List of Journals    /    Call For Papers    /    Subscriptions        
 
 
 
 
 
 
ABOUT IJOAR
 About IJOAR
 IJOAR Journals Objectives
 List of Journals
 CALL FOR PAPERS
 Call For Papers CFP
AUTHOR GUIDELINES
 Submission Guidelines
 Peer Review Process
 Plagiarism Policies
 Abstracting & Indexing
 Open Access Policy
 Submit Manuscript
 FOR REVIEWERS
 Reviewer Guidelines
 FOR REGISTRATION
 Registration Process
 Online (via Paypal)
 Wire Transfer Process
 Direct Bank Transfer
 DOWNLOAD SECTION
 Manuscript Template
 Copyright Form
 Registration Form
  SERVICES
 Abstracting & Indexing
 CURRENT ISSUES
 Volume 1, Issue 2, Feb 2013
 
 

Volume 1, Issue 2, February 2013


International Journal of Advance Research in Computer Science & Engineering (IJOARCS)
 
 

ZigBee in Wireless Communication[ ]


The ZigBee module designed to operate within the ZigBee protocol (open source protocol which can be downloaded and used for developing various types of applications) to support GPS tracking system in terms of latitude and longitude. The module operates in the ISM 2.4 GHz frequency band with minimal power and provides reliable delivery of data between remote devices. The location of the object is seen on the map on the computer interfaced with the central unit.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Automated Drip Irrigation Improvements Using Wireless Application[ ]


Drip Irrigation is today’s need because water is nature’s gift to the mankind and it is not unlimited and free forever. World’s water resources are fastly vanishing. The one and only one solution to this problem is automated Drip Irrigation system. In the field of agriculture, use of proper method of irrigation is important and it is well known that irrigation by drip is very economical and efficient. In the conventional drip irrigation system, the farmer has to keep watch on irrigation timetable, which is different for different crops. In Automatic microcontroller based drip irrigation system irrigation will take place only when there will be intense requirement of water. Irrigation system uses valves to turn irrigation ON and OFF. These valves may be easily automated by using controllers and solenoids. The purpose of this paper is to provide more facility in agriculture field by using wireless sensor network along with linear programming. Paper describes an application of a wire-less sensor network for low-cost wireless controlled and monitored irrigation solution. The developed irrigation method removes the need for workmanship for flooding irrigation as well as drip irrigation. use of linear pro-gramming help us to distribute available water to the crops if and only if there is immense need of water to the crop in order to get maxi-mum profit with minimum cost. Also linear Programming helps us to do proper management of available water.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Cyber Crime And Thier Solution[ ]


This paper deals with the cyber crime & its realistic facts which blocked our working capability, efficiency & revealed the privacy of victims. This paper also deals with the futuristic cyber crime & its prevention.We are very thankful to Prof. Sitanshu Ray for his tireless support and his lucid way of explaining us the salient points really helped us to write this paper.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Vehicular Network: Properties, Structure, Challenges, Attacks, Solutions For Improving Scalability And Security[ ]


VANET is a form of Mobile Ad-Hoc Network or MANET and its different from MANET due to high mobility of nodes and the large scale of networks. The escalating amount of budding applications related to intelligent transportation systems (ITSs) has attracted more number of researchers to the area of vehicular networks (VNs). Some main curriculums of applications have lately gained popularity, i.e., security, scalable, safety, and traffic information and service location applications. In our paper we discussed what the challenges, attacks faced by vehicular networks and we provided solutions for some of the challenges which comprises more important factor. For improving scalability in vehicular network we introduced two sets of protocol (LocVSDPs and GeoVCom) and also suggested a set of resolution to progress the security in VANET.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Resilient Packet Ring Technology[ ]


