JCAKSRCE

Displaying 1-40 of 92 results

  • White Papers // Mar 2014

    A Novel Approach for Privacy Preserving Multiparty Data Publishing

    Data mining is the technique normally used for extracting the data from large database. Collaborative data publishing is the emerging technique to publish the data in one webpage and provide web service on more than one page with security. Collaborative data publish has the problem for anonymizing horizontally partitioned data...

    Provided By JCAKSRCE

  • White Papers // Sep 2013

    Study of Knowledge Based Admission Control for a Software-as-a-Service Provider in Cloud Computing Environments

    Software as a Service (SaaS) provides access to applications to end users over the Internet without upfront investment in infrastructure and software. To serve their customers, SaaS providers utilize resources of internal data centers or rent resources from a public Infrastructure as a Service (IaaS) provider. In-house hosting can increase...

    Provided By JCAKSRCE

  • White Papers // Apr 2013

    Cloud-Based Image Processing with Data Priority Distribution Mechanism

    Most users process short tasks using MapReduce. In other words, most tasks handled by the map and reduce functions require low response time. Currently, quite few users use MapReduce for 2D to 3D image processing, which is highly complicated and requires long execution time. However, in the author's opinion, MapReduce...

    Provided By JCAKSRCE

  • White Papers // Jan 2013

    Multi Algorithm Approach for Face Recognition Using Average Half Face

    Face recognition has received much attention in recent years due to its many applications such as human computer interface, video surveillance and face image database management. It is a challenging technique due to under different lighting conditions, facial expressions and changes in head pose. Single class of feature is not...

    Provided By JCAKSRCE

  • White Papers // Jan 2013

    A Survey to Analysis of Topological Relational Ranked Clusters for Spatial and Temporal Data

    Data mining is the process of discovering interesting and useful patterns of information embedded in large databases. Data clustering is a very important technique for exploratory information analysis in data mining and has been the main target of considerable research in many domains for many years. Clustering may be a...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    Energy-Efficient Protocol for Wireless Sensor Networks

    The power consumption of nodes determines the lifetime of the wireless sensor network. Thus, the design of low-power node is very important. The sensors sense physical phenomena in different ways, designing and testing a different coverage protocol for each sensing model is indeed a costly task. To address these challenging...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    Matrix Hop Mobile Agent (MHMA) - A Novel Framework for Security Architecture

    Mobile agent technology is a new computing paradigm appropriate for distributed computing environment. To eliminate various security issues and its corresponding solutions available in existing mobile agent systems like free roaming mobile agent, an alternative model has been developed called as MHMA (Matrix Hop Mobile System) system. In MHMA, the...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    A Systematic Review of Reusability Assessment Model and Related Approach for Reusable Component Mining

    Promoting reuse at sophisticated levels is becoming an increasingly important part. Software reuse is the process of reusing the existing software components from the system rather than developing the components newly. As software re-user's include the reusable software components to improve the productivity and quality in their product, they must...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    The Performance Comparison of an AODV, DSR, DSDV and OLSR Routing Protocols in Mobile Ad-Hoc Networks

    Wireless networking is an emerging technology that allows users to access information and services electronically, regardless of their geographic position. Wireless networks can be infrastructure networks or infra structure less (Ad-hoc) networks. An ad-hoc network is a collection of mobile nodes which forms a temporary network without the aid of...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    Evaluation and Delay of the Routing Protocols in Ad-Hoc Wireless Networks

    A wireless ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    Comparative Analysis and Inferences for Enhancement of Cognitive Radio Networks

    Cognitive Radio Network opportunistically exploits locally unused spectrum which is not heavily occupied by licensed users. It provides a new path to resolve spectral scarcity and to avoid spectral congestion, without disturbing the QoS requirements of others in the system. Of the many challenges involved in the practical ways of...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    Dropping of Call Due to Congestion in Mobile Network

    A Mobile network can be defined as the group of multiple nodes like MS, BTS/Node B, BSC/RNC, MSS, HLR, etc. These nodes architecture are vendor dependent but in general it consist specific hardware & software. Software is application specific & vendor proprietary. Nokia Siemens Network, Ericsson, Huawei are major manufacturer...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    The Adaptation of SC-FDMA in the Uplink Gives Edge to LTE Over WiMAX2 in Ad-Hoc Network

