IOSR Journal of Engineering

Displaying 1-40 of 485 results

  • White Papers // May 2014

    Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

    Defining cloud computing becomes a difficult task with many definitions, yet no consensus on single or unique on ones. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Controlling the Behavior of a Neural Network Weights Using Variables Correlation and Posterior Probabilities Estimation

    In this paper, a number of posterior probabilistic based equations were introduced to detect the effect of controlling the correlation between variables on the behavior of feed forward neural network weights. In this paper it was proofed that, under certain assumptions, in a feed forward neural network with backprobagation learning...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    An Approach to Secure Data Sharing for Dynamic Groups in the Cloud

    As the low maintenance, cloud computing supply and capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from an un-trusted cloud is still an issue, due to the frequent change of the membership. In this paper,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Evaluation of Bitmap Index Compression using Data Pump in Oracle Database

    Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. The authors review the existing technologies of Compression and introduce the bitmap index compression through data pump. According to conventional wisdom bitmap index is more efficient for minimum unique value. But through...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Secured Remote Switching DC Motors

    The notion of this work is to make use of GSM network to provide users mobility facility to support them while moving. The system is structured into three main parts: GSM network, controlling software, and boost circuits. The GSM network acts as low cost tool to aid in developing the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Framework for Collaborative Application in Mobile Ad-hoc Network

    With increase usage of mobile devices, there is a need to connect them together in meaningful way. Specifically, there a demand of application that enables collaboration among these mobile devices and their users. The users have different need and different way to collaborate using collaborative application while carrying the mobile...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Security Issues of Power Line Communications

    In this paper the authors provide discussion of security issues for Power Line Communications (PLC) networks and they put forth several security requirements needed for that network. Security is a major issue for the deployment of local area networks in companies, where the development of IP telephony applications is sustained....

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Comarison and Analysis of Simulators for Ad hoc Wireless Networks

    Wireless networks are one of the best fields for research unlike wired networks. In ad hoc wireless networks to evaluate the performance and behavior of various routing strategies & protocols, simulators are very good compromises between cost and complexities as well as accuracy of the results. Since there are many...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Stock Portfolio Selection Using Data Mining Approach

    Stocks have always been a hot topic of discussion in the financial realm, but the difficulty in understanding the real meaning of stocks still persists. Once it is decided that investment is to be made in the stock, the obvious question which arises is: which all stocks should be purchased?...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Financing of Micro, Medium and Small Scale Enterprises in India Key Challenges

    Micro, small and medium sector enterprises have a vital role in the economic growth of a developing nation like India. These enterprises play a catalyst role in the development of industrial and commercial activities. In the overall value chain of different industries these firms are placed in critical positions. It...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks

    Due to the rapid development of wireless sensor devices in terms of low power and inexpensive data-relaying has been partially achieved because of the rapid progress in integrated circuits and radio transceiver designs and device technology. Because of this, the wireless sensor devices are able to gather information, process them...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Survey of Weight-Based Clustering Algorithms in MANET

    As MANETs haven't any mounted infrastructure, all messages have to be routed through the nodes within the network. Several clustering and routing algorithms are developed for MANETs. Moreover, most of the prevailing routing algorithms don't utilize the potency that may be obtained by clustering a network. Clustering method involves in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Green Computing Under Cloud Environment Proposed Architecture Using Cloud Computing & Thin Client

    Private Cloud computing provides attractive & cost efficient Server Based Computing (SBC). The implementation of Thin client computing for private cloud computing will reduce the IT Cost and consumes less power. Most cloud services run in browser based environment so the authors don't need a fat client to use in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Blacklisting Misbehaving Users for Enhancing Security in Anonymizing Networks

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites....

