International Journal of Scientific and Research Publication (IJSRP)

Displaying 1-40 of 92 results

  • White Papers // Apr 2014

    A Prevention of DDOS Attacks in Cloud Using NEIF Techniques

    In recent years, most of the organizations in the world have increasingly realized the importance of cloud platforms. The cloud computing is one of the developing segmenting of IT industry as well as a promising concept to the end users. However cloud computing has more applications but there are many...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Apr 2014

    A Linux Based Content Management System

    A Content Management System (CMS) is computer program or a system administrator tool that allows publishing, editing and modifying content as well as maintenance from a central interface. Such systems of content management provide procedures to manage work flow in a collaborative environment. The core function and use of content...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Mar 2014

    An Appraisal to Overhaul Database Security Configurations

    It is reckoned that amount of information is rapidly increasing and engendering magnitude of database to be increased further. Security engineering is a vital aspect in the database management systems, since database is being targeted incessantly for vulnerability to invade sensitive data. Cherishing the database from security threats necessitates maintaining...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Survey on Requirements and Approaches of Business Process Repositories

    Business processes manifest the business knowledge and related logics. As it becomes more common for organizations to describe their operations in terms of business processes, it is necessary to establish a business process repository to manage thousands of process models while providing capabilities for effective sharing and reusing of valuable...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Mobile Monitoring and Inquiry System Using Fingerprint Biometrics and SMS Technology

    In this paper the authors described a mobile monitoring and inquiry system using the fingerprint biometrics and Short Message Service (SMS) technology. It was specifically developed for the monitoring of preschoolers' attendance during their schooling, which is beneficial to the working parents. The system adopted the Rational Unified Process (RUP),...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Embedded Web Server with Data Security for Wireless Sensor Networks

    Sensor network has quick installation, dynamic configuration features. Security of the data in the wireless sensor network has become a critical issue. As the applications are increasing, privacy preservation is an important issue in wireless sensor network. Depending on the nature of the installment of the network and the data...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Analysis on Big Data Over the Years

    Big data is characterized by increasing volume and velocity of data. IBM estimates that every day 2.5 quintillion bytes of data are created - so much that 90% of the data in the world today has been created in the last two years. The traditional data-intensive sciences such as astronomy,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Understanding the Cloud: Towards a Suitable Cloud Service

    With the rapid development of databases and data storage technology, the cloud has emerged as a significant aspect of now-a-days businesses. This embraces the necessity of the distinction between the cloud services and deployment models in order to obtain a service that fits the user demands. This paper provides current...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    QR Based Advanced Authentication for All Hardware Plateform

    In this paper the authors seem quite obvious that now-a-days the authors are able to do transactions, shopping, banking, sharing and storing confidential data like other online services which aims to highly secured. The design and implementation of QR is easy to use and read, combined with multifactor (ID/password which...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks

    Use of Online Social Networking sites (OSNs) has become ubiquitous now-a-days. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper the authors analyze the influence of the social media...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2013

    Development of Private Cloud

    Cloud computing is a major change, caused by the underlying commoditization of IT. It is expected to see a future dominance of the open source model in cloud computing, which will solve the major adoption concerns for users. Even a small private cloud built on the authors' college intranet gives...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2013

    Survey Paper On Cloud Computing

    Everyone has an opinion on what is cloud computing. It can be the ability to rent a server or a thousand servers and run a geophysical modeling application on the most powerful systems available anywhere. It can be the ability to rent a virtual server, load software on it, turn...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    Enhanced Security Evaluation and Analysis of Wireless Network Based on MAC Protocol

    All pre-RSNA methods fail to meet their security goals and are deprecated except for open system authentication after that RSNA comes in the picture. This paper evaluates why pre-RSNA methods fail for providing security to wireless networks. This analysis is necessary to migrate to RSNA and making more highly secure...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    A Co-Operative Cluster Data Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in MANET's

    MANETs are very popular because of its infrastructure less network. These mobile nodes serve as both hosts and routers so they can forward packets on behalf of each other. It has restricted computing resources and due to mobility of node there is much change in network topology. These restrictions raise...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    An ASCII Value Based Text Data Encryption System

    Encryption is a process of generating secret text from the input text using a secret key and an encryption algorithm. Input text is referred to as plain text and the secret text generated is known as cipher text. Encryption algorithms are mainly divided into two categories which are symmetric key...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    Use of Data Mining Methodologies in Evaluating Educational Data

    Currently, online learning has gained a huge recognition within the higher education context and it has become a vital need in the current society to find such improvements, to increase the level of knowledge in people. In the modern society e-learning is recognized highly where it connects the students with...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Secure Cloud Storage with Controlled Data Access Assured Deletion and Data Forwarding

