International Journal of Scientific and Research Publication (IJSRP)

Displaying 1-40 of 98 results

  • White Papers // Dec 2014

    Resource Cost Prediction and Comparison System for Cloud Consumers to Achieve Cost Effective Uses

    Cloud computing or in shorthand just the \"Cloud\", is a pool of resources, software and information that are accessed over a network (Internet). Cloud provides services based on \"Pay for what the user use\" principle i.e., pay for only those resources used for a particular time. The information and services...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    Enhancing Data Mining Techniques for Secured Data Sharing and Privacy Preserving on Web Mining

    Algorithms for assigning anonymous IDs are examined with respect to threshold between communication and computational requirements. The new algorithms are built on top of a secure sum data mining operation using Newton's identities and Sturm's theorem. The enhancing data techniques are used in the user database for secure their database...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    A Comparative Analysis on Encryption and Decryption Algorithms

    In this modern world of communications, cryptography has an important role in the security of data transmission and is the best method of data protection against passive and active fraud. Cryptography is an algorithmic process of converting a plain text or clear text message to a cipher text or cipher...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    A Study on Intrusion Detection System Against DDOS Attack in MANET

    Mobile Ad-hoc NETwork (MANET) is one of the most important fields for development of wireless network. A mobile ad hoc network is an autonomous collection of mobile devices like laptops, mobiles, sensors, etc. MANET is an emerging technology and has great strength to be applied in critical situations in military...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    Network Intrusion Detection on CPU GPU System

    With the great increase in the usage of computer networks, the risk of having this network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Intrusion Detection Systems (IDS)....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2014

    Data Centric Based Routing Protocols for Wireless Sensor Networks: A Survey

    Sensor networks are quite different from traditional networks in different ways: sensor networks have severe energy concerns, redundant low-rate data, and many-to-one flows. Routing protocols developed for other ad hoc networks cannot be applied directly in WSN because of the energy constraint of the sensor nodes. Data-centric technologies are needed...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Apr 2014

    A Prevention of DDOS Attacks in Cloud Using NEIF Techniques

    In recent years, most of the organizations in the world have increasingly realized the importance of cloud platforms. The cloud computing is one of the developing segmenting of IT industry as well as a promising concept to the end users. However cloud computing has more applications but there are many...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Apr 2014

    A Linux Based Content Management System

    A Content Management System (CMS) is computer program or a system administrator tool that allows publishing, editing and modifying content as well as maintenance from a central interface. Such systems of content management provide procedures to manage work flow in a collaborative environment. The core function and use of content...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Mar 2014

    An Appraisal to Overhaul Database Security Configurations

    It is reckoned that amount of information is rapidly increasing and engendering magnitude of database to be increased further. Security engineering is a vital aspect in the database management systems, since database is being targeted incessantly for vulnerability to invade sensitive data. Cherishing the database from security threats necessitates maintaining...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Survey on Requirements and Approaches of Business Process Repositories

    Business processes manifest the business knowledge and related logics. As it becomes more common for organizations to describe their operations in terms of business processes, it is necessary to establish a business process repository to manage thousands of process models while providing capabilities for effective sharing and reusing of valuable...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Embedded Web Server with Data Security for Wireless Sensor Networks

    Sensor network has quick installation, dynamic configuration features. Security of the data in the wireless sensor network has become a critical issue. As the applications are increasing, privacy preservation is an important issue in wireless sensor network. Depending on the nature of the installment of the network and the data...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Analysis on Big Data Over the Years

    Big data is characterized by increasing volume and velocity of data. IBM estimates that every day 2.5 quintillion bytes of data are created - so much that 90% of the data in the world today has been created in the last two years. The traditional data-intensive sciences such as astronomy,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Mobile Monitoring and Inquiry System Using Fingerprint Biometrics and SMS Technology

    In this paper the authors described a mobile monitoring and inquiry system using the fingerprint biometrics and Short Message Service (SMS) technology. It was specifically developed for the monitoring of preschoolers' attendance during their schooling, which is beneficial to the working parents. The system adopted the Rational Unified Process (RUP),...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks

