International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Displaying 1-40 of 372 results

  • White Papers // Dec 2014

    A Comprehensive Review of Mobile Adhoc Networks (MANETs)

    A Mobile Ad hoc NETwork (MANET) is a complex self configurable wireless network consisting of mobile devices. This network allows devices to work without any fixed infrastructure, nodes in this act as router as well as host. This concept has given introduction to various new technologies have become a boon...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    A Novel Approach to Secure Browser API in Cloud Computing Using HTTPS, MD5 and RSA

    Cloud computing is surrounded by many security issues like securing data, and examining the utilization of cloud by the cloud computing vendors. The wide acceptance www has raised security risks along with the uncountable benefits, so is the case with cloud computing. They also provide authentication at certain specific level....

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Feature Analysis Using Spiking Neurons with Improved PCA Appoach for Hand Gesture Recognition

    Gesture recognition allows a computing device to mathematically present human motion. Recognizing gestures makes communication more natural and providing them as an input makes computers more accessible for the physically-impaired. The authors focus on hand gesture recognition. The paper is about to recognize the hand gesture by using the concept...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Design and Study of Security Model for Core Financial System

    The need of security model is to provide secure data warehouse for core financial institutes. Security model for core financial system is a scheme for specifying and enforcing security policies. A security model is a statement that outlines the requirements necessary to properly support and implement a certain security policy....

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Design and Analysis of Microwave Planar Band Pass Filter for WiMAX Application

    In this paper, the authors present the design and analysis of a compact size planar microstrip band pass filter in the S-band of RF frequency for the application of wireless communication system. This designed structure of band pass filter with low insertion loss is mostly suitable in WiMAX for its...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    A Digital Certification Technique to Message Authentication and Source Privacy in Wireless Sensor Networks

    Message authentication is the one of the most effective ways to unauthorized and corrupted messages from being forwarded in wireless sensor networks. For this reason so many techniques are available for authentication message in the networks. This paper basically three concepts i.e., secret key generation, message authentication, message encryption and...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    A Survey of Various Algorithms in Congestion Detection in VANET

    In Today's era traffic congestion is of big issue everywhere in the world. So to combat with this problem many sensors and devices where designed and also many algorithms where implemented which can overcome this problem in some amount. The invention relates to the field of traffic jam discovery, and...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Enabling Public Verification and Privacy Preserving Audit for Secure Cloud Storage

    Using cloud place for storing, users can from far store their knowledge for computers and have special rights the on-demand high quality applications and services from a shared card-player's money of configurable computing useable things, without the weighting of nearby knowledge for computers place for storing and support. However, the...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Perspectives in Multi-Cloud Computing Emerging Framework and Multi-Domain Services

    As cloud computing becomes more chief, the hard question of scalability has become critical for cloud computing givers. The cloud example is good-looking because it offers a like an actor in a play copies of smaller size in by death and operation expenses for users. But as the request for...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Building Encrypted Data Over MAS by Achieving Data Confidentiality

    In a cloud arena, inserting important information below untrusted third parties, risks the confidentiality of data. Guaranteeing confidentiality within the DataBase-as-a-Service (DBaaS) paradigm remains a problem. Therefore to resolve that confidential concurrent to secure DBaas is projected because the initial resolution to produce availability, security, accessibility and reliability while not...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    An Analysis of Wireless Sensor Networks Scheduled Based MAC Protocol for Assign Transmission & Reception Opportunities

    Wireless Sensor Networks (WSNs) are found suitable for applications such as surveillance, precision agriculture, smart homes, automation, vehicular traffic management, habitat monitoring, and disaster detection. A Medium Access Control (MAC) protocol is the first protocol layer above the PHYsical layer (PHY) and consequently MAC protocols are heavily influenced by its...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Cyber Crime: Challenges and Its Classification

    Digital technology is encompassing in all walks of life, all over the world and has brought the real meaning of globalization. At the one end cyber system provides opportunities to communicate and at the other end some individuals or community exploit its power for criminal purposes. Criminals exploit the Internet...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Recommendation with Data Mining Algorithms for E-Commerce and M-Commerce Applications

