International Journal of Engineering Research and Applications (IJERA)

Displaying 121-160 of 633 results

  • White Papers // Apr 2014

    Design of Multi-functional High frequency DDS using HDL for Soft IP core

    A multi-functional high-efficiency generation of spectrally pure, wide-band, multi-carrier waveforms is a key objective in modern communication and radar applications. A high-efficiency signal generator is a device that can output various types of signal waveforms, such as sine wave, saw tooth wave, square wave, triangle wave, trapezoidal wave and so...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    An optimal Reconfigurable Cross Bar Switch for Network On Chip Applications

    In this paper, the authors present the technique and method to develop a Reconfigurable Crossbar Switch (RCS) architecture for network processors. The main purpose of this paper is to increase the performance and flexibility of crossbar and reduce the excess power consumption. The method they proposed to reduce the power...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design of Arithmetic Unit for High Speed Performance Using Vedic Mathematics

    As many of know that the Computation unit is main unit of any science and technology, which perform different arithmetic operation like as addition, subtraction and multiplication etc. also in some places it perform logical operation such as add, or, invert, x- or etc. Multiplexer are extensively used in microprocessor,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design and Development of Remote Monitoring and Controlling System Based on Embedded Web Technology

    The application of remote monitoring and controlling systems is used to implement a monitoring and controlling system using ARM intelligent monitoring and controlling center which uses Samsung's processor (S3C6410) as its major controller. The environmental circumstances present within laboratory can be monitored using sensors and other devices are connected to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    AIDA Technique for Privacy Protection in Cloud

    Cloud is a relatively new concept and emerging technology. The information assurance, data protection, network security and privacy concerns have yet to be fully resolved. Cloud is offering different services to its users. Data sharing between two organizations is common in many application areas. Current data sharing and integration among...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    A Novel Topological Approach Using Transferable Belief Model for Distributed Data-Static Version

    In this paper, the authors explain adds transferable belief model to a multiagent distributed context using tree topology. Agent acting as a node collects data independently using graph with cycles. The cyclic structure better describes interaction among mobile units. Static scenario is been considered where agents provide data that do...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Document Clustering with Feature Selection Using Dirichlet Process Mixture Model and Dirichlet Multinomial Allocation Model

    To find the appropriate number of clusters to which documents should be partitioned is crucial in document clustering. In this paper, the authors propose a novel approach, namely DPMFS, to address this issue. The proposed approach is designed firstly to group documents into a set of clusters while the number...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Knowledge Acquisition Using Tree Based Machine Learning Model: A Survey

    Knowledge acquisition alone is not as good as when the authors combine it with machine learning, especially the tree based machine learning. The idea to use tree based machine learning is derived from the decision trees and connectionist approach. Knowledge acquisition is a well-known and upcoming field of computer science....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Querying XML Document using Relational Database System: A Survey

    XML is rapidly emerging being the eminent standard for representing data in the World Wide Web (WWW). High-level query engines that allow end users to effectively tap the data stored in XML documents will be crucial to exploiting the full power of XML. While there has been quite a lot...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Accelerating Product Time to Market Using PaaS and Automation Tool

    In today's product development environment, product and the technologies they're based on change rapidly, as do the number of competitors for market share. This means that time to market and finding ways of optimizing it are critical components that directly affect revenue. Organizations always make a systematic approach to reduce...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    A Survey on Performance Analysis for Optimization of Storage Reallocation Strategies in Cloud Environment

    In cloud computing environment, resource allocation strategies are used to improve overall system utilization and data replication is used to improve the data access this environment is used by most of IT industries to meet their high computational requirement with reduce cost. To achieve this, efficient resource allocation strategies are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Study of Clusterization Methods for Random Data

    Clustering is the process of grouping data object. Data sets within a cluster should be similar and data sets outside the cluster should be dissimilar. It is the commonest form of unsupervised learning i.e. learning from raw data. Data mining is a knowledge discovering process. Clusters are formed as a...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Impact on Mixed Attribute Data Set