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Defending Against Replication Node Attack in Wireless Sensor Network

    In Wireless Sensor network, nodes are interconnected and information is shared among them. In a situation, many attacks are involved to misuse the wireless sensor network. One of the attacks is replica node replication attack, in which the adversary can detain and conciliation of sensor nodes by hacking IP address...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Threshold Proxy Re-Encryption Scheme and Decentralized Erasure Code in Cloud Storage with Secure Data Forwarding

    A cloud storage system, used to store large number of data in storage server. Cloud system is used to provide large number storage servers, which provide long-term storage service over the Internet. Third party's cloud system does not provide data confidentiality. Constructing centralized storage system for the cloud system makes...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Analysis of Manhattan Mobility Model Without RSUs

    The vehicular communication is an important issue to the researchers who are engaged in preventing traffic accidents and traffic jams. The earlier vehicular models had discussed only communication among vehicles through the Road Side Units (RSU). Most of the researchers used IEEE 802.11 for vehicular communication in which the vehicles...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Comprehensive Parametric Analysis of Vertical Handoff in Next Generation Wireless Networks

    The science and technology is developing day by day leading to expand and forcing to reshape user's living standards. The main aspects leading to deployment of a wide array of wireless and mobile networks are advances in miniaturization, low power circuit design and development in radio access technologies and increase...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    An Efficient and Active Data Delivery for Highly Dynamic Mobile Ad Hoc Networks

    In highly dynamic mobile ad hoc networks occurred transmission problems like delivering data packets, packet delay, and time delay and so on. Most of the existing ad hoc routing protocols are affected by node mobility, especially for large-scale networks. Large-scale networks mean that wireless network at the dynamic time. Propel...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Comparison on Trust Based Power Aware Reliable On Demand Routing Protocol in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile wireless nodes, which communicate to each other without any centralized administration. Trust and Power consumption is the most challenging task in routing protocol design for Mobile Ad-hoc NETworks (MANETs), since the highly dynamic nature of MANET coupled with limited bandwidth...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Research Paper on Comparison Between Energy Efficient Routing Protocol with Energy and Location in MANET

    Energy is an important issue in MANET (Mobile Ad-hoc NETwork). Nodes in network are working in presence of limited energy. So, energy efficient routing is needed for reducing energy consumption. Energy efficient routing schemes can greatly reduce energy consumption and extends the lifetime of the networks. Multipath routing protocol (AOMDV)...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Implementation of Tree Based Itinerary Design (TBID) Algorithm Over Wireless Sensor Networks by Using Mobile Agent

    In many sensor network applications viz., environmental monitoring, spatial exploration and battlefield surveillance, sensed data is aggregated and transmitted to the sinks for analysis. Thus, in-network data aggregation becomes an important technique in wireless sensor networks and has been well studied in recent years. In general, any sensory network suffers...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Performance Improvement Techniques for Customized Data Warehouse

    In this paper, the authors present performance improvement techniques for data retrieval from customized data warehouses for efficient querying and On-Line Analytical Processing (OLAP) in relation to efficient database and memory management. Different database management techniques, e.g. indexing, partitioning, etc. play vital role in efficient memory management. A comparison of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    A Novel Approach for Event Monitoring In Wsn Using Sleep Scheduling

    A broadcasting delay is an important problem for the application of the critical event monitoring in wireless sensor networks. To prolong the network lifetime some of the sleep scheduling methods are always employed in WSNs it results in a significant broadcasting delay. A novel sleep scheduling method to be proposed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Virtual Energy Based Encryption & Keying on Wireless Sensor Network

    Since the secure communication for Wireless Sensor Network (WSNs) is a challenging problem because sensors are resources limited and cost is the most dominant factor in a energy consumption, for this the authors introduce an energy-efficient Virtual Energy-Based Encryption and Keying (VEBEK) scheme for WSNs that reduces the number of...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols With Varying Number of Nodes and Traffic Applications Over MANETs

    Wireless Technology is at its peak when they talk about research and innovation. This field has become a hub of invention of new theories and structures. Mobile Ad-hoc Network is a special point of focus for the researchers. MANET is a collection of wireless mobile nodes which forms a dynamic...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Enhancement in Elimination of Security Threads using Trusted Proactive Routing

    Ad hoc networks have been used in many applications which mandate a dynamic setup in the absence of fixed infrastructure. The design of ad hoc network has been mainly focuses on proper operation. It is possible that eventually a malicious node becomes easy to deploy in ad hoc n/w and...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing

    In this paper, the authors propose an optimized version of the FCFS scheduling algorithm to address the major challenges of task scheduling in cloud. The incoming tasks are grouped on the basis of task requirement like minimum execution time or minimum cost and prioritized (FCFS manner). Resource selection is done...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Peer To Peer Content Sharing On Wi-Fi Network For Smart Phones

    Peer-to-Peer (P2P) communications and its applications have become conventional architecture in the wired network environment. However, they have not been effectively adapted to the ensemble mobile environment which composed of various devices such as smart mobiles devices, laptops, and device with embedded software. In P2P systems, each node can act...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Review on Google Android a Mobile Platform

    Technology has been touching user's lives in almost every domain. With the advent of modern technologies, the need of enhancing its security also arises. Data security has become one of the most important issues of concern. Data security is achieved with the help of adapting certain security measures. Here, in...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Quality of Service Optimization in Realm of Green Monitoring Using Broad Area Sensor Network (BASN)

    A Wireless Sensor Network (WSN) contains short range energy limited terminals/nodes in which multiple nodes participates one by one to transfer data from source node to Base station. Each node appends some amount of delay which degrades the network performance as the jittered behavior of network may not be allowed...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Adhoc Network (MANET) Routing Protocols Analytical Study

    Man being social by nature cannot live in isolation. He feels being in company with other co-humans. So sometimes he wants to connect with himself and most of the other times he wishes to be connected with others at other places through one means or the other. Man's persistent desire...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework

    The National Institute of Standards and Technology (NIST) defined cloud computing as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or cloud provider interaction. Cloud computing has the potential to change...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Effectual Routine for Trilateral Authentication in Ad-Hoc Networks Using Multicast Conventions

    Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity of the message traffic become an essential constraint for the operation and management of the network. The authors focus on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Privacy and Security in Online Examination Systems

    A new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure for Online Examination System (OES). Privacy and security are crucial in an OES. Privacy represents the ability to maintain a personal space such that there is certain user control on...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Face Recognition Using Mobile Phones and Cloud

    Now-a-day's lifestyle has been changed and any one can easily receive information about everyone in the world. It is very useful for person identification it can be obtained from the mobile device and also connected to social networking. The authors proposed a face recognition system on mobile devices by combining...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Resource Allocation for Antivirus Cloud Appliances

    Malware detection or antivirus software has been recently provided as a service in the cloud. A cloud antivirus provider hosts a number of virtual machines each running the same or different antivirus engines on potentially different sets of workloads (files). From the provider's perspective, the problem of optimally allocating physical...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Mobile Phone Based Attendance System

    In this paper, the authors are emphasizing on developing this project that will help the lecturers to take attendance easily, securely and is less error prone. For this, they are implementing software "Mobile Phone Based Attendance System (MPBAS)" based on Android Technology. They are inspired to work on MPBAS from...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Cross-Layer Based Performance Optimization for Different Mobility and Traffic Scenarios in Adhoc Networks

    The self configuring dexterous autonomy of MANET imposes some network challenges constrained to traditional dynamic routing behavior. So as working with different mobility and traffic patterns with normal management schemes may lead some minor pitfalls to some important network performance parameters and hence can degrade the whole network performance. Here,...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Data Security Model Enhancement In Cloud Environment

    Cloud computing is one of the most emerging technologies which plays an important role in the next generation architecture of IT Enterprise. It has been widely accepted due to its ability to reduce costs associated with computing while increasing flexibility and scalability for computer processes. During the past few years,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Implementing SAAS: Cloud Computing and Android Based Application Framework for C Programming

    Under The National Mission on Education through Information and Communication Technology (NMEICT) a lot of e-learning material, applications and other useful information have been made available on its web portal. MHRD has also taken initiatives for the dissemination of this knowledge by distributing Aakash Tablets to the students at free...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Literature Critique: \"Competition Law, Enforcement and the Australian Small Business Sector\"

    Various developed nations nowadays have put all their efforts to regulate competition laws for international market. And, Australia is not an exception to this implementation; the further growth and development of the Australian industries are mainly regulated by the Australian government in order to oversee if the organizations, business owners,...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Improving Security for Data Migration in Cloud Computing Using Randomized Encryption Technique