    Recommendation is widely used technique to guide user to choose the right product online as it becomes the essential feature for the successful E-commerce or M-commerce application, as information grows exponentially over the time on the internet the accurate recommendation with less processing time is the greater challenge, several approach...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Campus Network Security and Management

    In this paper, the authors are totally dedicated to the network engineer for new and smart learning of the network structure. In this paper, it is possible for the networker to check the network structure of a company spread in the big campus area. The incoming & the outgoing traffic...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Security Issues and Key Management in WiMAX

    WiMAX (Worldwide interoperability for Microwave Access) IEEE 802.16, WiMAX is the emerging technology of this generation. WiMAX uses radio channel, which are open channel that's why security problem arises. WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Dimension Modelling Techniques in Business Intelligence

    Dimension modeling is the technique associated with modeling data present in data warehouse in the form of data cubes or other data modeling schema. Dimension modeling is used to form relationship amongst data present on different computer separated by physical distance with the help of dimension table and fact tables....

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Periodic Cargo Balancing for Multifarious Entity Network

    Load balancing is a vital networking solution responsible for sharing new arrival of jobs efficiently so that individual servers are not over strike by sudden incoming of tasks. Many provisions have been proposed to handle the load balancing drawbacks. Still all these solutions either ignore the heterogeneity creation of the...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Shortest Path in WSN to Detect the Abnormal Packet for Saving Energy and Efficient Data Collection Using AODV

    In this paper, the authors are to study energy-efficient data-gathering mechanisms to abnormal packet data for saving the energy. To detect the abnormal packet irregularities is useful for saving energy, as well as for management of network, because the patterns found can be used for both decision making in applications...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Study of Low Rate Denial of Service (LDoS) Attacks on Random Early Detection (RED)

    RED active queue management is designed to avoid congestion by controlling the average queue size. However a malicious flow cannot be identified. And it enables potential network-layer attacks, e.g. the flooding Denial-of-Service (DoS) attack and the Low-rate DoS (LDoS) attack. LDoS attack is very difficult to identify because the average...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Simulation of MANET Routing Protocols DSDV, DSR and AODV for Different Mobility Models

    Mobile Ad-hoc NETwork (MANET) is a special kind of wireless network that consists of group of mobile nodes that communicate each other. A routing node is a collection point in the network and it uses a protocol to forward data from source to destination. The nodes are free to move...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Comparison of Ant-Net, Honeybee and SRAAA Protocols in MANETs

    Mobile Ad-hoc NETworks (MANETs) is a collection of small randomly dispersed nodes that have the capability to move, establish wireless communication with each other and do computations and process operations. A network especially a wireless network strongly depends on the routing protocols to route the sensed data to the Base...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Design and Implementation of a System for Denial of Service Attack Detection Based on Multivariate Correlation Analysis: A Review

    The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for accurate network traffic characterization by extracting the geometrical correlations between...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Load Balancing and Process Management Over Grid Computing

    As the technology is grown the need of computational efficiency is increases day-by-day. If the user can see around even their mobile phone becomes more efficient and with high computational resources. To empower computation in new principals and concepts changes the face of computation, due to the introduction grid computing...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Enhanced Online Signature Verification System

    Signature has always been and still is widely used as a validation tool to identify the user or their intent in civil society. Online signature is nothing but the dynamic process of handwriting as a feature vector sequence along time. Dynamic Time Warping (DTW) has been used as a popular...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Spoofing Attacks Detection and Localizing Multiple Adversaries in Wireless Networks: A Review

    Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. The flexibility and openness of wireless networks enables an adversary to masquerade as other devices easily. Although the identity of a node can be verified through cryptographic authentication, authentication is not always possible because it...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Understanding of Energy Efficiency in Cloud Computing

    When cloud computing is becoming as a promising approach to improve resources utilization. This is mainly due to use of virtualization that allows providers to run multiple workloads from different customers on the same computing infrastructure. Energy efficiency is becoming a very important issue in cloud computing environments as more...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Efficiency and Performance Evaluation of IERF MANET Routing Protocol

    Networking and internet has become one of the most influential forces for making communication easy and inexpensive around the globe instantly which plays a vital role in data communication network. The performance of routing algorithm checks the ability to select the best route and minimum energy consumption depending upon the...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Privacy Preservation and Public Auditing for Cloud Data Using ASS