    Missing data are question without answer or variables without observation. Missing data can be treacherous because it is difficult to identify the problem. Numerous industrial and research database include missing values. It is not uncommon to encounter database that have up to half of the entries missing making it very...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Using K-Means and FCM in Cloud Environment

    Cloud computing provides large scale computing resource to each customers. Cloud systems can be threatened by numerous attacks as cloud provides services to no trustworthy system. Cloud needs to contain intrusion detection system for protecting system against threads. If IDS is having stronger security using more rules or patterns then...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Deploying an Application on Cloud and Its Security

    Cloud computing is a model of storing the data transmitted across the network. For all the Organization security of data is the serious concern in cloud computing. There is the number of services available in the cloud computing such as IaaS, PaaS, and SaaS. By using these services the authors...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Deployment of Application and Review of Different Encryption Algorithm for Cloud Computing

    Security in the cloud computing is a vital issue and it is a most evolving area and it is very much accepted by most of the organization. There are number of services available in cloud computing with the help which the authors can develop and deploy their own application on...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Study and Implementation of Private Cloud

    In today's era everyone knows the importance of cloud computing. Everyone wants to access their system from anywhere, they want to access their important files and application efficiently whether they have access to their system or not. Millions of people are storing their files into cloud storage so they can...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Priority Based Assignment of Shared resources in RTOS

    A Real Time Operating System (RTOS) is a system that allows completing the task in predictable timing constraints. RTOS have several characteristics such as multitasking, preemption, priority, predictable task synchronization, priority inheritance and known behavior. The major problem of RTOS is critical section problem. In RTOS, it is difficult make...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Implementation of Low Cost VoIP Media Stream Encryption Device Using Linux

    Internet telephony refers to communications services like voice, facsimile, and/or voice-messaging applications that are transported via the Internet, rather than the Public Switched Telephone Network (PSTN). The basic steps involved in originating an Internet telephone call are conversion of the analog voice signal to digital format and compression/translation of the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Data Publishing in M-Privacy Using Anonymization and Randamization Method

    In this paper, the authors' focus is on the study of data mining is the extraction of interesting patterns or knowledge from huge amount of data. The goal of data mining is to extract knowledge from data. In recent years, with the explosive development in Internet, data storage and data...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Online Virtual App with Onion Routing

    Online shopping is a form of electronic commerce which allows consumers to directly buy goods from a seller over the internet using android phones. This paper deals with developing an e-commerce website for online different types of products. It provides the user with a catalog of different types of products...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Security Enhancement in Cloud Computing Using Triple DES Encryption Algorithm

    Cloud computing provides easy accessibility of the data from anywhere all the time. Due to the availability of the data over the cloud it is easy for every user to access the data. The user can also store the sensitive data so the security is the matter of concern of...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Database Forensic Analysis Using Log Files

    Most organization and company maintain their business related data in database system. The misuse of data within database system may cause consequences for company. Intruders are both unauthorized user and insider privileged users. It is difficult to detect high privileged user's misuse of database within organization. Database contains the number...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Cloud Based Collaboration Tool

    Cloud computing is a computing paradigm, where a large pool of systems are connected in private or public networks, to provide dynamically scalable infrastructure for application, data and file storage. It is a technology that uses the internet and central remote servers to maintain data and applications. It allows consumers...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Ontology Based Approach for Domain Specific Semantic Information Retrieval System

    In today's era, there is rapid growth of resources in the Internet. Therefore, improving the information retrieval technology has become important. The existing information retrieval technique is based on the keywords search. In keyword based system most of the times, irrelevant information is retrieved. It consumes more time than required....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Review of Semantic Web, Annotation Methods and Automatic Annotation for Web Search Results

    Now-a-days, the use of web search engines is very frequent and common worldwide over the internet by end users for different purposes. The basic aim of this web search engines is that to take the query request from the end user and execute that query on relational database used to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Modern Graph Databases Models

    Graph database models are increasingly a topic of interest the database area. The representation of data in the form of a graph lends itself well to structured data with a dynamic schema. This paper goes over current applications and implementations of graph databases, giving an overview of the different types...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