IEEE802.17 Resilient Packet Ring (RPR) is a promising new technology that was standardized to meet the needs of telecommunication network providers and enterprise data network. RPR allows substantial re-use of the valuable existing telecommunications infrastructure, while also allowing a greatly simplified means of aggregation packetized data from many customers into the provider’s access and metro networks. The RPR fairness protocol and algorithm insures fair medium access among an RPR‘s users. RPR also provides the high reliability that has become increasingly important for enterprise network users. This paper reviews the key aspects of RPR, including medium access control and its fairness mechanism, physical layer options, protection restoration options, and bridging and routing within and across an RPR.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Security of Digital Images Using Steganography Techniques based on LSB and DCT Coefficients[ ]


In modern Communications, We required special means of security that protect our important/private information from unauthorized or unwanted persons. Using the Steganography, we can solve this problem. Steganography is a one of the best technique of hiding information in digital media. In advance to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Main aim of steganography is to communicate securely in a completely undetectable manner. That means Steganography provide invisible communication. In this paper, a novel image steganography method based on LSB and DCT that provide randomized bit embedding inside the cover image. Firstly the Discrete Cosine Transform (DCT) apply on the cover image and then hiding the secrete message image in LSB of the cover image in random locations based on threshold. It is observed that the values of PSNR and security better in the case of proposed algorithm compare to existing algorithms.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Performance Comparison of Routing Protocols(OSPF & EIGRP)[ ]


In modern communication networks, routing protocols are used to determine the shortest path to the destination. Open Shortest Path First (OSPF), Enhanced Interior Gateway Routing Protocol (EIGRP) is the dominant interior routing protocol for such networks. This paper presents a simulation based analysis of these protocols. To carry out the network simulations, we used Optimized Network Engineering Tool (OPNET). The comparison analysis is based on several parameters that determine the robustness of these protocols.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Service-Oriented and Software Product Lines Architecture: A Systematic Comparison of Two Concepts[ ]


Service-Oriented Architectures (SOA) and Software Product Lines are two concepts that currently get a lot of attention in research and practice. Both promise to make possible the development of flexible, cost effective software systems and to support high levels of reuse. But at the same time they are quite different from one another: while Software Product Lines focus on one producer alone developing a set of systems based on a common platform (often in the embedded systems-domain), most proponents of SOA pro-pose systems consisting of loosely coupled services or company-wide infrastructures including a variety of systems that are loosely coupled using services. In any case, the services are usually developed by various companies. The focus of this paper is the systematic comparison of these concepts and an outlook on how Enterprise Component Platforms could be created by combining SOA and Software Product Lines.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
IP Multimedia Subsystem (IMS) Security Model[ ]


The IP multimedia subsystem (IMS) is a Next Generation Network (NGN) that integrates wireless, wireline and internet technologies. IMS enables the convergence of voice, data and multimedia services such as Voice over IP (VoIP), Video over IP, push-to-talk, presence or instant messaging services. IMS is almost independent of the access technology and uses a number of protocols such as HTTP and SMTP while the most important one is called SIP or session Initiation Protocol. At parallel this open based emerging technology has security challenges from multiple communication protocols like IP, SIP and RTP etc. Because of the nature of the IMS (IP based), these networks will inherit most of the security threats that these protocols are currently facing. In this paper we have presented a security model to protect IMS resources from different attacks like session teardown attack, session modification attack and media flow attack. Also authorization module is proposed to protect IMS resources against unauthorized access. All of these affect the IMS value added services.

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Comparitive Study on Face Recognition Using HGPP, PCA, LDA, ICA and SVM[ ]


we are comparing the performance of five algorithms of the face recognition i.e. HGPP, PCA, LDA, ICA and SVM. The basis of the comparison is the rate of accuracy of face recognition. These algorithms are employed on the ATT database and IFD database. We find that HGPP has the highest rate of accuracy of recognition when it is applied on the ATT database whereas LDA outperforms the all other algorithms when it is applied to IFD database

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 
 
     
  Untitled Document
 
 
Copyrights & Usage: Articles published by IJOAR Journals are Open Access. Permission to copy and distribute any other content, ../../images, animation and other parts of this website is prohibited. IJOAR Journals has the rights to take action against individual/group if they are found victim of copying these parts of the website.