International Research Association of Computer Science and Technology (IRACST)

Displaying 1-40 of 151 results

  • White Papers // Aug 2014

    A Survey of Routing Attacks in Mobile Ad Hoc Network

    Mobile Ad hoc NETworks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and have no fixed infrastructure. MANET do not have centralized administration, here nodes act as both host as well as router and communicate by forwarding packets for each other in multi hop way, because of the...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2014

    Security Framework for Malware Detection in a Decentralised Peer to Peer Network

    In a network of connected computers which aims to perform several tasks and important operations in real-time detection of malware requires computers to share information and access resources from other connected systems in the network. A decentralized P2P network which enables peers to have equal privileges also operate as both...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Jun 2014

    Prevailing Issues and Research Confront in Underwater Acoustic Sensor Networks

    In this paper, the authors examine a variety of approaches and the challenges in the design and the implementation on the research area of underwater acoustic sensor networks. Research in an Ocean is still unexplored boundary in this planet as compared to terrestrial sensor networks. This paper highlights various applications...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Jun 2014

    Performance Analysis of High Performance Energy Efficient Logic Styles in VLSI

    In this paper, the authors present a comparative study of high performance energy efficient logic styles in VLSI circuits. It has a keen role in the field of VLSI circuits. As the VLSI technology is upgrading this energy efficient logic styles are also upgrading. This logic styles include dynamic domino...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Jun 2014

    A Novel Approach For Ensuring Cost Effective Privacy In Cloud

    Cloud computing helps users to store massive data and allows them to process or retrieve the data whenever required without the aid of any infrastructure investment. But in the cloud, the privacy of the data is a major concern. For processing the data, data is classified into multiple data sets....

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Apr 2014

    Step-Up towards Privacy and Connectivity Concerns in WhatsApp

    WhatsApp is an instant messaging application which runs on all the Smartphone with internet access. Recently, hit the record of 10 billion total messages exchanged per day. Though, it is one of the most popular and favorite application of the Smartphone users there are few issues involved in its working....

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Oct 2013

    A Survey on Secure Intrusion Detection for Detecting Malicious Attackers in MANETs

    Mobile ad hoc network is a wireless network and it has a collection of mobile hosts. In this paper, all the nodes are moving independently within the same radio range and each mobile node can be act as a router. During the data transmission some nodes are attacked by the...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Oct 2013

    Surveying and Analyzing Security Challenges and Privacy in Cloud Computing

    Cloud computing is almost similar distributed computing over a network and means the power to run a program on many connected computers at the same time. The word is also, more commonly used to refer to network-based services which seems to be provided by real server hardware, which really are...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2013

    Hierarchical Attribute-Set-Based Encryption

    Cloud computing has emerged as one of the most influential paradigms in the IT industry in recent years. Since this new computing technology requires users to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. Several schemes employing Attribute-Based Encryption (ABE)...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Jun 2013

    A Perspective Analysis of Security Challenges and Performance Enhancement in Could Computing

    Cloud computing - delivering infrastructure, services, and software on demand via the network - offers attractive advantages to the public sector. It has the potential to reduce Information and Communications Technology (ICT) costs by vritualizing capital assets like disk storage and processing cycles into a readily available, affordable operating expense....

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Jun 2013

    Advanced Security in Virtualized Environment

    Virtualization is a key component of current enterprise IT infrastructure. That is mainly because of the cost effective solutions and highly scalable and efficient ways of data storage and data processing it provides. On one hand this ensures business continuity for critical business applications viz. banking, e-commerce etc. but at...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Jun 2013

    Assessing the Essential Features of ICT-Based LMS for Performance Enhancement

    Transformation has been happening in every field with the help of Information and Communication Technology (ICT). ICT is revolutionizing every aspect of an education sector in this digital era. To enhance the sustainability of higher education it is very much required to integrate ICT-based tools. In accordance with the above...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Apr 2013

    Introduction to Jamming Attacks and Prevention Techniques Using Honeypots in Wireless Networks

    Built upon a shared wireless medium, wireless networks are susceptible to jamming attacks. These types of attacks can easily be accomplished by an adversary by either bypassing MAC layer protocol or by emitting RF signals. Typically, jamming can be referred as intentional interference attacks on wireless networks. It is an...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Apr 2013

