International Journal on Computer Science and Technology (IJCST)

Displaying 1-40 of 524 results

  • White Papers // Dec 2013

    Defenses Against Large-Scale Online Password Guessing Attacks

    Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing. Enabling convenient login for legitimate users while preventing such attacks is a difficult problem. Automated Turing Tests (ATTs) continue to be an effective, easy-to-deploy approach to identify automated malicious login attempts with reasonable cost...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    A New Pre Key Distribution in Wireless Sensor Networks

    Key management is the most important in wireless sensor network to achieve secure data transmission between nodes in the wireless sensor networks. However, sensor nodes have most insufficient resources in terms of hardware, power, processing capacity, storage capacity. As a result, the key management and distribution of keys in the...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Performance Comparison of DSDV, I-DSDV in Ad-Hoc Networks Using Random Walk Mobility Model

    Ad-hoc networks are wireless networks without a fixed infrastructure and nodes are randomly distributed in a region are moving arbitrarily. In ad hoc networks, however, routing becomes a significant concern, because it needs to be handled by ordinary nodes that have neither specialized equipment nor a fixed, privileged position in...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Spatial Data in Peer to Peer Systems

    The authors present spatial P2P, a totally decentralized indexing and searching framework that is suitable for spatial data. Spatial P2P supports P2P applications in which spatial information of various sizes can be dynamically inserted or deleted, and peers can join or leave. The Peer-to-Peer (P2P) model is used for storing...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    A New Approach for Monitoring System for Wireless Sensor Networks Using K-anonymity

    A privacy-preserving location monitoring system for wireless sensor networks is adopted. Two in network location anonymization algorithms are considered, namely, resource and quality-aware algorithms that aim to enable the system to provide high-quality location monitoring services for system users, while preserving personal location privacy. Both algorithms rely on the well...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    A Survey on Routing Protocols and Security Issues in Mobile Ad-Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is an autonomous collection of mobile devices (laptops, smart phones, sensors, etc.) that communicate with each other over wireless links and cooperate in a distributed manner in order to provide the necessary network functionality in the absence of a fixed infrastructure. The wireless links in...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Efficient Tree Based Data Collection in WSNs

    Wireless sensor networks may want to continuously extract data from other networks. In those situation energy efficient data collection and aggregation in wireless sensor networks is always a challenging issue present days. For example network topology construction and interferences also causes significant effects. For providing more efficiency in wireless sensor...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Anonymous Communication and Cell Counting Attack Against Tor

    Various low-latency anonymous communication systems such as tor and anonymizer have been designed to provide anonymity service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equalsized cells. Via extensive experiments on tor, the authors found that the size...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Secured Resource Accessing Through VPN Technology

    There is huge digitized data available with many libraries and they want to give restricted access to the thousands of users. The data is valuable and saleable intellectual property so the library managements or universities who are maintaining digital libraries wants to provide restricted access to their authorized persons such...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Identification of Security Flaws in Android By Using Reverse Engineering of Malware

    Smartphones have gained tremendous popularity over the last few years. In this growing market of smartphones, Android, an open source platform of Google has become one of the most popular operating systems. Android is mainly used in smartphones and tablets. Smartphones are accepted and admired by many mainly because they...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Keynote Trust Management for Network Security

    Network security concerns with the idea of the designed to a secured network, which is the most significant task in any organization or in an enterprise. To secure the different network devices from the unauthorized access i.e. to secure the network the users mainly apply the security policies and the...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    A Trusted Mechanism For Providing Security Over Cloud Computing

    The development of cloud computing is still in its initial stage, and the biggest obstacle is data security. How to guarantee the privacy of user data is a worthwhile study. This paper has proposed a secure document service mechanism based on cloud computing. Out of consideration of security, in this...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Advanced Prediction-Based System for Cloud Bandwidth and Cost Reduction

