International Journal of Soft Computing and Engineering (IJSCE)

Displaying 1-40 of 514 results

  • White Papers // Apr 2015

    An Area Efficient Low Power High Speed Pulse Triggered Flip Flop using Pass Transistor

    The performance of flip-flop is an important element to determine the efficiency of the whole synchronous circuit. This paper presents an efficient explicit pulsed static single edge triggered flip flop with an improved performance and overcomes the drawbacks of the implicit type pulsed flip flops. The proposed flip flop is...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2015

    Study of 8 Bits Fast Multipliers for Low Power Applications

    High-speed multiplication has always been a fundamental requirement of high performance processors and systems. With MOS scaling and technological advances there is a need for design and development of high speed data path operators such as adders and multipliers to perform signal processing operations at very high speed supporting higher...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2015

    The Key Issues Surrounding Electronic Commerce Information Security Management

    In this paper, the authors identify the key issues surrounding electronic commerce information security management. A descriptive survey research design was conducted to gather primary data. Information about the current status of e-commerce information security practices and the impediments of these approaches was also collected. A structured questionnaire was used...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2015

    A Cloud Robotics Architecture with Applications to Smart Homes

    Cloud computing is a computational model in which interconnected computers over the Internet work together toward offering greater processing power and storage capabilities than stand-alone solutions. The use of the cloud has found application in a diversity of fields including robotics and mobile computing. This has resulted in the emergence...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2015

    Secure Steganography Algorithm Based on Cellular Automata using Fibonacci Representation and Reverse Circle Cipher Application for Steganography

    Steganography is the act of hiding a message inside another message in such a way that can only be detected by its intended recipient. The process of hiding information inside another media is called steganography. In this technique the basic idea of steganography based on cellular automata using Fibonacci representation....

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2015

    Comparative Analysis and Study on 4-Bit RCA and CSK Using CMOS Logic

    Adders are the most basic and essential component used in digital signal processing and is widely used in the digital integrated circuits. In VLSI application area, delay and power are the important factors which must be taken into account in design of a full adder. In this paper, the authors...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2015

    Near Lossless Compression of Video Frames Using Soft Computing Technologies in Immersive Multimedia

    Compression of video frames is a heavily researched domain in digital TV technology and multimedia applications and hundreds of researchers have experimented with various techniques of transform coding and quantization mechanisms with varied results. Despite this fact, there is still a tremendous amount of scope for better compression schemes that...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2015

    Generic Architecture for Biometric and Digital Forensic Analysis

    Information systems and network communications has become part of the people everyday life. In recent times, there has been a massive growth in computer and electronic devices as well as network-based systems either for e-commerce, e-government or internal processes within organizations. Human beings can no longer be separated from electronic...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2015

    Method for Evaluating The Routing Cost in MPLS Network with Regard To Fractal Properties of The Traffic

    There has been proposed the method for evaluating the routing cost which is based on the account of fractal properties of the network traffic and preset limits for the latency time and the number of lost packets. This method calculates the fractality of the traffic and the value of bursts....

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2015

    Securing the User Equipment (UE) in LTE Networks by Detecting Fake Base Stations

    An LTE network attacker can set up rogue base station easily to make the victim User Equipment (UE) connect to such base station. The privacy of the UE will be compromised. In this paper, the authors propose a protocol to identify fake base stations to protect user privacy. The basic...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2015

    Neural Network Applications in a Power Station

    The integration of soft computing techniques in traditional real-time systems is a promising approach to cope with the growing complexity of real-world applications. A power station is a complicated multivariable controlled plant, which consists of boiler, turbine, generator, power network and loads. The demands being placed on control & instrumentation...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2015

    A New Scheme for Pseudo Random Numbers Generator Based on Secret Splitting

    In this paper, the authors present a secure scheme for generating a pseudo random numbers. The scheme is based on secret splitting of a piece of secure information which is used as a seed to the generator. In this scheme the procedure of splitting the secure information is performed according...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2015

    Evolving Trends and its Application in Web Usage Mining: A Survey

    With the abundance of information available on the World Wide Web (WWW), the issue of how to extract useful knowledge from the web has gained significant attention among researchers in data mining and knowledge discovery areas. Web mining is applied to reflect the importance of webpages and to predict the...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2015