    Mobile cloud is a new emerging technology which can be used to enable users to enjoy abundant multimedia applications in a pervasive computing environment. Therefore, the scheduling of massive multimedia flows with heterogeneous QoS guarantees becomes an important issue for the mobile cloud. Generally, the predominant popular cloud-based scheduling algorithms...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Object Based Data Storage System for Cloud Using DHT and TPDSS With a Self-Destructing Data

    Now-a-days, cloud computing the every user having personal data stored in the cloud may contain account numbers, passwords, notes, and other important personal or official information that could be used or misused by a hacker, a competitor or a wrong person. These types of data or information of user are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Load Rebalancing in Clouds

    In distributed file systems, nodes simultaneously serve computing and storage functions, a file is partitioned into a number of chunks allocated in distinct nodes so that application data processing tasks can be performed in parallel over the multiple nodes. Here, every node plays the same role and perform same computation...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Comparative Analysis of Pattern Taxonomy Model used in Text Mining with respect to different Application Domains

    In the last decade, many data processing techniques are planned for mining helpful patterns in text documents. However, how effectively use associate degreed update discovered patterns remains an open analysis issue, particularly within the domain of text mining. Existing system is used term-based approach for extracting the text. Pattern evolution...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Creating Materialized View over the Integration of Heterogeneous Databases

    In E-Business, distributed information needs to be integrated or interoperated to provide the unique view of information from disparate sources. When the authors design the relevant databases dependently, it does not create heterogeneity problems to integrate the data sources. However, when databases have been designed independently, there are heterogeneity problems...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Hardware and Software Co-Design for Wireless Fire Fighting System

    Technological growth in modern era leads to varied protection against fire based disasters for people, property and business even though fire fighting still remains area of concern. Fire fighting though being a dangerous profession needs a fire extinguishing system that can be easily implemented, used and with minimum investment. This...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Mobile Search Browser

    Web service is a popular standard to publish services for users. However, diversified users need to access web service according to their particular preferences. Mobile search is quite different from standard PC-based web search in a number of ways: the user interfaces and I/O are limited by screen real state;...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Link Prediction in Temporal Mobile Database

    The rapid development of wireless and web technologies has allowed the mobile users to request various kinds of services by mobile devices at anytime and anywhere. The services which are provided to the wireless mobile devices (such as PDAs, cellular phones, and laptops) from anywhere, at any time using ISAP...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Secret Sharing Schemes: A Review

    The technique to hide a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe, and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is important too. Consider, the users...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks Using Identity-Based Short Signature Scheme

    Wireless reprogramming in a Wireless Sensor Network (WSN) is the process of uploading a new code image or relevant commands to sensor nodes or changing the functionality of existing code. As a WSN is usually deployed in hostile environments, so for security reasons every code update must be authenticate to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Analysis on MPTCP Combining Congestion Window Adaptation and Packet Scheduling for Multi-Homed Device

    Evolution of use of wireless technologies in laptops and mobile terminals, which are equipped with several network interfaces, has provided users to take advantage from multi-homing to access network services anywhere, at any time and from any network. Advantage with multi-homed host is that some of the traffic from more...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    An Efficient Private Search Technique Using SADS Algorithm

    The ability to securely share sensitive information between untrusting parties is a prerequisite for many real-world applications. There exist many large collections of private data that must be protected on behalf of the entities that hold them or the clients they serve. For example, two intelligence agencies might be willing...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Apr 2014

    Design an Algorithm for Vertical Handover In Heterogeneous Network

    A heterogeneous network is consisting of different wireless access standards. For seamless data transfer a Vertical Hand-Off (VHO) plays a major role. Vertical Hand-Off decision (VHO) is totally based upon Received Signal Strength (RSS) measurements. Hand-Off (HO) decision is made individually without considering other HO User Equipments (UE). User mobility...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    A Study of DDOS Attacks, Tools and DDOS Defense Mechanisms