    With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Requirements and Challenges for Securing Cloud Applications and Services

    Adopting cloud computing is a complex decision involving many factors. This paper focuses on the central issues of cloud computing security. The cloud computing architectural framework provides a conceptual framework to help evaluate initial cloud risks and inform security decisions. It's a quick method for evaluating the tolerance for moving...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis Strategy for Small and Medium Business Development Policy Gresik District in East Java

    This paper is the preparation of Policy Development Small and Medium Enterprises (SMEs) Gresik regency, East Java. The expected outcome of this activity is the completion of SME Development Policy Gresik regency, East Java. This research included in this type of survey research (survey research). To identify and determine the...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Innovative HR Strategies for SMEs

    The small and medium scale enterprises being very volatile in nature take high amount of risk. It is therefore imperative for them to address the uncertainty through reliable and loyal work force which can shoulder them in good and bad times. HR has the challenge of attracting talent on role...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2012

    Capital Market and the Development of the Small and Medium - Scale Enterprises in Nigeria

    This paper looked at the need to incorporate the Small and Medium Scale Enterprises (SMEs) into the capital market in Nigeria as a means of raising capital for their operations. The findings of the paper found that the growth in the transactions of the quoted companies has been fluctuating over...

    Provided By IOSR Journal of Engineering

  • White Papers // Jun 2013

    Financing of Micro, Medium and Small Scale Enterprises in India Key Challenges

    Micro, small and medium sector enterprises have a vital role in the economic growth of a developing nation like India. These enterprises play a catalyst role in the development of industrial and commercial activities. In the overall value chain of different industries these firms are placed in critical positions. It...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Removal of High Density Impulse Noise Using Cloud Model Filter

    The fact that makes image denoising a difficult task is uncertainties in the impulse noise. The most knowledge in dayflies is uncertainty and erratic, unfortunately it is similar to impulse noise. The mathematic implements for handling uncertainty mostly are probability theory and fuzzy mathematics. That means, among the uncertainties involved...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Green Cloud Computing: A Constructive Advent to Curtail the Carbon Emission Radiation Due to Servers

    This paper analytically scrutinizes the energy dissipation based on services and invades the conditions to promote green cloud computing to save energy crisis. In conventional, cloud computing emphasis on the data computing efficiency whereas green cloud computing accredit to the research and practice of applying computing resources in virtuous, adequate...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Entrepreneurial Characteristics and Competency as Determinants of Business Performance in SMEs

    This paper is to empirically test the influence of entrepreneurial characteristics and competencies on business performance in Small and Medium Enterprises (SMEs). This study was conducted with 147 SMEs owner in Malang regency East Java Indonesia using survey instrument. Data analysis using the structural equation modelling. The results of this...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Critical Factors Influencing the Performance of E-Business in SMEs

    E-business technologies have significantly affected business processes of companies. As a result, it is critical for organizations to have an effective and efficient E-business performance, particularly, for small and medium sized enterprises due to their lack of financial and human resources. The purpose of this paper is to study the...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    A New Approach to Volunteer Cloud Computing

    Volunteer cloud computing is based on the concept where highly distributed non-dedicated resources are harnessed to build a cloud so as to offer cloud services. As volunteer clouds are allowed to communicate with each other and with other commercial clouds also, it's necessary to implement an enhanced interoperable environment. The...

    Provided By IOSR Journal of Engineering

  • White Papers // Nov 2013

    Stock Portfolio Selection Using Data Mining Approach

    Stocks have always been a hot topic of discussion in the financial realm, but the difficulty in understanding the real meaning of stocks still persists. Once it is decided that investment is to be made in the stock, the obvious question which arises is: which all stocks should be purchased?...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Secured Remote Switching DC Motors

    The notion of this work is to make use of GSM network to provide users mobility facility to support them while moving. The system is structured into three main parts: GSM network, controlling software, and boost circuits. The GSM network acts as low cost tool to aid in developing the...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Framework for Collaborative Application in Mobile Ad-hoc Network

    With increase usage of mobile devices, there is a need to connect them together in meaningful way. Specifically, there a demand of application that enables collaboration among these mobile devices and their users. The users have different need and different way to collaborate using collaborative application while carrying the mobile...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Security Issues of Power Line Communications

    In this paper the authors provide discussion of security issues for Power Line Communications (PLC) networks and they put forth several security requirements needed for that network. Security is a major issue for the deployment of local area networks in companies, where the development of IP telephony applications is sustained....

