International Journal of Engineering and Innovative Technology (IJEIT)

Displaying 1-40 of 98 results

  • White Papers // Nov 2013

    Utilization of ID-Based Proxy Blind Signature Based on ECDLP in Secure Vehicular Communications

    Security of Vehicular Ad-hoc NETworks (VANETs) has been a major research area in both academia and industry. Reducing cost of computation, effective consumption of limited resources and providing uncompromised security has always been a challenge in vehicular communications. Security establishment with no certificates and/or certificate revocation gives lesser signature overhead....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Nov 2013

    A Survey on the Measurements and Requirements of Various Security Aspects of Data Warehousing Environment in Different Levels of Organization

    In this paper, the authors present the survey about the security levels of various levels of organizations ranging from small, medium, large and enterprise. The activities are common in all the levels of data warehousing environment, the only thing to consider is the amount of data and the number of...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Nov 2013

    A New Approach for Skin Tone Based Steganography with Key Analysis for Mistreatment Biometrics

    Biometric feature accustomed implement steganography is skin tone region of pictures. Here secret information is embedded inside skin region of image that may offer a wonderful secure location for information activity. For this skin tone detection is performed by using HSV (Hue, Saturation and Value) color space and DWT (Discrete...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Oct 2013

    A Survey on Resource Allocation and Task Scheduling Algorithms in Cloud Environment

    Cloud computing is a computing service paradigm that charges under the basis of the amount of resources consumed i.e. pay per use constraint .One key characteristic that differentiate cloud computing from the other enterprises computing is that the infrastructure itself is programmable. An important issue faced by Infrastructure-as-a-Service (IaaS) in...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Oct 2013

    Energy Efficiency for Data Center and Cloud Computing: A Literature Review

    Cloud computing (CC) is a promising area in distributed computing. This technology can achieve communication, storage, processing, high performance, hosting and services on demand to cloud costumer. Energy consumption cost and environmental effect are dynamic challenge to cloud computing. Data centers are the backbone of cloud computing. They continue to...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Sep 2013

    Improving the Efficiency of Apriori Algorithm in Data Mining

    In computer science and data mining an interdisciplinary subfield of computer science, is the computational process of discovering patterns in large data sets in database systems. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Sep 2013

    Radio Frequency Identification (RFID) Security Issues and Possible Solutions

    Radio Frequency IDentification (RFID) has become popular for automated identification and tracking of objects, goods and people. As the applications of RFID are expanding every day, new security issues also will be appeared. This paper speaks about fundamentals of RFID systems and security issues which can be raised in each...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2013

    Review of Biometric Technologies Used for ATM Security

    Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. In order to deal with security, authentication plays an important role. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2013

    A New Approach for Discovering Frequent Pattern from Transactional Database

    Frequent pattern mining is a heavily researched area in the field of data mining with wide range of applications. Finding a frequent pattern (or items) play essentials role in data mining. Efficient algorithm to discover frequent patterns is essential in data mining research. A number of research works have been...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Aug 2013

    Real Time Peer-Peer Intrusion Detection Using Rough Set Dynamic Reduct Approach

    There's a humongous rise in the usage of internet over the past decade with the introduction of new services and constantly progressing technology. Some of these services imbibe in them sensitive information thereby resulting in high exposure for compromising the data. There comes a deep necessity to inculcate the features-confidentiality,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Mobile Cloud Security Issues and Challenges: A Perspective

    Mobile Cloud Computing (MCC) is exploring vast in IT due to anywhere anytime data access. Mobile devices are enabled with rich user experience especially, Smartphone's. Apple, Google, Facebook and Amazon are the top four horsemen in the mobile world. That is why the mobile cloud computing technology is growing rapidly...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Comparison Between PSO and Firefly Algorithms in Fingerprint Authentication

    One of the biggest challenges facing society is confirming the true identity of a person. Fingerprint identification may be preferred over traditional methods (e.g. passwords, smart-cards) because its information is virtually impossible to steal. Recently, a new trend has been opened by using swarm intelligence techniques in biometric field. Therefore,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Enhancing Data Security during Transit in Public Cloud

