Andhra University

Displaying 1-40 of 46 results

  • White Papers // Oct 2013

    An Improved Secured Client Authentication to Protect Software Against Piracy

    Software protection and security plays a vital role to the business and commercial organizations. Various techniques have been proposed to enhance the security of the client's system to authenticate the software against piracy protection. Various software attacks like hardware cloning, software cloning, software cracking, virus scripts provides high influence on...

    Provided By Andhra University

  • White Papers // Sep 2012

    A Categorical Review of Recommender Systems

    As more and more information became available electronically, the need for effective information retrieval and implementation of filtering tools has become essential for easy access of relevant information. Recommender Systems (RS) are software tools and techniques providing suggestions for items and/or services to be of use to a user. These...

    Provided By Andhra University

  • White Papers // Sep 2012

    A Novel Semi-Blind Reference Color Image Watermarking Using DWT-DCT-SVD

    In this paper, the authors propose three robust and semi-blind digital color image watermarking algorithms. These algorithms are based on hybrid transforms using the combination of Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD), Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD), Discrete Wavelet Transform (DWT), Discrete Cosine...

    Provided By Andhra University

  • White Papers // Aug 2012

    A Semi-Blind Reference Video Watermarking Using Hybrid Transforms for Copyright Protection

    When network and storage devices become more popular, the digital data more easily and more quickly will be distributed. Can be easily pirated copy and did not limit a large number of multimedia information (images, audio and video). Therefore, people are increasingly concerned about the protection of intellectual property rights...

    Provided By Andhra University

  • White Papers // Aug 2012

    An Efficient ID-Based Proxy Signcryption Scheme

    Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step, at lower computational cost and communication over heads than the signature-then-encryption. Proxy signcryption schemes are variations of ordinary signcryption schemes and have been useful in many applications where the delegation of rights is quite common....

    Provided By Andhra University

  • White Papers // Jul 2012

    Privacy Preserving Through Segment-Based Visual Cryptography

    The role of privacy in the digital world is an essential criterion and confidentiality of pictographic data has added significance to the study of security. A version of visual cryptography for hiding textual data which is based on sixteen segment display is presented. The secret that is in the form...

    Provided By Andhra University

  • White Papers // Jul 2012

    UNET- A Simulator for Underwater Networks

    The applications of Underwater Sensor Networks are plenty and varied. Acoustic sensor nodes and Autonomous Underwater Vehicles are the main constituents of such a network. But it is required to analyze the performance of such a network using a simulation program. Simulation of the network will help in reaching optimum...

    Provided By Andhra University

  • White Papers // Feb 2012

    Recent Performance Evaluation Among Various AES Algorithms-Mars, RC6, Rijndael, Serpent, Twofish

    In this paper, the structure and design various AES algorithms have been analyzed, remarking its main advantages and limitations, as well as its similarities and dissimilarities with each other. Thus, the fact that the new cipher and its inverse use different components, which practically eliminates the possibility for weak and...

    Provided By Andhra University

  • White Papers // Dec 2011

    Position Detection with Face Recognitionusing Image Processing and Machine Learning Techniques

    In this paper, an improved algorithm for detecting the position of a person in controlled environments using the face detection algorithm is proposed. This algorithm ingeniously combines different face detection, occlusion detection algorithms, EMD for facial recognition and SVM classifier. A class room environment with thirty students is used along...

    Provided By Andhra University

  • White Papers // Nov 2011

    Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key

    In this paper, the authors propose a scheme of encryption for Block ciphers in N-alphabet, where every member of any m-block of plain text is enciphered by different permutations which are generated by the help of a secret key word. Further the authors extend this method to multicode encryption using...

    Provided By Andhra University

  • White Papers // Nov 2011

    A Novel Approach for Pass Word Authentication Using Bidirectional Associative Memory

    Password authentication is a very important system security procedure to gain access to user resources. In the traditional password authentication methods a server has check the authenticity of the users. The authors' proposed method users can freely select their passwords from a predefined character set. They can also use a...

    Provided By Andhra University

  • White Papers // Sep 2011

    A Novel Approach for Pass Word Authentication Using Brain -State -In -A Box (BSB) Model

    Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program...

