- Filter by:
-
Content Type
-
Topic
-
An Integrated Approach for Energy Efficient Routing Over Ad-Hoc Network Using Soft Computing
In the past few years, wireless communication has grown rapidly. Through these greatest features are provided by the network without wires. Handheld devices and any user can take their place. They benefit from a small device, the long-lasting battery. The new communication standard is for high-bandwidth services. For communication, the...
Download Now -
Determination of Ranking Fraud for Mobile Applications
Mobile application is important for all the Smartphone users to play or perform different tasks. There large numbers of mobile application developers are available; they can develop the different mobile applications. For making lager users for their mobile applications some developers refers fraudulent activities. Due to these fraudulent activities the...
Download Now -
A Survey on Various Backup and Recovery Technique in Cloud
Cloud computing is an emerging technology that allows their user to store large amount of data in cloud storage and it can be use whenever required, from anywhere. It provides numerous kinds of services to its users such as software-as-a-service, infrastructure-as-a-service and platform-as-a-service, etc. Storage-as-a-service is one of the services...
Download Now -
Secure and Energy Efficient Data Aggregation Technique for Cluster Based Wireless Sensor Network
In the past few years, secure transmission of data along with efficiency is a serious issue for Wireless Sensor Networks (WSNs).Clustering is a powerful and convenient way to enhance performance of the WSNs system. In this paper, a secure transmission of data for Cluster-based WSNs (CWSNs) is studied, where the...
Download Now -
A Survey Paper on Novel Approach to Improve Quality of Web Service Discovery
Web services have vital role on the web for supporting the distributed service-based economy on a global scale. There are number of web services are available today but they face serval problems like isolation of services and lack of social relationship among related services has been known as reason for...
Download Now -
Study and Analysis of Software Testing
Software testing is a process conducted by the tester to give proper information about the quality of the software. It is a method which provides aids to reduce bugs and maintenance costs of the software. It provides a conceptual view of the software to allow the business to acknowledge and...
Download Now -
Providing Customized Requirements for Privacy Preserving in Web Search Engines
Web search tools are generally used to get information from web servers. These web crawlers use client profiles and as of late sought information to give indexed lists, so here there is no security insurance for client information. The authors give a framework that can assist clients with customizing their...
Download Now -
A Survey and Security Analysis on One-to-Many Order Preserving Technique on Cloud Data
The data on cloud computing is encrypted due to security concern or the factor of third party digging into it. As the consequence to this, the search over encrypted data becomes a complex task. The traditional approaches like searching in plain text cannot be apply over encrypted data. So, the...
Download Now -
A Cluster Tree Based Model for Secure Data Retrieval in Military Using Wireless Sensor Networks
Wireless Sensor Networks (WSNs) can be used in military environments such as a battlefield tracking the enemies. One of the challenging issues in this scenario is enforcement of authorization policies and the policies update for secure data retrieval. CP-ABE is using efficient and secure data retrieval method for decentralized DTNs....
Download Now -
Comparative Analysis of MANET Routing Protocol by Varying Number of Groups in Group Mobility Model
A Mobile Ad hoc NETwork (MANET) is a network consisting of wireless mobile nodes that are self-configuring and communicate with each other any centralized infrastructure. Each device in a MANET can move freely and independently in any direction and will therefore change its links to other devices frequently. In order...
Download Now