    Cloud computing has developed as a widespread model in computing world in which resources of the computing infrastructure are provided as services over the Internet. A cloud computing scenario usually tailors the server as needed. Cloud computing pattern also brings out several new challenges in data security and access control...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    A Review of Cloud Computing Security Issues

    Compute clouds are enormous server farms packed with computing power and storage space accessible through the Internet. Instead of having to manage one's own infrastructure to run applications, server time and storage space can be bought from an external service provider. From the customers' point of view the benefit behind...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    VANET (Vehicular Ad-Hoc Networks): Avoidance of Risk Factor in Secure Communication

    Recent advances in development of Wireless Communication in Vehicular Ad-hoc NETwork (VANET) has provided emerging platform for industrialists and researchers. Vehicular ad-hoc networks are multi-hop networks with no fixed infrastructure. It comprises of moving vehicles communicating with each other. One of the main challenges in VANET is to route the...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Security of Credit Card Using Security Code Displayed On Customer Mobile to Prevent Any Unauthorized Access

    As the authors know that over the past three decades, consumers have been largely depending on and trust credit to conveniently meet there credit needs, this paper is to develop a security code, which is used for credit card security system. In this paper, they have to plan that as...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Real Time Periodicity Detection in Time-Series Databases

    Time series is a set of statistics, usually collected at regular intervals. The goal of analyzing a time series database is to find whether and how frequent a periodic pattern is repeated within the series. Periodic pattern mining is the problem that regards temporal regularity. It has a number of...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2013

    Identification and Alleviation of MANET Routing Attack Risks

    A Mobile Ad-hoc NETwork (MANET) is a self-starting dynamic network comprising of mobile nodes, where each and every participation node voluntarily transmit the packets destined to some remote node using wireless transmission. Mobile Ad-hoc NETworks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jun 2013

    Cloud Service Tools: State of the Art

    Cloud computing is not a newly developed technology. It is an evolutionary paradigm evolved from parallel computing, distributed computing, grid computing and utility computing. It has been one of the hot research topics in Information Technology circle. In the present scenario, many industries are involved in cloud computing related techniques....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    Global Load Balancing and Fault Tolerant Scheduling in Computational Grid

    Grid computing is a replica of distributed computing that uses geographically and administratively different resources found on the network. These resources may include processing power, storage capacity, specific data, and other hardware such as input and output devices. In grid computing, individual users can access computers and data visibly, without...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    Cloud Vision Using MOCHA Architecture on Jelastic Cloud

    Face recognition applications that automatically identify an individual from captured images or Videos are everywhere and are used for applications such as surveillance, airport security, military enforcement, and edge detection. Face recognition algorithms analyze images, extract information such as the shape, size and position of the facial features (e.g., eyes,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    Design of Cloud Computing Based MIS Model for Textile Industries

    Small and Medium Scale Textile Industries are working under intensive market pressure. This pressure forces the textile business to improve their Management Information System (MIS) and reduce expenses (Capex) in IT. IT technology are developing so fast, it is very difficult to keep update with IT by SME. In order...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    A Study on Task Scheduling Algorithms in Cloud Computing

    Cloud computing is a new computing model using which applications, data and IT services are provided over the Internet. Cloud computing shares data and offers service transparently among its users. With the increase in number of users of cloud the tasks to be scheduled increases. The performance of cloud depends...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    STEP-2 User Authentication for Cloud Computing

    Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. At present cloud user authentication can be done by several ways like password authentication, Graphical and 3D password etc. In...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    Deployment of Novel Techniques on Web Log Data to Analyze User Navigation Patterns

    The authors know that the amount of data available online is increasing day by day, the World Wide Web has becoming one of the most valuable resources for information retrievals and knowledge discoveries. Web mining technologies are the right solutions for knowledge discovery on the Web. Application of web usage...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    Security Enhancement Using SCTP Against Password Stealing in Multi-Homed Networks