    SYN Flooding Attack Countermeasures in Next Generation Network

    In this paper, the authors propose countermeasures against SYN flooding attack in the Next Generation Network (NGN), Applying a filtering and PSO algorithm to IP packets flowing from internet in to NGN. IP packets are checked and abnormal packets for SYN flooding attack are detected at the internal router, and...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Apr 2013

    Medium Access Control Spoof Detection and Prevention Algorithm (MAC SDP DoS) for Spoofing Attacks in WLAN

    Wireless Local Area Network (WLAN) is widely used today because of its mobility and ease of deployment. Providing complete security to the WLAN users is a challenge due to the open nature and undefined boundaries of the wireless networks. This paper is intended to protect the 802.11 WLAN environments from...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2013

    Advanced Database Management Systems

    Data base management system consists of a collection of interrelated data and a set of programs to access those data. The collection of data is database. These are designed to manage large bodies of information. This paper describes advanced aspects of database management system including Query processing, data modeling, data...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Dec 2012

    Intrusion Detection Systems for Trust Based Routing in Ad-Hoc Networks

    Ad hoc networks are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures, and vulnerability of nodes, vulnerability of channels and open medium of communication. To address these concerns this work discusses a trust based mechanism coupled with ad hoc network based Intrusion Detection...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Nov 2012

    IT Security Measures for SME and Enterprise Organisations

    Security is an important aspect to be always focused in SME and enterprise organizations. Security aspects to various organizational groups need to be reviewed and different types of security has been reviewed. Appropriate solutions to handle various security scenarios would be briefed and their impact level was highlighted. IT security...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Nov 2012

    Analysis of Cloud Related Security and Risks Mitigation

    Adoptation to new technologies is quite common, out of which cloud computing usage is dramatically increasing day by day. Cloud computing security is an important aspect to be evaluated and this paper highlights the key concepts of cloud security to be adopted in SME and enterprise organizations. Security risk management...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Oct 2012

    A Survey on Encryption Schemes for Data Sharing in Cloud Computing

    A model by which information technology services being delivered is resources are retrieved from the internet through web-based tools and applications, instead of direct connection to a server. The Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Oct 2012

    Intrusion Detection: Using Log and Activities of User on the Computer

    Intrusion detection consists of actions for detection of illegal activity of (intruders) system that recognize the intruders. Some important intrusion avoidance activities are writing and implementing good activity information security rule, planning and performing effectual information security programs, installing and testing technology-based information security system for counting intruders activities such...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Oct 2012

    A New Block Based Database Encryption Algorithm

    It is necessary to secure systems is well understood and securing data must be part of an overall security plan. Growing amounts of confidential data are being retained in databases and more of these databases are being made accessible via the internet. As more data is made available electronically, it...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Oct 2012

    A Cogitate Study of IDS in MANET

    Mobile Ad-hoc NETworks (MANET) are widely used because of mobility and open architecture nature. But new technology always comes with its own set of problems. Several Intrusion Detection Techniques (IDTs) proposed for mobile ad hoc networks rely on each node passively monitoring the forwarding behavior by its next hop. In...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Performance Evaluation of Space Time Block Coded Spatial Modulation, Vertical-BLAST and Diagonal-BLAST Space Time Block Code

    Multiple Input Multiple Output (MIMO), Space-Time Coding (STC) improves the BER by adding diversity in the presence of a channel fading. The V-BLAST and D-BLAST techniques are designed to improve the data rate. The performance of these techniques is highly dependent on the MIMO channel environment. Space-Time Block Coded Spatial...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Energy Efficient Maximum Lifetime Ad-Hoc Routing (EEMLAR)

    A mobile ad-hoc network which does not use a wired network and base station system is composed of a group of mobile and wireless nodes. There are various types of restrictions. The biggest restriction is the confined energy of the batteries. In recent years, mainly focused on the shortest path...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Load Balancing Algorithms in Wireless Sensor Network : A Survey

    In this paper, the authors examine the proposed load balancing algorithms for wireless sensor networks. Load balancing can be used to extend the lifetime of a sensor network by reducing energy consumption. Load balancing using clustering can also increase network scalability. Wireless sensor network with the nodes with different energy...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Research Paper on Drip Irrigation Management Using Wireless Sensors