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    Cloud Forensics-An IS Approach

    The Cloud hosting is where data centers really shine in electronic media. Every major IT firm has an offering of how consumers can be served by data centers wherein their cloud will be scaled as per Service Level Agreement (SLA) bounded only by the capacity of the data center. Hence,...

    Provided By IOSR Journal of Engineering

  • White Papers // Oct 2012

    A Detailed Analysis of the Issues and Solutions for Securing Data in Cloud

    Cloud computing, the next generation architecture of IT enterprises, offers the users with a flexible computing environment. In cloud, the virtualized resources are provided as a service over the internet. Typical applications that have already been thought of are SaaS (Software as a Service), PaaS (Platform as a Service), IaaS...

    Provided By IOSR Journal of Engineering

  • White Papers // Apr 2013

    Failure Factors of ERP Projects in an Iranian Context

    Implementing an information technology project is a very challenging task that needs several preparations such as assigning a professional project manager, receiving top management support, employee engagement, etc. Same studies have been conducted about the success and failure factors of the Enterprise Resource Planning (ERP) projects and several researchers concluded...

    Provided By IOSR Journal of Engineering

  • White Papers // Aug 2012

    Feature Level Fusion Based Bimodal Biometric Using Transformation Domine Techniques

    Bimodal biometric used to authenticate a person is more accurate compared to single biometric trait. In this paper the authors propose Feature Level Fusion based Bimodal Biometric using Transformation domine techniques (FLFBBT). The algorithm uses two physiological traits viz., fingerprint and face to identify a person. The Region Of Interest...

    Provided By IOSR Journal of Engineering

  • White Papers // Dec 2013

    Comarison and Analysis of Simulators for Ad hoc Wireless Networks

    Wireless networks are one of the best fields for research unlike wired networks. In ad hoc wireless networks to evaluate the performance and behavior of various routing strategies & protocols, simulators are very good compromises between cost and complexities as well as accuracy of the results. Since there are many...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    The Role of Knowledge Management on Individu, the Community and the Organization

    Adoption of Knowledge Management (KM) has become the emerging agenda in developing business strategies. The purpose of this paper is to contribute to an emerging debate centered on the ways in which Knowledge Management (KM) might be give benefits and, in turn, how KM practice might be improved. Stills lightly...

    Provided By IOSR Journal of Engineering

  • White Papers // Jan 2013

    Entrepreneurial Idea Development to Business Start-Up: Teaching Methodological Approach

    The crucial issue on entrepreneurship training in the tertiary institutions of learning is teaching students how to develop innovative business idea to the business venture start-up stage. This is the ability of the students to develop ideas that are out of the theoretical teaching of the academic environment. Several scholars...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Cloud Migration Benefits and Its Challenges Issue

    Cloud computing is one of the emerging fields in the computer world these days. Cloud computing is attracting everyone with its benefits. Now companies are shifting their focus onto cloud computing. But to be a part of cloud computing environment and to take advantages of cloud computing, legacy applications need...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC

    Defining cloud computing becomes a difficult task with many definitions, yet no consensus on single or unique on ones. Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Controlling the Behavior of a Neural Network Weights Using Variables Correlation and Posterior Probabilities Estimation

    In this paper, a number of posterior probabilistic based equations were introduced to detect the effect of controlling the correlation between variables on the behavior of feed forward neural network weights. In this paper it was proofed that, under certain assumptions, in a feed forward neural network with backprobagation learning...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    An Approach to Secure Data Sharing for Dynamic Groups in the Cloud

    As the low maintenance, cloud computing supply and capable solution for sharing group resource within cloud users. Sharing data with the two or more owners while preserving data and identity privacy from an un-trusted cloud is still an issue, due to the frequent change of the membership. In this paper,...