    In this paper, the authors present PACK (Predictive ACKs), a novel end-to-end Traffic Redundancy Elimination (TRE) system, designed for cloud computing customers. Cloud-based TRE needs to apply a judicious use of cloud resources so that the bandwidth cost reduction combined with the additional cost of TRE computation and storage would...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    A Study of Algorithms Used to Secure Data Processing in Cloud Computing

    Cloud computing is a web based application. There are many challenges faced by the data owner in outsourcing the data because the data can be changed or damaged when it is stored in third party cloud. To make data access and storage in cloud computing more secure in cloud, data...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Data Protection Analysis in Cloud Computing

    Cloud computing is basically an internet-based network made up of large numbers of servers - mostly based on open standards, modular and inexpensive. Clouds contain vast amounts of information and provide a variety of services to large numbers of peoples. The benefits of cloud computing are reduced data leakage, decrease...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Preventing Jamming Attacks in Wireless Networks by Using Cryptographic Primitives

    Jamming attacks are much harder to counter and more security problems. They have been shown to actualize severe Denial-of-Service (DoS) attacks against wireless networks. Under this model, jamming strategies include the continuous or random transmission of high power interference signals. The authors address the problem of jamming under an internal...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    A Bug Ignorance Causes Big Expensive on Smart Systems

    Computers are the pervasive technology of the people time. As computer become critically tied to human life, it also becomes more important that interactions with them are under control. They are no longer a novelty, but are integrated into the fabric of the people world, performing both high and low-level...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    A Secure Mechanism for MPI in Parllel Computing

    An increasing number of commodity clusters are connected to each other by public networks, which have become a potential threat to security sensitive parallel applications running on the clusters. To address Message Passing Interface (MPI) implementation to preserve confidentiality of messages communicated among nodes of clusters in an unsecured network....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    An Overview of Data Possessions on Scalability and Integrity Verification in Multi-Cloud Computing

    In cloud environment, an enormous amount of data is produced everyday. Many organizations are now migrated to cloud and demand for resource is increasing. Hence the providers are now delivering multi-cloud environment to meet this demand. If multiple providers cooperatively work together the availability of resource can be increased. But...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    A Novel Approach to Optimize Link - Node Failures in IP Networks

    As the internet evolves into a global communication infrastructure and supports many applications like, trading system, online games etc. To such a network, survivability is an important requirement in that services interrupted by network failures must be recovered. Failures in communication networks are common and can result in substantial losses....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Fuzzy Type Ahead: An Efficient Keyword Search in XML Data

    The traditional keyword-search system in XML data composes a keyword query and submits the query to the system. When the user has a limited knowledge about the data, they feels confused when issuing queries. The user has to use a trial and error method for finding out the needed information....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Mobile Message Authentication in IPv6

    In this paper the authors propose a secure message authentication method for mobile IPv6. IPsec is specified as the means of securing signaling messages between the mobile node and home agent for mobile IPv6. They propose a new mechanism for securing mobile IPv6 signaling between mobile node and different agents....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Multi View Point Similarity Measure with Incremental Clustering

    The main task of clustering technique in data mining and text mining is to analyze datasets by dividing it into meaningful groups. Certain relationship exists between the objects in the dataset. The similarity between the data objects can be described either explicitly or implicitly. In the existing algorithm the similarity...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Construct a Key-Insulated Symmetric Key by Using Cryptographic Cloud Software

    The motivation of the present study is two-fold. From a system perspective, a cloud should facilitate secure communications between the applications that run in different Virtual Machines (VMs). Software-based attacks (e.g., malware) pose a big threat to cryptographic software because they can compromise the associated cryptographic keys in their entirety....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Systems Bag for Dynamic Risk Management of Security in a Network

    Network security is an important task of network management. One threat to network security is malware (malicious software) propagation. One type of malware is called topological scanning that spreads based on topology information. The focus of this paper is on modeling the spread of topological malwares, which is important for...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Prediction of Business Calculations for Web Usage Mining