    In this paper, the authors are giving brief outline of improving Throughput and Average end to end delay of information gathered from the agriculture field for Precision Agriculture. This algorithm provides the Throughput of 180 bits/seconds. Besides delivery of water level information packets/signals to base station as it also computes...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    A Survey of Scalable Multicast Routing Protocols for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) consists of a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Multicast is a efficient method for supporting collaborative applications among a group of mobile users. Group communications are important in...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    The Effect of an Advanced Model of Power Consumed in Communications on the Lifetime of Wireless Sensor Networks

    In this paper, the authors present an advanced model for power consumption in communications and study its effect on the lifetime of the wireless sensor networks. The new model for power communications takes into consideration parameters such as power consumption for the active mode, power consumption for the sleep mode,...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Efficient Routing Protocol for MANET

    Current generation of applications including audio, video, and multimedia applications is dependent on the infrastructure based networks. But a large amount of research work is in process to utilize the benefits of adhoc networks over the infrastructure based wireless networks or adhoc networks. Due to the dynamic nature of adhoc...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Simulation of Service Availability and Restoration in Hybrid 4G Mesh Networks With Bandwidth and Power Management

    Heterogeneous wireless Mesh networks will be dominant in the next-generation wireless networks with the integration of various wireless access networks. The deployment of various wireless technologies (2G, 3G, WLAN, WMAN, etc.) in combination with the evolution of Mobile Terminals (MTs) with multiple network interfaces and the development of IP-based applications...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Spectrum Sensing in Cognitive Radio Using TSA

    A cognitive radio is a transceiver which automatically detects available channels in wireless spectrum and accordingly changes its transmission or reception parameters so more wireless communications may run concurrently in a given spectrum band at a place. The key requirement in cognitive radio is accurate detection of vacant spectrum bands....

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Vertical Handoff Reduction Mechanism Using IEEE 802.21 Standard in Mobile IPv6 (MIPv6) Network

    Low handoff latency and minimum packet loss are envisioned important factors for the next generation Mobile IPv6 (MIPv6) based heterogeneous networks. To meet these constraints IEEE 802.21-Media Independent Handover (MIH) was introduced to enhance the Quality of Service (QoS) of the networks. The MIH provides link layer information to the...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Performance Evaluation of TCP and UDP Over FSR, DSR and ZRP in MANETs

    No infrastructure, no centralized administration and self-configuration are the main characteristics of MANETs. The primary motivation of MANET deployment is to increase portability, mobility and flexibility. However, this mobility causes an unpredictable change in topology and makes routing more difficult. In this paper, the authors will show their conducted study...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    A Study of Wireless Mobile Sensor Network Deployment

    Wireless mobile sensor network is the collection of autonomous and distributed sensor with additional capacity of mobility. Mobility of sensor nodes adds additional functionality to the wireless sensor network of self deployment and relocation of sensors. Sensors find their own position and placed themselves over the target area after initial...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Creating Entrepreneurs Through Business Incubator

    This paper is to investigate and to identify the Business Incubator (BI) program in SMEs (Small and Medium Enterprises) in Bangunjiwo, Kasihan subdistrict, Bantul residence, Province of DIY (Daerah Istimewa Yogyakarta), Indonesia. Bangunjiwo has their own superiority in regards of SMEs which is handicraft SMEs as well as their superior...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Analysis of Total Quality Management - A Study With Special Reference to Selected SME's

    Improvements in quality can lead directly to increased productivity and other benefits. Recent evidence shows that more and more corporations are recognizing the importance and necessity of quality improvement if they are to survive domestic and world-wide competition. In today's Globalized economy quality management and control is recognized as the...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    IKM-Based Security Usability Enhancement Model

    Today by growth of hardware and software technologies new developed products are delivering more facilities while their security configuration is becoming more and more complicated. Security configuration of network-based products is not comprehensible for every user and therefore degrades system usability dramatically. IKM is a cryptographic key management framework which...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Big Data Analysis for Implementation of Enterprise Data Security

    In an enterprise which can be retail, finance, health or manufacturing, there is a high volume of data to be analyzed. The data arrives for analysis at high velocity and there is a lot of data variety. Such a huge data is termed as the \"Big data\". This big data...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Aug 2012

    Review and Analysis of Data Security in Data Mining

    In new era the information and data communication technologies are highly used in the business industry. The data warehouse is used in the significant business value by improving the effectiveness of managerial decision-making. Naturally such a process may open up new assumption dimensions, detect new invasion patterns, and raises new...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Apr 2012