    Provided By Andhra University

  • White Papers // Sep 2011

    Handwritten Text Image Authentication Using Back Propagation

    Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program...

    Provided By Andhra University

  • White Papers // Jul 2011

    An Ancient Indian Board Game as a Tool for Authentication

    User authentication is the first phase of information security. Users should remember their passwords and recall them for authentication. Text based passwords is the traditional method for authentication. Short and simple passwords are memorable and usable but not secure. Random and lengthy passwords are secure but not memorable and usable....

    Provided By Andhra University

  • White Papers // Jun 2011

    Generation of Nakagami Fading Signals With Arbitrary Correlation and Fading Parameters

    Mobile radio channel simulators are essential for repeatable system tests in the development, design, or test laboratory. Field tests in a mobile environment are considerably more expensive and may require permission from regulatory authorities. Because of the random, uncontrollable nature of the mobile propagation path, it is difficult to generate...

    Provided By Andhra University

  • White Papers // May 2011

    Authentication Schemes for Session Passwords Using Color and Images

    Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text...

    Provided By Andhra University

  • White Papers // Apr 2011

    A Study of the Agile Software Development Methods, Applicability and Implications in Industry

    There has been a tremendous importance in the field of agile software development approaches in the recent past. This is because of the fastness that agile approaches bring in the life cycle of software development. This interest in the field shows that there are benefits to reap through successful implementation...

    Provided By Andhra University

  • White Papers // Apr 2011

    Supply Chain Management - An Approach for Medium Scale Enterprises

    The supply chain management has attracted much attention from both the business managers and consultants, which has changed the traditional procurement and inventory planning. The developments in information technology also have enabled major advances in information management and electronic commerce. The supply chain management is implemented in various business functions....

    Provided By Andhra University

  • White Papers // Feb 2011

    Performance Evaluation of a Communication Network With Dynamic Bandwidth Allocation and Bulk Arrivals

    Communication networks had a separate deployment for each emerging service like telephone networks, data networks and multimedia networks. In integrated services network the packets are transmitted using efficient statistical multiplexing. In this paper, the authors develop and analyze a two-node communication network with dynamic bandwidth allocation having bulk arrivals. The...

    Provided By Andhra University

  • White Papers // Jan 2011

    Variable Quantum Deficit Round Robin Scheduling for Improved Fairness in Multihop Networks

    To increase the coverage area, Multichip WiMAX networks are particularly useful without the need to deploy expensive base stations. One of the most common variants in Multihop WiMAX is the Wireless Mesh Networks. Scheduling algorithms for WiMAX has been a topic of interest for a long time since the very...

    Provided By Andhra University

  • White Papers // Jan 2011

    Performance Evaluation of Two Node Tandem Communication Network With Dynamic Bandwidth Allocation Having Two Stage Direct Bulk Arrivals

    A two node tandem communication network with Dynamic Bandwidth Allocation (DBA) having two stage direct bulk arrivals is developed and analyzed. The messages arriving to the source are packetized and stored in the buffers for forward transmission. Dynamic bandwidth allocation strategy is proposed by adjusting the transmission rate at every...

    Provided By Andhra University

  • White Papers // Dec 2010

    Performance Evaluation of DSR in Various Placement Environments

    The main method for evaluating the performance of MANETs is simulation. This paper is subjected to the Dynamic Source Routing protocol (DSR) and evaluated its performance in three different placement environments namely random, grid and uniform. The authors investigated the QOS metrics namely average jitter, average end-to-end delay, packet delivery...

    Provided By Andhra University

  • White Papers // Dec 2010

    Performance Analysis of MC-CDMA and OFDM in Wireless Rayleigh Channel

    Recent advances in wireless communications have made use of MC-CDMA and OFDM techniques to allow for high data rate transmission. Rapid time variations of the wireless communication channel have an effect on the performance of multicarrier modulation. In this paper, the authors emphasis the Doppler spread and computes its effect...

    Provided By Andhra University

  • White Papers // Dec 2010

    Speech Recognition Using HMM With MFCC-An Analysis Using Frequency Specral Decomposion Technique

    This paper presents an approach to the recognition of speech signal using frequency spectral information with Mel frequency for the improvement of speech feature representation in a HMM based recognition approach. A frequency spectral information is incorporated to the conventional Mel spectrum base speech recognition approach. The Mel frequency approach...