    Use of Online Social Networking sites (OSNs) has become ubiquitous now-a-days. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper the authors analyze the influence of the social media...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    QR Based Advanced Authentication for All Hardware Plateform

    In this paper the authors seem quite obvious that now-a-days the authors are able to do transactions, shopping, banking, sharing and storing confidential data like other online services which aims to highly secured. The design and implementation of QR is easy to use and read, combined with multifactor (ID/password which...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Understanding the Cloud: Towards a Suitable Cloud Service

    With the rapid development of databases and data storage technology, the cloud has emerged as a significant aspect of now-a-days businesses. This embraces the necessity of the distinction between the cloud services and deployment models in order to obtain a service that fits the user demands. This paper provides current...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2013

    Survey Paper On Cloud Computing

    Everyone has an opinion on what is cloud computing. It can be the ability to rent a server or a thousand servers and run a geophysical modeling application on the most powerful systems available anywhere. It can be the ability to rent a virtual server, load software on it, turn...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2013

    Development of Private Cloud

    Cloud computing is a major change, caused by the underlying commoditization of IT. It is expected to see a future dominance of the open source model in cloud computing, which will solve the major adoption concerns for users. Even a small private cloud built on the authors' college intranet gives...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    An ASCII Value Based Text Data Encryption System

    Encryption is a process of generating secret text from the input text using a secret key and an encryption algorithm. Input text is referred to as plain text and the secret text generated is known as cipher text. Encryption algorithms are mainly divided into two categories which are symmetric key...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    A Co-Operative Cluster Data Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in MANET's

    MANETs are very popular because of its infrastructure less network. These mobile nodes serve as both hosts and routers so they can forward packets on behalf of each other. It has restricted computing resources and due to mobility of node there is much change in network topology. These restrictions raise...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    Enhanced Security Evaluation and Analysis of Wireless Network Based on MAC Protocol

    All pre-RSNA methods fail to meet their security goals and are deprecated except for open system authentication after that RSNA comes in the picture. This paper evaluates why pre-RSNA methods fail for providing security to wireless networks. This analysis is necessary to migrate to RSNA and making more highly secure...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2013

    Use of Data Mining Methodologies in Evaluating Educational Data

    Currently, online learning has gained a huge recognition within the higher education context and it has become a vital need in the current society to find such improvements, to increase the level of knowledge in people. In the modern society e-learning is recognized highly where it connects the students with...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Secure Cloud Storage with Controlled Data Access Assured Deletion and Data Forwarding

    A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality and to reduce data management costs. However, the authors must provide security guarantees for the outsourced data. They...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Energy Aware Data Aggreagation Technique in WSN

    Wireless sensor networks consist of sensor nodes with sensing, communicating, computing & storage with battery capacity. Data aggregation is a process or scheme to eliminate redundant transmission & provide fused information to base station which improves energy efficiency & network, lifetime of energy constrained WSN. In this paper, the authors...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Collaborative Writing SupportTools on the Cloud

    Managing writing activities and providing feedback to students is very labor intensive and academics often opt out of including such learning experiences in their teaching. The authors describe the architecture for a new collaborative writing support environment used to embed such collaborative learning activities in engineering courses. iWrite provides tools...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    A Survey of Various Workflow Algorithm in Cloud Environment

    Cloud computing is a technology that uses the internet and the central servers to maintain data and resources. Cloud computing allows consumers and businesses to use the applications without installing and access their personal files at any computer with the help of internet. The users request for available services according...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    SQL Support Over MongoDB Using Metadata

    New requirements are arising in environments where the authors have higher volumes of data with high operation rates, agile development and cloud computing. In recent years, a growing number of companies have adopted various types of non-relational database, commonly referred to as NoSQL database. This reflects the growing interactivity of...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    A Survey on Security of Data Outsourcing in Cloud

