describe the research environment and research efforts wisely. Here the authors carry out a paper which needs to extract intelligence from web resources especially for scientific research analysis. This paper made a research caricature based on...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secured Solutions for Mobility in Wireless Body Area Networks

    Body Sensor Network (BSN) that is linked by a wireless network interface roams from one coverage zone to another then interference between Wireless-Body-Area-Networks (WBAN) created, which can cause serious throughput degradation, Scattering of WBAN and Remote Base Station (RBS) will not be in range. When a wireless body area network...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Proposed Local Data Mart Approach for Data Warehouse Architecture

    A data warehouse is a data repository, containing historical data, prepared for analysis and supporting decision making process. Data warehouses are in use for more than a decade but companies are still finding it difficult to decide on the approach they should take for successful implementation. Data warehouse architecture plays...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secure Intrusion Detection to Avoid Zombies Exploration in Cloud

    In cloud system, virtual machine is considered as the security threat. This is because all cloud users install their applications in virtual machines. Particularly, intruders can exploit vulnerability to a cloud system and compromise virtual machines to deploy further large scale types of attack like Distributed Denial Of Service (DDOS)....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Feature Subset Selection in High Dimensional Data by Using Fast Technique

    Feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness. A fast clustering-based feature selection algorithm, FAST works in two steps. In the first step,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Secured Resource Sharing in Cloud Storage using Policy based Access Control

    Cloud computing is a general term anything that involves delivering hosted services, Anything-As-A-Service (AAAS), over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Performance for Scalable Monitoring in Cloud Services

    Cloud monitoring plays a crucial role in providing application guarantees like performance, availability, and security. Primary motive behind more organizations moving to cloud is the reduction in cost and dynamic resource allocation. Since the underlying infrastructure is hosted by the cloud provider. Also, characteristics like Scalability, elasticity, availability, accuracy and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Algorithm for Identifying Relevant Features Using Fast Clustering

    In the high dimensional data set having features selection involves identifying a subset of the most useful features that produce compatible results as the original entire set of features. A fast algorithm may be evaluated from both the ability concerns the time required to find a subset of features and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2014

    Cloud Computing- SPI Framework, Deployment Models, Challenges

    Cloud Computing is a \"Buzz word\" encompassing a wide variety of aspects. Clouds are a large pool of easily useable and accessible virtualized resources (hardware, development platforms and/or services). Most of the people are already using cloud computing in their daily lives for personal use, and now enterprises are rapidly...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Combined RFID-Biometric Based MIS for Student Information

    RFID (Radio Frequency IDentifier) and Biometric now a days are one of the most popular technologies in use today. This paper focuses on creating a MIS (Management Information System) system of student using both RFID and biometric (face-detection) technology. With the increasing number of students managing the attendance manually becomes...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    HTTP Botnet Detection Mechanism Using Network Behaviour Analysis

    Now-a-days it has been Observed that the Botnet attacks on the internet is increasing day by day. The authors have to find a corresponding solution for this attack otherwise a serious problem will be occur in future. They need to find an effective approach to detect and notify Botnet attacks...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Cryptanalysis With a Symmetric Key Algorithm TORDES

    Today's cryptography is vastly more complex than its precursor. Unlike the innovative use of cryptography in its classical roots where it was implemented to conceal both diplomatic and military secrets from the enemy, the cryptography of today, even though it still has far-reaching military implications, has expanded its field, and...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Working of DSR and AODV in Congested Networks

    Ad hoc networks are characterized by multi-hop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. The wireless mobile nodes in this network communicate with each other without centralized control or established infrastructure. Since the wireless links are highly error prone and can go down...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Performance of Triple Umpiring System and Its Enhancements in Wireless Sensor Networks

    Advances in Wireless Sensor Network Technology (WSN) has provided the availability of small and low-cost sensor with capability of sensing various types of physical and environmental conditions, data processing and wireless communication. One of the most challenging issues so far is the extension of network lifetime with regards to small...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Neighborhood Search for the Bounded Diameter Minimum Spaning Tree

    Many optimization problems including the network design problem of finding the bounded diameter minimum spanning tree are computationally intractable. Therefore, a practical approach for solving such problems is to employ heuristic algorithms that can find solution close to the optimal one within a reasonable amount of time. Neighborhood search algorithms...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    The New Approach of Quantum Cryptography in Network Security

    Cryptography means that the authors keep a message secret during transmission through untrusted and insecure channel. It's simple means-encoding and decoding messages and has existed as long as people have distrusted each other and sought forms of secure communication. This encoding and decoding is perform by the some special key...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Wireless Sensor Network Cuts: A Survey

    This paper gives formatting guidelines for authors preparing papers for publication in the International Journal of Emerging Technology and Advanced Engineering The authors must follow the instructions given in the document for the papers to be published Wireless Sensor Networks (WSNs) consist of thousands of tiny nodes having the capability...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Optimal PMU Placement on Network Branches for Intentional Islanding to Prevent Blackouts

