International Journal of Engineering Trends and Technology

Displaying 1-40 of 410 results

  • White Papers // Aug 2014

    BFO Based Optimized Positioning For Black Hole Attack Mitigation in WSN

    Wireless sensor networks are always susceptible to attacks by malicious behavior of external adversary which could negatively affect the secured routing and QoS and hence, vital wireless applications. In recent times, a lot of severe attacks have been proposed which make such networks highly vulnerable. One such attack is black...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    NOC Architecture Comparison with Network Simulator NS2

    The current density integration in integrated circuits can have quite complex SoCs. Problems of interconnections between IP blocks become a critical point that current communication structures are no longer able to solve. These problems are mainly related to the notion of QoS becomes an important concept ensuring maximum reliability. Thus,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    On Nano Regular Generalized and Nano Generalized Regular Closed Sets in Nano Topological Spaces

    In this paper, the authors define and study a new class of sets called Nano regular generalized and Nano generalized regular closed sets in nano topological spaces. Basic properties of nano regular generalized closed sets and nano generalized regular closed sets are analyzed. The authors also used them to introduce...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Two-Call Index Based Internet Traffic Sharing Analysis in Case of Cyber Crime Environment of Computer Network

    While there are many benefits from the Internet, it has also become a powerful tool in the hands of those wishing to engage in criminal activities. Cyber crime encompasses any criminal act dealing with computers and networks, due to huge Internet traffic load every service provider want to capture much...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Comparative Study of Revised FP - Growth, Weighted Apriori and Fuzzy Apriori Algorithm

    Association rule mining is considered as one of the crucial step in finding the frequent itemsets, for the purpose of extracting association rules from high voluminous relational databases. Many algorithms were developed to find the frequently occurred Itemsets. The association rules were considered as better, since they are useful at...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Multi Purpose and Efficient Data Transferring FPGA Based Applications

    In this paper, the author's design of an asynchronous FPGA blocks is implemented with power optimization techniques. Concentrated on standby and dynamic power consumptions are presented and studied on various gating techniques. The existing techniques are standby power is reduced by using autonomous fine grain power gating and reducing the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Multilink Constrained k-means Clustering Algorithm for Information Retrieval

    Clustering is traditionally viewed as an unsupervised method for data analysis. However, in some cases information about the problem domain is available in addition to the data instances themselves. In this paper, the popular k-means clustering algorithm can be profitably modified to make use of information with available instances is...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Joint Estimation of Spectral Envelope and Fundamental Frequency for Speech Signals

    The speech synthesis applications demand effective modeling of speech signals. Such speech modeling techniques require the squared magnitude response (spectral envelope) of the vocal tract and the pitch period (fundamental frequency) of its input excitation to be estimated accurately. Logically as both spectral envelope and fundamental frequency are inter-related, an...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Multi-Feature Based Speech Emotion Recognition

    In this paper, the authors deal with the use of multi features for speech emotion recognition. They analyze the tradeoff among the different combination of features for the efficient recognition rate. The method of multi-feature combination is to make recognition rate more accurate but by increasing the computational complexity. In...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Secrecy Conserving Sociable Network Communication against Mutual Friend Attacks and Structural Attacks

    Critical concern on secrecy storage will communicate sociable networks and have been elevated for unique secrecy in latest years. There exists much secrecy conserving works that can deal with different attack models. In this a new attack model and refer it as a mutual friend attack and knob info and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Signal Transmission through Selection Combining Diversity Technique in Multiple Input Multiple Output Systems

    Selection combining diversity technique of combining two or more signals in such a manner that the signal with the largest signal to noise ratio is selected first and this kind of diversity technique is generally used to eradicate long term fading. The rayleigh fading model has been discussed. The definition...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    A Secure Dual Encryption Scheme Combined With Steganography

    In this paper a new encoding scheme is proposed which combines encryption and steganography thereby ensuring secure data exchange. Encryption hides the confidential information for the purpose of security, by converting the data in to an unintelligible form and steganography hides the data in medias like image, video, audio etc...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Enhanced Steganography Algorithm to Improve Security by using Vigenere Encryption and First Component Alteration Technique

    Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. In recent years many steganography methods have been challenge by steganalysis. Steganalysis algorithm which detects the stego - message by the static analysis of pixel values. In the proposed method, the secret...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Routing Overhead in MANET - Minimization with Multipath Local Route Discovery Routing Protocol