    This paper proposes a study of distributed denial-of service attacks and a study of the defense mechanism that strive to counter these attacks. The attack illustrate do using both known and potential attack mechanisms along with this classification the authors discuss important feature .So each attack category that in turn...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    A Comparative Performance Analysis of Clustering Algorithms

    Clustering is an adaptive procedure in which objects are clustered or grouped together, based on the principle of maximizing the intra-class similarity and minimizing the inter-class similarity. Various clustering algorithms have been developed which results to a good performance on datasets for cluster formation. This paper analyze the three major...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Elements of Dynamic Programming in Sorting

    Dynamic programming is an effective algorithm design method. Sorting is believed to be an unusual area for dynamic programming. The authors' finding is contrary to this conventional belief. Though it appears that classical sorting algorithms were designed using bottom up design approach, but they have found the evidence which suggests...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Secure Authentication & Key Exchange Technique for IEEE 802.16e by Using Cryptographic Properties

    Many sophisticated authentication and encryption techniques have been embedded into IEEE 802.16 but it still facing a lot of challenging situations. Authentication process is a key to secure access in wireless network ; the security sub layer of IEEE802.16 employs an authenticated client server key management protocol in which the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Implementation of Secure Master Using Modified Twofish Algorithm in FPGA Devices

    In this paper a novel VLSI architecture of the modified Twofish block cipher is presented. Twofish is one of the most secure cryptographic algorithms. The characteristic features of the Twofish Algorithm are good security margin, fast encryption/decryption in software, moderately fast in hardware and moderate flexibility. Designed Twofish cryptographic algorithm...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Modeling of Land Mobile Satellite Systems Using LCR and AFD

    In this paper a multi-state model is developed for land mobile satellite systems, based upon measurements in an urban environment at 1.8 GHz, using Nakagami distribution. Multi-state models can yield more accurate fading amplitude time series than can single state models. Here pdfs have been derived using the second order...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    A New Approach to Diffie-Hellman Key Exchange Algorithm

    Diffie-hellman was the first published public key algorithm that is used for secure key exchange mechanism. The purpose of algorithm is used to enable users to security exchange a key that can be used for subsequent encryption. This cryptographic problem ensure A (resp. B) that no other participants aside from...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Aug 2011

    Comparative Analysis of Fiber Optic Voice Link Using Intensity Modulation in Commercially Available Optical Fibers

    Communication is the method by which two persons can share any meaningful information with each other at an instant. It requires a sender who wants to communicate, message which is to be conveyed & receiver who receives this message at the receiver end. Now a days due to the advancements...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Analysis of System Errors in Real-Time Propagation of Signals in L - Band Phased Array Radar

    NARL has active array radar which has been designed, developed and tested at 1280 MHz. This system comprises of planar microstrip patch antenna array fed by solid-state TransReceiver (TR) modules, Two-Dimensional (2- D) passive Beam Forming Network (BFN) and direct IF Digital Receiver (DRx). Errors are the common factors that...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    GSM and GPS Based Vehicle Location and Tracking System

    A vehicle tracking system combines the installation of an electronic device in a vehicle, or fleet of vehicles, with purpose-designed computer software to enable the owner or a third party to track the vehicle's location, collecting data in the process. Modern vehicle tracking systems commonly use Global Positioning System (GPS)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    An Automatic Frequency Planning of GSM Networks Using Evolutionary Algorithms

    The last few years have seen a tremendous demand for wireless services. Service providers have to accommodate this rapid growth on their existing networks as well as make plans for new networks. Therefore, there is a need for a cell planning and frequency planning tools incorporating optimization techniques to assist...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Sep 2011

    Design and Implementation of CRC Code Generator Based on Parallel Execution Method for High Speed Wireless LAN

    In networking environments, the Cyclic Redundancy Check (CRC) is widely utilized to determine whether errors have been introduced during transmissions over physical links. In this paper, the authors focus on the CRC calculation in WLAN where the packet size is huge and hence slow CRC calculation may become bottleneck for...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Design Simulation and Implementation of Embedded System Based Dual Horn Using Wireless Technology