    SCTP is a young transport layer protocol. It is designed for transferring public switched telephone network signaling over IP networks. SCTP provide improved security mechanism in addition with DTLS. Password stealing attack is the major problem in the web environment. Passwords are stolen by attackers using several methods. An attacker...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    A Trust Based Secure Source Routing Using Fuzzy Logic Rules Prediction in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links. It is a collection of independent mobile nodes that can communicate with each other via radio waves. These networks are fully distributed, and can work at any place without the help...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    Secure Routing in Mobile Ad-hoc Networks: A Survey

    In the current era of wireless network, popularity of MANET is increasing at a very fast pace. Reason for this increased attention is the wide range of multimedia applications running in an infrastructure less environment. Because of the infrastructure less environment, limited power and dynamic topology it becomes very difficult...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Functional Analysis of the Eucalyptus Private Cloud

    The paper addresses the methodology of deployment of a private cloud in enhancing the functional limits of cloud computation at constrained conditions of configuration. The investigation was performed in environment of well designed configuration in such a way that the load limits are controlled. The attempt reveals that there is...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Task Scheduling in Grid Computing Systems Constrained by Resource Availability

    In this paper, a survey of some of the approaches to task scheduling in grid computing systems based on resource availability is discussed. To improve task scheduling, resource availability can be predicted by multistate availability predictors. Execution time of each application is modeled by a random variable. Each application is...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Distributed Data Warehouse Architecture: An Efficient Priority Allocation Mechanism for Query Formulation

    Data warehouse is the repository where data for an enterprise is stored using a centralized approach. A data warehouse environment includes an Extraction, transportation, Transformation and Loading (ETL) solution, an On-Line Analytical Processing (OLAP) engine, client analysis tools, and other applications that manage the process of gathering data and delivering...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Review: Location Based Authentication to Mitigate Intruder Attack

    Recently the use of online banking has been increased to perform various online banking transactions. On the other hand, it is been targeted by various attacks found at the client side. Lately, traditional security methods were not capable enough to tackle these attacks such as intruder attacks, phishing attacks, etc....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Survey on Resource Allocation in Grid

    Resource allocation is a problem that arises whenever different resources, which have preferences in participating, have to be distributed among multiple autonomous entities. A distributed system is composed of such computers which are separately located and connected with each other through a network Resource allocation is a problem that arises...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Natural Language Interface to Database

    The need for natural language interfaces to database has become increasingly acute as more and more people access information from web browsers. Yet NLI (Natural Language Interface) is only usable if they map natural language questions to SQL queries correctly. Natural Language processing is becoming one of the most active...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Entropy-Based Similarity for Efficient Keyword Search In XML Databases

    With the rapid emergence of XML as a data exchange and data transfer medium over the Web, an effective keyword-based search approach to locate the relevant information is indeed essential. The major challenge with keyword-based search is to ensure that; it returns only the relevant results to the query, and...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Operating System as Service Using XEN Cloud

    Cloud computing provides a means to access IT service through a network. This paper can be used to effectively cut down infrastructure costs. In order to perform operations and run processes on multiple hardware systems, one would have to install the required operating systems in each of those systems. Cloud...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Providing Security for Database at Rest with Fine Grained Encryption

    Database is an important asset for any organization and there should be strong security measures to preserve the confidentiality of sensitive data. There are different levels of granularity for encryption. This paper focus on minimizing the overhead of encryption and decryption during query processing. These include encrypting the sensitive data...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    User Centric Access Control in Cloud Using Identity Management

    Having numerous login for many service providers brought an pathetic situation among many organizations in order to avoid verifying identity of each individual every time when they login the challenge to overcome the multiple accounts is by providing Identity as a Service (IaaS).The overall objective of security, private and trust...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    Design and Implementation of Computation Grid, Measure & Improve Performance Parameter:-A Survey

    The goal of this Paper is to develop Reliable Communication System in the Grid. The first initiative is to apply multi-casting features to this protocol & the algorithm for the same is developed. Then apply the algorithm on the Grid by using MPI (Message Passing Interface). Reduce the System call,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    Security Risks & Migration Strategy For Cloud Sourcing: A Government Perspective

    Governments of various countries all over the globe, irrespective of their economic & technological standing on the world stage, are realizing the benefits of cloud computing and devising strategies to migrate their IT systems to the Cloud, a trend also called Cloud sourcing. In this paper, the authors identify the...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Distributed Environment of Cloud for Supply Chain Management

