International Journal on Computer Science and Technology (IJCST)

Displaying 1-40 of 611 results

  • White Papers // Apr 2015

    Virtualization and Consolidation of Server and Related Security Issues

    Although 'Virtualization' as a concept is not new, currently, 'Server virtualization' has become a hot topic in the IT industry and everyone is talking about it. It is deeply connected with the topic of 'Green IT computing' (other synonymous terms being green computing and green IT). Many organizations seem to...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Apr 2015

    Using Side Information Partitioning for Efficient Classification of Web Data

    Web data mining has been a major requirement in current era as the spread of internet and increasing data over the internet. User specific requirements are being more demanding for making websites search engine friendly and listing on top of search engines. But since the search engine techniques available are...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2015

    Enhanced Agent Based Scheduling & Monitoring System in Cloud Computing

    Scheduling and monitoring is the main challenge in cloud computing paradigm. Various methods have been proposed but they have their own pros and cons. The main challenge is distributive nature of the cloud computing that create the problem to implement the proper scheduling of the service (mainly SaaS) and their...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2015

    Application Migration over the Cloud with High Performance and Reliability

    Cloud computing has been discussed and researched majorly in areas of security, performance, application management & deployment, virtual machine migration etc. Along with these prominent researches it also needs to focus on application migration with reliability over the cloud. This is needed for fault tolerance in applications and keeping the...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2015

    Leakage-Resilient Cryptosystem with Efficient and Flexible Key Delegation in Scalable Cloud Storage

    Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machine. But the thing is user don't have physical control over the outsourced data. The need is...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2015

    Bayes Classifier for Different Data Clustering-Based Extra Selection Methods

    Feature choice involves distinctive a set of the foremost helpful options that produces compatible results because the original entire set of options. A feature choice formula could also be evaluated from each the potency and effectiveness points of read. Whereas the potency considerations the time needed to seek out a...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2015

    Intrusion Detection and Severity Analysis in Cloud

    Cloud computing takes the technology, services and applications that are close to those on the internet and turns them into a self-service utility. Hence, cloud management and security has become an important and growing area of technology. However, clouds introduce security challenges which need to be addressed to facilitate widespread...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2015

    TinyOS: An Operating System for Wireless Sensor Networks

    TinyOS is an open-source, flexible and application-specific operating system for wireless sensor networks. Wireless sensor network consists of a large number of tiny and low-power nodes, each of which executes simultaneous and reactive programs that must work with strict memory and power constraints. The wireless sensor network's challenges of event-centric...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2015

    Data Linkage for BigData Using Hadoop MapReduce

    One-to-many data linkage is important in data mining. In earlier works data linkage is performed among entities of the same type. To link between matching entities of different types in larger datasets a new one-to-many data linkage method with MapReduce is proposed that links between entities of different natures. The...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2015

    Comparison Between Various Types of Adder Topologies

    Adders are one of the most widely digital components in the digital integrated circuit design and are the necessary part of Digital Signal Processing (DSP) applications. With the advances in technology, researchers have tried and are trying to design adders which offer either high speed, low power consumption, less area...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    Operations Research and Value Engineering - Role in Decision Making and Productivity Improvement

    "In today's highly competitive business environment it has become a truism only the fittest survive. Organizations invest in many different aspects of managing their business in order to remain competitive. Operations research and value engineering is a key strategic factor for increasing organizational productivity and for better utilization of resources....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    Simulation of Probability of False Alarm and Probability of Detection Using Energy Detection in Coginitive Radio

    "The rapid growth of wireless devices and application has contributed to huge demand for licensed and unlicensed frequency spectrum. However, recent studies exhibits that restricted spectrum assignment policy results in congestion for spectrum utilization under which considerable portion of the licensed spectrum is severely under-utilized. To address this problem, Cognitive...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    Mobile Ad-Hoc Networking

    "A Mobile Ad-hoc NETwork (MANET) is collection of nodes that can physically move and that communicate using wireless technology. Each node can also act as a router and nodes cooperate to facilitate multi-hop connections. This is in contrast to the well-known single hop cellular network model that supports the needs...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    Vehicular Ad-Hoc Networks (VANETs): A Survey

