International Journal of Scientific and Research Publication (IJSRP)

Displaying 1-40 of 100 results

  • White Papers // Dec 2014

    Network Intrusion Detection on CPU GPU System

    With the great increase in the usage of computer networks, the risk of having this network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS)....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    Data Centric Based Routing Protocols for Wireless Sensor Networks: A Survey

    Sensor networks are quite different from traditional networks in different ways: sensor networks have severe energy concerns, redundant low-rate data, and many-to-one flows. Routing protocols developed for other ad hoc networks cannot be applied directly in WSN because of the energy constraint of the sensor nodes. Data-centric technologies are needed...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    Resource Cost Prediction and Comparison System for Cloud Consumers to Achieve Cost Effective Uses

    Cloud computing or in shorthand just the \"Cloud\", is a pool of resources, software and information that are accessed over a network (Internet). Cloud provides services based on \"Pay for what the user use\" principle i.e., pay for only those resources used for a particular time. The information and services...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    Enhancing Data Mining Techniques for Secured Data Sharing and Privacy Preserving on Web Mining

    Algorithms for assigning anonymous IDs are examined with respect to threshold between communication and computational requirements. The new algorithms are built on top of a secure sum data mining operation using Newton's identities and Sturm's theorem. The enhancing data techniques are used in the user database for secure their database...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    A Comparative Analysis on Encryption and Decryption Algorithms

    In this modern world of communications, cryptography has an important role in the security of data transmission and is the best method of data protection against passive and active fraud. Cryptography is an algorithmic process of converting a plain text or clear text message to a cipher text or cipher...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    A Study on Intrusion Detection System Against DDOS Attack in MANET

    Mobile Ad-hoc NETwork (MANET) is one of the most important fields for development of wireless network. A mobile ad hoc network is an autonomous collection of mobile devices like laptops, mobiles, sensors, etc. MANET is an emerging technology and has great strength to be applied in critical situations in military...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Apr 2014

    A Prevention of DDOS Attacks in Cloud Using NEIF Techniques

    In recent years, most of the organizations in the world have increasingly realized the importance of cloud platforms. The cloud computing is one of the developing segmenting of IT industry as well as a promising concept to the end users. However cloud computing has more applications but there are many...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Apr 2014

    A Linux Based Content Management System

    A Content Management System (CMS) is computer program or a system administrator tool that allows publishing, editing and modifying content as well as maintenance from a central interface. Such systems of content management provide procedures to manage work flow in a collaborative environment. The core function and use of content...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Mar 2014

    An Appraisal to Overhaul Database Security Configurations

    It is reckoned that amount of information is rapidly increasing and engendering magnitude of database to be increased further. Security engineering is a vital aspect in the database management systems, since database is being targeted incessantly for vulnerability to invade sensitive data. Cherishing the database from security threats necessitates maintaining...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Mobile Monitoring and Inquiry System Using Fingerprint Biometrics and SMS Technology

    In this paper the authors described a mobile monitoring and inquiry system using the fingerprint biometrics and Short Message Service (SMS) technology. It was specifically developed for the monitoring of preschoolers' attendance during their schooling, which is beneficial to the working parents. The system adopted the Rational Unified Process (RUP),...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Survey on Requirements and Approaches of Business Process Repositories

    Business processes manifest the business knowledge and related logics. As it becomes more common for organizations to describe their operations in terms of business processes, it is necessary to establish a business process repository to manage thousands of process models while providing capabilities for effective sharing and reusing of valuable...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Embedded Web Server with Data Security for Wireless Sensor Networks

    Sensor network has quick installation, dynamic configuration features. Security of the data in the wireless sensor network has become a critical issue. As the applications are increasing, privacy preservation is an important issue in wireless sensor network. Depending on the nature of the installment of the network and the data...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Analysis on Big Data Over the Years

    Big data is characterized by increasing volume and velocity of data. IBM estimates that every day 2.5 quintillion bytes of data are created - so much that 90% of the data in the world today has been created in the last two years. The traditional data-intensive sciences such as astronomy,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Understanding the Cloud: Towards a Suitable Cloud Service

    With the rapid development of databases and data storage technology, the cloud has emerged as a significant aspect of now-a-days businesses. This embraces the necessity of the distinction between the cloud services and deployment models in order to obtain a service that fits the user demands. This paper provides current...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    QR Based Advanced Authentication for All Hardware Plateform