    MANET: a Mobile Ad-hoc NETwork, is a collection of autonomous system, with frequent mobility, can be set anywhere dynamically on the existing network structure. The connections were made by wireless links presented. They are based on the wireless connection, arbitrarily changing topology, and distributed architecture and deployment defects. Mobile ad...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2014

    Fuzzy Rule Based Vertical Handoff Decision Strategies for Heterogeneous Wireless Networks

    The 4th generation wireless communication systems goal is to provide continuous connection to users for access various wireless technologies and to have the connection with the best network which provides the best quality of service. The authors need best decision making algorithm which can decide which one is best network...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Implementation of TPA and Data Integrity in Cloud Computing using RSA Algorithm

    Cloud infrastructure has been envisioned as the next-generation construction of IT Initiative. It passages the application software and databases to the integrated large data hubs, where the administration of the data and services may not be fully trustworthy. This exceptional prototype brings about many new security challenges, which have not...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Efficient Pattern Mining and Prediction of User Behavior in Mobile Commerce

    Mobile commerce has received a lot of interests from both of the industry and academia. A framework called mobile commerce explorer for mining and prediction of mobile user's movements and purchase transactions under the context of mobile commerce, consists of three major components, Similarity Inference Model (SIM), personal mobile commerce...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    An Approach for Controlling Faults in Wireless Sensor Networks Using Clustering

    Fault control and tolerance in WSN is a challenging problem because of limited energy, bandwidth, and computational complexity. While facing numerous threats these severely resource constrained nodes are responsible for data collection, data processing, localization, time synchronization aggregation and data forwarding. One of the effective approaches to control and tolerate...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Approaches for Enhancing the Performance and Security of Mobile Ad Hoc Networks

    In past few decades the wired network has been migrated to wireless network. The mobility and scalability of wireless network made it possible in many applications. The next stage of advancement was Mobile Ad hoc NETwork (MANET). As compared to the other wireless networks that need a centralized node, fixed...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    QoS Analysis in Mobile Ad-hoc Networks Using Routing Protocols

    It is proposed to analyze the usefulness of Bandwidth Reservation Protocol (BRP) for mobile ad-hoc networks in improving the Quality of Service (QoS). There are two types of bandwidth reservation protocols namely, priority based and scheduling based. In this simulation the priority based bandwidth reservation protocols are used. These are...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    An Implementation of Security Cloud for Cloud Computing Data as a TPA

    Cloud computing is considered next generation architecture of IT enterprise for computing. Cloud is nothing but the internet. 5 years ago people the authors were store data local machine with system security but day-by-day security of data is increasing and new modification data is also increase, now peoples are storing...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption

    As more sensitive data is shared and stored by third-party sites on the internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level. Attribute based encryption is a public-key-based one-to-many...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    A Review of Clustering Protocols in Wireless Sensor Networks

    Protocols are more beneficial in power saving. In cluster-based routing, a cluster head is selected to approximate the data received from root nodes and forwards the information to the base station. In Wireless Sensor Networks (WSNs), minimizing the power consumption of available resources is great issue remain unsolved. To save...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Efficient Network Reorganization to Reduce Delay in Data Collection

    Wireless sensor network consists large numbers of wireless sensor nodes. Nodes are used to collect information from their sensing areas. In this paper, efficient network reorganization to reduce delay in data collection is proposed. The objective is to reduce the delays in the data collection processes of wireless sensor networks....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Comparative Study of MAC Layer Protocols in Wireless Sensor Networks: A Survey

    Wireless Sensor Networks (WSN) is the collection of many small size low cost, battery operated sensor nodes distributed over the targeted region to collect the information of interest. The authors can say these networks can be a fruitful solution for many applications such as target tracking, intrusion detection etc. Whenever...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Effective CAN Controller Design for Highly Secured Applications

    Controller Area Network (CAN) was initially created by German automotive system supplier Robert Bosch in the mid-1980s for automotive applications as a method for enabling robust serial communication. In this paper, the main intention is to provide security mechanism which keeps the bus utilization as low as possible. The goal...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    An Empirical Model of Network Traffic Classification for Identifying Anonymous Behavior