    "With the development in the field of wireless communications, ITS (Intelligent Transport System) applications are developed based on car-to-car communication standards such as Wireless Access in Vehicular Environments (WAVE) and Dedicated Short Range Communications (DSRC). Wireless networks are gaining popularity now-a-days, as the users require wireless connectivity irrespective of their...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    "Malware Analysis, Clustering and Classification: A Literature Review"

    "The term malware or malicious software (also known as computer virus) is used for any computer program that is designed with explicit intent to compromise system and to perform various types of frauds. Malware is major security threat on the Internet now-a-days. Anti-Virus companies receive large number of malware samples...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    The Efficiency of Data Sharing in a Cloud by Security Analysis Using Mona

    The cloud servers managed by cloud providers are not completely trusted by users while the data files stored in the cloud may be responsive and confidential such as business plans. To preserve data privacy a basic solution is to encrypt data files and then upload the encrypted data into the...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    Two Novel Approaches on the Node Clone Detection in Wireless Sensor Networks

    "Wireless Sensor Networks (WSNs) are vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. In this paper, it presents two novel, practical node clone detection protocols with different tradeoffs on network conditions and performance. The first proposal is based on a Distributed Hash...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    Privacy Enhancing Technologies

    "Privacy is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). Different communities of computer science researchers have framed the 'OSN privacy problem' as one of surveillance, institutional or social privacy. In tackling these problems they have also treated them as if they...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    Implementation of LAR Protocol Using MANETS

    "Mobile Ad-hoc NETworks (MANETs) consist of wireless mobile hosts that communicate with each other, in the absence of a fixed infrastructure. Routes between two hosts in a Mobile Ad-hoc NETwork (MANET) may consist of hops through other hosts in the network. Host mobility can cause frequent unpredictable topology changes. Therefore,...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    A Novel Architecture for Peer-to-Peer System to Provide Security

    "In this paper, the authors propose a novel architecture for Peer-To-Peer (P2P) system to provide security that aims to decrease malicious activity in a P2P system by establishing trust relations among peers in their proximity. In this architecture, peers are assumed to be strangers to each other at the beginning....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    "Performance Study of Proactive, Reactive and Hybrid Routing Protocols for MANET in Multiple CBR Scenario"

    "Mobile Ad-hoc NETwork (MANET) comprises of numerous ubiquitous mobile computing devices called nodes which form distributed network and support dynamic topology without any centralized infrastructure like base station. In such distributed network, the communication between the nodes relies on multi-hop technique. Since, the nodes in a MANET do not have...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    Technological Innovation and Its Role in Promoting and Facilitating the Process of Organizational Learning in Small and Medium Enterprises

    "In this paper, the authors aim to identify the role of technological innovation in promoting organizational learning in small and medium enterprises, from the premise that organizational learning is a key step in the learning organization as an appropriate climate for the adoption of organizational learning for sustainability success within...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    Sensibility of Sensors in Smartphones

    "Now-a-days every second person uses a Smartphone but very few know what sensors work inside the mobile. The demand is growing for indoor navigation software's. This topic is very hot because, the authors have a lot of sensor but they can't use them for indoor positioning. The other problem is...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    The Effect of VoIP Payload Size on Upload Delay Values in HSPA and HSPA Mobile Networks

    "Voice over IP (VoIP) is a more and more popular way of communication, because people can use it for long distances with very low cost. The importance of mobile broadband is also increasing, since the need for immediate information access is bigger than ever. The authors can combine these fields,...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    A New Advance Role Based Access Control Model to Enhance the Transactions at Cloud Server

    "In cloud computing, RBAC enables users to carry out a wide range of authorized tasks by dynamically regulating their actions according to flexible functions, relationships and constraints. This is in contrast to conventional methods of access control, which grant or revoke user access on a rigid, object-by-object basis. In RBAC,...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    A Review on Camera Based Attacks on Android Smart Phones

    "Mobile phones are becoming important part of the users' day-to-day life specially the smart phones, since they are involved in keeping in touch with friends and family, doing business, accessing the internet and other activities. Now-a-days, almost all the smart phones have features like camera and touch screen. These features...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jan 2015

    In the Multi-Hop Wireless N/W: Avoiding Packet Drop for Improved Throughput

    "In this paper, a new approach of controlling congestion is being proposed on the basis of a few more information maintained by nodes locally to slow down the network traffic inflow so that information shall not be gathered on a node and hence no need of dropping access packets in...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    Feature Subset Selection in High Dimensional Data using Clustering