    Cloud computing enables on-demand access to shared resources. It lets to use files and applications over the internet. This technology uses both the internet and the central servers to maintain data and resources. Many organizations uses cloud computing services to outsource their data into cloud environment for location independent resource...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Enabling for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud

    In this paper, the authors propose a upper-bound privacy leakage constraint based approach to identify which intermediate datasets need to be encrypted and which do not, so that privacy preserving cost can be saved while the privacy requirements of data holders can still be satisfied. To identify and encrypt all...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Vehicle Security System Using Zigbee

    The security system has become one of the key factors in car manufacturing as the demand from the buyer. This paper is to secure and monitor the car based on combination of Zigbee system, Peripheral Interface Controller (PIC) 16F877A microcontroller, vibration sensor, temperature sensor and micro switch. In order to...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Port Knocking System Using Unilateral Authentication Algorithm

    It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. The authors examine ways to construct an authentication service to achieve this goal. Taking into consideration the strengths and weaknesses of existing port knocking designs...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    A New Method for Biometric Based Recognition

    Biometric based recognition is the science of identifying or verifying the identity of a person based on physiological and or behavioral characteristics. Biometric recognition offers many advantages over traditional PIN number or password and token-based (e.g., ID cards) approaches. A biometric trait cannot be easily transferred, forgotten or lost, the...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Sep 2013

    Access Control in Cloud Computing

    Cloud computing is an advanced emerging technology. In this world the storage of data is a big headache for all. Cloud computing is an efficient solution for the easiest and fastest storage and retrieval of data. The main issue in cloud computing is security. Here, the author trying to introduce...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Validating a Document using XML Languages

    XML files are developed for people to be easily read and edit. They are also useful for data exchange among different systems and different applications. Validation of a document plays a very important role and also solves a number of important issues when working with XML and XML related technologies....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    The Rabin Cryptosystem & Analysis in Measure of Chinese Reminder Theorem

    Cryptography is the practice and study of techniques for secure communication in the presence of third parties. The necessity and the fact that exchanged messages are exposed to other people during the transmission promoted the creation of encryption systems, enabling just the recipients to interpret the exchanged information. In this...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    A Heuristic Approach for the Detection of Malicious Activity at Autonomous System

    On the internet, an autonomous system is the unit of router policy which is also sometimes referred to as a routing domain. An autonomous system is assigned a globally unique number called Autonomous System Number (ASN). The investigators and network operators have recently identified that the high profile autonomous systems...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Security of Network Using Ids and Firewall

    An Intrusion Detection System (IDS) detects intruders that is, unexpected, unwanted or unauthorized people or programs on computer network. An IDS is used to determine if a computer network or server has experienced an unauthorized intrusion. An IDS works like a burglar alarm system. If it detects a possible intrusion,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Rules Extraction in XML Using Correlation

    As the amount of digital information on the internet grows it is more and more critical to retrieve information from semi-structured documents. Also the data returned as answers to queries may not give interpretable knowledge. Therefore the concept of association rule mining is introduced in XML data-structure. Even if it...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Channel Coding Using LFSR Based Symmetric Cryptography

    Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jun 2013

    Providing Security for the Building Using Ant Colony Optimization Technique

    To describe the approach of real-world activities the authors have proposed an idea by using ACO technique for providing security to the building and building can be bank, parliament house, prime minister's house, ambani's house etc. In this paper they are providing the security to the building and if any...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    Comparative Analysis of Data Centric Routing Protocols for Wireless Sensor Networks

    Wireless sensor networks consists of small nodes with sensing, computation, and wireless communications capabilities. The life time of a sensor node depends on its energy consumption. Saving energy and increase network life time are main challenges of wireless sensor networks. The efficiency of the sensor node depends on the routing...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    Cross Layer Transport Layer Approach for Multihop Wireless Sensor Network