    In this paper the authors seem quite obvious that now-a-days the authors are able to do transactions, shopping, banking, sharing and storing confidential data like other online services which aims to highly secured. The design and implementation of QR is easy to use and read, combined with multifactor (ID/password which...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks

    Use of Online Social Networking sites (OSNs) has become ubiquitous now-a-days. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper the authors analyze the influence of the social media...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2013

    Development of Private Cloud

    Cloud computing is a major change, caused by the underlying commoditization of IT. It is expected to see a future dominance of the open source model in cloud computing, which will solve the major adoption concerns for users. Even a small private cloud built on the authors' college intranet gives...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2013

    Survey Paper On Cloud Computing

    Everyone has an opinion on what is cloud computing. It can be the ability to rent a server or a thousand servers and run a geophysical modeling application on the most powerful systems available anywhere. It can be the ability to rent a virtual server, load software on it, turn...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    Enhanced Security Evaluation and Analysis of Wireless Network Based on MAC Protocol

    All pre-RSNA methods fail to meet their security goals and are deprecated except for open system authentication after that RSNA comes in the picture. This paper evaluates why pre-RSNA methods fail for providing security to wireless networks. This analysis is necessary to migrate to RSNA and making more highly secure...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    A Co-Operative Cluster Data Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in MANET's

    MANETs are very popular because of its infrastructure less network. These mobile nodes serve as both hosts and routers so they can forward packets on behalf of each other. It has restricted computing resources and due to mobility of node there is much change in network topology. These restrictions raise...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    An ASCII Value Based Text Data Encryption System

    Encryption is a process of generating secret text from the input text using a secret key and an encryption algorithm. Input text is referred to as plain text and the secret text generated is known as cipher text. Encryption algorithms are mainly divided into two categories which are symmetric key...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    Use of Data Mining Methodologies in Evaluating Educational Data

    Currently, online learning has gained a huge recognition within the higher education context and it has become a vital need in the current society to find such improvements, to increase the level of knowledge in people. In the modern society e-learning is recognized highly where it connects the students with...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Energy Aware Data Aggreagation Technique in WSN

    Wireless sensor networks consist of sensor nodes with sensing, communicating, computing & storage with battery capacity. Data aggregation is a process or scheme to eliminate redundant transmission & provide fused information to base station which improves energy efficiency & network, lifetime of energy constrained WSN. In this paper, the authors...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Secure Cloud Storage with Controlled Data Access Assured Deletion and Data Forwarding

    A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality and to reduce data management costs. However, the authors must provide security guarantees for the outsourced data. They...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    A Survey of Various Workflow Algorithm in Cloud Environment

    Cloud computing is a technology that uses the internet and the central servers to maintain data and resources. Cloud computing allows consumers and businesses to use the applications without installing and access their personal files at any computer with the help of internet. The users request for available services according...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Collaborative Writing SupportTools on the Cloud

    Managing writing activities and providing feedback to students is very labor intensive and academics often opt out of including such learning experiences in their teaching. The authors describe the architecture for a new collaborative writing support environment used to embed such collaborative learning activities in engineering courses. iWrite provides tools...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    A Survey on Security of Data Outsourcing in Cloud

    Cloud computing enables on-demand access to shared resources. It lets to use files and applications over the internet. This technology uses both the internet and the central servers to maintain data and resources. Many organizations uses cloud computing services to outsource their data into cloud environment for location independent resource...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    SQL Support Over MongoDB Using Metadata

    New requirements are arising in environments where the authors have higher volumes of data with high operation rates, agile development and cloud computing. In recent years, a growing number of companies have adopted various types of non-relational database, commonly referred to as NoSQL database. This reflects the growing interactivity of...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Enabling for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

    In this paper, the authors propose a upper-bound privacy leakage constraint based approach to identify which intermediate datasets need to be encrypted and which do not, so that privacy preserving cost can be saved while the privacy requirements of data holders can still be satisfied. To identify and encrypt all...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Vehicle Security System Using Zigbee

    The security system has become one of the key factors in car manufacturing as the demand from the buyer. This paper is to secure and monitor the car based on combination of Zigbee system, Peripheral Interface Controller (PIC) 16F877A microcontroller, vibration sensor, temperature sensor and micro switch. In order to...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    A New Method for Biometric Based Recognition

    Biometric based recognition is the science of identifying or verifying the identity of a person based on physiological and or behavioral characteristics. Biometric recognition offers many advantages over traditional PIN number or password and token-based (e.g., ID cards) approaches. A biometric trait cannot be easily transferred, forgotten or lost, the...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Port Knocking System Using Unilateral Authentication Algorithm