    Provided By Andhra University

  • White Papers // Nov 2010

    Scaling Data Mining Algorithms to Large and Distributed Datasets

    In the contemporary world of global economy real-life data is distributed and evolving consistently. For the purpose of data mining, the large set of evolving and distributed data can be handled efficiently by Parallel Data mining and Distributed Data Mining, Incremental Data mining. In this paper, the authors discuss about...

    Provided By Andhra University

  • White Papers // Aug 2010

    An ID-Based Blind Signature Scheme From Bilinear Pairings

    Blind signatures, introduced by Chaum, allow a user to obtain a signature on a message without revealing anything about the message to the signer. Blind signatures play an important role in plenty of applications such as e-voting, e-cash system where anonymity is of great concern. Identity based(ID-based) public key cryptography...

    Provided By Andhra University

  • White Papers // Aug 2010

    A Plausible Comprehensive Web Intelligent System for Investigation of Web User Behavior Adaptable to Incremental Mining

    With the continued increase in the usage of the World Wide Web (WWW) Web mining has been established as an important area of research. The WWW is a vast repository of unstructured information, in the form of interrelated files, distributed on numerous web servers over wide geographical regions. Web mining...

    Provided By Andhra University

  • White Papers // Jul 2010

    A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network

    Password authentication using Hopfield Networks is presented in this paper. In this paper, the authors discussed the Hopfield Network Scheme for Textual and graphical passwords, for which input Password will be converted in to probabilistic values. They observed how to get password authentication using Probabilistic values for Textual passwords and...

    Provided By Andhra University

  • White Papers // Jul 2010

    A Tandem Communication Network With Dynamic Bandwidth Allocation and Modified Phase Type Transmission Having Bulk Arrivals

    This paper deals with the performance evaluation of a two node communication network with dynamic bandwidth allocation and modified phase type transmission having bulk arrivals. The performance of the statistical multiplexing is measured by approximating with the compound Poisson process and the transmission completions with Poisson processes. It is further...

    Provided By Andhra University

  • White Papers // Jun 2010

    Fuzzy Based Approach for Predicting Software Development Effort

    Software development effort prediction is one of the most significant activities in software project management. The literature shows several algorithmic cost estimation models such as Boehm's COCOMO, Albrecht's' Function Point Analysis, Putnam's SLIM, ESTIMACS etc, but each do have their own pros and cons in estimating development cost and effort....

    Provided By Andhra University

  • White Papers // Apr 2010

    Modified Queue-Based Exponential Rule Scheduler for Improved QoS in OFDMA Systems

    In the authors' paper, they propose a modification of queue based exponential scheduler that dynamically improves the channel gain of far away users (by increasing their credits) at the cost of a small reduction of the same for the nearby users(by reducing the credits), since users nearby anyway have a...

    Provided By Andhra University

  • White Papers // Feb 2010

    Analysis of 4p-Kappa TEF in to Software Reliability Growth Model and Optimal Software Release Policy

    This paper investigates a SRGM (Software Reliability Growth Model) based on NHPP (Non-Homogeneous Poisson Process) which incorporates the 4p-Kappa testing effort function. Testing Software reliability is generally a key factor in software quality. Reliability is an essential ingredient in customer satisfaction. In software development process reliability conveys the information to...

    Provided By Andhra University

  • White Papers // Jan 2010

    Performance Evaluation of Message Encryption Scheme Using Cheating Text

    In this paper, the authors evaluate the performance of their proposed Message Encryption scheme using cheating text with respect to response time and user load. In this method the authentication of the message is also possible because of the hashing by Modified message digest Algorithm. This scheme can be applied...

    Provided By Andhra University

  • White Papers // Dec 2009

    Identifying the Importance of Software Reuse in COCOMO81, COCOMOII

    Software project management is an interpolation of project planning, project monitoring and project termination. The substratal goals of planning are to scout for the future, to diagnose the attributes that are essentially done for the consummation of the project successfully, animate the scheduling and allocate resources for the attributes. Software...