    Provided By IOSR Journal of Engineering

  • White Papers // May 2014

    Evaluation of Bitmap Index Compression using Data Pump in Oracle Database

    Bitmap index is most commonly used technique for efficient query processing and mostly in the Data warehouse environment. The authors review the existing technologies of Compression and introduce the bitmap index compression through data pump. According to conventional wisdom bitmap index is more efficient for minimum unique value. But through...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Intrusion Detection of Masquerading Attacks & Secure Authentication in Cloud

    This paper proposed for a new authenticated access control scheme for securing data in cloud system. In this scheme cloud system verifies the authenticity of user and provides access control only to applicable user to decrypt the stored data. The scheme prevents replay attacks and supports creation, modification, and reading...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Fully Homomorphic Encryption Equating to Cloud Security: An Approach

    As the data storage challenge continues to grow for insurers and everyone else, one of the obvious solutions is cloud technology. Storing data on remote servers rather than in-house is definitely a money-saver, but in insurance circles, the worry has been that having critical data reside outside the physical and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Comparison for Secured Transmission of Packets in Wireless LAN Using AES and ECC

    Wireless Local Area Network (WLAN) has increased rapidly, providing flexibility and mobility to the device users. This made the technology popular amongst a wide range of users in the universe. But one of the common problems the authors are overcoming is fragment loss. So far they were following a scheme...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Analysis and Evaluation of Probabilistic Routing Protocol for Intermittently Connected Network

    Intermittently connected network often referred to as Delay/Disruption Tolerant Network which is an infrastructure less network suffers from intermittent connection i.e. a connected path from the source to the destination may be absent or a given destination may not be reachable at the moment a message is sent. As a...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Secure Massive Data Storage With Consistency And Route Control On The Cloud

    As the advent of computer has thrown light to the storage of massive data in small spaces the resources has been reduced broadly. Cloud computing in recent times has become a trend among organization to store data and retrieve it on-the-go around the globe. With this the data storage devices...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Distributed RK- Secure Sum Protocol for Privacy Preserving

    Secure multi party computation allows several parties to compute some function of their inputs without disclosing the actual input to one another. Secure sum computation is an easily understood example and the component of the various secure multi party computation solutions. Secure sum computation allows parties to compute the sum...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Detection of Routing Misbehavior in MANET Using Improved 2ACK

    A Mobile Ad-hoc NETwork consists of individual mobile nodes communicating via wireless link. The node which refuses to share their own resources but gets benefit from other nodes, are called selfish or misbehaving nodes. The nodes in MANET are mobile with changing topologies. Performance of network may get affected due...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Comprehensive Study on Tracking VoIP Caller

    Session Initiation Protocol (SIP) is most extensively usable VoIP protocol which works on application layer. It uses Transmission Control Protocol or User Datagram Protocol which further uses Internetworking Protocol for establishing VoIP communication. None of these protocols including SIP provides absolute location information which provides caller's location in latitude and...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    Artificial Routing Protocol for Cut Detection of Cut Vertices

    A Wireless Sensor Network can break into a number of disconnected paths due to failure of some of the nodes known as cut vertices. In this paper, the authors propose an efficient algorithm to detect vertices. The neighbor node gets failure intimation from the cut vertex so that the information...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Review of Bot Protection Using CAPTCHA for Web Security

    Today several daily activities such as communication, education, E-commerce, Entertainment and tasks are carried out by using the internet. To perform such web activities users have to register regarding the websites. In registering websites, some intruders write malicious programs that waste the website resources by making automatic false enrolments that...

    Provided By IOSR Journal of Engineering

  • White Papers // Feb 2013

    A Secure Data Distribution Assessment for Virtual Storage Systems Using JAR File Authentication

    Cloud computing has the great potential to dramatically change the landscape of the current IT industry. Cloud services are provided based on user request. In cloud environment user's data are usually processed remotely in unknown machines that users do not own or operate. Control of user's data is reduced on...

    Provided By IOSR Journal of Engineering