    Cloud computing is a class of network based computing through Internet. Cloud data services stores data in the cloud as well as shares data among many users. The integrity of these cloud data is subjected to reluctance due to failure of either hardware or even software and also human errors...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2014

    Survey on Types of Threats Due to RAP and Solutions in IEEE 802.11 WLAN

    IEEE 802.11 WLAN specifically named as infrastructure network bridges a wireless network to a wired network through Wireless Access Points (WAPs). Therefore it is necessary to configure the Access Point and all local wireless clients in order to use the same network. On the basis of Gartner research, now-a-days 20%...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Oct 2014

    Minimum Coverage Design in Wireless Surveillance Networks

    In this paper, the authors present a new application-oriented review on analysis and improvement of the primary QoS indicators of the Wireless Sensor Network (WSN) applications described in the context and scope of the newly introduced concept of minimum coverage. Although crucial and design-critical, especially in the quasi-randomly deployed networks,...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Oct 2014

    The Study of Game Theory in Wireless Sensor Networks

    In this paper, the authors present fundamental results in game theory and their application to wireless communications and networking. It provides a foundational understanding of the current research on game theory. The application of mathematical analysis to wireless sensor networks has met with limited success, due to the complexity of...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Oct 2014

    New Iris Feature Extraction and Pattern Matching Based on Statistical Measurement

    Iris recognition system is considered one of the best biometric systems used to distinguish individuals. The iris recognition system consists of several stages and each stage must be carried out carefully, especially iris feature extraction and matching stages because it affect the accuracy of system performance and its speedup. In...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Oct 2014

    A New Approach to Biometric Person Identification from Retinal Vascular Patterns

    In this paper, the authors present a novel method for biometric person identification by using retinal vascular patterns present in the retina. Retinal vascular patterns crossing the optic disk in the eye is a unique feature and varies from person to person. Here, Singular Value Decomposition (SVD) is used for...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Oct 2014

    MobShield: Analysis for Mobile Applications using Cloud Computing with Data Mining

    With day-to-day increase in the number of mobile applications there is an analogous increment in the mobile threats. For such kinds of threats to mobile devices there should be some security mechanism to be implemented. In this proposed system in order to improve the security to the mobile apps one...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Oct 2014

    Thrusting Energy Efficiency for Data center in Cloud Computing Using Resource Allocation Techniques

    In recent development, complexity data intensive applications are increasing in cloud computing. The users know that it can reduce investments, human resources and enhance productivity. Data centers play a key role with rapid growth online services of client demands in terms of providing the Infrastructures-as-a-Services (IaaS). For data intensive application...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Oct 2014

    RFID Modules & Guideline for selecting appropriate RFID Module for Industries

    Barcode has been used for identification of products since long. It had been successful for identification but as time has gone for barcode now. The users do need to move on towards the technology which could work better and easier than barcode. The manual scanning of each product made a...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Oct 2014

    Multiple Text Cryptanalysis by Using Matrix and Logical Operations

    Data security is plays a vital role in data communication through Internet. Definitely there is a need to protect the data from unauthorized access .To protect data cryptography plays an important role. Cryptography is a technique which allow human-being to encrypt the data in such a way that the decryption...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Oct 2014

    Using Hybrid Model of Turing Band Method and Feed Forward Neural NetworkImprovingPerformance Accuracyof Distributed Web System

    Recently the prediction method was introduced for forecasting the web performance by using the innovative application of Turing Band (TB) geostatistical experiment. However this method is having major limitation which is required to be rectified further. The forecasting accuracy of this proposed method is poor. In addition to this, this...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2014

    Analysis and the Performance Effectiveness of RTS /CTS mechanism in IEEE 802.11

    Wireless communication is one of the fastest-growing technologies. IEEE 802.11 is one of the most organized technologies in wireless LANs. There are two access mechanism of IEEE 802.11 DCF; Basic access mechanism and RTS/CTS mechanism. There are several parameters that have significant impact on network performance when RTS/CTS mechanism is...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2014

    PAPR Reduction in OFDM System using QPSK Modulation and Companding Technique

    Orthogonal Frequency Division Multiplexing (OFDM) is a spectrally efficient multicarrier modulation technique for high speed data transmission over multipath fading channels. One of the main issues of OFDM is high Peak-to-Average Power Ratio (PAPR) of the transmitted signal which adversely affects the complexity of power amplifiers. A-law companding method is...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    A Study on Signature Verification - A Behavioral Biometric Identification