    ASIC Thread for Decimal (BCD) Algorithm: A Tutorial on How Create a Thread and to Evaluate ISPMACH4256ZE CPLD

    Here it is explained how can be designed by an easy form, and using HDL tool, a thread for implement the algorithm for natural Binary format to DeCimal (BCD) format. In order to achieve that, here is released an explanation of such algorithm in a fast and needed way. In...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Nov 2014

    G-Netadmin-A Network Management System

    Network management is a hard task. G-NETADMIN - a Network Management System (NMS) is a set of software and hardware tools for the monitoring and management of networks. Technological development in the mobile communication area has been growing substantially in recent years. Currently, two technologies have appeared as big players...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Nov 2014

    EAR Recognition using Artificial Neural Networks

    Authentication of a person is to ascertain their identity is an important problem in the society. Among various physiological traits (biometrics), ear has gained much popularity in recent years as it has been formed to be the reliable biometrics for human recognition. Ear recognition consists of the two important steps:...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Nov 2014

    MIMO Systems Performance Simulator

    Multi Input Multi Output (MIMO) has emerged as a hot topic in wireless communications. This is due to possible dramatic increase in reliability and capacity as compared to single antenna solution. In this paper, the authors are developing a MIMO System Performance Simulation (MSPS) tool by using MATLAB for making...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Nov 2014

    Comparative Study of Parallel Odd Even Transposition and Rank Sort Algorithm

    A sorting algorithm is an algorithm that puts elements of a list in a certain order. In this paper, the execution behaviors of different parallel sorting algorithms like odd-even transposition sort and parallel rank sort have been invested with multithreading. Multithreading in JAVA programming language provides a mechanism where parallel...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Sep 2014

    Retrieving Frequent Item Sets from Distributed Data Base

    With fast growing of the network and the data storage, large scale data are rapidly expanded and collected on the physically distributed storage, consequently traditional data mining approaches are not appropriate for information retrieval purpose. Distributed data mining techniques are developed in order to examine distributed data by parallel algorithms....

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Sep 2014

    Back Propagation Artificial Neural Network Structure Error Reduction by Defined Factor of Capacity and Algorithm Reinforcement Method

    In this paper, the authors investigates how to reduce error and increase speed of back propagation ANN by certain defined capacity factor. For the years from 1965 to 1980 the use of a variety of ANNs for problem solving was relented significantly because of limitations in one layer networks that...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Sep 2014

    Multi Model Biometric Identification System: Finger Vein and Iris

    Personal identification process is a very important process that resides a large portion of daily usages. Identification process is applicable in work place, private zones, banks etc. Human is a rich subject having many features that can be used for identification purpose such as finger vein, iris, and face etc....

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Sep 2014

    ADHOC Networks Improving Power Efficiency using Multicast Multi-Path Routing Technology

    In this paper, the authors present a measurement based routing algorithm to load balance intra domain traffic along multiple paths for multiple multicast sources. Multiple paths are established using application-layer overlaying. The proposed algorithm is able to converge under different network models, where each model reflects a different set of...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Sep 2014

    A Review on Technological Development of Automatic Speech Recognition

    Speech recognition has been a challenging and multidisciplinary research area since decades. Speech recognition technology has tremendous potential as it is an integral part of future intelligent devices, in which speech recognition and speech synthesis are used as the basic means for communicating with humans. In this paper, a survey...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Sep 2014

    Design of Baugh Wooley Multiplier Using HPM Reduction Tree Technique

    Multiplication is one of the complex arithmetic operations. In most of the signal processing algorithms, multiplication is a root operation whereas multipliers have large area, consume considerable power and long latency. So, in low-power VLSI system design, low-power multiplier design is also an important part. Mostly, architecture of parallel multipliers...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2014

    An Intrusion Detection System Based on KDD-99 Data using Data Mining Techniques and Feature Selection

    Internet and internet users are increasing day-by-day. Also due to rapid development of internet technology, security is becoming big issue. Intruders are monitoring computer network continuously for attacks. A sophisticated firewall with efficient Intrusion Detection System (IDS) is required to prevent computer network from attacks. A comprehensive study of literatures...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2014

    Dual Image Steganography for Communicating High Security Information

    The recent growth in computational power and technology has propelled the need for highly secured data communication. One of the best techniques for secure communication is steganography-a covert writing. It is an art of hiding the very existence of communicated message itself. The process of using steganography in conjunction with...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2014