    Power grids, throughout the world, are operated as large interconnected networks to ensure reliability of supply in an economic way. The interconnected nature of power network makes it vulnerable and sometimes even a small disturbance in the grid may propagate and result in a blackout. Investigations into major blackouts of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Rateless Erasure Code Based Secure Storage in Cloud Computing

    Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. The first offered cloud service is moving data into the cloud: data owners let cloud service providers host their data on cloud servers and data consumers can access...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Optimized Node Deployment Using Enhanced Particle Swarm Optimization for WSN

    Sensor nodes deployment is critical for Wireless Sensor Networks (WSNs). Current methods are apt to enlarge the coverage by achieving a nearly even deployment with similar density in the wireless sensor network. Virtual Force (VF) directed Enhanced Particle Swarm Optimization (EPSO) algorithm, which uses a combined objective function to achieve...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Refining Bogus Data in Wireless Sensor Network Using Non Repudiation and Enrouting Filter Mechanism

    Wireless sensor network is usually composed of a large number of sensor nodes which are interconnected through wireless links to perform distributed sensing tasks. When a sensor node generates report after being triggered by a special event, it will send the report to a data collection unit (also known as...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Automatic Hybrid Detector for Spontaneous Detection of Malicious Nodes in MANET's

    MANET capabilities are expected to be an overall driving force for next-generation wireless functionalities. These multi-hop networks the burden of routing packets from source to destination. Each Node handles part of the management of the network. Fault detection is extremely difficult because of the distributed design. In this paper, the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Implementation of Improved WPC for Secured Steganography on Ad-Hoc Networks

    In this paper, the authors aim on transferring the data in a more secured manner using WPC. Cryptography and Steganography techniques of encrypting the data and hiding the data are well known. In this paper, they use Wet Paper Codes (WPCs), which enable the sender to determine the selection channel...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Enhancing Security in Biometric System Using Blind Authentication Protocol

    Biometric authentication system are used prevalently for its template security, retract ability and privacy. The Authentication process is reinforced by biometric cryptosystem. The authors propose a demonstrable secure and blind biometric authentication protocol which discloses only identity and not any other information to both client and server. To reduce the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Message Security Through Digital Signature Generation and Message Digest Algorithm

    It is common now a day to communicate through messages. The sending and receiving message with in a network is not more secure as the people data can be accessed by everyone within that network. In order to provide security to the data most commonly the authors are using the...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2013

    Modified Cellular Message Encryption Algorithm

    The Cellular Message Encryption Algorithm (CMEA) has been designed by the TIA (Telecommunication Industry Association) to protect the control data of cellular phone communication. As cellular telephony industry has boomed, the need for security has increased: both for privacy and fraud prevention. Because all cellular communications are sent over a...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Secured Consistent Network for Coping Up With Fabrication Attack in MANET

    Recent advances in wireless communication along with peer - peer paradigm have led to increasing interest in P2P MANET. In mobile ad-hoc networks, mobile host move freely thereby disconnections occur frequently and result in network partition, which decreases data availability. Consequently, data replication improves data availability which maintains the consistency...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    An Adaptive Eadr Approach to Purge the Routing Attacks in DSR

    A Mobile Ad hoc NETwork (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. These types of wireless networks are more prone to vulnerabilities. The pre-existing research efforts results its inefficiency in detecting attacker's intrusion during collisions and have high routing overhead....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Service Oriented Architecture Design for Web Based Home Banking Systems With Cloud Based Service

    The aim of this paper is to design and develop Software as a Service (SaaS) for cloud environment using SOA principles. Globalization continuous to pressure the banking industries for increased collaboration within their value chains. The banking industry, a virtual backbone for all other industries, feels this pressure both within...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Accurate Estimation of Reverberation Time and DRR Using Maximum Likelihood Estimator

    This paper presents a speech-model using the Linear Predictive (LP) residual signal and Maximum Likelihood Estimator (MLE). With this model an accuracy of the reverberation time estimation can be improved. During past decade, the reverberation time estimation was performed using only maximum likelihood detector, which resulted in excess time of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    IHONEYCOL: A Collaborative Technique for Mitigation of DDoS Attack

    Distributed denial of service is flooding of network with unrelated information by malicious node. Thus causing the authorized service deny from user. This distributed denial of service poses a major security threat. The mitigation of distributed denial of service becomes hard when they it comes to distributed environment. In general...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Overview of Data Aggregation Based Routing Protocols in Wireless Sensor Networks

    Resource-constrained is a critical issue in Wireless Sensor Networks (WSNs) applications. Data aggregation is an efficient method to conserve energy by reducing packet transmissions and extend the network lifetime in WSNs. The total lifetime of the network is a major design factor for protocols used by WSNs. Routing protocols with...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Review on Continuous Authentication Using Multimodal Biometrics

    Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources until the initial user logs out. This situation is encountered when the logged in...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Performance Analysis of Different Adaptive Modulation Techniques in MIMO Systems on Basis of Ber Performance