    A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality and to reduce data management costs. However, the authors must provide security guarantees for the outsourced data. They...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    A Survey of Various Workflow Algorithm in Cloud Environment

    Cloud computing is a technology that uses the internet and the central servers to maintain data and resources. Cloud computing allows consumers and businesses to use the applications without installing and access their personal files at any computer with the help of internet. The users request for available services according...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Collaborative Writing SupportTools on the Cloud

    Managing writing activities and providing feedback to students is very labor intensive and academics often opt out of including such learning experiences in their teaching. The authors describe the architecture for a new collaborative writing support environment used to embed such collaborative learning activities in engineering courses. iWrite provides tools...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    A Survey on Security of Data Outsourcing in Cloud

    Cloud computing enables on-demand access to shared resources. It lets to use files and applications over the internet. This technology uses both the internet and the central servers to maintain data and resources. Many organizations uses cloud computing services to outsource their data into cloud environment for location independent resource...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    SQL Support Over MongoDB Using Metadata

    New requirements are arising in environments where the authors have higher volumes of data with high operation rates, agile development and cloud computing. In recent years, a growing number of companies have adopted various types of non-relational database, commonly referred to as NoSQL database. This reflects the growing interactivity of...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Enabling for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

    In this paper, the authors propose a upper-bound privacy leakage constraint based approach to identify which intermediate datasets need to be encrypted and which do not, so that privacy preserving cost can be saved while the privacy requirements of data holders can still be satisfied. To identify and encrypt all...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Energy Aware Data Aggreagation Technique in WSN

    Wireless sensor networks consist of sensor nodes with sensing, communicating, computing & storage with battery capacity. Data aggregation is a process or scheme to eliminate redundant transmission & provide fused information to base station which improves energy efficiency & network, lifetime of energy constrained WSN. In this paper, the authors...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Access Control in Cloud Computing

    Cloud computing is an advanced emerging technology. In this world the storage of data is a big headache for all. Cloud computing is an efficient solution for the easiest and fastest storage and retrieval of data. The main issue in cloud computing is security. Here, the author trying to introduce...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Vehicle Security System Using Zigbee

    The security system has become one of the key factors in car manufacturing as the demand from the buyer. This paper is to secure and monitor the car based on combination of Zigbee system, Peripheral Interface Controller (PIC) 16F877A microcontroller, vibration sensor, temperature sensor and micro switch. In order to...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    A New Method for Biometric Based Recognition

    Biometric based recognition is the science of identifying or verifying the identity of a person based on physiological and or behavioral characteristics. Biometric recognition offers many advantages over traditional PIN number or password and token-based (e.g., ID cards) approaches. A biometric trait cannot be easily transferred, forgotten or lost, the...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Port Knocking System Using Unilateral Authentication Algorithm

    It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. The authors examine ways to construct an authentication service to achieve this goal. Taking into consideration the strengths and weaknesses of existing port knocking designs...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Draining Injected Invalid Data for Efficient Bandwidth Consumption Using Authentication Scheme in WSN

    Wireless sensor is the biggest researching area. Now-a-days most of the applications are working on wireless medium. In wireless sensor network Injecting invalid data attack is very serious threat. If invalid data is stored in sink than due to error decision waste of energy and bandwidth will take place. In...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Resource Management and Scheduling in Cloud Environment

    In cloud environment, the process of execution requires resource management due to the high process to the resource ratio. Resource scheduling is a complicated task in cloud computing environment because there are many alternative computers with varying capacities. This paper is to propose a model for job-oriented resource scheduling in...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Cloud Computing Platform: A Perspective Overview

    Traditional business applications have always been very complicated and expensive. The amount and variety of hardware and software required to run them are daunting. The users need a whole team of experts to install, configure, test, run, secure, and update them. When the people multiply this effort across dozens or...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    A Counter Based Approach for Mitigation of Grayhole Attack in VANETs: Comparison and Analysis

    Vehicular Ad-hoc NETworks (VANETs) are highly dynamic network and prone to many kinds of attacks. One class of attacks known as routing misbehavior targets the routing process of the networks. Grayhole attack is a malicious change in the routing process of effected nodes. Such node takes part in routing process...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Mitigating Large Propagation Delay by Mitigating Wormhole Attack in Mobile Ad Hoc Network

    Wormhole attacks, in which colluding attackers with out-of-band communication links record packets (or bits) at one location and replay at another, cause far away nodes to consider themselves as neighbors to one another. Under this attack, two faraway malicious nodes can collude together using either wired link or directional antenna,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Big Data Landscape