    Multi-Objective Evolutionary Algorithm for Routing in Wireless Mesh Networks

    Wireless mesh networks are an attractive technology for providing broadband connectivity to mobile clients who are just on the edge of wired networks, and also for building self organized networks in places where wired infrastructures are not available. Routing in wireless mesh networks has multi-objective nonlinear optimization problem with some...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2014

    A Study of the Factors Considered when Choosing an Appropriate Data Mining Algorithm

    A lot of data is generated and collected in today's organizations. Data mining has helped a lot of businesses to extract knowledge from data and use it to make decisions and gain competitive advantage. Businesses now analyze the data to make business decisions. Various algorithms may be used to analyze...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2014

    Securing user Authentication Through Customized X.509 in Cloud Computing

    Cloud computing, a highly flexible and user friendly technology of the era providing benefits like accessibility, scalability, reliability and cost effeteness but on the other hand many security and privacy issues arises with the rapid increase of users. Weak authentication process is one of the biggest problem towards breach and...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2014

    Secure Digital Image Steganography

    Steganography is the art of hiding the fact that communication is taking place. It is the science that hides the information in an appropriate cover carrier like image, text, audio and video media. Established businesses have adopted steganography for covert communication, artists have done the same for intellectual property protection...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2014

    Flower Pollination Optimization Algorithm for Wireless Sensor Network Lifetime Global Optimization

    As wireless sensor networks still struggling to extend its lifetime, nodes' clustering and nomination, or selection of cluster head node are proposed as solution. LEACH protocol is one of the oldest remarkable clustering approaches that aim to cluster the network's nodes and randomly elects a cluster head for each cluster....

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // May 2014

    A Brief Study of Data Mining

    Data mining plays a significant role on human activities and has become an essential component in various fields of human life. It is the knowledge discovery process which analyzes the large volumes of data from various perspectives and summarizes it into useful information. Data mining is greatly inspired by advancements...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // May 2014

    A Synthesized Approach for Comparison and Enhancement of Clustering Algorithms in Data Mining for Improving Feature Quality

    Data mining is the important step for discover the knowledge in knowledge discovery process in data set. Data mining provide a useful pattern or model to discovering important and useful data from whole database. Different algorithms are used to extract the valuable data. To mine the data important steps or...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // May 2014

    A Survey on Location Based Services in Data Mining

    Data privacy has been the primary concern since the distributed database came into the picture. More than two parties have to compile their data for data mining process without revealing to the other parties. Continuous advancement in mobile networks and positioning technologies has created a strong challenge for location-based applications....

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // May 2014

    An Approach for Security and Privacy Enhancing by Making Use of Distinct Clouds

    Security challenges are the major concern when the authors considering the acceptance of cloud service. A lot of research activities regarding to cloud security resulting in an amount of application and targeting the cloud security threats. The cloud concept comes with a new set of unique features, techniques and architectures....

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // May 2014

    Heterogeneous Parallel Programming

    In this paper, the authors present Heterogeneous Parallel Computing (HPC), which is a well-orchestrated and co-ordinate effective use of a suite of diverse high performance machines to provide super-speed processing for computationally demanding tasks with diverse computational needs. GPUs are accoutered with a much more throughput oriented design as compared...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // May 2014

    Design and Study of Enhanced Parallel FIR Filter Using Various Adders for 16 Bit Length

    Now-a-days parallel Finite Impulse Response (FIR) filter plays very important role in the Digital Signal Processing (DSP) based applications. FIR filters are one of the most widely used fundamental filters in the DSP systems. The parallel FIR filters are derived from FIR digital filter. In this paper, the authors design...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Apr 2014

    Understanding the Internet Usage Habits of the Students of University of the Visual & Performing Arts through Data Mining

    This data mining has been a commonly used tool in the telecommunication sector. This is due to the useful insights that it can provide to assess the user preferences and optimize the service offerings consistent with user expectations. Data mining provides the required insights to the Internet and data usage...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2014

    FPGA Implementation of Single Precision Floating Point Multiplier using High Speed Compressors

    Floating point multiplier is one of the vital concerns in every digital system. In this paper, the concepts of high speed compressors are used for the implementation of a high speed single precision binary floating point multiplier by using IEEE 754 standard. Since compressors are special kind of adder which...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2014