    An Efficient Message Passing Technique Using Route Path Information in Unstructured Peer to Peer Network

    Peer-to-Peer overlay systems offer a substrate for the construction of large scale and distributed applications. The Peer-to-Peer technique is differentiated in to two major forms, Structured P2P and Unstructured P2P. In structured peer-to-peer networks, connections in the overlay are fixed. They typically use Distributed Hash Table-based (DHT) indexing, such as...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Apr 2012

    Testing Strategies for Object Oriented Systems

    The objective of testing, stated simply, is to find the greatest possible number of errors with a manageable amount of effort applied over a realistic time span. Although this fundamental objective remains unchanged for object-oriented software, the nature of OO programs changes both testing strategy and testing tactics. The architecture...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Apr 2012

    A Survey of Cryptanalytic Attacks on Lightweight Block Ciphers

    Lightweight block ciphers are used in applications where low power consumption is a requirement along with hardware area constraints regarding their implementation. Design of these ciphers demands an optimal tradeoff between computational efficiency and security. These ciphers being supportive in fast and secure transmission of data from one location to...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    A Comparative Study of Rate Matching and IG-MAC Schemes in Multi-Rate Ad Hoc Networks

    Ad hoc networks face certain challenges such as mobility, scalability, time varying topology, hidden and exposed terminal problem, etc. This paper addresses the issue of hidden terminal problem. This problem occurs in MANETs due to its multi-hop nature. The transmitting nodes which are out of transmission range of each other...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Study on Data Prefetching Techniques for Linked Data Structure Applications

    Data Prefetching is a promising solution to hide memory access latency. An application with Linked Data Structure (LDS) aggravates the memory access latency problem. There are quite number of research publications to solve this problem. Helper thread prefetching is a method in which the cache miss of an application is...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Simulation of a Rectangular Patch Antenna

    This paper is dedicated to simulate a rectangular patch antenna by using the software HFSS and ADS. Microstrip antennas have a profile which relays at the needs of new technology, such as a low profile, a flat configuration and a better gain. The simple configuration of the rectangular microstrip antenna...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Subledger Accounting in Oracle R12 New Release

    Subledger Accounting is a new feature in Oracle R12 release. Oracle Subledger Accounting enables corporations to comply with corporate, local and managerial accounting and audit requirements via increased control, visibility and efficiency. Oracle Subledger Accounting increases control by storing a complete and balanced journal entry for each subledger transaction and...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Recognition Based System Using Principal Component Linear Discriminant Analysis

    A robust face recognition system for large scale data sets taken under uncontrolled illumination variations. The proposed face recognition system consists of a novel illumination insensitive preprocessing method, a hybrid Fourier based facial feature extraction, and a score fusion scheme. First, in the preprocessing stage, a face image is transformed...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    A Reputation System to Prevent Collusive Copyright Protection in P2P Network

    P2P (Peer-To-Peer) applications have enormous success in information sharing, although there exist illegal distributions of copyright-protected works (music, games, video streams, etc.) and anonymous malicious attacks. These abuses have resulted in heavy financial loss in media and content industry. Collusive piracy is the main source of intellectual property violations within...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Adhoc On-Demand Distance Vector Routing Reputation-Based (AODVRB) Over MANET

    In this paper fully distributed reputation-based model is used to improve the security in MANETs. The authors design and build the prototype Adhoc On-Demand Distance Vector Routing Reputation-Based (AODVRB) over Adhoc On Demand Distance Vector Routing (AODV) and test it in their own simulator in the presence of variable black...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Cloud ERP - A Soltion Model

    Recently cloud computing has become a buzzword and it is having applications in many domains. New cloud ERP based solutions are multiplying, by setting stage for acceleration of the delivery of ERP functions as cloud-based services. This is an attempt to study how cloud services especially SaaS helps in implementation...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    A Survey on Biometrics Based Cryptographic Key Generation Schemes

    Need for information security and privacy is increasing in recent times. Since several valuable data and files are stored in an organization server system and moreover personal information are being shared in WWW, the need for providing security and permitting only the authorized user is becoming indispensable. For this purpose,...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Improved Handover Performance by Integration of Fast Handover in Hierarchical Setup

    In the infrastructure based network, mobility management is going wide importance. Currently, seamless mobility in IPv6 network is classified into HMIPv6 and FMIPv6. The HMIPv6 is used to reduce the signaling overhead and delay concerned with Binding Update in mobile IPv6. But, there is no provision for fast handover. FMIPv6...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Implementation of Advanced Peripheral Bus Based Devices for SOC Application