    Feature selection is a process of identifying a subset of potential features that can be used to produce useful results similar to the original feature set. The feature selection should be characterized and viewed from the efficiency and effectiveness point of view. Efficiency is a matter of time needed to...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    EIRQ Methods to Provide a Cost-Efficient Solution for Private Searching in Cloud Computing

    As a characteristic cloud application an organization pledge the cloud services and approves its team to share files in the cloud. Each file is explained by a set of keywords and the staff as authorized users can repossess files of their interests by querying the cloud with certain keywords. In...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    To Do Comparitive Study by Implemennting Cryptography Algorithms on the Bases of RSA and EL-GAMAL

    In this paper, the authors explain about the combination of different types of asymmetric key cryptography. Here they will going to combine two different algorithms which are RSA algorithm and El-Gamal algorithm and hence form a new algorithm named as RSAELGAMAL algorithm. The results will be implemented with the help...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    WSN Secure Coverage of Large Scale WSN Using Scalable Key Management Scheme

    A Wireless Sensor Network (WSN) contains of spatially distributed self-sufficient sensors to screen physical or environmental circumstances such as temperature, sound, pressure, etc. and to obligingly permit their data through the network to a main location. The recent networks are bi-directional, also empowering control of sensor activity. The expansion of...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    Improving Security For Dynamic Groups in Cloud Using Bell-Lapadula Model

    A public cloud provides a scalable access to the computing resources and IT resources. In addition to these services it should also posses the level of security when it comes to dynamic groups. The authors propose a dynamic group system to implement multi-level security using Bell-Lapadula model to distinguish the...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    Modified History Information-Exchange Optimized Protocol : A Clone Node Detection Protocol in Mobile Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are frequently deployed in unfriendly environments; they are exposed to physical capture and cooperation. In a node replication attack or clone attack, an adversary physically arrests a sensor node, removes its cryptographic confidences and distributes a large number of imitations of captured node all over the...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    Energy Balanced Clustering and Aggregation for Wireless Sensor Networks

    Wireless Sensor Network (WSN) is a large group of dedicated equipments with a communication infrastructure intended to supervise and document conditions at diverse locations. Sensor nodes are limited in power. It is difficult to recharge the battery of sensor. Energy preservation is the main issue of WSN. Clustering and aggregation...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    Issues and Effective Research on Energy Re-Gain in Underwater Wireless Sensor Network

    UnderWater Sensor Networks (UWSNs) was lately projected to sustenance moderately few of aquatic solicitations such as wharf observing and marine consideration. In energy-constraint UnderWater Sensor Network (UWSN) it is very vital to find tactic to mend the life expectancy of the sensor. Acoustic communication stereo typically directs the clout usage...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    Cloud Storage- Security and Privacy

    The cloud has become popular for delivering resources such as computing and storage to customers on demand. Cloud storage is a service where data is remotely maintained, managed, and backed up. The service is available to users over a network, which is usually the internet. Users should also be aware...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    Iterative Duplicate Detection in XML Data

    Duplicate detection consists in detecting multiple representations of a same real-world object, and that for every object represented in a data source. Duplicate detection is relevant in data cleaning and data integration applications and has been studied extensively for relational data describing a single type of object in a single...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    Neighbour Verification and Discovery in MANETS

    Information about the location is an important resource in mobile networks. This information may be used by a number of protocols and applications. The knowledge of location of the nodes in Mobile Ad-hoc NETworks (MANETs) is essential in these applications. The correctness of node locations is an important issue in...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    Partitioning and Load Balancing in Cloud Computing

    Cloud computing implementations offer seemingly infinite pooled computing resource over the network. In cloud computing resources are provided virtually for computation, storage and developing application. Cloud computing is built on the base of distributed computing, grid computing and virtualization. Cloud computing is defined as a large scale distributed computing paradigm....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2014

    Data leakage and Prevention

    Data leakage can cause an organization untold public embarrassment and loss of revenue. Decision-makers therefore need to address the risk of data loss or leakage in light of a broader security strategy and roadmap. Data leakage incidents are not necessarily the result of malicious intent. Employees may transfer sensitive data...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2011