    Optimizing the internet traffic is always an important research issue in the field of network traffic classification, although various approaches available for minimizing the traffic over heads during the network traffic, they are not optimal. In this paper, the authors are proposing an optimized classification approach for internet traffic by...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    An Introduction to Wireless Communication

    Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. Wireless communications is becoming more essential than ever in today's modern society and access to information and knowledge will be of crucial differences between success and failure. The authors have...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Overview of Microwave and Infrared Transmission Systems for Short Distance Network Connections

    In this paper, the authors evaluate the advantages of both microwave and infrared technology and examine some crucial issues where each technology provides added value. Both microwave and infrared transmission systems are use for short distance network connections. They need line-of-sight and have its merits and demerits. The evaluation of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Analysis of Bandwidth Recycling in IEEE 802.16 Network Using PSA, RB-RFA & HSA

    IEEE 802.16 network protocol is designed to provide a Worldwide interoperability for Microwave Access (WiMAX). Due to limited bandwidth and an expensive radio spectrum available for communication, it is necessary to use one bandwidth more than one time in a same network when it became unused. For that purpose \"Bandwidth...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    An Implementation of Predictive Hotset Identification and Analysis in Social Networks

    Social networks platforms where people build connections, share interests, activities, links, different resources, tweets, and reviews about the things etc. These are web based services which provide means for interaction over internet through instant messaging and sharing of resources. As so many different services are collectively provided by single platform...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Bluetooth Secure Simple Pairing Personal Area Network Countermeasure DOS Middle Attack

    The other device to communicate with a primary option is Bluetooth devices as more types. Bluetooth technology and associated devices such companies, service attacks, man-in-the-middle attack, deny the message of revival and resource misappropriation as general wireless networking dangers, hot blood. DoS Middle Attack (DoSMA) between the physical layer of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    An Efficient Dynamic Channel Assignment Scheme for OWDM Based Radio-Over-Fiber Optical System

    In 3G cellular networks, high data-rates can be achieved. However, fundamental capacity limitation still exists. Call requests are frequently blocked in hotspot areas. Load balancing among cells helps to solve this problem and to utilize the radio resources. Some schemes are not flexible enough or even practical for such networks....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    High Efficient Li-Fi and Wi-Fi Technologies in Wireless Communication by Using Finch Protocol

    Li-Fi or optical Wi-Fi, Li-Fi technology is the milestone in the history of wireless communication. In the past few years Wi-Fi have gained a lot of popularity, this technology comes to be ten times cheaper than the Wi-Fi and also much safer, because regardless of access control systems and passwords....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Data transmission using Secure Protocol for Spontaneous Wireless Ad Hoc Networks

    Ad-hoc wireless network is an infrastructure less network, i.e. there is no centralized coordination for the network operations. As and when a new node comes in the vicinity of the network it will spontaneously form the network. This paper presents data transmission using a secure protocol for spontaneous wireless ad...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Using Apriori with WEKA for Frequent Pattern Mining

    Knowledge exploration from the large set of data, generated as a result of the various data processing activities due to data mining only. Frequent pattern mining is a very important undertaking in data mining. Apriori approach applied to generate frequent item set generally espouse candidate generation and pruning techniques for...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Cryptography: A Useful and Widely Used Tool in Today's Engineering Security

    Encryption is a useful and widely used tool in security engineering today. It involved the use of codes and a cipher to transform information into unintelligible data. This paper presents a systematic approach for data encryption. Ad-hoc networks that communicate between the nodes of the network using basic server client...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Novel Solutions for Initial Cluster Means Problem for K-Mean Algorithm

    K-means algorithms are used in various applications there are some categories of the clustering algorithm. K-means algorithm is part of the one of clustering method partitioning, K-means algorithm generally is used for the grouping of the data, and it is use in various fields like gene data, banking data and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    Quintessence of Existing Testbeds for Wireless Sensor Networks

    Research activities in the area of WSNs need expositive performance statistics about scenario, systems, protocols, gathered data and applications. The objective of this contribution is to present an epitome on currently available testbeds for wireless sensor networks. The statistics gathered from this experimental tool can be realistic and convenient, and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jun 2014

    A Review on Classical and Modern Encryption Techniques

    Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Often the objectives of information security cannot solely be achieved through mathematical algorithms and protocols alone, but require procedural techniques and abidance of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    Performance of Ethernet Protocol Conversion on an Arm-7 Embedded Processor