    USB Keyboard Security Unit

    Every user has its specific rhythm of typing which could be used as a biometrics in order to build some kind of \"Footprint\" - unique profile. If somebody gets to know this profile, legitimate user is endangered by tracking and being impersonated. That is the way typing rhythm must be...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2011

    Challenges for Mobile Wireless Devices for Next Generation in Pervasive Computing

    Network computing and mobile computing are fast becoming a part of everyday life. The authors expect devices like PDAs, mobile phones, offices PCs and even home entertainment systems to access information and work together in one integrated system and the challenge is to combine these technologies into a seamless whole...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2011

    A Novel Approach to Intrusion Detection System Using Rough Set Theory and Incremental SVM

    Intrusion Detection System (IDS) is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet. These attempts may take the form of attacks, as examples, by crackers, malware and/or disgruntled employees. An IDS cannot directly detect...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2011

    Optimization of Association Rule Mining Apriori Algorithm Using ACO

    Association rule mining is an important topic in data mining field. In a given large database of customer transactions. Each transaction consists of items purchased by a customer in a visit. Apriori algorithm that generates all significant association rules between items in the database. On the basis of the association...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2011

    Mobile SMS Classification

    Text Classification is the process of classifying documents into predefined classes based on its content. Text classification is important in many web applications like document indexing, document organization, spam filtering etc. In this paper, the authors analyze the concept of a new classification model which will classify Mobile SMS into...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2011

    Efficient Coding Mechanism for Low Power Consumption in Wireless Programmable Devices

    Due to the continuous advancement in technology embedded devices are playing important role in everyone's day to day life. Everyone is moving towards wireless embedded systems, but there is important concern about power consumption in such devices. While designing a lot of care has to be taken especially in power...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Sep 2011

    Group Delay Variations in Wideband Transmission Lines: Analysis and Improvement

    Although poorly studied in the literature, Group Delay Variations (GDV) versus frequency is an essential factor which causes distortion and degradation in wideband satellite signals specially when using phase modulation and high data rates. In this paper, transmission line is analyzed as a dispersive medium and some kinds of coaxial...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Sep 2011

    Design and Implementation of Context Program Compiler for Developing Context Aware Applications in Pervasive Computing Environment

    With the advancement of pervasive computing, sensors technology and the wide deployment of wireless communication, there is an increasing demand for the context aware computing application. Contextual presentation is an emerging technique that has huge commercial possibilities .The theory behind the applications is complex and this make the implementation non...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Performance Elevation Criteria for OFDM Under AWGN Fading Channel Using IEEE 802.11a

    In this paper, the BER performance of OFDM-BPSK 16 - QAM and 64 - QAM system over AWGN fading channel has been reported. Orthogonal Frequency Division Multiplexing (OFDM) is a key technique for achieving high data rates and spectral efficiency requirements for wireless communication systems. However in fading environments the...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Survey of Finding Frequent Patterns in Graph Mining: Algorithms and Techniques

    Graphs become increasingly important in modeling complicated structures, such as circuits, images, chemical compounds, protein structures, biological networks, social networks, the web, workflows, and XML documents. Many graph search algorithms have been developed in chemical informatics, computer vision, video indexing and text retrieval with the increasing demand on the analysis...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Density Based Protocol for Head Selection in Wireless Sensor Networks

    In wireless sensor networks nodes have several limitations such as limited battery life, low computational capability, short radio transmission range and small memory space. However, the most severe constraint of the nodes is their limited energy resource because they cease to function when their battery has been depleted. To reduce...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Performance Analysis of AQM Schemes in Wired and Wireless Networks Based on TCP Flow

    TCP is the main protocol that carried the traffic in a reliable way. IP based network always facing congestion because of increasing traffic. To control congestion and implement QOS in TCP the authors perform a comparative study between different active queue management techniques. Queue management is an important part to...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Segmentation and Classification Using Heuristic HRSPSO

    In this paper, a Heuristic Hybrid Rough Set Particle Swarm optimization (HRSPSO) Algorithm is proposed for partitioning a digital image into different segments that is more meaningful and easier to analyze segmentation and Classification. The heuristic HRSPSO algorithm has been implemented with a novel method in MATLAB platform considering 50...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Analysis of Effectiveness of Web Based E-Learning Through Information Technology