    Cloud computing can give the ability of flexibly outsourcing software for supply chain collaboration and infrastructure needs in a better way. Instead of maintaining and paying for maximum use this technology puts forward the method that provides flexibility to add on the way, depending upon the overall business process and...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Intrusion-Tolerant Architecture for Mobile Adhoc Networks

    Now-a-Days, the use of Mobile Ad hoc NETworks (MANETs) has become very important communication medium through which several users communicate, large amount of information exchange including some mission critical applications, and as such security has become one of the major concerns in MANETs. Due to some unique characteristics of MANETs,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    IPv4 to IPv6 Shift: Major Challenges

    Today, the Internet Assigned Numbers Authority (IANA), The Regional Internet Registries (RIRs) have become depleted of IPv4 addresses. The ever-increasing popularity of internet and its simultaneous users has forced to the need of IPv6 addresses (with much larger address space) & its urgent usage & implementations. But the implementation .deployment...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Enriching Alert Analysis and Threat Evaluation Techniques in Network Situation Awareness (NSA)

    A network is a connection of devices, where each node (device) is said to have wired or wireless connection between them. And now a day's most of the threat comes to the network by either from outside or from a sort of situation which arises internally due to many reasons....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Economics of Cloud Computing

    In an attempt to gain a competitive edge, businesses are increasingly looking for new and innovative ways to cut costs while maximizing profits especially now that the world is experiencing economic downturn. Firms recognize that they need to grow and as a result are under pressure to save money. This...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Implementation of Multi-User FPGA Environment Over TCP/IP

    Optimizing the single target device as a simulator in a multi user environment is the authors' aim to achieve. It is important step to use FPGA to design and improve flow of multi user data in a high speed computer network environment. Hence, they create a system where multiple users...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    An Advanced OS Design for Pocket PC's Based on Wince 6.0

    The systems engineers designing personal communication products face issues that require a new approach to solve the balance act between end user perceived (GUI) performance and unnecessary applications developed on their products. In this paper, the authors approach a new trend in designing personal communication devices. The hardware is based...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Adopting Makov's Chain Queuing Model in Channel Allocation

    This paper proposes a novel approach to Dynamic Channel and Packet Assignment (DCPA) scheme to serve efficient circuit-switching in voice traffic and packet-switching for Internet traffic communications in wireless cellular networks. The DCPA, as a distributed-controlled scheme, assigns channels or packet-slots to handoff and new calls based on their traffic...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Overview of Attacks on Cloud Computing

    Cloud computing is currently one the most hyped IT innovations. Most IT companies announce to plan or (suddenly) already have IT products according to the cloud computing paradigm. Though cloud computing itself is still not yet mature enough, it is already evident that it's most critical flaw according to public...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Gateway Placement Approaches: A Survey

    Gateway placement is an important part of WMN design that determines how to place the gateways in WMN. Placing too many Gateways will, on one side improve the throughput and reduces congestion but on the other side increase interference and cost. So various approaches have been given by various researchers...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Development of Electrical Appliance Controlling System Using Bluetooth Technology

    The use of electronic controllers for controlling electrical home appliances can be found widely around the world especially in the developed countries. By time, wireless technology such as infrared light communication. This wireless technology is widely commercialized and can be found almost anywhere. Though appealing, it still has a weakness...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Facial Expression Recognition Using Fuzzy Inference System

    Within the last several years, recognition of human's facial expression has been very active research area of computer vision. It has the important role in the Human-Computer Interaction (HCI) systems. This paper proposes a novel fuzzy method for facial expression recognition on still images of the face. The new technique...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    An Efficient Secure AODV Routing Protocol in MANET

    An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a Mobile Ad-hoc NETwork (MANET). Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR are used....