    This paper designed a research on real web access functionality is embedded in a device to enable low cost widely accessible and enhanced user interface functions for the device. A web server in the device provides access to the user interface functions for the device through a web page. A...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    An Enhanced Framework for Performing Pre-Processing On Web Server Logs

    Now, peoples are interested in analyzing log files which can offer valuable insight into web site usage. The log files shows actual usage of web site under all circumstances and don't need to conduct external experimental labs to get this information. This paper describes the effective preprocessing of access stream...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    A Confidentiality Proof Wandering - Protocol in Mobile Networks

    This method highlights a novel scheme of Hierarchical ID-based wandering protocol in wireless network or MANET for shielding confidentiality of the wandering user. The protocol uses dual-layer hierarchical ID-based cryptosystem in which a trusted party acts as the root authority, each domain server acts as the second-layer authority, and the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Apr 2012

    Soft Handoff in Mobile Networks

    In power controlled CDMA systems soft handoff is preferred over hard handoff strategies. This is more pronounced when the IS-95 standard is considered wherein the transmitter power is adjusted dynamically during the operation. The previous and the new wide band channels occupy the same frequency band in order to make...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Performance Evaluation of Spectrum Sensing and Channel Access in Cognitive Radio Networks

    Spectrum sensing is an essential functionality of cognitive radio networks. In the existing Cognitive Radio spectrum detection techniques secondary nodes base their channel access decisions solely on the outcome of the spectrum sensor without taking into consideration the possibility that those outcomes are incorrect. To alleviate these negative effects a...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    A Novel Approach of Multilevel Binary Image Encoding Using Walsh Table and Spiral Scanning

    In this paper, the authors proposed a method of image encoding technique in a new formulated way. During transmission image is encoded in two phases for the enhancement of security. In the first phase encoding is done using Walsh table and in the second phase by using spiral scanning based...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2011

    A Review of Load Balanced Routing Protocols in Mobile Adhoc Networks

    A wireless Mobile Ad hoc NETwork (MANET) is an infrastructure-less mobile network which is based on radio to radio multi-hoping and has no centralized controller or a fixed router. All nodes are capable of movement and can be connected dynamically in an arbitrary manner. Due to the dynamic nature of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2013

    Desired EEG Signals for Detecting Brain Tumor Using LMS Algorithm and Feedforward Network

    In Brain tumor diagnostic EEG is the most relevant in assessing how basic functionality is affected by the lesion. EEG continues to be an attractive tool in clinical practice due to its non invasiveness and real time depication of brain function. But the EEG signal contains the useful information along...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2012

    Analysis of Blocking Probability in a GSM Based Cellular Network System

    In this paper the authors check the performance of a GSM cellular communication system by using FDMA - TDMA system. In the present paper they evaluate the performance of the blocking probability, spectral efficiency and the bit error rate by using the specific model. By using this they try to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2012

    Data-driven Link Estimation and Routing in Sensor Network

    Link properties in 802.11b mesh networks and dense wireless sensor networks have been well studied. They have observed that wireless links assume complex properties, such as wide range non-uniform packet delivery rate at different distances, loose correlation between distance and packet delivery rate, link asymmetry, and temporal variations. The authors'...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Mar 2012

    Scalable and Distributed Mobile Underwater Wireless Sensor Networks for Oceanographic Applications

    Large-scale mobile Underwater Wireless Sensor Network (UWSN) is a novel networking paradigm to explore aqueous environments. However, the characteristics of mobile UWSNs, such as low communication bandwidth, large propagation delay, floating node mobility, and high error probability, are significantly different from ground-based wireless sensor networks. The novel networking paradigm poses...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    RFID-Based Mobile Robot Positioning - Sensors and Techniques

    Mobile robot navigation using analog signal strength of a Radio Frequency IDentification (RFID) device is a promising alternative of different types of robot navigation methods in the state of the art. Skilled navigation in mobile robotics usually requires solving two problems: the knowledge of the position of the robot, and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Dec 2011

    A Study on Auto Theft Prevention Using GSM

    This paper deals with the design & development of a theft control system for an automobile, which is being used to prevent/control the theft of a vehicle. The developed system makes use of an embedded system based on GSM technology. An interfacing mobile is also connected to the microcontroller, which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    Analysis of Leakage Reduction Technique on Different SRAM Cells