    The need for an automatic verification system is based on the reality that the signature is broadly used as a means of individual verification. Verification can be achieved either Offline or Online. Offline systems work on the scanned picture of a signature. Online systems use active information of a signature...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Resource Allocation and Scheduling in the Cloud

    Recently, there has been a dramatic increase in the popularity of cloud computing systems that rent computing resources on-demand, bill on a pay-as-you-go basis, and multiplex many users on the same physical infrastructure. These cloud computing environments provide an illusion of infinite computing resources to cloud users so that they...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Static IP Address Based Asymmetric Algorithms

    Interconnected collection of autonomous computers called computer network. Most of the computer users participated in internet or intranet users. Network technologies included the function of exchange the information, data, application, and files are stored, modified and deleted .This stage most important factor is to secure the information store by a...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Storage Optimization in Cloud Environment Using Compression Algorithm

    Cloud storage provides users with storage space and makes user friendly and timely acquire data, which is foundation of all kinds of cloud applications. However, there is lack of deep studies and research on how to optimize cloud storage aiming at improvement of data access performance over cloud. In this...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Exploration of Wireless Sensor Networks Technology and Development

    Wireless Sensor Network (WSNs) represents one of the most interesting research areas with deep impact on technological development because of their potential usage in a wide variety of applications such as fire monitoring, border surveillance, medical care, and highway traffic coordination. Sensor nodes are inexpensive portable devices with limited processing...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    The Role of Content Distribution Networks in the Future Media Networks

    The next generation of applications will follow the trend of user-centricity where users are not just seen as consumers or a product or service, but are active participants in providing, operation, or even being the application itself. In this paper, the authors will discuss the role of content distribution networks...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Analysis of Secret Sharing & Review on Extended Visual Cryptography Scheme

    Visual Cryptography (VC) schemes hide the secret image into two or more images which allows the encoding of a secret image into shares distributed to participants. The secret image can be recovered simply by stacking the shares together without any complex computation involved. An Extended Visual Cryptography Scheme (EVCS) is...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Security of Cloud Service Provisioning Using Attribute Based Encryption

    Today, cloud computing has become important research area and more enterprises are adopting the Cloud based strategy for their businesses. In this case, user access control is the primary concern for cloud users and cloud service providers. User accesses are key factor in determining how much they have to pay...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Data Consistency on Private Cloud Storage System

    Cloud computing paradigm contains many shared resources such as infrastructures, data storage, various platforms and software. In cloud storage service, consistency not only influences the performance and availability of the systems but also the overall operational cost. This paper is proposed an analytical model using MM1 queuing for data consistency...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Fault-Tolerant Management for Private Cloud System

    Cloud computing provides access to large pool of data, applications and computational resources. Many researchers have been proposed several open-source Infrastructure-as-a-Service (IaaS) cloud management frameworks (e.g, Eucalyptus, Nimbus, OpenNebula). However, all these systems have limited scalable and fault-tolerance support. Now, fault-tolerance in new computing environments has become a critical requirement....

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Fingerprint Image Enhancement, Thinning and Matching

    Fingerprint image enhancement method is based on the intrinsic characteristics of fingerprint patterns in the Fourier domain rather than spatial domain. Since, signal components of fingerprints ridges are localized in the Fourier domain. So, to enhance the localized signal components and attenuate the other noise component, fingerprint filters is designed...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Autonomous Mobile Robots

    Agents are systems acting on some environment, including their minds. In this case, their action consists of taking decisions, manipulating information, etc. More generally, they act on the physical or social environment producing transitions from one state to another. In this contribution, agents are essentially autonomous, operate without the direct...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Framework for Video Clustering in the Web

    The usage of Web video search engines has been growing at an explosive rate. Due to the ambiguity of query terms and duplicate results, a good clustering of video search results is essential to enhance user experience as well as improve retrieval performance. Existing systems that cluster videos only consider...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    A Survey of Semantic Based Solutions to Web

    An effective retrieval of the most relevant documents from the Web is difficult due to the large amount of information in all types of formats. Researches have been conducted on ways to improve the efficiency of Information Retrieval (IR) systems. To arrive to suitable solutions in IR systems, machines need...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Performance Evaluation of USB WiFi Bridge Based on Embedded System

    Data transfer between two devices, one with USB port but no WiFi connectivity and another device with WiFi connectivity but no USB port, is not possible as two devices cannot be connected directly. The authors' aim is to transfer data from the USB device to the WiFi device or vice-versa....