    Big Data has become a major source of innovation across enterprises of all sizes. Data is being produced at an ever increasing rate. This growth in data production is driven by increased use of media, fast developing organizations, proliferation of web and systems connected to it. Having a lot of...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Enhanced Packet Dissembling Schemes for Selective Jamming Attacks Prevention in Wireless Networks

    Wireless networks provide wide range of services which is never so easy by any other medium, its mode of working tends it to have many security breaches. In modern era of communication trillions of profitable vital information is available on internet and they are accessible through this open medium. Such...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Security of Network Using Ids and Firewall

    An Intrusion Detection System (IDS) detects intruders that is, unexpected, unwanted or unauthorized people or programs on computer network. An IDS is used to determine if a computer network or server has experienced an unauthorized intrusion. An IDS works like a burglar alarm system. If it detects a possible intrusion,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Rules Extraction in XML Using Correlation

    As the amount of digital information on the internet grows it is more and more critical to retrieve information from semi-structured documents. Also the data returned as answers to queries may not give interpretable knowledge. Therefore the concept of association rule mining is introduced in XML data-structure. Even if it...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Channel Coding Using LFSR Based Symmetric Cryptography

    Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Providing Security for the Building Using Ant Colony Optimization Technique

    To describe the approach of real-world activities the authors have proposed an idea by using ACO technique for providing security to the building and building can be bank, parliament house, prime minister's house, ambani's house etc. In this paper they are providing the security to the building and if any...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    A Protocol for Peer-Peer System to Provide Anonymity

    Peer-To-Peer (P2P) systems can be used to share files, telephony, discussion forms, and streaming media. In anonymity Peer-To-Peer (P2P) networks, many systems try to mask the identities of their users for privacy considerations. Existing anonymity approaches like onion routing, tor, and crowd are mainly path-based: peers have to pre-construct an...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    File Sharing System

    The authors know that what is cost of storing the data on servers and again retrieving the same data. It is only suitable for paid users. Through their paper they are going to reduce cost of this data storage and retrieval process and it will be beneficial for normal users....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    A Block Based Encryption Model to Improve Avalanche Effect for Data Security

    Encryption is widely used to ensure security in public networks like the internet. Any type of data has its own attribute; therefore, various algorithms should be used to protect confidential data from unauthorized access. Mostly the available encryption algorithms are used for text data. However, due to large data size...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    Comparative Analysis of Data Centric Routing Protocols for Wireless Sensor Networks

    Wireless sensor networks consists of small nodes with sensing, computation, and wireless communications capabilities. The life time of a sensor node depends on its energy consumption. Saving energy and increase network life time are main challenges of wireless sensor networks. The efficiency of the sensor node depends on the routing...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    Cross Layer Transport Layer Approach for Multihop Wireless Sensor Network

    The traditional network is layered designed. Most network architectures of the radio network are also layered. In the layered design, each layer just is responsible for its own task. This can make the design more easily, and the network architecture adapted more application. But this also may make the design...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    Minimized Routing Protocol in Ad-Hoc Network with Quality Maintenance Based on Genetic Algorithm: A Survey

    Mobile ad-hoc network networks are self-organizing network having a concise radio range and limited bandwidth without having the any specified infrastructure. The topology of the ad hoc network may change suddenly. At this type of situation, is finding the Shortest Path (SP) between source and destination nodes within a specified...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Feb 2013

    Three Phase Paremeter Data Logging and Fault Detection Using GSM Technology

    As the people know that electricity losses during transmission and distribution are extremely high due to which many problems are faced such as varying voltage levels, change in the load current etc. This has been experienced due to the varying electrical consumption and power theft. Also these give rise to...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Apr 2012

    Location Based Authentication: A New Approach Towards Providing Security

    Identifying communicating entities i.e. \"Users\" is today's need. The process of identifying these entities accurately is known as authentication. The conventional authentication mechanisms are based on three factors: knowledge, possession and biometrics. The geographical position of a user is an important attribute that can be used to authenticate a user....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Secure Cloud Storage with Controlled Data Access Assured Deletion and Data Forwarding

    A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality and to reduce data management costs. However, the authors must provide security guarantees for the outsourced data. They...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    A Survey of Various Workflow Algorithm in Cloud Environment

    Cloud computing is a technology that uses the internet and the central servers to maintain data and resources. Cloud computing allows consumers and businesses to use the applications without installing and access their personal files at any computer with the help of internet. The users request for available services according...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Collaborative Writing SupportTools on the Cloud