    Relay technologies have been actively studied and considered in the standardization process of next-generation mobile broadband communication systems such as 3GPP LTE-Advanced, IEEE 802.16j, and IEEE 802.16m. This paper first introduces and compares different relay types in LTE-Advanced and WiMAX standards. Simulation results show that relay technologies can effectively improve...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    A Comparative Study on the Topology Control Mechanism Using GAHCT and FLHCT for an N-Tier Heterogeneous Wireless Sensor Network

    Topology control targets to achieve an energy efficient network with limited number of communication links between the sensor nodes. One way to attain a reduced topology is via a cooperative technique. In this paper, a new methodology GAHCT: Genetic Algorithm based Hierarchical Cooperative Technique is proposed and implemented for a...

    Provided By JCAKSRCE

  • White Papers // Mar 2012

    Reduce Delays in End to End DVB-RCS Satellite Networks

    In today's satellite network to a return-channel for communication between terminals used in the DVB-RCS standard is provided by this feature. In order to allocate the bandwidth of the standard protocol used is called DAMA where algorithms such as CRA, RBDC uses to request bandwidth Since these methods are simple...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Delegation-Based in On-Line and Off-Line Authentication Over Wireless Communication

    Portable communication system provides mobile users with global roaming services. Localized authentication protocol is presented for inter-network roaming across wireless LANS. Private authentication protocol is presented to prevent the home location register. The concept of delegation in wireless communication is used to solve the problems of data security, user privacy...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Wireless Sensor Network Lifetime Prolonging Self Organisable Cluster Based Energy Efficient and Aggregation Protocol

    The main issues in wireless sensor network are prolonged network lifetime, reliable delivery and secured transmission. Since wireless sensor network is the battery powered application energy saving is the main constraint to prolong the network lifetime. Clustering based routing mechanism is one of the best mechanisms for saving energy of...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Modeling Advanced Botnet and Detecting Botmasters

    A "Botnet" consists of a network of compromised computers controlled by an attacker ("Botmaster"). Recently, botnets have become the root cause of many Internet attacks. To be well prepared for future attacks, it is not enough to study how to detect and defend against the botnets that have appeared in...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Comparative Analysis of General Defect Proneness in the Competing Software Systems

    Predicting defect-prone software components are an economically important activity and so has received a good deal of attention. The main objective of this software defect-proneness is to propose and evaluate a general framework for defect prediction in software that supports unbiased and comprehensive comparisons between competing prediction systems. Generally, before...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Least Bandwidth Allocation for Periodic Streams Wireless Network System

    Allocation based as opposed to contention-based channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless and embedded real-time applications. Also, reservation based channel access is energy-efficient since a wireless adaptor is powered on only during its exclusive channel access times....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Design of Error Correction and Allusion in Turbo Decoder for Wireless Application

    Wireless Sensor Network (WSN) consists of limited energy resources, which reduce the processing capabilities and a radio frequency communication unit with limited transmission power. In wireless communication, Automatic Repeat reQuest (ARQ) technique are used which has power loss in packet retransmission. Then Error Correcting Code (ECC) can be used to...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Autonomously Reconfiguring Failures in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are being developed actively and deployed widely for a variety of applications They have also been evolving in various forms to meet the increasing capacity demands. However during their lifetime, multi hop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles,...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Secure Encrypted-Data Routing Protocol for Wireless Sensor Networks

    In sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a typical deployment of large number of sensor nodes have posed many challenges to the design and management of sensor networks. These challenges...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Secure Data Delivery in Wireless Sensor Network Using Collaborative Randomized Dispersive Routes

    In wireless sensor networks (WSNs) Compromised-node and denial-of-service are two key attacks that create the black hole in the network. In existing classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. Once the adversary acquires the routing algorithm, it can compute the same routes...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Green Networking

    Green networking refers to the practice of using networking resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Energy Based Multipath Routing Protocols for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consists of small nodes with sensing, computation, wireless communications capabilities have led to many new routing protocols specifically designed for sensor networks and enabling real time applications in wireless sensor networks. Wireless sensor networks demands certain delay sensitive, bandwidth requirements and reliability, energy efficient not only...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Exploiting Resource Overloading Using Utility Accrual Approach for Parallel Data Processing in Cloud