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Features of WSN and Data Aggregation Techniques in WSN: A Survey

    Sensor networks consist of several sensor nodes which co-operatively send sensed data to base station. One of the critical constraints of sensor nodes is the power consumption requirement. Sensor nodes carry limited, generally irreplaceable, power sources. In real life scenario when these sensor nodes are deployed in any environment it...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    A Power Efficient Cluster-Based Data Aggregation Protocol for WSN (MHML)

    Wireless Sensor Networks (WSNs) is a network of an inexpensive low coverage, sensing, and computation nodes. The difference between the wireless networks and WSN is that sensors are sensitive to energy consumption. In design of routing protocols for WSN the energy saving is the crucial issue. Till today many protocols...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Modelling and Simulation of Voice Over Internet Protocol (VOIP)

    Real time voice transmission is now widely used over the Internet and has become a very significant application. Voice quality is still however an open problem due to the loss of voice packets and the variation of end-to-end delay packet transmission. These two factors are a natural result of the...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Deployment of Multiple Base Stations to Counter Effects of Black Hole on Data Transmission in Wireless Sensor Network

    In networking, black holes refer to places in the network where incoming traffic is silently discarded (or "Dropped"), without informing the source that the data did not reach its intended recipient. The black hole attack is one of the simplest routing attacks in WSNs. In a black hole attack, the...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Analysis of Web Mining and Evolving of User Profiles

    A good and effective Customer Relationship Management (CRM) needs clear understandings of customer requirements. The management should have up to date needs of the customers, and accordingly they should act. Gathering information about the web user (customer) profiles and analysis of the profiles is not so easy for the large...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2012

    Study and Design of Reactive Routing Protocols for Mobile Ad Hoc Networks

    A Mobile ad-hoc network is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures. These networks shows a new way of network establishment and these are well suited for an environment where either the infrastructure is lost or where deploy an infrastructure is...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Apr 2013

    STEP-2 User Authentication for Cloud Computing

    Cloud computing is one of today's most exciting technologies due to its ability to reduce cost associated with computing. This technology worldwide used to improve the business infrastructure and performance. At present cloud user authentication can be done by several ways like password authentication, Graphical and 3D password etc. In...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    Global Load Balancing and Fault Tolerant Scheduling in Computational Grid

    Grid computing is a replica of distributed computing that uses geographically and administratively different resources found on the network. These resources may include processing power, storage capacity, specific data, and other hardware such as input and output devices. In grid computing, individual users can access computers and data visibly, without...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    Cloud Vision Using MOCHA Architecture on Jelastic Cloud

    Face recognition applications that automatically identify an individual from captured images or Videos are everywhere and are used for applications such as surveillance, airport security, military enforcement, and edge detection. Face recognition algorithms analyze images, extract information such as the shape, size and position of the facial features (e.g., eyes,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    Design of Cloud Computing Based MIS Model for Textile Industries

    Small and Medium Scale Textile Industries are working under intensive market pressure. This pressure forces the textile business to improve their Management Information System (MIS) and reduce expenses (Capex) in IT. IT technology are developing so fast, it is very difficult to keep update with IT by SME. In order...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // May 2013

    A Study on Task Scheduling Algorithms in Cloud Computing

    Cloud computing is a new computing model using which applications, data and IT services are provided over the Internet. Cloud computing shares data and offers service transparently among its users. With the increase in number of users of cloud the tasks to be scheduled increases. The performance of cloud depends...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Nov 2012

    Online Data Back-up and Disaster Recovery Techniques in Cloud Computing: A Review

    Today, in electronic format data has been generated in large amount that required the data recovery services. The authors know that the cloud computing introduces a new type of computing platform in today's world. This type of computing will generates a large amount of private data on main cloud. Therefore,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Nov 2012

    A Review: Scheduling in Grid Environment

    Grid computing came into being and is currently an active research area. One motivation of Grid computing is to aggregate the power of widely distributed resources, and provide non-trivial services to users. To achieve this goal, an efficient Grid scheduling system is an essential part of the Grid. Rather than...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Dec 2012

    A Study on Security Challenges and Issues in Cloud Computing

    In this paper, the authors present a study on the challenges and issues of security in Cloud computing. First they look into the critical fifteen domains in Cloud security, namely Domain: Cloud Architecture to Domain 15: Virtualization. Then they analyze the cloud traditional best practice security solutions and the security...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    User Centric Access Control in Cloud Using Identity Management