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Performance Improvement in Infrastructureless Networks by Using Smart Antenna Technology

    Infrastructureless network is a collection of wireless nodes, which are connected in decentralized structure. Nodes in infrastructureless networks can communicate with each other and can move from one place to another. By using omnidirectional antennas, the channel in infrastructureless networks cannot be utilized 100%, so for improving channel utilization the...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Network Security: Distributed Agents Approach

    The purpose of this paper is to present the design of a Hybrid network security system based on distributed multi-agent approach. This system combines NIDPS, HIDPS, KIDPS and firewall using a semantic distribution through detection method and different security levels. The aim is to minimize the analysis loading so that...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    E-learning System: Educational Content Delivery Through Mobile Phones

    This paper was aimed at the development of a mobile learning framework that will enable students to have access to learning facilities using their mobile phones. There is need to utilize the technology in the hands of everyone to implement learning. The authors applied the theoretical review of electronic learning...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Hypercube Based Team Multicasting Routing Protocol in MANET

    Multicast applications for large-scale Mobile Ad hoc NETworks (MANETs) require an efficient and effective Quality of Service (QoS)-aware multicast model. The new requirements to guarantee QoS are high availability and good load balancing due to limited bandwidth and transmission power of Mobile Nodes (MNs). In this paper, multicast routing protocol...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Performance Evaluation of AODV and OLSR Routing Protocols Under Converging and Diverging Traffic

    Wireless ad-hoc networks are characterized by the lack of infrastructure, use of wireless links with limited bandwidth and frequent topological changes. These networks must be capable self-organizing and self-configuring to handle the dynamic nature of the network. Routing protocols should be able to handle the dynamic nature, and the limited...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Analytical Study on Energy Efficient Clustering Algorithms for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) were initially designed to facilitate military operations but its application has since been extended to health, traffic, and many other consumer and industrial areas. The size of the sensor nodes can also range from the size of a shoe box to as small as the size...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    A Cloud Computing Framework Based Mobile Agents for Web Services Discovery and Selection

    The increasing use of web services as well as the growing interest lent to cloud computing technology and its capacity of calculation, storage and cloud services, impose today that the traditional mechanisms of discovery and selection must be re-examined. This specificity of discovery over the cloud led one to propose...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Analyzing the Effect of Timer Timeout and Packet Length on the Performance of Error Control Protocols

    In the present day computer networks quality of service is a major issue, which invariably depends on the network performance under various network constraints such as flow control, error control, bandwidth, data traffic, buffer handling etc. In this paper, the authors are analyzing the effect of timer timeout and Packet...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Maximizing Network Lifetime Using Reliable Energy Efficient Routing Protocol Based on Non Cooperative Game Theory for Wireless Sensor Networks

    Wireless sensor networks create numerous fundamental coordination problems. For example, in a number of application domains including homeland security, environmental monitoring and surveillance for military operations, a network's ability to efficiently manage power consumption is extremely critical as direct user intervention after initial deployment is severely limited. In these settings,...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Radio Over Fiber: Future Technology of Communication

    This paper consists of two parts: introduction of Radio of Fiber technology & methodology, quality parameter & challenges for Implementation. Wireless communication was one of the paramount ways in term of high bandwidth data communication. Technology like microwave, wireless, optical communication & their combination are used and have improved the...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Accounting for Uplink Traffic in the Design of Schedulers for Multiple Traffic Classes in OFDMA Networks

    The research literature in wireless networks contains many examples of proposed MAC protocols. Every such proposed protocol thoroughly addresses downlink traffic from the Base Station (BS) to the Mobile Station (MS). Few, if any, do more than mention uplink traffic. In this paper, the authors look at two MAC protocols,...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    A Novel Entropy Based Detection of DDoS Attacks