    The traditional network is layered designed. Most network architectures of the radio network are also layered. In the layered design, each layer just is responsible for its own task. This can make the design more easily, and the network architecture adapted more application. But this also may make the design...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    Minimized Routing Protocol in Ad-Hoc Network with Quality Maintenance Based on Genetic Algorithm: A Survey

    Mobile ad-hoc network networks are self-organizing network having a concise radio range and limited bandwidth without having the any specified infrastructure. The topology of the ad hoc network may change suddenly. At this type of situation, is finding the Shortest Path (SP) between source and destination nodes within a specified...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Feb 2013

    Three Phase Paremeter Data Logging and Fault Detection Using GSM Technology

    As the people know that electricity losses during transmission and distribution are extremely high due to which many problems are faced such as varying voltage levels, change in the load current etc. This has been experienced due to the varying electrical consumption and power theft. Also these give rise to...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Apr 2012

    A Study of Congestion Aware Adaptive Routing Protocols in MANET

    Routing protocols for Mobile Ad hoc NETworks (MANETs) have been explored extensively in last few years. Much of this paper is targeted at finding a feasible route from a source to a destination without considering current network traffic or application requirements. Routing may let a congestion happen which is detected...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Nov 2012

    Intrusion Detection: An Energy Efficient Approach in Heterogeneous WSN

    Intrusion detection in Wireless Sensor Network (WSN) is widely used in many applications such as detecting an intruder. The intrusion detection is a mechanism for a Wireless Sensor Network to detect the existence of inappropriate, incorrect or unsuspicious moving attackers. WSN consumes lots of energy to detect an intruder. The...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Feb 2012

    An Efficient Leader Election Mechanism for Intrusion Detection in MANET

    The Mobile Ad-hoc NETwork (MANET) is highly vulnerable to security attacks compared to wired network and infrastructure based wireless network due to the dynamic changing and decentralized network topology. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    Survey on Spatio-Temporal Database and Data Models with Relevant Features

    Spatio-temporal data is the abstract of the spatio-temporal characteristics and process of the real world. Spatio-temporal database modeling on the earlier stages attempted to capture the state of real world objects or the physical event upon them, on the time line. The spatio-temporal data models integrate time and space so...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    Clustering Techniques for the Identification of Web User Session

    The web user-session can be defined as a set of several TCP connections generated by a single user while surfing the web during a given time frame. An activity period, i.e. session, is terminated by a long silent period. This activity period is comprised of several TCP connections which may...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    An Overview Study of Personalized Web Search

    Personalized web search is one of the growing concepts in the web technologies. Personalization of web search is to carry out retrieval for each user incorporating his/her interests. For a given query, a personalized Web search can provide different search results for different users or organize search results differently for...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    A Survey: Security Perspectives of ORACLE and IBM-DB2 Databases

    As storage of data plays an integral part of databases, security issues becomes major concerns. Relational databases hold a significant portion of data stored in software, therefore today's database purchase decisions revolve around how secure the product is. This paper provides a categorical feature comparison between Oracle9i Database (Oracle) and...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2013

    A Block Based Encryption Model to Improve Avalanche Effect for Data Security

    Encryption is widely used to ensure security in public networks like the internet. Any type of data has its own attribute; therefore, various algorithms should be used to protect confidential data from unauthorized access. Mostly the available encryption algorithms are used for text data. However, due to large data size...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    MOULT: A Methodology for the Refinement of Virtual Machines

    Smart archetypes and expert systems have garnered profound interest from both analysts and steganographers in the last several years. After years of compelling research into wide-area networks, the authors confirm the visualization of object-oriented languages, which embodies the private principles of complexity theory. In order to fix this obstacle, they...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Design and Implementation of K-Split Segmentation Approach for Visual Cryptography

    Visual Cryptography is a special type of encryption technique which is used to hide the information and data in images. In this technique the decryption process is done without any complex cryptographic computation. The encrypted data is decrypted using Human Visual System (HVS). This is the benefit of the visual...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Cellular Phone Forensics