    Today's System-On-Chip (SOC) is designed with reusable intellectual property cores to meet short time to market requirements. Embedded systems design focuses on low Power dissipation and system-on-chip. A reliable on-chip communication standard is a must in any SOC. The AMBA 2.0 APB is a peripheral bus standard for low bandwidth...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Agent based: QoS Resource Management for Grids

    Grids provide access to distributed resources. When resources are used for critical services, the resources must adhere to stringent Quality of Service (QoS) requirements. This paper presents an approach to resource allocation and management in the grid by proposing a grading system for the resources based on QoS parameters. In...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    ANZ Based Task Allocation Algorithm (ANZA) for Computational Grid

    Due to the advancement in the internet technologies, the processing power of the CPU and the low cost high speed bandwidth, a need arises for the geographically distributed network of computers to solve the problems, which requires high computing power and large number of resources. Thus, Grid computing was born....

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    A Novel Approach for Conventional Web Spider Results and Log Mining

    Despite of the popularity of global search engines, people still suffer from low accuracy of site search. The primary reason lies in the differences of link structures and data scale between global web and websites, which leads to failures of traditional reranking methods such as HITS, PAGE RANK and DIRECT...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Automotive Automation and Remote Access Using GSM Technology

    In this paper, the authors present Controller Area Network (CAN), it's architecture, protocol, and standards i.e. an overview of the Controller Area Network. They also propose the application of CAN extended to automation in automotive field like heavy earth moving vehicles. The proposed system is stand-alone single-chip embedded system equipped...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Implementing Efficient Monitoring and Data Dynamics for Data Storage Security in Cloud Computing

    Cloud Computing is an internet based computing that enables sharing of resources. This project supports an external auditor to audit user's outsourced data in the cloud with out learning knowledge on the data content. This Project is the first to support scalable and efficient public auditing in the Cloud Computing...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Marker Based Augmented Reality Browser

    This paper gives the overview of augmented reality and augmented reality browser. It also describes the various approaches of augmented reality browser. This paper mainly proposes an algorithm for marker detection. Augmented reality is the combination of real scene viewed by the user and a virtual scene generated by the...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    False Alert Reduction and Correlation for Attack Scenarios With Automatic Time Window

    The Intrusion Detection System (IDS) will provide alerts for the attacks happened in the network. Managing and analyzing vast amount of the low level alerts are very difficult for network administrator. And also false alerts are raised from IDS. False alert reduction method has been proposed to reduce the number...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Comparison of Image Compression Through Neural Network SPIHT,STW,EZW Wavelets

    The compression offers a means to reduce the cost of storage and increase the speed of transmission. Image compression is used to minimize the size in bytes of a graphics file without degrading the quality of the image. There are two types of image compression is present. The aim of...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Dynamic Behavioural Routing Protocol for Longest Route Lifetime Predication in MANET

    In MANETs, the network's wireless topology may be unpredictable and may change rapidly. The widely varying mobility characteristics are expected to have significant impact on the performance of the routing protocol. A host may lose its energy or roam independently without informing to its cooperative nodes, causing changes in network...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Low Complexity Lossless Compression for Multicolored Images

    This paper presents a method for compressing the images which is based on the LOCO-I (LOw COmplexity lossless compression for images) algorithm. The authors try to reduce complexity of the original algorithm. From experimental verification it can be found out that the proposed algorithm is better than the rice compression...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Phase Congruency Corner Detection as Biometric Feature

    Palmprint is one of the most reliable physiological biometric due to its unique and permanent features like geometry features, principal line features, wrinkles, ridges, delta point features, texture features and points. Here, Phase Congruency Corner Detector method is proposed as a corner detection technique to extract palmprint features in the...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Semantic Search Engine Using Content and Location Ontology Extraction

    Since the number of Internet users' increases today it is becoming difficult to find a document that is relevant to the user's particular needs. The problem is that the identical information which is retrieved is presented commonly without any difference. Here the personalization method is proposed to tailor search results...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Feb 2012

    Bluetooth Intrusion Techniques

    Bluetooth technology has grown through the years, but because of the increase, security has become an issue. In all the world the people interacting and use this technology, when transferring data through devices or when using the computer or personal devices, null confidentiality and null authenticity are factors to remain...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Mar 2012