    Advancements of technology help in providing effective decision-making and problem solving in many aspects of life. Amongst the available technologies, Information Technology (IT) is one of the leading technologies in effectively utilizing the scarce resources to encounter the gap between solutions provided by existing methodologies and demands of society. Effectiveness...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Routing in Ad Hoc Wireless Networks Using Soft Computing Techniques and Performance Evaluation Using Hypernet Simulator

    An ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination,...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Web Spam Detection Using Different Features

    Spamming is any deliberate action solely in order to boost a web page's position in search engine results, incommensurate with page's real value. Web Spam is the Web pages that are the result of spamming. Web spam is the deliberate manipulation of search engine indexes. It is one of the...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Security Enhancement in Elliptic Key Cryptography Using Character Based Method

    It is widely recognized that data security will play a central role in the design of future IT system. Elliptic key cryptography recently gained lot of attention in industries when the authors talk about security. This paper discusses the basic operation how ECC is more secure than other public key...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Optimization of Artificial Neural Network for Speaker Recognition Using Particle Swarm Optimization

    This paper proposes a Particle Swarm Optimization (PSO) based optimization technique for Artificial Neural Network weights optimization for speaker recognition. PSO is a search algorithm, in which each potential solution is seen as a particle with a certain velocity flying through the problem space. The particle swarms find optimal regions...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    UEP Based on Proximity Pilot Subcarriers in OFDM

    A novel Unequal-Error-Protection method is proposed that utilizes the subcarrier positions relative to pilot subcarriers in an OFDM multicarrier frame. With the available physical layer techniques, a prioritized encoding strategy based on the characteristics of the channel fading effects on the data subcarriers, those are in close proximity to the...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Corpus Based Automatic Text Summarization System With HMM Tagger

    The rapid growth of the data in the Internet has overloaded the user with enormous amounts of information which is more difficult to access huge volumes of documents. Automatic text summarization technique is an important activity in the analysis of high volume text documents. Text Summarization is condensing the source...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Performance Elevation Criteria of RS Coded OFDM Transmission Over Noisy Channel

    OFDM has recently been applied widely in wireless communication system due to its high data rate transmission capability with high bandwidth efficiency. Error control codes are used to protect information from errors that can occur during transmission Reed Solomon (RS) codes is one of the most important and best known...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Finding Optimal Attack Path Using Attack Graphs: A Survey

    As the traditional methods, the result of vulnerability scanning can't directly reflect complex attack routes existing in network, so the concept of attack graph comes. After analyzing host computer, devices link relation and the characteristic of attack, the model of network security status was built. Attack graphs are one of...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jul 2011

    Comparison of Different Parameters Used in GMM Based Automatic Speaker Recognition

    The performance of Speaker recognition systems has improved due to recent advances in speech processing techniques but there is still need of improvement. In this paper, the authors present the comparison of different parameters used in automatic speech recognition system to increase the accuracy of the system. The main goal...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Nov 2012

    An Evolution Strategy Approach Toward Rule-Set Generation for Network Intrusion Detection Systems (IDS)

    With the increasing number of intrusions in systems' and networks' infrastructures, Intrusion Detection Systems (IDS) have become an active area of research to develop reliable and effective solutions to detect and counter them. The use of Evolutionary Algorithms in IDS has proved its maturity over the times. Although most of...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Efficient Solution for SQL Injection Attack Detection and Prevention

    SQL injection is the most common attack for web applications and widely used exploit by hackers all over the world. A malicious hacker can do a lot of harm if he wishes to. SQL injection is a security vulnerability that occurs in the database layers of an application. SQL injection...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Efficient Statistics Based Framework for Network Intrusion Detection

    Due to the growing threat of network attacks, detecting and measuring network abuse are increasingly important. Network intrusion detection is one of the most frequently deployed approaches. Most detection systems only rely on signature matching methods and, therefore, they suffer from novel attacks. This investigation presents a simple yet efficient...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2013

    Load Balancing Management by Efficient Controlling Mobiles Agents

    Load balancing is a computer networking methodology which allows the distribution of the workload across multiple computers or computing devices, such as central processing units, disk drives, or other resources, to reach optimal resource utilization, reduce response time, maximize throughput and circumvent overload. The Use of multiple computers with load...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Jan 2013