    Managing writing activities and providing feedback to students is very labor intensive and academics often opt out of including such learning experiences in their teaching. The authors describe the architecture for a new collaborative writing support environment used to embed such collaborative learning activities in engineering courses. iWrite provides tools...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2012

    Comparison of Pattern Matching Techniques for Host Based Intrusion Detection System

    The rapid growth of the network influences the economy, politics, culture and many aspects of the society. The deeper and wider the network applications is, the more obvious and more complex the computer and network's security problems are. Hackers and virus can find more ways to launch attack with the...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    A Comparative Analysis of Association Rules Mining Algorithms

    Association rule mining is the one of the most important technique of the data mining. Its aim is to extract interesting correlations, frequent patterns and association among set of items in the transaction database. This paper presents a comparison between different association mining algorithms. All these algorithms are compared according...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Aspect Oriented Business Process Model For Exceptional Flows in Business Processes

    The increasing transparency and accountability of all organizations, including public service and government, together with the modern complexity, penetration and importance of ITC (information and communications technology), for even very small organizations nowadays, has tended to heighten demand for process improvement everywhere. This means that business process modeling is arguably...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Resource & Availability in Multi-Cloud Using Services

    Cloud computing reduces costs associated with computing with increase of flexibility and scalability for computer processes because of this cloud computing is counted as one of today's most exciting technologies. As the authors know that Turbo-c, Microsoft visual studio, Java is software package available in the windows operating system. But...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Web Services Based On SOAP and REST Principles

    Interest in web services is rapidly increased from their start of use. To exchange information among the application in standard way is the main goal of web services. This communication between the applications is based on SOAP and REST principle. SOAP communications causes network traffic, higher latency and processing delays....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Apr 2014

    A Prevention of DDOS Attacks in Cloud Using NEIF Techniques

    In recent years, most of the organizations in the world have increasingly realized the importance of cloud platforms. The cloud computing is one of the developing segmenting of IT industry as well as a promising concept to the end users. However cloud computing has more applications but there are many...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Apr 2014

    A Linux Based Content Management System

    A Content Management System (CMS) is computer program or a system administrator tool that allows publishing, editing and modifying content as well as maintenance from a central interface. Such systems of content management provide procedures to manage work flow in a collaborative environment. The core function and use of content...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    MOULT: A Methodology for the Refinement of Virtual Machines

    Smart archetypes and expert systems have garnered profound interest from both analysts and steganographers in the last several years. After years of compelling research into wide-area networks, the authors confirm the visualization of object-oriented languages, which embodies the private principles of complexity theory. In order to fix this obstacle, they...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Design and Implementation of K-Split Segmentation Approach for Visual Cryptography

    Visual Cryptography is a special type of encryption technique which is used to hide the information and data in images. In this technique the decryption process is done without any complex cryptographic computation. The encrypted data is decrypted using Human Visual System (HVS). This is the benefit of the visual...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Cellular Phone Forensics

    As mobile devices grow in popularity and ubiquity in everyday life, they are often involved in digital crimes and digital investigation as well. Cell phones, for instance, are becoming a media or tool in criminal cases and corporate investigation. Cellular phone forensics is therefore important for law enforcement and private...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Mobile Text Messaging: An Emerging Market Tool

    With multiple technologies to choose from in the Mobile applications space, it's hard to clearly determine what tool is best for the job. One particular technology that's growing to meet the needs of enterprise users worldwide is SMS/MMS. With the growing popularity worldwide of text messaging, many companies have begun...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Secure on Demand Multicast Routing Protocol for Mobile Ad-Hoc Networks

    Wireless ad-hoc networks emerged as a promising technology that offers low-cost high-bandwidth community wireless services. A WAN consists of a set of stationary wireless routers that form a multi hop backbone, and a set of mobile clients that communicate via the wireless backbone. Many applications can benefit from the service...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Hybrid Markov Model for Better Prediction of Web Page

    The problem of predicting user's web page request is gaining importance due to the increase in the demand of World Wide Web; recently Markov models are widely used for this purpose. Markov models found major application in this area different order Markov models are used for providing different level of...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    A Power Saving Scheme for FTP Applications in Peer to Peer Networks

    A Peer-To-Peer (P2P) system is composed of peer computers which are interconnected in overlay networks. Here, each peer computer can play both the roles of server and client. The P2P system is fully distributed and there is no centralized coordinator. The power consumption of each peer will vary accordingly. Here,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Study on Different Tuning Approach With Incorporation of Simulation Aspect for Z-N (Ziegler-Nichols) Rules