    Noise pollution due to excessive honking on expressways is on an increase due to the impulsive and at times errant behavior of drivers. Besides it is difficult at times due to various factors to completely avoid honking in the no honking zones. These factors contribute to the noise-pollution and at...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    A Two-Way Spam Detection System with a Novel E-Mail Abstraction Scheme

    E-mail communication is indispensable now-a-days, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2013

    Identity Verification of Newborn Using Biometrics

    A proper identity verification system for newborns is a requisite in the current scenario. The various crimes against newborns' like illegal adoptions (intentionally, accidentally); missing, swapping and child trafficking are on a rise. The proposed system uses biometrics to prevent such acts by using the footprint trait of the newborn....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Personal Identification and Verification Using Multimodal Biometrics

    In this paper, the authors present an overview of the fundamentals of personal authentication based on hand geometry measurements and palm print features. Researchers have used some complex methods or algorithms like Quadratic Spline function of Wavelet transform (QSW), voronoi diagram, Gaussian Mixture Model (GMM), Radial Basis Function neural networks...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Different Techniques to Transfer Big Data: A Survey

    Now-a-days the world is moving around the social networks, i.e. most of the people are interacting with each other via internet only. Transmitting data via the Internet is a routine and common task for users today. Transferring a gigabyte of data in an entire day was normal; however, users are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Mobile Personal Firewall-Design

    In this paper, the authors will discuss the issues on the design of a mobile personal firewall framework. Under this framework, the Home Agent (HA) will act as the centralized controller for the firewall, and the Mobile Nodes (MN) will be protected by the Access Routers (AR) that they are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Prevention of Black Hole Attack Using AOMDV

    A Mobile Ad-hoc NETwork (MANET) is a dynamic wireless network that can be formulated without the need for any pre-existing infrastructure in which each node can act as a router. One of the main challenges of MANET is the design of robust routing protocol that adapt to the frequent and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Keystroke Biometric for User Authentication - A Review

    Keystroke biometrics for user authentication uses the behavioral typing pattern of a user and authenticates him. As the authors all know computers have become a ubiquitous part of the modern society. Everybody uses computers in one or other way. Computer is often used together with the space force they are...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Impact of Data Distribution on Response Time in Telecom Databases

    Centralized databases are becoming bottlenecks for physically distributed organizations. They carry the disadvantages of high communication cost and high data retrieval time. The emerging distributed database technology promises increased availability, reduced cost and improved response time. However, this area needs to research many issues before implementation. Data fragmentation and allocation...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    A Survey On Cloud Networking

    Cloud computing is one of the evolving technology in today's era. It has changed the whole view that distributed computing, grid computing and parallel computing used to present. In the past few years cloud computing has grown widely and becomes the part of the IT industry, because it offers reliability,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Cloud Information Sharing and Accountability Using Logging and Auditing Techniques

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Hosting Services by Cloud Computing

    Cloud computing is basically an Internet-based network made up of large numbers of servers - mostly based on open standards, modular and inexpensive. Clouds contain vast amounts of information and provide a variety of services to large numbers of people. The benefits of cloud computing are reduced data leakage, decrease...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Secure Scheme for User Authentication and Authorization in Android Environment

    Providing ultimate security in sensitive transaction and communication of online premium application is still a question mark of standardization in the area of networking and security. It has been seen that currently majority of the authentication and authorization techniques are usually designed on the top of One Time Password (OTP)...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Security as a Service

    As more and more enterprises are deploying their software systems in the cloud environment, cloud security is becoming a mainstream area of information technology. The cloud applications are usually large scale and include a lot of distributed components. This paper makes it imperative to employ an efficient security strategy. Also,...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Wireless Sensor Network Using Zigbee

    Zigbee is a specification for a suite of high level communication protocols. Zigbee is a typical wireless communication technology. Zigbee uses low rate, low-power digital radios based on an IEEE 802 standard for personal area networks. The technology defined by the Zigbee specification is intended to be simpler and less...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    An Approach towards Optimization of Enterprise Network and Firewall Environment