    Provided By Andhra University

  • White Papers // Dec 2009

    An Efficient ID- Based Directed Signature Scheme From Bilinear Pairings

    A directed signature scheme allows a designated verifier to directly verify a signature issued to him, and a third party to check the signature validity with the help of the signer or the designated verifier as well. Directed signatures are applicable where the signed message is sensitive to the signature...

    Provided By Andhra University

  • White Papers // Dec 2009

    Approaches and Data Processing Techniques for Intrusion Detection Systems

    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection Systems (IDS).In this paper an overview of types of attacks, IDS components, and classifications of IDS is briefly given. Two approaches from the classification of...

    Provided By Andhra University

  • White Papers // Dec 2009

    New Model for Quality of Service in Mobile Ad Hoc Network

    A Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes where each node is free to move about arbitrarily. The Ad Hoc On-Demand Distance Vector AODV) routing protocol is one of the well-known and efficient on-demand MANET protocols. AODV currently does not support Quality of Service (QoS) and...

    Provided By Andhra University

  • White Papers // Nov 2009

    Modified Opportunistic Deficit Round Robin Scheduling for Improved QOS in IEEE 802.16 WBA Networks

    Packet and flow scheduling algorithms for WiMAX has been a topic of interest for a long time since the very inception of WiMAX networks. WiMAX offers advantages particularly in terms of Quality of service it offers over a longer range at the MAC level. In the work, the authors propose...

    Provided By Andhra University

  • White Papers // Nov 2009

    Selfless Distributed Credit Based Scheduling for Improved QoS in IEEE 802.16 WBA Networks

    Packet and flow scheduling algorithms for WiMAX has been a topic of interest for a long time since the very inception of WiMAX networks. WiMAX offers advantages particularly in terms of Quality of service it offers over a longer range at the MAC level. In the paper, the authors propose...

    Provided By Andhra University

  • White Papers // Oct 2009

    A Software Safety Model for Safety Critical Applications

    Software has become responsible for most of the critical functions of complex systems. Software safety is the notion that software will execute within a system context without contributing to hazards. Software for safety-critical systems must deal with the hazards identified by safety analysis in order to make the system safe....

    Provided By Andhra University

  • White Papers // Dec 2009

    Approaches and Data Processing Techniques for Intrusion Detection Systems

    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection Systems (IDS).In this paper an overview of types of attacks, IDS components, and classifications of IDS is briefly given. Two approaches from the classification of...

    Provided By Andhra University

  • White Papers // May 2011

    Authentication Schemes for Session Passwords Using Color and Images

    Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text...

    Provided By Andhra University

  • White Papers // May 2008

    A Novel Approach for Privacy Preserving Publication of Data

    Protecting privacy of an individual while revealing knowledge about one's personal and sensitive information is a much talked about concern in the data mining world. Several works have been reported in literature as a solution to this concern. But most of these solutions which claim privacy preserving, usually end up...

    Provided By Andhra University

  • White Papers // May 2008

    IP-Surveillance System for Unmanned Platforms of Offshore Oil & Gas Field Using WiMAX Technology

    The Offshore oil and gas fields generally consist of a process complex and group of unmanned platforms attached to it. The hydrocarbons produced at different unmanned platforms will be transported to process complex, where they will be separated, dried and transported to the nearest land fall point. These installations are...

    Provided By Andhra University

  • White Papers // Dec 2010

    Performance Analysis of MC-CDMA and OFDM in Wireless Rayleigh Channel

    Recent advances in wireless communications have made use of MC-CDMA and OFDM techniques to allow for high data rate transmission. Rapid time variations of the wireless communication channel have an effect on the performance of multicarrier modulation. In this paper, the authors emphasis the Doppler spread and computes its effect...

    Provided By Andhra University

  • White Papers // Oct 2009

    A Software Safety Model for Safety Critical Applications

    Software has become responsible for most of the critical functions of complex systems. Software safety is the notion that software will execute within a system context without contributing to hazards. Software for safety-critical systems must deal with the hazards identified by safety analysis in order to make the system safe....

    Provided By Andhra University

  • White Papers // Apr 2011

    A Study of the Agile Software Development Methods, Applicability and Implications in Industry

    There has been a tremendous importance in the field of agile software development approaches in the recent past. This is because of the fastness that agile approaches bring in the life cycle of software development. This interest in the field shows that there are benefits to reap through successful implementation...