    This paper is based on PID tuning approach using traditional Ziegler-Nichols tuning method with the help of simulation aspects. The most important reason behind this PID tuning approach is due to its simple control structure and satisfactory results. Nowadays there are various optimization techniques like Particle Swarm Optimization (PSO), Bacterial...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2012

    A Practical Approach for Secure Internet Banking Based on Cryptography

    There are a continuously growing number of customers who use internet banking because of its convenience. But the security and privacy of Information may be one of the biggest concerns to the online banking users. The problem with online banking applications is that they send data directly to customer in...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2012

    Security Problems and their Defenses in TCP/IP Problems Suite

    The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers. TCP/IP is the basic communication language or protocol of the internet and private networks either an intranet or an extranet. The TCP/IP suite has many design weaknesses so far as security and privacy are concerned. Some...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2012

    Encryption as an Impressive Instrumentation in Decrease Wireless WAN Vulnerabilities

    The security of wireless WANs (World Area Network) has been a source of concern for businesses and individuals who are aware of its advantages due to its flexibility. With the increase in the use of wireless WANs for enterprises and homes, where information assets are shared continually, security is of...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2012

    Packet Length Based Steganography Detection in Transport Layer

    Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Network steganography describe methods which are used for transmitting information over network without being detected. Length of packet is used for...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2012

    Optimization of Association Rule Learning in Distributed Database using Clustering Technique

    Association rule mining is a way to find interesting associations among different large sets of data item. Apriori is the best known algorithm to mine the association rules. In this paper, clustering technique is used to improve the computational time of mining association rules in databases using access data. Clusters...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Draining Injected Invalid Data for Efficient Bandwidth Consumption Using Authentication Scheme in WSN

    Wireless sensor is the biggest researching area. Now-a-days most of the applications are working on wireless medium. In wireless sensor network Injecting invalid data attack is very serious threat. If invalid data is stored in sink than due to error decision waste of energy and bandwidth will take place. In...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Resource Management and Scheduling in Cloud Environment

    In cloud environment, the process of execution requires resource management due to the high process to the resource ratio. Resource scheduling is a complicated task in cloud computing environment because there are many alternative computers with varying capacities. This paper is to propose a model for job-oriented resource scheduling in...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Cloud Computing Platform: A Perspective Overview

    Traditional business applications have always been very complicated and expensive. The amount and variety of hardware and software required to run them are daunting. The users need a whole team of experts to install, configure, test, run, secure, and update them. When the people multiply this effort across dozens or...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    A Counter Based Approach for Mitigation of Grayhole Attack in VANETs: Comparison and Analysis

    Vehicular Ad-hoc NETworks (VANETs) are highly dynamic network and prone to many kinds of attacks. One class of attacks known as routing misbehavior targets the routing process of the networks. Grayhole attack is a malicious change in the routing process of effected nodes. Such node takes part in routing process...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Mitigating Large Propagation Delay by Mitigating Wormhole Attack in Mobile Ad Hoc Network

    Wormhole attacks, in which colluding attackers with out-of-band communication links record packets (or bits) at one location and replay at another, cause far away nodes to consider themselves as neighbors to one another. Under this attack, two faraway malicious nodes can collude together using either wired link or directional antenna,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Big Data Landscape

    Big Data has become a major source of innovation across enterprises of all sizes. Data is being produced at an ever increasing rate. This growth in data production is driven by increased use of media, fast developing organizations, proliferation of web and systems connected to it. Having a lot of...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Enhanced Packet Dissembling Schemes for Selective Jamming Attacks Prevention in Wireless Networks

    Wireless networks provide wide range of services which is never so easy by any other medium, its mode of working tends it to have many security breaches. In modern era of communication trillions of profitable vital information is available on internet and they are accessible through this open medium. Such...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Security of Network Using Ids and Firewall

    An Intrusion Detection System (IDS) detects intruders that is, unexpected, unwanted or unauthorized people or programs on computer network. An IDS is used to determine if a computer network or server has experienced an unauthorized intrusion. An IDS works like a burglar alarm system. If it detects a possible intrusion,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Rules Extraction in XML Using Correlation

    As the amount of digital information on the internet grows it is more and more critical to retrieve information from semi-structured documents. Also the data returned as answers to queries may not give interpretable knowledge. Therefore the concept of association rule mining is introduced in XML data-structure. Even if it...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Channel Coding Using LFSR Based Symmetric Cryptography

    Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Providing Security for the Building Using Ant Colony Optimization Technique

    To describe the approach of real-world activities the authors have proposed an idea by using ACO technique for providing security to the building and building can be bank, parliament house, prime minister's house, ambani's house etc. In this paper they are providing the security to the building and if any...

    Provided By International Journal of Scientific and Research Publication (IJSRP)