    As mobile devices grow in popularity and ubiquity in everyday life, they are often involved in digital crimes and digital investigation as well. Cell phones, for instance, are becoming a media or tool in criminal cases and corporate investigation. Cellular phone forensics is therefore important for law enforcement and private...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Mobile Text Messaging: An Emerging Market Tool

    With multiple technologies to choose from in the Mobile applications space, it's hard to clearly determine what tool is best for the job. One particular technology that's growing to meet the needs of enterprise users worldwide is SMS/MMS. With the growing popularity worldwide of text messaging, many companies have begun...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Secure on Demand Multicast Routing Protocol for Mobile Ad-Hoc Networks

    Wireless ad-hoc networks emerged as a promising technology that offers low-cost high-bandwidth community wireless services. A WAN consists of a set of stationary wireless routers that form a multi hop backbone, and a set of mobile clients that communicate via the wireless backbone. Many applications can benefit from the service...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Hybrid Markov Model for Better Prediction of Web Page

    The problem of predicting user's web page request is gaining importance due to the increase in the demand of World Wide Web; recently Markov models are widely used for this purpose. Markov models found major application in this area different order Markov models are used for providing different level of...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    A Power Saving Scheme for FTP Applications in Peer to Peer Networks

    A Peer-To-Peer (P2P) system is composed of peer computers which are interconnected in overlay networks. Here, each peer computer can play both the roles of server and client. The P2P system is fully distributed and there is no centralized coordinator. The power consumption of each peer will vary accordingly. Here,...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Aug 2012

    Study on Different Tuning Approach With Incorporation of Simulation Aspect for Z-N (Ziegler-Nichols) Rules

    This paper is based on PID tuning approach using traditional Ziegler-Nichols tuning method with the help of simulation aspects. The most important reason behind this PID tuning approach is due to its simple control structure and satisfactory results. Nowadays there are various optimization techniques like Particle Swarm Optimization (PSO), Bacterial...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Oct 2013

    Secure Cloud Storage with Controlled Data Access Assured Deletion and Data Forwarding

    A cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet. Storing data in a third party's cloud system causes serious concern over data confidentiality and to reduce data management costs. However, the authors must provide security guarantees for the outsourced data. They...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Priority Page Content Rank by Web Search Result using the Rank Improvement

    The problem of finding relevant documents has become much more difficult due to the return a large number of web pages generally in the form of ranked list data on the WWW. This paper increases the users' searching time to find the desired information within the search results, while in...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    An Effective Fraud Detection System Using Mining Technique

    Detection of fraud in e-commerce payment system or \"An effective fraud detection system using mining technique\" is some more related to Mobile computing. Usage of credit card has increased. As the authors know credit card has become the most popular mode of payment. Customers can easily purchase goods through online....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Distributed Metadata Management Scheme in HDFS

    A Hadoop Distributed File System (HDFS) is designed to store very large data sets reliably and to stream those data sets at high bandwidth to user applications. Metadata management is critical to distributed file system. In HDFS architecture, a single master server manages all metadata, while a number of data...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Fault Tolerant Distributed Meeting using Cloud

    Exploiting full potential of mobile computing is difficult because of the problems such as resource scarcity, mobility, frequent disconnections. To conquer these issues Mobile cloud computing can be used. Because of the mobile nature of the devices fault-tolerance is a highly important aspect in a mobile cloud, even more than...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    A Secure and Synchronized Cloud Ecosystem for Students Academics and Professional Records

    Cloud computing refers to computing with a focus of virtualized computer networks or resources and application services by improving the utilization of data centre and data resources. In the existing system, it has been analyzed that the risks and availability of student's academic records and information are very likely to...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Optimized Resource Allocation in Cloud Environment Based on a Broker Cloud Service Provider

    Cloud computing provides on-demand services with high performance in a flexible manner. Fast and easy deployment, scalability and service-oriented architecture are its main features. It promises substantial cost reduction together with flexibility than the traditional IT operations. Service provider's offers substantial amount of services with different performance characteristics. A Broker...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Join Query Optimization in Distributed Databases