    Human Resource Empowerment as Social Responsibility of Organizational Management

    Research on the link between Human Resource Empowerment (HRE) and Social Responsibility of Organizational Management (SROM) is very important. For this reason, the responsibility and functions of managers as a responsible who increasingly charged with the following of many HRE practices. This paper explores the attention to human resource and...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Sep 2011

    Overview of ERP

    ERP (Enterprise Resource Planning) benefits are important for a number of reasons, as they lower operating costs, reduce cycle times and (arguably) increase customer satisfaction. In addition to that, there are some requirements for successful implementation of ERP in the organization like huge amount of money, etc. Besides the ERP...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2011

    Role of Management Information System (MIS) in Human Resource

    In today's organizations human resource is considered as one of the key resources of business organizations. The transaction processing layer of MIS in human resource function deals with routine activities like attendance recording and payroll calculations. The operational level activities also include maintaining the employee records which is used as...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2011

    Web Content Mining Using Database Approach and Multilevel Data Tracking Methodology for Digital Library

    Website plays a significant role in success of an e-business, e-books and knowledge discovery. It is the main start point of any organization and corporation for its customers, so it's important to customize and design it according to the visitors. Also, websites are a place to introduce services of an...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Sep 2012

    Enterprise Resource Planning: Factors and Procedures that Leads to Success in Implementation

    Enterprise Resource Planning (ERP) systems are highly complex information systems. The implementation of these systems is a difficult and high cost proposition that places tremendous demands on corporate time and resources. Many ERP implementations have been classified as failures because they did not achieve predetermined corporate goals. This paper identifies...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Jun 2011

    Link Analysis Algorithms for Web Mining

    With the explosive growth of web, the primary goal of website owner is to provide relevant information to the users to fulfill their needs. Hyperlink analysis was important methodology used by famous search engine Google to rank the pages. There is ranking algorithms page rank, weighted page rank and weighted...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Load Balancing of Ant Based Algorithm in MANET

    MANETs hold the promise of future, with the capability to establish networks at anytime, anywhere without the aid of any established infrastructure. In MANETs all nodes are mobile and can be connected dynamically. MANETs are inspired by ant colony optimization framework and uses "Ants" for route discovery, maintenance & improvement....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    4 Bit Architectures Considered Harmful

    The implications of secure epistemologies have been far-reaching and pervasive. In this paper, the authors disconfirm the structured unification of access points and lambda calculus, which embodies the structured principles of cryptography. Here, they describe a novel system for the emulation of Byzantine fault tolerance (TAS), which they use to...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    A Case for Active Networks

    The analysis of active networks has improved the partition table, and current trends suggest that the analysis of information retrieval systems will soon emerge. In fact, few system administrators would disagree with the exploration of symmetric encryption. The authors demonstrate that though reinforcement learning can be made large-scale, symbiotic, and...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    FRENSA: Farthest, Reliable and Efficient Node Selection Algorithm for Mobile Ad-Hoc Networks (MANETs)

    Mobile Ad hoc NETworks (MANETs) are temporal networks consists of wireless interface, dynamic connection establishment without pre-existing infrastructure, low power, dynamic topology and self organized nodes. Security and reliability play major role on selection of a node for packet forwarding. In this paper, the authors proposed a new approach to...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Effect of Black Hole Attack on AODV Routing Protocol in MANET

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are infrastructure less. A black hole is a malicious node that incorrectly replies the route requests that it has a fresh route to destination and then it drops all the receiving packets. The...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Vulnerabilities and Intrusion Detection in Wireless Networks

    Wireless technologies will be among the most important ones in the next decade. In this paper, the most frequently exploited vulnerabilities of wireless networks that use the IEEE 802.11 standard are enumerated. Intrusion detection and prevention systems are proposed as an important line of defense in a multifaceted wireless network...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    A New Prospectus to Proceed Software Reliability Modelling

    Now-a-days nearly two hundred models for Software Reliability modelling have been developed and it becomes so complex to choose an appropriate model for that particular case. Every researcher does development of new model for solving the upcoming problem, but they have not laid emphasis on how people can select a...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Effectiveness of Process Metrics in Software Development