    Spatial Modulation (SM) is a recently proposed joint coding and modulation scheme for Multiple-Input - Multiple-Output (MIMO) wireless systems, which is receiving a growing interest. SM is used in wireless systems, which can offer good data rates and error performance with a moderately low system complexity. Adaptive modulation schemes for...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Adaptive Defense Strategy: Immunizing Shared Channel Network From DoS Attacks

    Denial of Service attacks is an attempt to make a machine or network resource inaccessible to intended users. This attack saturates the target machine with a lot of communications requests, in such a way that it cannot respond to traffic from legitimate requests. The Denial of service attacks is massive...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    An Effective Packet Filtering Mechanism for Reducing Complexity

    Most organizations need to control the traffic that crosses into and out of their networks to prevent attacks from both the net-work as well as organization perspective. The firewall is a crucial component in the defense mechanisms of every network connected to the internet. It is the first filtering device...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Peak-to-Average Power Ratio Reduction by CB-ACE and Adaptive Ace Algorithms

    Orthogonal Frequency Division Multiplexing (OFDM) is a method of Digital Modulation in which a signal is split into several narrowband channels at different frequencies. The OFDM technology was first conceived in the 1960s and 1970s during the research into minimizing interference among the channels near each other in the frequency....

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Mining Usage Profiles Using Fuzzy Clustering and Its Applications

    Web usage mining is an application of data mining technology to mine the data of the web server log file. It can discover the browsing patterns of user and some kind of correlations between the web pages. Web usage mining provides the support for the web site design, providing personalization...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Face Photo-Sketch Synthesis and Recognition

    Today in Modern Society Face Recognition has gained much attention in the field of network multimedia access. After the 9/11 tragedy in India, the need for technologies for identification, detection and recognition of suspects has increased. One of the most common biometric recognition techniques is face recognition since face is...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Enhancing Quality of Service Using OFDM Technique for Next Generation Network

    The migration to 4G networks will bring a new level of expectation to wireless communications. As after digital wireless revolution made mobile phones available for everyone, the higher speeds and packet delivery of 4G networks will make high quality multimedia available everywhere. The key to achieving this higher level of...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Feb 2012

    Categorization of Unstructured Web Data Using Fuzzy Clustering

    The World Wide Web has huge amount of information that is retrieved using information retrieval tool like Search Engine. Page repository of Search Engine contains the web documents downloaded by the crawler. This repository contains variety of web documents from different domains. It becomes tedious for the user to manually...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Mar 2012

    Removing Inconsistencies and Errors From Original Data Sets Through Data Cleansing

    The problem of data cleaning, which consists of removing inconsistencies and errors from original data sets, is well known in the area of decision support systems and data warehouses. This holds regardless of the application - relational database joining, web-related, or scientific. In all cases, existing ETL (Extraction Transformation Loading)...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // May 2013

    QoS Aware Routing and Admission Control in MANET

    It is difficult to provide Quality of Service (QoS) assurances in a Mobile Ad-hoc NETwork (MANET) due to node mobility, distributed channel access, fading radio signals, a lack of centralized coordination, and the unreliable nature of the wireless channel. This application gives a thorough overview of QoS routing metrics, resources,...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Remote Data Integrity in Cloud Security Services

    Cloud structure delivers infrastructure, platform and software as a service which are made available in pay-as-you go model. Cloud storage is a model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Users interact with the cloud servers through...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Profit Maximization for SaaS Using SLA Based Spot Pricing in Cloud Computing

    Cloud Computing provides user a complete software environment. To serve resources to customers, Software as a Service providers rent resources from the Infrastructure as a Service Providers. Client applications and service providers negotiate for the sales of services by means of Service Level Agreement (SLA) that acts as a contract...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Analysing Multicast Routing Protocols With Different Mobility Models

    A Mobile Ad hoc NETwork (MANET) is a wireless network where a collection of mobile nodes may dynamically vary the topological structure. Multicast is an efficient method to implement the group communications. Mobile Ad-Hoc is a dynamic, multi-hop and autonomous networks composed by wireless mobile nodes. The mobility model represents...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    A Recent Secure Intrusion Detection System for MANETs

    Mobile ad hoc network is a collection of wireless mobile nodes forming a network without using any existing infrastructure. MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly. A new intrusion detection...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Reliable and Efficient Distributed Code Dissemination in Wireless Sensor Networks

    In wireless sensor networks, code dissemination is a process of propagating new code images or commands in the network. Since the WSN are mostly deployed in the military and hostile environments secure code dissemination is needed. Mostly code dissemination protocols are based on two approaches. First based on the centralized...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)

  • White Papers // Jan 2013

    Effective Multi Keyword Search Over P2P Network Using Optimized Bloom Filter Settings

    P2P network is a popular technology used for sharing and searching files on the computers connected to the network. Current search mechanisms of Peer-To-Peer (P2P) systems can well handle a single keyword search problem. Other than single keyword search, multi keyword search is very popular and useful in many file...

    Provided By International Journal of Emerging Technology and Advanced Engineering (IJETAE)