    Parallel Data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. One of an IaaS cloud's key feature is the provisioning of compute resources on demand. The computer resources available in the cloud are highly dynamic and possibly heterogeneous. Nephele is the first data processing...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Route Diversity Based Optimal Path Selection Using Random Key Generation

    A network programming protocols provide an efficient way to update program images running on sensor nodes without having physical access to them. Securing these updates, however, remains a challenging and important issue, given the open environment where sensor nodes are often deployed. Several approaches addressing these issues have been reported,...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A New Data Mining Based Network Intrusion Detection Model

    As information systems are more widely used in the field of internet nowadays the need for secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) based on sophisticated algorithms rather than current signature base detections are in demand. Due to emerging new attack methods there is often the...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Credit Card Fraud Detection Using Rough Sets and Artificial Neural Network

    The authors propose an approach towards detecting credit card frauds using rough set theory and artificial neural networks. They aim at finding an optimal attribute reduct using rough set theory and then using these attributes to train an ANN system which would then carry out the credit card fraud detection....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Protecting Database From Malicious Modifications Using JTAM

    The intrusion response component of an overall intrusion detection system is responsible for issuing a suitable response to an anomalous request. The notion of database response policies to support the authors' intrusion response system tailored for a DBMS. The interactive response policy language makes it very easy for the database...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Column-Decoupled 9T Cell for Low Power Differential and Domino-Based SRAM Design

    Embedded memories are widely used in low power system on chip. Low power performance can optimized with process, circuit and architecture and system level code development. Static random access memories consist of almost 90% of Very Large Scale Integration (VLSI). In this paper, low power design considerations are described in...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Data Mining and Warehousing

    Data mining has become a popular buzzword but, in fact, promises to revolutionize commercial and scientific exploration. Databases range from millions to trillions of bytes of data. Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Anomaly Protection Using Batching Strategies

    Traffic analysis is typically countered by the use of intermediary nodes, whose role is to perturb the traffic flow and thus confuse an external observer. Such intermediaries are called mixes. The authors address attacks that exploit the timing behaviour of TCP and other protocols and applications in low-latency anonymity networks....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Compare the Performance of the Two Prominent Routing Protocols for Mobile Ad-Hoc Networks

    An ad hoc network is a collection of wireless mobile nodes, frequently forming a network topology without the use of any existing network infrastructure or centralized administration. Compare the performance of the two prominent routing protocols for mobile ad hoc networks Dynamic Source Routing - DSR, Destination Sequenced Distance Vector...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Data Dynamics for Storage Security and Public Auditability in Cloud Computing

    Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. The unique paradigm brings about many new security challenges, which have not...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Hand Written Signature Embedding in Photographs - An Authentication Mechanism for Internet Based Transactions

    The photograph-signature scheme is widely used in many day-to-day transactions, such as in passport application and others. This paper proposes to embed the handwritten signature into passport size photograph using watermarking technique. The signature is embedded in the photograph, and thus protected from all attempts to copy it. The watermarking...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Improving CA-AOMDV Protocol Against Blackhole Attacks

    Mobile ad hoc networks are infrastructure less network where the nodes themselves are responsible for routing the packets. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. Due to security vulnerabilities of the routing protocols, wireless ad hoc networks are not...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Defending Against Sybil Attacks in Anonymizing Networks

    An anonymity network enables users to access the Web while blocking any tracking or tracing of their identity on the Internet. Tor is open-source anonymity software free to public use. This type of online anonymity moves Internet traffic through a worldwide network of volunteer servers. Anonymity networks prevent traffic analysis...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    STRAB: Sensing and Tracing Back Attackers Against Encrypted Protocols

    The uncontrolled growth of the network based applications has contributed to enormous security leaks. Though the encrypted protocols are used to provide secure communication, Intrusion detection systems (Idss) are often employed to monitor network traffic and host activities that may lead to unauthorized accesses and attacks against vulnerable services. Anomaly...