    Data mining, an interdisciplinary subfield of computer science, is the computational process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. In this paper the authors use some of the data mining techniques to capture information in business...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    RCF: A Novel Approach for Removing Conflicts in Firewalls

    The advancement of computer technology has enabled the users to perform business services more efficiently and effectively. But still the authors are suffering from the security leakages from unauthorized users. A firewall is a system that acts as an interface between private network and a public network. It implements the...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Phantom Problems and Its Relief Over Router

    In world, main communication media is networks. A computer network, or simply a network, is a collection of computers and other hardware interconnected by communication channels that allow sharing of resources and information. Where the authors can setup communication in between a small office, offices, towns, cities and any geographic...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Web Data Mining Based Business Intelligence and Its Applications

    Data mining, a field at the intersection of computer science and statistics, is the process that attempts to discover patterns in large data sets. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Identifying SPAM Information by Screening Outgoing Messages

    The advancement in computer technology leads to various major security threats like spamming, spreading malware DDOS known as spam zombies reduces the throughput of cpu and efficiency, delay transfer of messages. In this paper, to avoid the above conflicts a dynamic spam zombie detecting system called spot is introduced, which...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Security Issues in Mobile Ad-Hoc Networks

    In this paper the authors have studied about different mobile ad hoc networks in the infrastructure less wireless network. In a network the mobile nodes move rapidly from one node to another. The application of MANET requires very good efficient group communication for the data transfer. The security constraints taking...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Privacy-Preserving Data Outsourcing in Cloud Computing

    In cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy, sensitive data has to be encrypted before outsourcing, which obsoletes traditional data utilization based on plaintext keyword...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Hiding Schemes Defined for Thwarting of Selective Jamming Attacks in Wireless Networks

    The open nature of wireless medium leaves an intentional interference attack, typically referred to as jamming. This intentional interference with wireless transmission launch pad is for mounting denial-of-service attack on wireless networks. Typically, jamming has been addresses under an external threat model. However, adversaries with internal knowledge of protocol specification...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    DDD-View Sate): Distributed Databases Detachment View State for I/O Life Cycles

    In this paper the authors related to increases the DBMS performance and resolve all issues and risks. Here the authors are implement the new view state techniques and buffering techniques. These new view state techniques consume the I/O life cycle utilization. Previous system working procedure starts in complex databases. User...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Vehicle Detection and Tracking by Using Dynamic Bayesian Networks

    There is a fast growth in computer technology and increasing needs in security and studies of target vehicle detection in aerial surveillance using image processing techniques. The authors present automatic vehicle detection in their system. The purpose of this technical report is to provide the survey of research related to...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Forced Protection Security Wall for Web Server on Network Attacks

    The term web server can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver web content that can be accessed through the internet. Here the authors deal with software of the server. The most common use of web servers is to host...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    A Novel Approach for Efficient Routing in MANET with Energy Routing Algorithm

    MANET is a wide emerging technology in recent. Topology of MANET is highly dynamic in nature and nodes are frequent to change so that the rate of link failure is more in MANET. As no central control over the nodes each node acts as a source. New nodes can be...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    3-Phase Parallel Model with Testing for MIS

    A Management Information System (MIS) provides information that is needed to manage organizations efficiently and effectively. Management information systems are not only computer systems - these systems encompass three primary components: technology, people (individuals, groups or clusters, or organizations), and data/information for decision making. Management information systems are distinct from...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    Effective Load Balancing Based on Cloud Partitioning for the Public Cloud

    Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This paper introduces a better load balance model for the public cloud based on the cloud partitioning concept with a switch mechanism to choose...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2013

    An Efficient Cut Detection Assessment in Wireless Sensor Networks

    Wireless sensor networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real - world phenomena. A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a \"Cut\"....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2012

    Performance of Traffic Through Correlation True and False Positive by Using Watermarking