    Leakage components is very important for estimation and reduction of leakage power, especially for low power applications. This provides the motivation to explore the design of low leakage SRAM cells. High leakage currents in deep submicron regimes are becoming a major contributor to total power dissipation of CMOS circuits as...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    An Overview on Privacy Preserving Data Mining Methodologies

    Recent interest in the collection and monitoring of data using data mining technology for the purpose of security and business-related applications has raised serious concerns about privacy issues. For example, mining health care data for the detection of disease outbreaks may require analyzing clinical records and pharmacy transaction data of...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2011

    Model-Based Programming of Intelligent Embedded Systems Through Offline Compilation

    Many recent and future space missions point to the need for increased autonomy in spacecraft with an emphasis on more capable fault diagnostic systems. The most widely used fault diagnostic systems are rule-based. Rule-based systems have quick response to events and clearly present to engineers the predefined reactions to events....

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2011

    GPS User Position Using Extended Linearization Technique

    The position of a GPS receiver can be determined by obtaining pseudoranges from a minimum of four different GPS satellites. The measured ranges do not represent the true ranges as the signal coming from a GPS satellite will be contaminated by various errors like Ephemeris error; Propagation error in the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    Model-Driven Performance for the Pattern and Advancement of Software Exhaustive Systems

    Model-Driven Engineering (MDE) is an advance to widen software systems by build models and pertaining robotic alteration to them to finally make the execution for a intention platform. Although the main focus of MDE is on the creation of code, it is also essential to bear the study of the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Oct 2011

    Power Quality Disturbances and Protective Relays on Transmission Lines

    Power quality concerns the effect of voltage disturbances on end-user equipment and of current disturbances on network components. Power system protection concerns the detection of faults in the system from measured voltages and currents. However, non-fault voltage and current disturbances may lead to the inadvertent detection of a fault in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    SNTP Driven Event Management to Control Audio/Video/Buzzer Events by Using Streaming Media Player

    This paper proposes a compact time sharing system for home use applying the simple Network Time Protocol. The compact SNTP server/client system for home appliances like audio, video buzzer controls, etc., has been developed as an extension of an SNTP client application. The newly developed system can obtain the time...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jan 2012

    Effective Placement and Selection Approaches for Network Services

    Network services are provided by means of dedicated service gateways, through which traffic flows are directed service placement problem, which takes into account traffic engineering considerations. Rather than trying to minimize the Length of the traffic flow routes, the authors take advantage of these routes in order to enhance the...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Improved Apriori and KNN Approach for Virtual Machine Based Intrusion Detection

    Now-a-days, as information systems are usually more accessible to the world wide web, the advantage of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) that based on sophisticated algorithms as an alternative to current signature-base detections are really in demand. Intrusion detection is one of network security...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Web Application Vulnerability Analysis Using Robust SQL Injection Attacks

    SQL Injection Attacks is one of the most serious threats in the security of database driven applications. An SQL injection attack focuses on interactive web applications that employ database services. These applications accept user inputs and use them into form SQL statements at runtime. In the SQL injection attack, an...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    A Novel Paradigm: Detection & Prevention of Wormhole Attack in Mobile Ad Hoc Networks

    This paper emphasized to propose and develop a scheme for the prevention of wormhole attack from intermediate and surrounding threads. In wireless ad hoc networks, it is difficult to detect wormhole attacks because malicious nodes impersonate legitimate nodes. Various issues including security, legitimacy and node concurrency still persist in mobile...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Analysing an Industrial Automation Pyramid and Providing Service Oriented Architecture

    Industrial automation platforms are experiencing a paradigm shift. New technologies are making their way in the area, including embedded real-time systems, standard local area networks like Ethernet, Wi-Fi and ZigBee, IP-based communication protocols, standard Service Oriented Architectures (SOAs) and Web Services. The introduction of these new technologies raises important problems...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Adaptive Classifier and Associative Algorithms for Phishing Detection

    Phishing serves as a social engineering crime generally known as impersonating a trusted third party to gain access to private data. Data Mining (DM) Techniques might be a very useful methodology for identifying and detecting phishtank phishing websites. Using this proposed system, the authors present a novel approach to overcome...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    An Advanced Honeypot System for Efficient Capture and Analysis of Network Attack Traffic