    It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. The authors examine ways to construct an authentication service to achieve this goal. Taking into consideration the strengths and weaknesses of existing port knocking designs...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Access Control in Cloud Computing

    Cloud computing is an advanced emerging technology. In this world the storage of data is a big headache for all. Cloud computing is an efficient solution for the easiest and fastest storage and retrieval of data. The main issue in cloud computing is security. Here, the author trying to introduce...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Enhanced Packet Dissembling Schemes for Selective Jamming Attacks Prevention in Wireless Networks

    Wireless networks provide wide range of services which is never so easy by any other medium, its mode of working tends it to have many security breaches. In modern era of communication trillions of profitable vital information is available on internet and they are accessible through this open medium. Such...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Security of Network Using Ids and Firewall

    An Intrusion Detection System (IDS) detects intruders that is, unexpected, unwanted or unauthorized people or programs on computer network. An IDS is used to determine if a computer network or server has experienced an unauthorized intrusion. An IDS works like a burglar alarm system. If it detects a possible intrusion,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Rules Extraction in XML Using Correlation

    As the amount of digital information on the internet grows it is more and more critical to retrieve information from semi-structured documents. Also the data returned as answers to queries may not give interpretable knowledge. Therefore the concept of association rule mining is introduced in XML data-structure. Even if it...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Channel Coding Using LFSR Based Symmetric Cryptography

    Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Providing Security for the Building Using Ant Colony Optimization Technique

    To describe the approach of real-world activities the authors have proposed an idea by using ACO technique for providing security to the building and building can be bank, parliament house, prime minister's house, ambani's house etc. In this paper they are providing the security to the building and if any...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    A Protocol for Peer-Peer System to Provide Anonymity

    Peer-To-Peer (P2P) systems can be used to share files, telephony, discussion forms, and streaming media. In anonymity Peer-To-Peer (P2P) networks, many systems try to mask the identities of their users for privacy considerations. Existing anonymity approaches like onion routing, tor, and crowd are mainly path-based: peers have to pre-construct an...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    File Sharing System

    The authors know that what is cost of storing the data on servers and again retrieving the same data. It is only suitable for paid users. Through their paper they are going to reduce cost of this data storage and retrieval process and it will be beneficial for normal users....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    Network Intrusion Detection on CPU GPU System

    With the great increase in the usage of computer networks, the risk of having this network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS)....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    Data Centric Based Routing Protocols for Wireless Sensor Networks: A Survey

    Sensor networks are quite different from traditional networks in different ways: sensor networks have severe energy concerns, redundant low-rate data, and many-to-one flows. Routing protocols developed for other ad hoc networks cannot be applied directly in WSN because of the energy constraint of the sensor nodes. Data-centric technologies are needed...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2012

    Next Generation of Internet Protocol for TCP/IP Protocol Suite

    "The internet has instantly evolved into a vast global network in the growing technology. TCP/IP protocol is the basic requirement for the recent time Internet. In TCP/IP proposed a security enhancement. This enhancement adds three modules. These are security policy, security control and data link layer. Security policy belongs to...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Enhanced Packet Dissembling Schemes for Selective Jamming Attacks Prevention in Wireless Networks

    Wireless networks provide wide range of services which is never so easy by any other medium, its mode of working tends it to have many security breaches. In modern era of communication trillions of profitable vital information is available on internet and they are accessible through this open medium. Such...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Security of Network Using Ids and Firewall

    An Intrusion Detection System (IDS) detects intruders that is, unexpected, unwanted or unauthorized people or programs on computer network. An IDS is used to determine if a computer network or server has experienced an unauthorized intrusion. An IDS works like a burglar alarm system. If it detects a possible intrusion,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Rules Extraction in XML Using Correlation

    As the amount of digital information on the internet grows it is more and more critical to retrieve information from semi-structured documents. Also the data returned as answers to queries may not give interpretable knowledge. Therefore the concept of association rule mining is introduced in XML data-structure. Even if it...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Channel Coding Using LFSR Based Symmetric Cryptography

    Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Providing Security for the Building Using Ant Colony Optimization Technique

    To describe the approach of real-world activities the authors have proposed an idea by using ACO technique for providing security to the building and building can be bank, parliament house, prime minister's house, ambani's house etc. In this paper they are providing the security to the building and if any...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    A Protocol for Peer-Peer System to Provide Anonymity