    Tracing attackers' traffic through stepping stones is a challenging problem, especially when the attack traffic is encrypted, and its timing is manipulated (perturbed) to interfere with traffic analysis. The random timing perturbation by the adversary can greatly reduce the effectiveness of passive, timing-based correlation techniques. The authors presented a novel...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Effectiveness of Process Metrics in Software Development

    Software is characterised by software metrics. Calculation of effort estimation is a type of Process metrics. Software effort estimation plays a vital role in the development of software. In recent years, software has become the most expensive component of computer system projects. The major part of cost of software development...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Analysis of Software Development Models

    Software development is a highly complex field with countless variables impacting the system. All software systems are imperfect because they cannot be built with mathematical or physical certainty. Bridge building relies on physical and mathematical laws. Software development, however, has no laws or clear certainties on which to build. As...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    An Efficient Key Management Scheme Based on Elliptic Curve Signcryption for Heterogeneous Wireless Sensor Networks

    In this paper, an efficient key management scheme based on public key elliptic curves signcryption scheme for Heterogeneous sensor networks has been proposed. The proposed protocol is optimized for cluster sensor networks and is efficient in terms of complexity, number of message exchange, computation, and storage requirements with optimized security...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Association Rule Mining in XML Databases: Performance Evaluation and Analysis

    Data mining is the process of extracting useful information from the huge amount of data stored in the databases. Data mining tools and techniques help to predict business trends those can occur in near future. Association rule mining is an important technique to discover hidden relationships among items in the...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    A Survey on Grid Computing Approach

    Grid computing enables virtual organizations to share geographically distributed resources as they pursue common goals, assuming the absence of central location, central control, omniscience, and an existing trust relationship. A recent survey ranked grid computing as sixth on priority lists for IT spending among industry professionals. This paper details the...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    A Novel Approach to Allow Process Into Critical Section With No Delay-Time

    This paper proposes a new idea which makes the processes not to wait for a long time to enter into a critical section to access a data structure which is already assigned to the other process and that process enters into critical section. Till date so many approaches and algorithms...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Study of Various Routing Protocols in VANET

    Vehicular Ad Hoc NETworks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages/disadvantages and the applications of various routing protocols for...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    ANN Model for Estimation of Capacitance Requirements to Maintain Constant Air-Gap Voltage of Self-Excited Induction Generator With Variable Load

    It is essential to supply electric power at rated voltage and frequency to the consumers for efficient and safe operation of electric equipment or other appliances under varying conditions of load connected in power system. The dependence of output voltage and frequency of Self-Excited Induction Generator (SEIG) on its speed,...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    The Comparative Study of Different e-Commerce Payment Gateways

    E-commerce payment gateway is the access point to the online banking network. All online transactions must pass through a payment gateway to be processed. The payment gateways act as a bridge between the user's website and the financial institutions that process the transaction. Gateways process the different transactions between user...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Comparative Analysis of Broadband Wireless Technologies

    Broadband wireless access networks are considered to be enterprise-level networks providing more capacity and coverage. Wireless networking has offered an alternative solution to the problem of information access in remote inaccessible areas where wired networks are not cost-effective. They have changed the way people communicate and share information by eliminating...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    The Evaluation of a Self Organizing Superpeer Network (SOSPNET)

    The popularity of the internet, rapid progress in audio compression algorithm and cost effective digital audio recording and storage devices and the promise of higher bandwidth and Quality of Service (QOS) for both wired and wireless networks have made it possible to create, replicate, transmit and distribute digital audio content...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Cleanroom Software Engineering: Towards High-Reliability Software

    The software industry is in switch over from craft work to engineering practice, but development, operational and maintenance outlays are still capricious and dearer. In the present scenario of software industry there are certain factors that very critical for the success of software. These days there are a few software...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Prevention of DDoS Attacks

    Distributed Denial-of-Service (DDoS) is an increasingly worrying threat to availability of Internet resources. DDoS Attacks have recently emerged as one of the most newsworthy, if not the greatest weaknesses of the Internet. DDoS attacks cause economic losses due to the unavailability of services and potentially serious security problems due to...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Security Issues, Challenges & Solution in MANET

    Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Improved Mechanism for Efficient Object Pooling in J2ME Based Mobile Phone

    Now-a-days mobile phones are expected to handle huge volume of multimedia data which is very challenging due to the small memory size of the mobile phone sets. J2ME services play an important role in the field of communication industry. J2ME provides newest java virtual machine technology called K Virtual Machine...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    How the Two Adhoc Networks Can Be Different: MANET & WSNs

    Reasons for switching over from a wired network to a wireless network are many. To name a few - sharing internet access, along with the files and printers, playing games, always on, no more messy wires required and the list goes on and on. For a more mobile solution where...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    IPVDD: Intrusion Prevention for Virtual Data Centers (A Framework for Encryption and Decryption)

    In cloud computing, cloud user's sensitive data is in the control of a third part, where cloud users feel there is no privacy and security of the data. But an economic choice is to use cloud computing and cloud storage instead of manage data center by itself. The difficulty is...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Network Based Approach of Human Interaction With Real World Objects Through Semantics

    Ubiquitous computing is the opposite of virtual reality. Where virtual reality puts people inside a computer-generated world, Ubiquitous computing forces the computer to live out here in the world with people. Under normal sense a single user consciously engages a single device for a specialized purpose, using Ubiquitous computing many...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    An Overview of Intrusion Detection System Strategies and Issues

    During the past five years, security of computer network has become main stream in most of everyone's lives. Today, most discussions on computer security is centered on the tools or techniques used in protecting and defending networks. Intrusion detection is the method of identifying unauthorized use, misuse, and abuse of...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Survey of Software Life Cycle Models by Various Documented Standards

    In the current scenario, information systems are important part of any organization. As compared to 1970's and 1980's, they are becoming more and more complex. In the early years i.e., 192's, software development was not an independent established discipline. Instead it was only an extension of the hardware. Earlier programs...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    An En-Route Bogus Filtering Mechanism for Secured Data Dissemination in Wireless Sensor Networks

    Wireless Sensor Networks are deprived of high memory requirements, high processing power, and are limited in usage of efficient security mechanisms. They are susceptible to possible node compromise, passive and active attacks. Most of the public key cryptographic techniques are found to be more work prone with the secure exchange...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Secure SMS With Identity Based Cryptography in Mobile Telecommunication Networks

    Short Message Service (SMS) and Multimedia Message Service (MMS) has grown in popularity over the years and it has become a common way of communication. SMS is usually used to transport unclassified information, but with the rise of mobile commerce it has become a popular tool for transmitting sensitive information...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Nearest Neighbor Monitoring of Spatial Queries in Wireless Environments

    In a Wireless data broadcast is a promising technique for information dissemination that leverages the computational capabilities of the mobile devices in order to enhance the scalability of the system. Under this environment, the data are continuously broadcast by the server, interleaved with some indexing information for query processing. Clients...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    A New Forward Secure Elliptic Curve Signcryption Key Management (FS-ECSKM) Scheme for Heterogeneous Wireless Sensor Networks

    In this paper, an efficient Forward Secure Elliptic Curve Signcryption Key Management (FS-ECSKM) Scheme for Heterogeneous Wireless Sensor Networks (HWSN) has been proposed. The proposed protocol is optimized for cluster sensor networks and is efficient in terms of complexity, number of message exchange, computation, and storage requirements with optimized security...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    Software Engineering Issues in Development Models of Open Source Software

    In the recent years open source software has seen spectacular success due to the development of high quality software. Open source software development has established itself to be an efficient and successful development methodology despite the fact that no standard development life cycle exists and also the development methodology of...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    Comparison on Various Protocols by Using Qos Parameters in Wireless Sensor Networks