    A honeypot is an information system resource used to divert attackers and hackers away from critical resources as well as a tool to study an attacker's methods. One of the most widely used tools is honeyd for creating honeypots. The logs generated by honeyd can grow very large in size...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Encryption Technique With Data- In-Motion for Hybrid Database

    Rapid growth in the automation gives rise to emergence of the database having different flavors. Taking consideration of various domains; Database is the most important component in the world of software. As today's world is moving on the factors of dependant on the other technology or with other organization which...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2012

    Network Intrusion Detection System Based on Feature Selection and Triangle Area Support Vector Machine

    As the cost of the data processing and Internet accessibility increases, more and more organizations are becoming vulnerable to a wide range of cyber threats. Most current offline intrusion detection systems are focused on unsupervised and supervised machine learning approaches. Existing model has high error rate during the attack classification...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Jul 2012

    A Secured Requirement Engineering Approach in Online Shopping System

    Requirement engineering has always occupied a primal position in software engineering."If one get the requirement correct, the people are very close to getting the software correct", has been an accepted fact. Many principles and techniques have been proposed for efficient requirement gathering and these have been validated and applied in...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2012

    Collaborative Filtering and Random Forest Classification Algorithm for PROBE Attacks Detection in a Network Classification

    During the past few years huge amount of network attacks have been increased the requirement of efficient network intrusion detection techniques for detecting attacks. In the existing approach, different classification techniques are used for identifying various real time network attacks using data mining. However, most of the algorithms fail to...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Aug 2012

    A Traceability Approach in Software Creation by DM

    In present environment software engineering integrates with data mining. Data Mining(DM) works as good decision support system in software tools. Now, the authors discuss about navigation patterns source code tracing design. Static navigation shows constant navigation patterns. Through Static navigation every time execution flow takes same time and identifies same...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Processor Technological Advancement

    During the last decade Intel has introduced several technologies for different generation processors. Different architectures are added featuring enhanced energy efficiency, power management, affordable performance, fast execution, multitasking demands, optimized multithreading, CPU performance boost, higher data throughput, improved virtualization performance, smart security. This paper provides insight into recently added technologies...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Performance Analysis of Weighted Load Balanced Routing Protocol With Ad Hoc On-Demand Distance Vector

    This paper describes about WLBR (Weighted Load Balanced Routing Protocol) and its performances are analyzed with AODV. The simulation results shows that this proposed protocol outperforms well than the AODV. The main performance metrics used here are throughput, node remaining energy, packet delivery ratio, energy consumed and routing delay. A...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // Sep 2012

    Application Layer Based Packet Analysis and Intrusion Detection

    Network forensics is basically a new approach when it comes to the network information security, because the IDS and firewall cannot always discover and stop the misuse in the whole network. This proposed work is used to capture and analyze the data exchanged among the many different IP traceback techniques...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    False Data Detection Using Trusted Group Membership Service

    Wireless sensor networks are vulnerable to many types of security attacks, including false data injection, data forgery, and eavesdropping. Sensor nodes can be compromised by intruders, and the compromised nodes can distort data integrity by injecting false data. The transmission of false data depletes the constrained battery power and degrades...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Detection of Explosives Using Wireless Sensor Networks

    Automatic detection of explosives using wireless sensor networks monitors and tracks the IEDs that are placed by terrorists at public environments. The area under study is monitored in real time, collect data by the sensor and send to the processor which process the data and compares with the database and...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    Detection and Prevention of Congestion Attacks and Packet Loss Using Piggyback Methods in Wireless Network

    Network security involves the authorization of access to data in a network, which is controlled by the network administrator. In this paper, the authors investigate the problem of packet loss over the wireless communication and the congestions that are taken place. To prevent the packet loss, they propose the idea...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    A Hybrid Biometric Authentication Algorithm

    A facial recognition system is a computer based application for automatically identifying or verifying a person from a digital image. One of the ways to do this is by comparing the selected facial features from the image and a facial database. Some facial recognition algorithms identify faces by extracting landmarks,...

    Provided By International Journal of Engineering Trends and Technology

  • White Papers // May 2012

    A New Entropy Encoding Algorithm for Image Compression Using DCT

    Digital images contain large amount of information that need evolving effective techniques for storing and transmitting the ever increasing volumes of data. Image compression addresses the problem by reducing the amount of data required to represent a digital image. Image compression is achieved by removing data redundancy while preserving information...

    Provided By International Journal of Engineering Trends and Technology