    Software is characterised by software metrics. Calculation of effort estimation is a type of Process metrics. Software effort estimation plays a vital role in the development of software. In recent years, software has become the most expensive component of computer system projects. The major part of cost of software development...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Analysis of Software Development Models

    Software development is a highly complex field with countless variables impacting the system. All software systems are imperfect because they cannot be built with mathematical or physical certainty. Bridge building relies on physical and mathematical laws. Software development, however, has no laws or clear certainties on which to build. As...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    An Efficient Key Management Scheme Based on Elliptic Curve Signcryption for Heterogeneous Wireless Sensor Networks

    In this paper, an efficient key management scheme based on public key elliptic curves signcryption scheme for Heterogeneous sensor networks has been proposed. The proposed protocol is optimized for cluster sensor networks and is efficient in terms of complexity, number of message exchange, computation, and storage requirements with optimized security...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Requirements Based Test Case Prioritization Using Genetic Algorithm

    Software testing and retesting occurs continuously during the software development life cycle to detect errors as early as possible. During the regression testing, a modified system needs to be retested using the existing test suit. Since the test suit may be very large, the better way is to prioritize it....

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    NWSNS and Its Applications

    Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, wireless communications, and digital electronics have enabled the development of low-cost, low power, Multi functional sensor nodes that are small in size and communicate in short distances. Wireless Sensor Network (WSN) system is autonomous and operates unattended, adaptive to the environment. So it's...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    A Heuristic-Based Cache Replacement Policy for Data Caching

    Caching frequently accessed data is an important technique that allows performance improvement of a system by providing reusability of data in wired and wireless data dissemination environments. Also caching is a major step in system designing to achieve high performance in areas like WWW, operating systems, databases and LDIS of...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    On Device Portal & It's Features

    The Indian telecom industry is witnessing the adoption of On-Device Portals (ODPs), a new generation of products which deliver content on the mobile phone through the use of a client application. In India Bharti Airtel Has decided to launch On-Device-Portal parallels to Airtel Live (WAP). By launching the ODP there...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    A Novel Approach of Intrusion Detection and Prevention for Fingerprints

    Fingerprint system is an important biometric technique for personal identification. The metric used for performance of identification techniques are directly scanned fingerprints or inked impression of fingerprints. The purpose is real-time, high confidence recognition of a person's identity by mathematical analysis of the random patterns that are visible within the...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Electronic Service Quality Evaluation Methods for Online-Banking System

    E-commerce has increased its significance during the last decades and its importance is still continuing to increase. Branches, which have had traditional means of conducting business and interaction between parties have also been influenced by the Internet and gone through many changes. One of these traditional branches is the banking...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Improvising BayesNet Classifier Using Various Feature Reduction Method for Spam Classification

    In this paper, the authors have proposed an efficient approach for the reduction of significant attributes from the Spam base warehouses for identifying spam email using forward selection method and have performed the classification of spam e-mail using data mining techniques. The data used in this paper is collected from...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Neural Networks for Face Recognition Using SoM

    In today's networked world, the need to maintain the security of information or physical property is becoming both increasingly important and increasingly difficult. Face recognition is one of the few biometric methods, which is very complicated system since the human faces change depending on their age, expressions, etc. A human...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Frequency Domain Filtering of Colour Images Using Quaternion Fourier Transforms

    The 2D Fourier Transform is an important image processing tool to decompose a grayscale image into its sine and cosine components. The output of the transformation represents the image in the frequency domain, given the input image in the spatial domain. Filtering in the frequency domain is a common image...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Cryptanalysis of Modern Cryptographic Algorithms

    Cryptography - a word with Greek origin mean "Secret writing". It refers to the science and art of transforming messages to make them secure and immune to attacks. Research on cryptography is still in its developing stages and considerable research effort is required. This paper is devoted to the security...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2010

    Direct Sequenced C-IAODV Routing Protocol

    Ad Hoc Networking holds the place tightly in this present scenario and would be the network going to reign the technology driven world in the future. This is obvious by looking at the exponential growth of the protocols supportive to this network. The process of fine tuning those protocols and...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Mar 2012

    Performance of Traffic Through Correlation True and False Positive by Using Watermarking