    In recent days, the radio signals mingled with both high-quality and low-quality frequency links. The motes face failure from the radio frequency interferences in noisy environment and consume more energy for packet transmission. To overcome the higher power consumption problems, a system with the Efficient and Reliable Routing protocol (EAR)...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    Security in Multi-Hop Wireless Networks

    Multi-hop wireless networks are facing some research issues regarding routing protocols and security mechanisms. Multi-hop decentralized architecture, media access delay, lower link life, and multi-layer security threats are the key challenges which need to be address. The selection of optimal path for routing and the detection of multilayer security attacks...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    Securing Supply Chain Management System Using RFID

    RFID Applications can be used to monitor and manage the movement of the finished products throughout a supply chain. RFID tags can be attached directly to the items and materials or they can be attached to the containers that carry them. Pallets, trailers, totes, carts, cargo containers, and reusable transport...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    Reliability Estimation and Analysis of Linux Kernel

    Latest stable version of Linux kernel used by all Linux based operating system is 2.6 series. The purpose of this paper is to develop an optimized reliability model suitable for this version of the kernel and analyze its reliability by fitting this model. By using goodness of fit test best...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    A Sight Into Cloud Computing

    In this technological world, the people engulf with a variety of new advancements, out of these the one the authors are going to discuss is cloud computing. Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    Performance Comparison and Analysis of Manycast QoS Routing Algorithm Over Optical Burst Switched Networks

    In network communications, there are many methods to deliver data from sources to destinations. During the past few years, the authors have observed the emergence of new applications that use multicast transmission. In many distributed applications require a group of destinations to be coordinated with a single source. Multicasting is...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    A Comparison Between FCFS and Mixed Scheduling

    When more than one process is run-able, the operating system must decide which one first. Scheduling refers to a set of policies and mechanisms built into the operating system that govern the order in which work to be done by a computer is completed. Many objectives must be considered in...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    Novel Approach for Improvisation of Medium Access Protocol for Wireless Sensors Networks

    Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will, collaborate for a common application such as environmental monitoring. The authors expect sensor networks to be deployed in an ad hoc fashion, with individual nodes remaining largely inactive for long periods of time, but then...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    An Effective Implementation of Embedded Rabbit Web Server With HTTP Protocol

    This paper Presented Implementation of the Embedded Rabbit Web Server, the authors have used Rabbit 5000 Microprocessor and RCM 5700 Embedded Module and Its Programming Software Dynamic C. The main attention is to the TCP/IP architecture and its different protocols for implementation of Web Enabled services. HTTP protocols, various configurations...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    Ontology for MANET Intrusion Detection

    At present, the security issues on MANET have become one of the primary concerns. The MANET is more vulnerable to attacks as compared to wired networks due to distributed nature and lacks of infrastructure. Those vulnerabilities are nature of the MANET structure that cannot be removed easily. As a result,...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    A Framework for Security Enhancement in Mobile-Ad-Hoc Network

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes which dynamically forms a temporary network without the use of any existing network infrastructure or centralized administration. The security in MANETs has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    The Server Reassignment Problem for Load Balancing in Structured Peer to Peer Systems

    Application-layer Peer-To-Peer (P2P) networks are considered to be the path break in the Internet infrastructure. Load balancing among the peers is critical for these systems to be effective. Most structured P2P systems rely on ID-space partitioning schemes to solve the load imbalance problem. The authors' focus is on an important...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    Design of Wireless Communication Link Using Transreceiver System

    Modern Optical Wireless Communication (OWC) was an offshoot of the development of laser technologies in the 1960s. The main aim then was to develop communication between satellites and submarines beneath the surface of the sea. In the communication world, Optical Wireless Communication (OWC) is the only area that remains to...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    An Integrated Approach for Cloud Based Web Secure Web Services

    Cloud computing is the provision of dynamically scalable and often virtualized resources as a service over the Internet on a utility basis. Cloud computing services often provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers. The term...

    Provided By International Journal on Computer Science and Technology (IJCST)