    Provided By JCAKSRCE

  • White Papers // Jun 2009

    Iris Pattern Recognition Using Complex Wavelet and Wavelet Packet Transform

    A new iris recognition system based on Wavelet Packet Analysis and Morlet wavelet is described. Morlet wavelet calculations are easy compared to Gabor wavelets. Moreover Gabor wavelet based iris recognition system is patented which blocks its further development. The most unique phenotypic feature visible in a person's face is the...

    Provided By JCAKSRCE

  • White Papers // Jun 2009

    Optimization Algorithms for Access Point Deployment in Wireless Networks

    Wireless Local Area Networks (WLANs) have become very popular as they provide mobility for the nodes and the convenience with which such networks can be setup. However, there are important design considerations while setting up such networks. This paper focuses on the issues in the design of wireless networks and...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Delegation-Based in On-Line and Off-Line Authentication Over Wireless Communication

    Portable communication system provides mobile users with global roaming services. Localized authentication protocol is presented for inter-network roaming across wireless LANS. Private authentication protocol is presented to prevent the home location register. The concept of delegation in wireless communication is used to solve the problems of data security, user privacy...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Wireless Sensor Network Lifetime Prolonging Self Organisable Cluster Based Energy Efficient and Aggregation Protocol

    The main issues in wireless sensor network are prolonged network lifetime, reliable delivery and secured transmission. Since wireless sensor network is the battery powered application energy saving is the main constraint to prolong the network lifetime. Clustering based routing mechanism is one of the best mechanisms for saving energy of...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Modeling Advanced Botnet and Detecting Botmasters

    A "Botnet" consists of a network of compromised computers controlled by an attacker ("Botmaster"). Recently, botnets have become the root cause of many Internet attacks. To be well prepared for future attacks, it is not enough to study how to detect and defend against the botnets that have appeared in...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Comparative Analysis of General Defect Proneness in the Competing Software Systems

    Predicting defect-prone software components are an economically important activity and so has received a good deal of attention. The main objective of this software defect-proneness is to propose and evaluate a general framework for defect prediction in software that supports unbiased and comprehensive comparisons between competing prediction systems. Generally, before...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Least Bandwidth Allocation for Periodic Streams Wireless Network System

    Allocation based as opposed to contention-based channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless and embedded real-time applications. Also, reservation based channel access is energy-efficient since a wireless adaptor is powered on only during its exclusive channel access times....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Design of Error Correction and Allusion in Turbo Decoder for Wireless Application

    Wireless Sensor Network (WSN) consists of limited energy resources, which reduce the processing capabilities and a radio frequency communication unit with limited transmission power. In wireless communication, Automatic Repeat reQuest (ARQ) technique are used which has power loss in packet retransmission. Then Error Correcting Code (ECC) can be used to...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Autonomously Reconfiguring Failures in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are being developed actively and deployed widely for a variety of applications They have also been evolving in various forms to meet the increasing capacity demands. However during their lifetime, multi hop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles,...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Secure Encrypted-Data Routing Protocol for Wireless Sensor Networks

    In sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a typical deployment of large number of sensor nodes have posed many challenges to the design and management of sensor networks. These challenges...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Secure Data Delivery in Wireless Sensor Network Using Collaborative Randomized Dispersive Routes

    In wireless sensor networks (WSNs) Compromised-node and denial-of-service are two key attacks that create the black hole in the network. In existing classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. Once the adversary acquires the routing algorithm, it can compute the same routes...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Green Networking

    Green networking refers to the practice of using networking resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Energy Based Multipath Routing Protocols for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consists of small nodes with sensing, computation, wireless communications capabilities have led to many new routing protocols specifically designed for sensor networks and enabling real time applications in wireless sensor networks. Wireless sensor networks demands certain delay sensitive, bandwidth requirements and reliability, energy efficient not only...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Exploiting Resource Overloading Using Utility Accrual Approach for Parallel Data Processing in Cloud

    Parallel Data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. One of an IaaS cloud's key feature is the provisioning of compute resources on demand. The computer resources available in the cloud are highly dynamic and possibly heterogeneous. Nephele is the first data processing...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Route Diversity Based Optimal Path Selection Using Random Key Generation

    A network programming protocols provide an efficient way to update program images running on sensor nodes without having physical access to them. Securing these updates, however, remains a challenging and important issue, given the open environment where sensor nodes are often deployed. Several approaches addressing these issues have been reported,...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A New Data Mining Based Network Intrusion Detection Model