    Tracing attackers' traffic through stepping stones is a challenging problem, especially when the attack traffic is encrypted, and its timing is manipulated (perturbed) to interfere with traffic analysis. The random timing perturbation by the adversary can greatly reduce the effectiveness of passive, timing-based correlation techniques. The authors presented a novel...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Aug 2010

    An Effective Approach for Providing Anonymity in Wireless Sensor Network: Detecting Attacks and Security Measures

    A Wireless Sensor Network (WSN) consists of a large number of inexpensive and small nodes with sensing, data processing, and communication capabilities, which are densely deployed in a region of interest and collaborate to accomplish a common task. One main challenge in design of these networks is their vulnerability to...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Implementation of AXI Design Core With DDR3 Memory Controller for SoC

    This paper discusses the overall architecture of AMBA AXI design core along with its advantage with DDR3 memory controller and operation of its individual sub blocks. It takes care of the DDR3 initialization and various timing requirements of the DDR3 memory. The memory controller works as an intelligent bridge between...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    A Study on Fundamental Concepts of Data Mining

    The smallest elements that make up the system of neural networks are neurons. Neurons are typical programs those up on running acts like the people normal brain neurons in identifying the important information from large data. Neurons are the heart of neural networks. Initially it gives a brief description about...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Experimental Evaluation of Transmission Control Protocol Using Congestion Control for System to System

    In this paper, the authors present a survey of the congestion control proposals for TCP that preserve its fundamental host-to-host principle, meaning they do not rely on any kind of explicit signaling from the network. The proposed algorithms introduce a wide variety of techniques that allow senders to detect loss...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Design: USB 1.1 SIE (Serial Interface Engine) Transmitter Using VHDL

    USB has become a popular interface for exchanging data between PC's and peripherals. An increasing number of portable peripherals are using the USB interface to communicate with the PC. The design and implementation of a synthesizable model of the USB 1.1 protocol engine is presented in this report The PHY...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    An Observation on Performance Analysis of Grid Scheduler

    Grid scheduler allocates resources to task. In this paper, the authors proposed architecture of grid scheduler for task scheduling in grid. The goal of the scheduler in this paper is minimize make-span and maximize success execution rate of task. A number of experiments were carried out to check performance of...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Face Detection Using Skin Boosting Algorithm

    The problem of face detection is Vast. Many techniques have been used for detection of faces from the given set of images. In this paper, the authors present use human skin color to detect faces as main components. Detection results shows the components having skin color. Adaboost is used to...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    A Systematic Approach for Software Test Cases Generation Using Gray Box Testing With UML Activity Diagrams

    The trend of software engineering is shifting towards Component-Based Software Engineering (CBSE) from the traditional methods of software engineering. Everybody wants the product to be ready quickly. This support is provided by Component-Based Software engineering. Since the system is to be build with the ready to use components or prefabricated...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    Cross Platform Compatibility on Mobile Operating Systems

    Mobile Computing and its vast applications is the present day's most widespread technology. Mobile operating systems demonstrate six different leading platforms, each an island onto itself with a set of applications developed for that platform alone using the designated Software Development Kit (SDK). In order to develop the same application...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Dec 2011

    The Impact of Wormhole Attack on the Performance of Wireless Ad-Hoc Networks

    In multi-hop wireless ad hoc networks, cooperation between nodes to route each other's packets exposes these nodes to a wide range of security attacks. Also due to the vulnerability of the routing protocols, the wireless ad-hoc networks face several security risks. A particularly severe security attack that affects the ad...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Sep 2011

    Performance Comparison of Different Forward Error Correction Coding Techniques for Wireless Communication Systems

    High bit error rates of the wireless communication system require employing Forward Error Correction (FEC) methods on the data transferred. In this paper, the authors investigate the performance of convolutional, block as well as concatenated coding schemes that are used to encode the data stream in wireless communications. In this...

    Provided By International Journal on Computer Science and Technology (IJCST)

  • White Papers // Sep 2011

    Performance Evaluation of Tree - Based Multicast Routing Protocols in MANETs

    Multicasting plays a crucial role in many applications of MANETs. It can significantly improve the performance of the networks. This paper proposes the comparison of MAODV and ADMR protocol. MAODV improves the QoS parameters like throughput, delivery ratio, end-to-end delay as compared to the ADMR. The objective of a multicast...

    Provided By International Journal on Computer Science and Technology (IJCST)