    Having numerous login for many service providers brought an pathetic situation among many organizations in order to avoid verifying identity of each individual every time when they login the challenge to overcome the multiple accounts is by providing Identity as a Service (IaaS).The overall objective of security, private and trust...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    Design and Implementation of Computation Grid, Measure & Improve Performance Parameter:-A Survey

    The goal of this Paper is to develop Reliable Communication System in the Grid. The first initiative is to apply multi-casting features to this protocol & the algorithm for the same is developed. Then apply the algorithm on the Grid by using MPI (Message Passing Interface). Reduce the System call,...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    Security Risks & Migration Strategy For Cloud Sourcing: A Government Perspective

    Governments of various countries all over the globe, irrespective of their economic & technological standing on the world stage, are realizing the benefits of cloud computing and devising strategies to migrate their IT systems to the Cloud, a trend also called Cloud sourcing. In this paper, the authors identify the...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jan 2013

    Analysis of Servers - A Comparison on Cloud Elastic Server on Business Models

    Cloud computing offers Software-as-a-Service (SaaS) is beneficial to MNC corporations and industries, which wish to outsource software-related activities and use simple effort and low-cost software systems. The expected technological details are well represented in the contemporary literature. However, comprehensive understanding of AmazonEC2 as a business model servers persistent and highly...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Survey on Resource Allocation in Grid

    Resource allocation is a problem that arises whenever different resources, which have preferences in participating, have to be distributed among multiple autonomous entities. A distributed system is composed of such computers which are separately located and connected with each other through a network Resource allocation is a problem that arises...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Natural Language Interface to Database

    The need for natural language interfaces to database has become increasingly acute as more and more people access information from web browsers. Yet NLI (Natural Language Interface) is only usable if they map natural language questions to SQL queries correctly. Natural Language processing is becoming one of the most active...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Feb 2013

    Entropy-Based Similarity for Efficient Keyword Search In XML Databases

    With the rapid emergence of XML as a data exchange and data transfer medium over the Web, an effective keyword-based search approach to locate the relevant information is indeed essential. The major challenge with keyword-based search is to ensure that; it returns only the relevant results to the query, and...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Functional Analysis of the Eucalyptus Private Cloud

    The paper addresses the methodology of deployment of a private cloud in enhancing the functional limits of cloud computation at constrained conditions of configuration. The investigation was performed in environment of well designed configuration in such a way that the load limits are controlled. The attempt reveals that there is...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Mar 2013

    Task Scheduling in Grid Computing Systems Constrained by Resource Availability

    In this paper, a survey of some of the approaches to task scheduling in grid computing systems based on resource availability is discussed. To improve task scheduling, resource availability can be predicted by multistate availability predictors. Execution time of each application is modeled by a random variable. Each application is...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2012

    Enhancing Robustness of EC Cryptic Data using Forward Error Correction

    With the explosion of networks and the huge amount of data transmitted along, the data content needs to be secured. Data encryption ensures security in open networks such as the Internet. With the fast development of cryptography research and computer technology, the cryptosystems such as of RSA and Diffie-Hellman require...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2012

    Cloud Computing Support for Enhanced Health Applications

    Mobile devices are being considered as service platforms for mobile health information delivery, access and communication. However mobiles face challenges with regard to delivering secure multimedia based health services due to limitations in computation and power supply. Since mobile devices have limited computational capacity and run on small batteries; they...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2012

    An Approach to Clustering of Power Quality Events Data

    In this paper, the authors describe the, k-means clustering method applied to power quality event data. The data is collected by power monitors. This data thus supplied is used to generate a variety of reports such as the voltage drop, daily parameter report, etc. This project is an end to...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)

  • White Papers // Jul 2012

    Distributed Data Mining in the Grid Environment

    Grid computing has emerged as an important new branch of distributed computing focused on large-scale resource sharing and high-performance orientation. In many applications, it is necessary to perform the analysis of very large data sets. The data are often large, geographically distributed and its complexity is increasing. In these area...

    Provided By International Journal of Engineering and Innovative Technology (IJEIT)