    Peer-To-Peer (P2P) systems can be used to share files, telephony, discussion forms, and streaming media. In anonymity Peer-To-Peer (P2P) networks, many systems try to mask the identities of their users for privacy considerations. Existing anonymity approaches like onion routing, tor, and crowd are mainly path-based: peers have to pre-construct an...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    File Sharing System

    The authors know that what is cost of storing the data on servers and again retrieving the same data. It is only suitable for paid users. Through their paper they are going to reduce cost of this data storage and retrieval process and it will be beneficial for normal users....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Implementation of Multifactor Authentication System for Accessing Cloud Service

    Authentication is an important process in any system to verify whether someone is in fact. In any type of computer network such as private or public, authentication needs username and password. Password is a secrete key to verify the person is authentic. When user wish to use a system, first...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Providing Data Protection as a Service in Cloud Computing

    Data protection in cloud has become an unavoidable and tremendously increasing technology. Many multinational organizations are interested in cloud computing and its wonderful features but they are worried about the security, privacy and availability of data as it rest in the cloud. As more and more sensitive information are centralized...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    The Rabin Cryptosystem & Analysis in Measure of Chinese Reminder Theorem

    Cryptography is the practice and study of techniques for secure communication in the presence of third parties. The necessity and the fact that exchanged messages are exposed to other people during the transmission promoted the creation of encryption systems, enabling just the recipients to interpret the exchanged information. In this...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    A Heuristic Approach for the Detection of Malicious Activity at Autonomous System

    On the internet, an autonomous system is the unit of router policy which is also sometimes referred to as a routing domain. An autonomous system is assigned a globally unique number called Autonomous System Number (ASN). The investigators and network operators have recently identified that the high profile autonomous systems...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Validating a Document using XML Languages

    XML files are developed for people to be easily read and edit. They are also useful for data exchange among different systems and different applications. Validation of a document plays a very important role and also solves a number of important issues when working with XML and XML related technologies....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Mobile Monitoring and Inquiry System Using Fingerprint Biometrics and SMS Technology

    In this paper the authors described a mobile monitoring and inquiry system using the fingerprint biometrics and Short Message Service (SMS) technology. It was specifically developed for the monitoring of preschoolers' attendance during their schooling, which is beneficial to the working parents. The system adopted the Rational Unified Process (RUP),...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Vehicle Security System Using Zigbee

    The security system has become one of the key factors in car manufacturing as the demand from the buyer. This paper is to secure and monitor the car based on combination of Zigbee system, Peripheral Interface Controller (PIC) 16F877A microcontroller, vibration sensor, temperature sensor and micro switch. In order to...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    A New Method for Biometric Based Recognition

    Biometric based recognition is the science of identifying or verifying the identity of a person based on physiological and or behavioral characteristics. Biometric recognition offers many advantages over traditional PIN number or password and token-based (e.g., ID cards) approaches. A biometric trait cannot be easily transferred, forgotten or lost, the...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Port Knocking System Using Unilateral Authentication Algorithm

    It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. The authors examine ways to construct an authentication service to achieve this goal. Taking into consideration the strengths and weaknesses of existing port knocking designs...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Mar 2014

    An Appraisal to Overhaul Database Security Configurations

    It is reckoned that amount of information is rapidly increasing and engendering magnitude of database to be increased further. Security engineering is a vital aspect in the database management systems, since database is being targeted incessantly for vulnerability to invade sensitive data. Cherishing the database from security threats necessitates maintaining...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Survey on Requirements and Approaches of Business Process Repositories

    Business processes manifest the business knowledge and related logics. As it becomes more common for organizations to describe their operations in terms of business processes, it is necessary to establish a business process repository to manage thousands of process models while providing capabilities for effective sharing and reusing of valuable...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Distributed Metadata Management Scheme in HDFS

    A Hadoop Distributed File System (HDFS) is designed to store very large data sets reliably and to stream those data sets at high bandwidth to user applications. Metadata management is critical to distributed file system. In HDFS architecture, a single master server manages all metadata, while a number of data...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    An Effective Fraud Detection System Using Mining Technique

    Detection of fraud in e-commerce payment system or \"An effective fraud detection system using mining technique\" is some more related to Mobile computing. Usage of credit card has increased. As the authors know credit card has become the most popular mode of payment. Customers can easily purchase goods through online....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Priority Page Content Rank by Web Search Result using the Rank Improvement

    The problem of finding relevant documents has become much more difficult due to the return a large number of web pages generally in the form of ranked list data on the WWW. This paper increases the users' searching time to find the desired information within the search results, while in...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Join Query Optimization in Distributed Databases