    Parameter Estimation in Wireless Sensor Networks Based on Decisions Transmitted Over Rayleigh Fading Channels

    In this paper, the authors present a distributed estimation method in Wireless Sensor Networks (WSNs) based on decisions transmitted over Rayleigh fading channels. The fusion centre can use either coherent receiver or non-coherent receiver to acquire decisions transmitted over Rayleigh fading channels. The estimation method using coherent receiver and the...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Improvement in End-to-End Delay and Energy Consumption using Routing Algorithms in Wireless Sensor Network

    The popularity of Wireless Sensor Networks has increased tremendously due to the vast potential of the sensor networks to connect the physical world with the virtual world. In wireless sensor network one of the main problems is related to energy issue because every node is operated by battery. In wireless...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Speed Regulation of DC Drive Using Mobile Communication

    The importance of the speed control of DC motors in manufacturing industries like plastic, textile, chemical and pharmaceutical hardly needs any emphasis as it ensures efficient and consistent production. In this paper, the authors present implementation of a hardware circuit which is designed for remote speed control of a DC...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Various Attacks in Wireless Sensor Network: Survey

    Today wireless communication technique has become an essential tool in any application that requires communication between one or more sender(s) and multiple receivers. Since multiple users can use this technique simultaneously over a single channel, security has become a huge concern. Even though there are numerous ways to secure a...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Study on Cloud Computing and Security Approaches

    This paper highlights the basic concept of cloud computing and some of the security measures which have been taken into consideration till now. This paper also includes various ways which can be implemented for the betterment of cloud computing. With the recent advancement of technologies cloud computing has become a...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Reducing Delay Data Dissemination Using Mobile Sink in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) is a collection of sensor nodes, which is spread in environmental area. These sensor nodes sense the data, information, Temperature and environmental changes from environmental area. Later it will be provide sensing information to the Sink node. In Wireless Sensor Networks hop by hop and Multi-hop...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Control of Irrigation Automatically By Using Wireless Sensor Network

    In the field of agriculture the most important part is: to get the information about the fertility of soil and secondly moisture content of soil. After measuring these two factors a farmer can start sowing of seeds. In this paper, the authors are giving the brief outline about different techniques...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Efficient and Enhanced Algorithm in Cloud Computing

    A class of systems and applications that procure distributed resources to execute the function in the decentralized manner is referred as cloud computing. It enables a wide range of users to access scalable, virtualized hardware, distributed and/or software infrastructure over the Internet. One of the challenging scheduling problems in Cloud...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // May 2013

    To Improve Security in Cloud Computing With Intrusion Detection System Using Neural Network

    Cloud computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing Systems can be easily threatened by various cyber-attacks, because most of Cloud computing system needs to contain some Intrusion Detection Systems (IDS) for protecting each Virtual Machine (VM) against threats. In...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Multi-Sensor Based Forest Fire Detection System

    Wireless Sensor Networks (WSNs) have become hot topic in field of research in recent days. In day to day life the authors come across many problems which left unresolved by humans, so at that time they think of collaborating human knowledge with technology to eradicate the problems. The efficient approaches...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Data Security in Cloud Based on Trusted Computing Environment

    In recent years Cloud Computing has become one of the growing fields in computer science. In which the security problem of cloud computing has become a hot research topic. It must be verified in the trusted status of the platform which actually carries out the computing task in the cloud,...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Effect of Mobility and Traffic Models on the Energy Consumption in MANET Routing Protocols

    A Mobile Ad-hoc NETwork (MANET) is a group of mobile nodes that can be set up randomly and formed without the need of any existing network infrastructure or centralized administration. In this network the mobile devices are dependent on battery power, it is important to minimize their energy consumption. Also...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Mobile Positioning System Using a Mathematical Approach

    In this era of advanced communication, there are large number of location and positioning based applications which are introduced and implemented practically and theoretically. In this paper, a design and implementation of new location measurement technology is being proposed by which this parameter could easily be estimated. This proposed system...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)

  • White Papers // Mar 2013

    Significance of Data Warehousing and Data Mining in Business Applications

    Information technology is now required in every aspect of the authors' lives which help business and enterprise to make use of applications like decision support system, query and reporting online analytical processing, predictive analysis and business performance management. In this aspect this paper focuses on the significance and role of...

    Provided By International Journal of Soft Computing and Engineering (IJSCE)