    Provided By Andhra University

  • White Papers // Feb 2011

    Performance Evaluation of a Communication Network With Dynamic Bandwidth Allocation and Bulk Arrivals

    Communication networks had a separate deployment for each emerging service like telephone networks, data networks and multimedia networks. In integrated services network the packets are transmitted using efficient statistical multiplexing. In this paper, the authors develop and analyze a two-node communication network with dynamic bandwidth allocation having bulk arrivals. The...

    Provided By Andhra University

  • White Papers // Nov 2011

    Scheme of Encryption for Block Ciphers and Multi Code Generation Based on Secret Key

    In this paper, the authors propose a scheme of encryption for Block ciphers in N-alphabet, where every member of any m-block of plain text is enciphered by different permutations which are generated by the help of a secret key word. Further the authors extend this method to multicode encryption using...

    Provided By Andhra University

  • White Papers // Jul 2011

    An Ancient Indian Board Game as a Tool for Authentication

    User authentication is the first phase of information security. Users should remember their passwords and recall them for authentication. Text based passwords is the traditional method for authentication. Short and simple passwords are memorable and usable but not secure. Random and lengthy passwords are secure but not memorable and usable....

    Provided By Andhra University

  • White Papers // Sep 2011

    Handwritten Text Image Authentication Using Back Propagation

    Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program...

    Provided By Andhra University

  • White Papers // Sep 2011

    A Novel Approach for Pass Word Authentication Using Brain -State -In -A Box (BSB) Model

    Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person, tracing the origins of an artefact, ensuring that a product is what it's packaging and labelling claims to be, or assuring that a computer program...

    Provided By Andhra University

  • White Papers // Jun 2011

    Generation of Nakagami Fading Signals With Arbitrary Correlation and Fading Parameters

    Mobile radio channel simulators are essential for repeatable system tests in the development, design, or test laboratory. Field tests in a mobile environment are considerably more expensive and may require permission from regulatory authorities. Because of the random, uncontrollable nature of the mobile propagation path, it is difficult to generate...

    Provided By Andhra University

  • White Papers // Nov 2011

    A Novel Approach for Pass Word Authentication Using Bidirectional Associative Memory

    Password authentication is a very important system security procedure to gain access to user resources. In the traditional password authentication methods a server has check the authenticity of the users. The authors' proposed method users can freely select their passwords from a predefined character set. They can also use a...

    Provided By Andhra University

  • White Papers // Jul 2010

    A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network

    Password authentication using Hopfield Networks is presented in this paper. In this paper, the authors discussed the Hopfield Network Scheme for Textual and graphical passwords, for which input Password will be converted in to probabilistic values. They observed how to get password authentication using Probabilistic values for Textual passwords and...

    Provided By Andhra University

  • White Papers // Apr 2010

    Modified Queue-Based Exponential Rule Scheduler for Improved QoS in OFDMA Systems

    In the authors' paper, they propose a modification of queue based exponential scheduler that dynamically improves the channel gain of far away users (by increasing their credits) at the cost of a small reduction of the same for the nearby users(by reducing the credits), since users nearby anyway have a...

    Provided By Andhra University

  • White Papers // Jan 2011

    Variable Quantum Deficit Round Robin Scheduling for Improved Fairness in Multihop Networks

    To increase the coverage area, Multichip WiMAX networks are particularly useful without the need to deploy expensive base stations. One of the most common variants in Multihop WiMAX is the Wireless Mesh Networks. Scheduling algorithms for WiMAX has been a topic of interest for a long time since the very...

    Provided By Andhra University

  • White Papers // Nov 2009

    Selfless Distributed Credit Based Scheduling for Improved QoS in IEEE 802.16 WBA Networks

    Packet and flow scheduling algorithms for WiMAX has been a topic of interest for a long time since the very inception of WiMAX networks. WiMAX offers advantages particularly in terms of Quality of service it offers over a longer range at the MAC level. In the paper, the authors propose...

    Provided By Andhra University

  • White Papers // Dec 2010

    Speech Recognition Using HMM With MFCC-An Analysis Using Frequency Specral Decomposion Technique

    This paper presents an approach to the recognition of speech signal using frequency spectral information with Mel frequency for the improvement of speech feature representation in a HMM based recognition approach. A frequency spectral information is incorporated to the conventional Mel spectrum base speech recognition approach. The Mel frequency approach...