    The authors must admit that there information technology is the most vital part of most of the business operational environment where the companies performs immense information transaction from workstations to workstations, from servers to servers, and from LAN to WAN. So an optimized, planned and secure Information and communication system...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Client Honeypot Based Malware Program Detection Embedded Into Web Pages

    In today's world where internet is hosting major resources of this world, the malware programs embedded into web pages have become a severe threat in today's internet which launches the client side attacks by exploiting the browser based vulnerabilities. With the improvement of software security, vulnerabilities based attacks declined whereas...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    A Novel Approach to Cloud Computing Security Over Single to Multi Clouds

    The usage of cloud computing has increased speedily in the society. Cloud computing presents many benefits in terms of accessibility of data and low cost. A main characteristic of the cloud services is that users' data are usually processed remotely in unknown machines that users do not operate. It can...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Mar 2012

    Wireless Fidelity (Wi-Fi) - Threats and Security

    Wi-Fi is very popular technology as it allows various electronics devices to exchange data wirelessly over computer network or internet connection. This paper explains about various threats to wireless networks, How hackers makes most use of it and what are the security steps one should take to avoid becoming victim...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Secure Level Transmission in Wi-Fi Using Cryptography

    Wi-Fi is a mechanism that allows electronic devices to exchange data wirelessly over a computer network Wi-Fi suggests Wireless Fidelity, resembling the long-established audio-equipment classification term Hi-Fi or High Fidelity. This paper first gives some background information about Wi-Fi system and security issues in ad hoc networks, and then it...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Security Providing To Wireless Sensor Networks by Presence of Location Monitoring Systems

    Due to technological advances in sensor technologies, wireless sensor networks are widely used for location monitoring. In such systems monitoring personal locations is done through Internet server. As the server is untrusted, it may cause threats pertaining to privacy of individuals being monitored. This paper is the potential risk to...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    An Efficient Security Mechanism for Data Reporting In Wireless Sensor Networks

    Wireless sensor networks consist of a large number of small sensor nodes having limited computation capacity, restricted memory space, limited power resource, and short-range radio communication device. In these scenarios, sensor networks may suffer different types of malicious attacks. The adversaries can inject false data reports via compromised nodes and...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Cross-Layer Based Secure Routing In Manets

    The security of wireless networks has been a constant topic in the recent years. With the advance of wireless networks, building reliable and secure communication is becoming extremely important. Security is an essential requirement in Mobile Ad-hoc NETworks (MANETs) to provide protected communication between mobile nodes. In this paper, the...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    VNC Viewer Authentication and Security Using Remote Frame Buffer Protocol

    Virtual Network Computing (VNC) is remote control software which allows the user to view and fully interact with one computer desktop using a simple program on another computer desktop anywhere on the Internet. The two computers don't even have to be the same type, so for example the user can...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Oct 2013

    Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms

    Cloud computing is the next generation architecture, which focuses on IT enterprise, through which potentiality on delivery of services in an infrastructure is increased. By the means of cloud computing investing in new infrastructure, training new personnel and licensing new software descends. It offers the massive storage to the users....

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Improving Login Authorization by Providing Graphical Password (Security)

    Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Jul 2011

    A Review on Ecommerce Security

    The rapid evolution of computing and communication technologies and their standardizations have made the boom in e-commerce possible. Lowering of the cost of operation, increase in the speed of transactions, and easy global reach to customers and vendors have been the reasons for the overwhelming popularity of this new way...

    Provided By International Journal of Engineering Research and Applications (IJERA)

  • White Papers // Dec 2013

    Security in Virtual Private Networks

    There is an increasing demand nowadays to connect to internal networks from distant locations. Employees often need to connect to internal private networks over the Internet (which is by nature insecure) from home, hotels, airports or from other external networks. Security becomes a major consideration when staff or business partners...

    Provided By International Journal of Engineering Research and Applications (IJERA)