    As the data is increasing day-by-day, it is becoming more complex to store the more data on a single site. Data on a single site also suffers from many problems such as the storage limitations, site failure. Query optimization is to use the best plan for the query that improves...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Optimized Resource Allocation in Cloud Environment Based on a Broker Cloud Service Provider

    Cloud computing provides on-demand services with high performance in a flexible manner. Fast and easy deployment, scalability and service-oriented architecture are its main features. It promises substantial cost reduction together with flexibility than the traditional IT operations. Service provider's offers substantial amount of services with different performance characteristics. A Broker...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    A Secure and Synchronized Cloud Ecosystem for Students Academics and Professional Records

    Cloud computing refers to computing with a focus of virtualized computer networks or resources and application services by improving the utilization of data centre and data resources. In the existing system, it has been analyzed that the risks and availability of student's academic records and information are very likely to...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Fault Tolerant Distributed Meeting using Cloud

    Exploiting full potential of mobile computing is difficult because of the problems such as resource scarcity, mobility, frequent disconnections. To conquer these issues Mobile cloud computing can be used. Because of the mobile nature of the devices fault-tolerance is a highly important aspect in a mobile cloud, even more than...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Embedded Web Server with Data Security for Wireless Sensor Networks

    Sensor network has quick installation, dynamic configuration features. Security of the data in the wireless sensor network has become a critical issue. As the applications are increasing, privacy preservation is an important issue in wireless sensor network. Depending on the nature of the installment of the network and the data...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Analysis on Big Data Over the Years

    Big data is characterized by increasing volume and velocity of data. IBM estimates that every day 2.5 quintillion bytes of data are created - so much that 90% of the data in the world today has been created in the last two years. The traditional data-intensive sciences such as astronomy,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    Enhanced Security Evaluation and Analysis of Wireless Network Based on MAC Protocol

    All pre-RSNA methods fail to meet their security goals and are deprecated except for open system authentication after that RSNA comes in the picture. This paper evaluates why pre-RSNA methods fail for providing security to wireless networks. This analysis is necessary to migrate to RSNA and making more highly secure...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    A Co-Operative Cluster Data Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in MANET's

    MANETs are very popular because of its infrastructure less network. These mobile nodes serve as both hosts and routers so they can forward packets on behalf of each other. It has restricted computing resources and due to mobility of node there is much change in network topology. These restrictions raise...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    An ASCII Value Based Text Data Encryption System

    Encryption is a process of generating secret text from the input text using a secret key and an encryption algorithm. Input text is referred to as plain text and the secret text generated is known as cipher text. Encryption algorithms are mainly divided into two categories which are symmetric key...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Energy Aware Data Aggreagation Technique in WSN

    Wireless sensor networks consist of sensor nodes with sensing, communicating, computing & storage with battery capacity. Data aggregation is a process or scheme to eliminate redundant transmission & provide fused information to base station which improves energy efficiency & network, lifetime of energy constrained WSN. In this paper, the authors...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Access Control in Cloud Computing

    Cloud computing is an advanced emerging technology. In this world the storage of data is a big headache for all. Cloud computing is an efficient solution for the easiest and fastest storage and retrieval of data. The main issue in cloud computing is security. Here, the author trying to introduce...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Understanding the Cloud: Towards a Suitable Cloud Service

    With the rapid development of databases and data storage technology, the cloud has emerged as a significant aspect of now-a-days businesses. This embraces the necessity of the distinction between the cloud services and deployment models in order to obtain a service that fits the user demands. This paper provides current...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    QR Based Advanced Authentication for All Hardware Plateform

    In this paper the authors seem quite obvious that now-a-days the authors are able to do transactions, shopping, banking, sharing and storing confidential data like other online services which aims to highly secured. The design and implementation of QR is easy to use and read, combined with multifactor (ID/password which...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks

    Use of Online Social Networking sites (OSNs) has become ubiquitous now-a-days. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper the authors analyze the influence of the social media...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2013

    Development of Private Cloud

    Cloud computing is a major change, caused by the underlying commoditization of IT. It is expected to see a future dominance of the open source model in cloud computing, which will solve the major adoption concerns for users. Even a small private cloud built on the authors' college intranet gives...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2013

    Survey Paper On Cloud Computing

    Everyone has an opinion on what is cloud computing. It can be the ability to rent a server or a thousand servers and run a geophysical modeling application on the most powerful systems available anywhere. It can be the ability to rent a virtual server, load software on it, turn...

    Provided By International Journal of Scientific and Research Publication (IJSRP)