    As information systems are more widely used in the field of internet nowadays the need for secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) based on sophisticated algorithms rather than current signature base detections are in demand. Due to emerging new attack methods there is often the...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Credit Card Fraud Detection Using Rough Sets and Artificial Neural Network

    The authors propose an approach towards detecting credit card frauds using rough set theory and artificial neural networks. They aim at finding an optimal attribute reduct using rough set theory and then using these attributes to train an ANN system which would then carry out the credit card fraud detection....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Protecting Database From Malicious Modifications Using JTAM

    The intrusion response component of an overall intrusion detection system is responsible for issuing a suitable response to an anomalous request. The notion of database response policies to support the authors' intrusion response system tailored for a DBMS. The interactive response policy language makes it very easy for the database...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Column-Decoupled 9T Cell for Low Power Differential and Domino-Based SRAM Design

    Embedded memories are widely used in low power system on chip. Low power performance can optimized with process, circuit and architecture and system level code development. Static random access memories consist of almost 90% of Very Large Scale Integration (VLSI). In this paper, low power design considerations are described in...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Data Mining and Warehousing

    Data mining has become a popular buzzword but, in fact, promises to revolutionize commercial and scientific exploration. Databases range from millions to trillions of bytes of data. Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus...

    Provided By JCAKSRCE

  • White Papers // Jan 2012

    Enhancing Coding Aware Routing and Handling Link Failure in WSN

    This paper is to handle link failure during distributed coding aware routing in wireless networks. Network coding is the technique in which the nodes of the network instead of simply relaying the packets they receive, the nodes will take several packets and combine them together for transmission. Network coding is...

    Provided By JCAKSRCE

  • White Papers // Jan 2012

    SET With SMS OTP Using Two Factor Authentication

    This paper describes a method of implementing two factor authentication using SMS OTP - One Time Password to Secure an E-Transaction (SET). The proposed method guarantees authenticated transactions in services, such as online banking, e-shopping or ATM machines. The proposed system involves generating and delivering a One Time Password (OTP)...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Anomaly Protection Using Batching Strategies

    Traffic analysis is typically countered by the use of intermediary nodes, whose role is to perturb the traffic flow and thus confuse an external observer. Such intermediaries are called mixes. The authors address attacks that exploit the timing behaviour of TCP and other protocols and applications in low-latency anonymity networks....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Compare the Performance of the Two Prominent Routing Protocols for Mobile Ad-Hoc Networks

    An ad hoc network is a collection of wireless mobile nodes, frequently forming a network topology without the use of any existing network infrastructure or centralized administration. Compare the performance of the two prominent routing protocols for mobile ad hoc networks Dynamic Source Routing - DSR, Destination Sequenced Distance Vector...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Data Dynamics for Storage Security and Public Auditability in Cloud Computing

    Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. The unique paradigm brings about many new security challenges, which have not...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Hand Written Signature Embedding in Photographs - An Authentication Mechanism for Internet Based Transactions

    The photograph-signature scheme is widely used in many day-to-day transactions, such as in passport application and others. This paper proposes to embed the handwritten signature into passport size photograph using watermarking technique. The signature is embedded in the photograph, and thus protected from all attempts to copy it. The watermarking...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Improving CA-AOMDV Protocol Against Blackhole Attacks

    Mobile ad hoc networks are infrastructure less network where the nodes themselves are responsible for routing the packets. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. Due to security vulnerabilities of the routing protocols, wireless ad hoc networks are not...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Defending Against Sybil Attacks in Anonymizing Networks

    An anonymity network enables users to access the Web while blocking any tracking or tracing of their identity on the Internet. Tor is open-source anonymity software free to public use. This type of online anonymity moves Internet traffic through a worldwide network of volunteer servers. Anonymity networks prevent traffic analysis...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    STRAB: Sensing and Tracing Back Attackers Against Encrypted Protocols

    The uncontrolled growth of the network based applications has contributed to enormous security leaks. Though the encrypted protocols are used to provide secure communication, Intrusion detection systems (Idss) are often employed to monitor network traffic and host activities that may lead to unauthorized accesses and attacks against vulnerable services. Anomaly...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Review on Intelligent Deployment of Nodes for Improving the Performance of Overlay Networks