    Multifeature Recognition System for Authentication Process

    Palm print identification and confirming the identity of a person based on the way he walks are fairly new area in computer science compared with more traditional biometric methods and this makes it possible to authenticate the person in a kinetic fashion as he walks without requiring the attention from...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Dec 2011

    Identity Anonymization and Secure Data Storage Using Group Signature in Private Cloud

    Cloud computing is the best solution for providing a flexible, on-demand, and dynamically scalable computing infrastructure for many applications. In case of private cloud environment access is limited to a group of users or an organization. Even though there are many aspects in cloud environment. The data security, confidentiality and...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Dec 2011

    Prototyping of Mobile Health Monitoring System for Elderly: Using Android Python With SL4A And Logistic Regression Technique

    In this paper, the authors propose a prototype of pervasive mobile health system for monitoring elderly patients from indoor and outdoor environments. The system uses Sp02 and Heart Rate sensor worn by the patient and a Smartphone as a central node. The prototype is developed in Python using Scripting Layer...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Dec 2011

    Challenges for Reuse in Web Engineering

    Web engineering is a discipline which deals with the web based systems and applications, their analysis, designing, cost effective development, operations, testing of web applications according to their operations needed to be performed and maintenance of the high quality applications. There are many things which are common in many websites...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Dec 2011

    Analysis of Switching Techniques in Optical Network

    In this paper, the authors give an introduction to Optical Burst Switching (OBS) and compare it with other existing optical-switching paradigms. They analyze and then compare performance models of a fast-adapting and centrally controlled form of Optical Circuit Switching (OCS) with a conservative form of Optical Burst Switching (OBS). They...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Dec 2011

    Cloud Computing: Security Issues and Research Challenges

    Cloud computing is an architecture for providing computing service via the internet on demand and pay per use access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring them. So it saves managing cost and time for organizations. Many industries, such as banking,...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Dec 2011

    Home Security Using Zigbee Technology

    Security is the most important in day-to-day life for almost all the sectors of the world. A special security is most essential for houses and it is made possible by integrating various sensors with Zigbee network. The authors would like to provide simple and effective security solution for whatever the...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Dec 2011

    Interval Domain Based Software Process Control Using Weibull Mean Value Function

    Software reliability process can be monitored efficiently using Statistical Process Control (SPC). It assists the software development team to identify and actions to be taken during software failure process and hence, assures better software reliability. In this paper, the authors propose a control mechanism based on the cumulative observations of...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Dec 2011

    Ultra Wide Wavelength Multiplexing/Demultiplexing Conventional Arrayed Waveguide Grating (AWG) Devices for Multi Band Applications

    The increase on the demand of these services, related to the deregulation processes in USA and Europe in the telecommunications sector, has motivated the need of telecommunication transport networks with higher capacity and flexibility. Hence, the general trend in the all the disciplines of telecommunications in the last decade, has...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Oct 2011

    A Perspective Analysis of Green IT

    The unabated thirst for energy is a recurring story in news headlines every day. Some developing nations are even struggling to meet up their power requirements. Energy consumption however has negative fallout on the atmosphere in the form of outflow of dreadful carbon dioxide to the environment. This leads to...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Oct 2011

    A Perspective Analysis of the Fourth Generation (4G) Communication Standard and the Respective Technologies

    The wireless journey has been a really inspiring story for the whole world and it is absolutely clear that the forthcoming era of knowledge is to be established and sustained with the active and adaptive participation and contribution of highly available, reliable, and affordable communication technologies, networks, devices, and infrastructures....

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Oct 2011

    Role of the IT in HR Transformation Process

    Human Resources Management has been viewed as the most integral part of any organization and plays a significant role in providing right human capital at the right time, which in turn ensures meeting up with the pre-set objectives. Timely and correct management of the available Human Capital is very much...

    Provided By International Research Association of Computer Science and Technology (IRACST)

  • White Papers // Oct 2011

    Challenges and Performance Enhancement in Cloud Computing

    Cloud computing - delivering infrastructure, services, and software on demand via the network - offers attractive advantages to the public sector. It has the potential to reduce Information and Communications Technology (ICT) costs by virtualizing capital assets like disk storage and processing cycles into a readily available, affordable operating expense....

    Provided By International Research Association of Computer Science and Technology (IRACST)