    Distributed Denial Of Service (DDOS) attacks is a critical threat to the internet. Due to the memory less features of the internet routing mechanism makes difficult to trackback the source of the attacks. In this paper, the authors find out the source of the attack with the help of entropy...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    A Genetic Algorithmic Approach to the Identification of the Crucial Human Factors Involved in the Development of Secure Software

    Software project managers of the day are being increasingly confronted with the problem of managing the security risks of the software they are attempting to engineer. While software project management itself is quite challenging, security risk management adds to the severity of the problem. Human factors play an important role...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Problems and Solutions of Web Search Engines

    In internet, a wide range of web information increases rapidly, user wants to retrieve the information based upon his preference of using search engines. The authors' paper is going to propose a new type of search engine for web personalization approach. It will capture the interests and preferences of the...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    The Effects of Data Compression on Performance of Service-Oriented Architecture (SOA)

    Due to the various areas of applicability, there is a need for overcoming performance problem of service oriented architecture. In this paper, the impressive parameters on response time in service oriented architecture are determined. One of the important factors in reducing response time is the size of data being transferred...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    A Survey on Uplink Bandwidth Request in WiMaX Networks

    The bandwidth allocation in both wired and wireless networks has posed great challenges to network engineers for improving desirable Quality of Service (QoS). Bandwidth allocation is always an important element for improve QoS of network. Bandwidth utilization is considered optimum when there is no over- or under-allocation of capacity for...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    Mobile World for Cloud Computing

    The cloud computing emerges as a new computing model which aims to offer consistent, custom made QoS assured dynamic computing environments for end-users. This paper includes the definitions, features, CDLC and services provided by the cloud computing Technology. The cloud computing emerges as a blistering topic almost five years ago...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Multi Mobile Agent Itinerary for Wireless Sensor Networks

    The batteries power life is play an important role in the in Wireless Sensor Networks (WSNs), so that energy saving of its is a very critical issue. The limitation of transmission/reception of data should be as much as possible, it reduce the cause of power consumption in a sensor node....

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Authentication Method Based on Hashes Fingerprint for Fast Retrieval

    The popularity of information technology systems increase security requirement for it, the security in those system fulfill by PINs or passwords. During the past few years, the scientific community is keep trying to improve the biometric techniques to be accepted as an alternative option to other user authentication schemes. Fingerprints...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Optimizing the Performance of Fuzzy Implemented Radial Basis Function Channel Equalizer With Subset Centre Selection

    In this paper, the authors have investigated the performance optimization of the fuzzy implemented RBF equalizer with emphasis on subset centre selection. It is shown that the fuzzy implemented RBF equalizer provides optimal decision function with substantial reduction in computational complexity. This equalizer provides efficient schemes for subset centre selection...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    RFID: Severe Threat to Secrecy

    Radio Frequency IDentification, or RFID, is a knowledge which has been getting significant attention as of late. It is a fairly simple technology concerning radio wave communication between a microchip and an electric reader, in which an ID number stored on the chip is transferred and administered; it can be...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Jun 2012

    Comparative Study of Motion Estimation & Motion Compensation for Video Compression

    The newest predictive video coding schemes increasingly include the content based techniques which open new possibilities for advanced compression technology. Respected paper gives the better comparison for Motion Estimation & Motion Compensation, which are the major parameter for getting the highest compression. The ME process analyzes previous or future frames...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Mar 2013

    Mobile Devices and Social Networking Security Solution

    Now-a-days almost everyone is using smart phones. They are becoming an essential tool in human being's everyday life. They are not only used for mere communication such as calling or sending text messages; however, they are also used in applications such as for accessing internet, receiving and sending emails and...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Aug 2012

    ERP Software Implementation in Indian Small and Medium Enterprises

    ERP (Enterprise Resource Planning) is a way to integrate the data and processes of an organization into one single system. Its main goal is to integrate data and processes from all areas of the organization and unify it, to provide ease of access and an efficient work flow. ERP Systems...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

  • White Papers // Dec 2013

    Axioms of Cloud Computing

    Cloud computing is the emerging field of computer science. It is growing day-by-day due to its rich features of services. It is a virtual pool of resources which are provided to the users through Internet. Cloud computing can be defined as a computing environment where computing needs party can be...

    Provided By International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)