    Overlay network is a network built on top of one or more existing networks. It adds an additional layer of virtualization to the network. Overlays enhance the performance of the network. They provide various services to the underlying network for efficient resource utilization. Overlay nodes present in the network can...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Secure Migration Process for Mobile Agents Form One Host to Another Host

    In the past few years the computer systems have evolved from monolithic computing device to much more complex client-server environment. Now new phase of evaluation allows complete mobility of application code among supporting platforms to form a loosely-coupled distributed system. Mobile-agent paradigm is one such technology. Mobile agents paradigm has...

    Provided By JCAKSRCE

  • White Papers // Mar 2012

    Reduce Delays in End to End DVB-RCS Satellite Networks

    In today's satellite network to a return-channel for communication between terminals used in the DVB-RCS standard is provided by this feature. In order to allocate the bandwidth of the standard protocol used is called DAMA where algorithms such as CRA, RBDC uses to request bandwidth Since these methods are simple...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Surveying on Road Safety Using Vehicular Communication Networks

    Today's people are more and more concerned about their privacy and security. Vehicular Communication (VC) systems have the potential to improve road safety and driving comfort. Vehicular communication based on wireless short-range technology enables spontaneous information exchange among vehicles and with road-side stations. A novel class of wireless networks that...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Secure Cluster Head Election for Intrusion Detection in MANET

    In this paper, leader election is studied in the presence of selfish node for intrusion detection in Mobile Ad Hoc NETworks (MANETs).To balance the resource consumption among all the nodes, the most cost-efficient leaders with the most remaining energy must be elected as leader. But, the selfish nodes may behave...

    Provided By JCAKSRCE

  • White Papers // Sep 2009

    Finding Anomalies in Databases

    Association rules have become an important paradigm in knowledge discovery. Nevertheless, the huge number of rules which are usually obtained from standard datasets limits their applicability. In order to solve this problem, several solutions have been proposed, as the definition of subjective measures of interest for the rules or the...

    Provided By JCAKSRCE

  • White Papers // Sep 2009

    An Emerging Ant Colony Optimization Routing Algorithm (ACORA) for MANETS

    Ad hoc networks are characterized by multi-hop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. A Mobile ad hoc network (Manet) is a collection of mobile nodes which communicate over radio. These kinds of networks are very flexible, thus they do not require any...

    Provided By JCAKSRCE

  • White Papers // Sep 2009

    Ecommerce in Client/server Technology Using SNMP Protocol

    Ecommerce is perhaps the biggest change that business has feed after the industrial revolution. The revolution is of much greater magnitude and more global in nature and is beckoning business worldwide. Ecommerce business on net and it is challenging the very basics of the way in which business is done....

    Provided By JCAKSRCE

  • White Papers // Dec 2009

    Checking the Performance of Dynamic Composite Video-on-Demand Web Service

    This paper is to design and implement Dynamic Composite Video-on-Demand Web Service (DCVWS) and check its performance through Parallel Performance Monitoring Service (PPMS) during run-time. The media web services such as Video-on-Demand (VoD), Music-on-Demand (MoD) and News-on-Demand (NoD) are composed at design time using BPEL (Business Process Execution Language) designer...

    Provided By JCAKSRCE

  • White Papers // Jun 2010

    Technique for Improving the Data Retrieval Performance in Mobile Environments

    In this paper, the authors proposed a Neighbor Group caching scheme for Mobile Ad Hoc NETworks (MANETs). In this scheme, Neighbor caching makes a node possible to expand its caching storage instantaneously by storing its data in the storage of idle neighbors. To reduce communication and computational overhead, the authors...

    Provided By JCAKSRCE

  • White Papers // Jun 2010

    A Proposed Method to Solve the Drawbacks of Association Rule in E-Learning

    Data mining techniques have been successfully applied in many different fields including marketing, manufacturing, process control, fraud detection, network management and counter-terrorism. With the rapid growth of computer and Internet technologies, e-learning has become a major trend in the computer assisted teaching and learning fields. E-learning could be seen as...

    Provided By JCAKSRCE