    Provided By Andhra University

  • White Papers // Feb 2010

    Analysis of 4p-Kappa TEF in to Software Reliability Growth Model and Optimal Software Release Policy

    This paper investigates a SRGM (Software Reliability Growth Model) based on NHPP (Non-Homogeneous Poisson Process) which incorporates the 4p-Kappa testing effort function. Testing Software reliability is generally a key factor in software quality. Reliability is an essential ingredient in customer satisfaction. In software development process reliability conveys the information to...

    Provided By Andhra University

  • White Papers // Jan 2011

    Performance Evaluation of Two Node Tandem Communication Network With Dynamic Bandwidth Allocation Having Two Stage Direct Bulk Arrivals

    A two node tandem communication network with Dynamic Bandwidth Allocation (DBA) having two stage direct bulk arrivals is developed and analyzed. The messages arriving to the source are packetized and stored in the buffers for forward transmission. Dynamic bandwidth allocation strategy is proposed by adjusting the transmission rate at every...

    Provided By Andhra University

  • White Papers // Dec 2009

    Identifying the Importance of Software Reuse in COCOMO81, COCOMOII

    Software project management is an interpolation of project planning, project monitoring and project termination. The substratal goals of planning are to scout for the future, to diagnose the attributes that are essentially done for the consummation of the project successfully, animate the scheduling and allocate resources for the attributes. Software...

    Provided By Andhra University

  • White Papers // Jul 2010

    A Tandem Communication Network With Dynamic Bandwidth Allocation and Modified Phase Type Transmission Having Bulk Arrivals

    This paper deals with the performance evaluation of a two node communication network with dynamic bandwidth allocation and modified phase type transmission having bulk arrivals. The performance of the statistical multiplexing is measured by approximating with the compound Poisson process and the transmission completions with Poisson processes. It is further...

    Provided By Andhra University

  • White Papers // Jul 2008

    A New Approach for Estimating Software Effort Using RBFN Network

    Effort estimation consist the prediction of how many hours of work and how many workers are needed to develop a project. Predicting software development effort with high precision is still a great challenge for project managers. The majority of software cost estimation techniques falling into three general categories includes Algorithmic...

    Provided By Andhra University

  • White Papers // May 2008

    Credibility Based Corrective Mechanism for Reputation Computation in Peer-to-Peer Communities

    Trust plays a key role in each transaction in online Peer - To - Peer (P2P) communities. Transaction based trust computation is an insufficient mechanism when the number of transactions is less. Reputation plays a major role when a peer transacts with other peers for the first time. Reputation computation...

    Provided By Andhra University

  • White Papers // Dec 2009

    New Model for Quality of Service in Mobile Ad Hoc Network

    A Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes where each node is free to move about arbitrarily. The Ad Hoc On-Demand Distance Vector AODV) routing protocol is one of the well-known and efficient on-demand MANET protocols. AODV currently does not support Quality of Service (QoS) and...

    Provided By Andhra University

  • White Papers // Sep 2012

    A Categorical Review of Recommender Systems

    As more and more information became available electronically, the need for effective information retrieval and implementation of filtering tools has become essential for easy access of relevant information. Recommender Systems (RS) are software tools and techniques providing suggestions for items and/or services to be of use to a user. These...

    Provided By Andhra University

  • White Papers // Sep 2012

    A Novel Semi-Blind Reference Color Image Watermarking Using DWT-DCT-SVD

    In this paper, the authors propose three robust and semi-blind digital color image watermarking algorithms. These algorithms are based on hybrid transforms using the combination of Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD), Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD), Discrete Wavelet Transform (DWT), Discrete Cosine...

    Provided By Andhra University

  • White Papers // Jul 2012

    Privacy Preserving Through Segment-Based Visual Cryptography

    The role of privacy in the digital world is an essential criterion and confidentiality of pictographic data has added significance to the study of security. A version of visual cryptography for hiding textual data which is based on sixteen segment display is presented. The secret that is in the form...