    As the data is increasing day-by-day, it is becoming more complex to store the more data on a single site. Data on a single site also suffers from many problems such as the storage limitations, site failure. Query optimization is to use the best plan for the query that improves...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Resource & Availability in Multi-Cloud Using Services

    Cloud computing reduces costs associated with computing with increase of flexibility and scalability for computer processes because of this cloud computing is counted as one of today's most exciting technologies. As the authors know that Turbo-c, Microsoft visual studio, Java is software package available in the windows operating system. But...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Aspect Oriented Business Process Model For Exceptional Flows in Business Processes

    The increasing transparency and accountability of all organizations, including public service and government, together with the modern complexity, penetration and importance of ITC (information and communications technology), for even very small organizations nowadays, has tended to heighten demand for process improvement everywhere. This means that business process modeling is arguably...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    A Comparative Analysis of Association Rules Mining Algorithms

    Association rule mining is the one of the most important technique of the data mining. Its aim is to extract interesting correlations, frequent patterns and association among set of items in the transaction database. This paper presents a comparison between different association mining algorithms. All these algorithms are compared according...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Platform for Pushing and Pulling Device Oriented Information via Cloud

    In this paper, the authors are building a platform to share the device oriented information using private cloud. Their purpose is to create an information-sharing platform that enables easy sharing of device-oriented information. The cloud is build using SaaS platform. Whenever required, the private cloud enables access to shared resources...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // May 2013

    Web Services Based On SOAP and REST Principles

    Interest in web services is rapidly increased from their start of use. To exchange information among the application in standard way is the main goal of web services. This communication between the applications is based on SOAP and REST principle. SOAP communications causes network traffic, higher latency and processing delays....

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Jan 2014

    Survey on Requirements and Approaches of Business Process Repositories

    Business processes manifest the business knowledge and related logics. As it becomes more common for organizations to describe their operations in terms of business processes, it is necessary to establish a business process repository to manage thousands of process models while providing capabilities for effective sharing and reusing of valuable...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Mar 2014

    An Appraisal to Overhaul Database Security Configurations

    It is reckoned that amount of information is rapidly increasing and engendering magnitude of database to be increased further. Security engineering is a vital aspect in the database management systems, since database is being targeted incessantly for vulnerability to invade sensitive data. Cherishing the database from security threats necessitates maintaining...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2012

    Encryption as an Impressive Instrumentation in Decrease Wireless WAN Vulnerabilities

    The security of wireless WANs (World Area Network) has been a source of concern for businesses and individuals who are aware of its advantages due to its flexibility. With the increase in the use of wireless WANs for enterprises and homes, where information assets are shared continually, security is of...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2012

    Packet Length Based Steganography Detection in Transport Layer

    Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Network steganography describe methods which are used for transmitting information over network without being detected. Length of packet is used for...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2012

    Optimization of Association Rule Learning in Distributed Database using Clustering Technique

    Association rule mining is a way to find interesting associations among different large sets of data item. Apriori is the best known algorithm to mine the association rules. In this paper, clustering technique is used to improve the computational time of mining association rules in databases using access data. Clusters...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2012

    Cut Detection in Wireless Sensors Network Using Distributed Source Separation Detection (DSSD) Approach

    A classical problem caused by separation of network is partitioning. Predicting those positioning from where the network get separated into the different partition could be a very useful feature that can be provided to applications in a wireless sensors network environment. Indeed, being aware of a future disconnection in the...

    Provided By International Journal of Scientific and Research Publication (IJSRP)

  • White Papers // Dec 2012

    Taxonomy of Anomaly Based Intrusion Detection System: A Review

    Intrusion detection systems aim at detecting attacks against information systems in general. It is difficult to provide secure information systems and maintain them in a secure state for their entire lifetime. Maintenance of such information system is technically difficult as well as economically costly. With the advent of new vulnerabilities...

    Provided By International Journal of Scientific and Research Publication (IJSRP)