    Provided By Andhra University

  • White Papers // Dec 2011

    Position Detection with Face Recognitionusing Image Processing and Machine Learning Techniques

    In this paper, an improved algorithm for detecting the position of a person in controlled environments using the face detection algorithm is proposed. This algorithm ingeniously combines different face detection, occlusion detection algorithms, EMD for facial recognition and SVM classifier. A class room environment with thirty students is used along...

    Provided By Andhra University

  • White Papers // Dec 2010

    Performance Evaluation of DSR in Various Placement Environments

    The main method for evaluating the performance of MANETs is simulation. This paper is subjected to the Dynamic Source Routing protocol (DSR) and evaluated its performance in three different placement environments namely random, grid and uniform. The authors investigated the QOS metrics namely average jitter, average end-to-end delay, packet delivery...

    Provided By Andhra University

  • White Papers // Aug 2012

    A Semi-Blind Reference Video Watermarking Using Hybrid Transforms for Copyright Protection

    When network and storage devices become more popular, the digital data more easily and more quickly will be distributed. Can be easily pirated copy and did not limit a large number of multimedia information (images, audio and video). Therefore, people are increasingly concerned about the protection of intellectual property rights...

    Provided By Andhra University

  • White Papers // Jul 2012

    UNET- A Simulator for Underwater Networks

    The applications of Underwater Sensor Networks are plenty and varied. Acoustic sensor nodes and Autonomous Underwater Vehicles are the main constituents of such a network. But it is required to analyze the performance of such a network using a simulation program. Simulation of the network will help in reaching optimum...

    Provided By Andhra University

  • White Papers // Apr 2011

    Supply Chain Management - An Approach for Medium Scale Enterprises

    The supply chain management has attracted much attention from both the business managers and consultants, which has changed the traditional procurement and inventory planning. The developments in information technology also have enabled major advances in information management and electronic commerce. The supply chain management is implemented in various business functions....

    Provided By Andhra University

  • White Papers // Jan 2010

    Performance Evaluation of Message Encryption Scheme Using Cheating Text

    In this paper, the authors evaluate the performance of their proposed Message Encryption scheme using cheating text with respect to response time and user load. In this method the authentication of the message is also possible because of the hashing by Modified message digest Algorithm. This scheme can be applied...

    Provided By Andhra University

  • White Papers // Oct 2013

    An Improved Secured Client Authentication to Protect Software Against Piracy

    Software protection and security plays a vital role to the business and commercial organizations. Various techniques have been proposed to enhance the security of the client's system to authenticate the software against piracy protection. Various software attacks like hardware cloning, software cloning, software cracking, virus scripts provides high influence on...

    Provided By Andhra University

  • White Papers // Feb 2012

    Recent Performance Evaluation Among Various AES Algorithms-Mars, RC6, Rijndael, Serpent, Twofish

    In this paper, the structure and design various AES algorithms have been analyzed, remarking its main advantages and limitations, as well as its similarities and dissimilarities with each other. Thus, the fact that the new cipher and its inverse use different components, which practically eliminates the possibility for weak and...

    Provided By Andhra University

  • White Papers // Aug 2012

    An Efficient ID-Based Proxy Signcryption Scheme

    Signcryption is a cryptographic primitive that performs encryption and signature in a single logical step, at lower computational cost and communication over heads than the signature-then-encryption. Proxy signcryption schemes are variations of ordinary signcryption schemes and have been useful in many applications where the delegation of rights is quite common....

    Provided By Andhra University

  • White Papers // Oct 2006

    A Java Based Network Intrusion Detection System (IDS)

    The number of hacking and intrusion incidents is increasing alarmingly each year as new technology rolls out. Unfortunately in today's digitally connected world, there is no place to hide. DNS, NSlookup, Newsgroups, web site trawling, e-mail properties etc. are just some of the many ways in which one can be...

    Provided By Andhra University

  • White Papers // Jul 2008

    Modeling an Intrusion Detection System Using Data Mining and Genetic Algorithms Based on Fuzzy Logic

    Fuzzy logic based methods together with the techniques from Artificial Intelligence have gained importance. Data mining techniques like clustering techniques, Association rules together with fuzzy logic to model the fuzzy association rules are being used for classifying data. These together with the techniques of genetic algorithms like genetic programming are...

    Provided By Andhra University