Bioinfo Publications

Displaying 1-40 of 147 results

  • White Papers // Aug 2013

    ABC: Adaptive Bandwidth Control for Fairness in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is a group of number of sensor nodes. Nodes are spatially distributed to monitor physical and environmental conditions. Multi-hop communication is significantly predictable in WSN, because of limited transmission range and energy saving purpose. Traffic load in multi-hop wireless sensor network is not distributed uniformly over...

    Provided By Bioinfo Publications

  • White Papers // Jul 2013

    MARS: Sectoring Scheme to Improve Reliability in WSN

    Wireless Sensor Networks (WSNs), consisting of a large number of sensor nodes connected through wireless standard has emerged as an innovative expertise that offers the unprecedented ability to monitor the physical world accurately. Because of resource-constrained nature of sensor nodes, it adds up to the problems have emerged out of...

    Provided By Bioinfo Publications

  • White Papers // Jul 2013

    Hybrid Public Key Encryption Scheme for Networking

    In this paper, the authors analyze the Akleylek scheme and their try to enhance a security of peer-to-peer network by merging El-Gamal scheme with knapsack system. They demonstrate that this combination disclose a security and causes a scheme weak to cipher-text only attack. So, in a network a hacker can...

    Provided By Bioinfo Publications

  • White Papers // Apr 2013

    Survey on Constrained Based Path Selection QoS Routing Algorithms: MCP and MCOP Problems

    Conventional IP protocols are not suitable for real time applications which have stringent QoS requirements. For real time applications such as webcasting, audio/video-conferencing, and telemedicine it is expected that the router should be able to forward the packet according to the demand of the packet and to find a feasible...

    Provided By Bioinfo Publications

  • White Papers // Feb 2013

    Wireless Sensor Networks: Security, Attacks and Challenges

    The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. Sensor networks have great potential to be employed in mission critical situations like battlefields...

    Provided By Bioinfo Publications

  • White Papers // Jan 2013

    An Efficient Id-Based Public Verifiable Signcryption Scheme

    Signcryption is a cryptographic scheme that combines the functionalities of signature and encryption in a single logical step. In a conventional signcryption scheme, the message is hidden and thus the validity of the signcryption can be verified only after the un-signcryption process. Thus, a third party will not be able...

    Provided By Bioinfo Publications

  • White Papers // Dec 2012

    Tab to Monitor and Control CES Using Runtime TCP-IP Protocol

    In this paper, the authors trying to provide completely atomized CES (Closed Ecological System) using runtime TCP-IP protocol to monitor and control the parameters which governs the plant growth. The architecture of a green house monitoring system comprises of a set of sensor nodes and a control unit that communicate...

    Provided By Bioinfo Publications

  • White Papers // Oct 2012

    SELA-DSR: Stability Energy and Load Aware Dynamic Source Routing Protocols of Mobile Ad Hoc Networks

    Design an energy efficient routing protocol in mobile ad hoc networks is one of the major challenges, because of highly dynamic and distributed characteristics of the nodes and nodes are battery powered. Most of the research works in this field have done which is based on specific issues like energy...

    Provided By Bioinfo Publications

  • White Papers // Sep 2012

    HPSO: A New Version of Particle Swarm Optimization Algorithm

    The Particle Swarm Optimization (PSO) is a new global optimization method based on a metaphor of social interaction. In this paper, a new version of particle swarm optimization algorithms has been proposed. This algorithm has been developed by combining two different approaches of PSO i.e., Standard Particle Swarm Optimization (SPSO)...

    Provided By Bioinfo Publications

  • White Papers // Sep 2012

    A Component-Based Model for E-Business, Integrating Knowledge Management and E-Commerce

    In today's era of rapid globalization and faster information retrieval companies are migrating towards e-business models which are more responsive and user friendly, and which employs information and knowledge-driven applications, that help them respond rapidly to changing market conditions and customer needs. In today's scenario Knowledge management and e-business are...

    Provided By Bioinfo Publications

  • White Papers // Sep 2012

    EAAS - ERP as a Service

    Enterprise Resource Planning (ERP) systems are usually very expensive for any organization to implement and maintain. Implementation of an ERP system is a major investment and commitment for any organization. Small and medium size companies cannot afford the cost of purchasing, implementing, and hiring ERP consultant and domain experts and...

    Provided By Bioinfo Publications

  • White Papers // Jul 2012

    On the Kdd'99 Dataset: Statistical Analysis for Feature Selection

    The authors present a contribution to the network intrusion detection process using Adaptive Resonance Theory (ART1), a type of Artificial Neural Networks (ANN) with binary input unsupervised training. In this phase, they present a feature selection using data mining techniques, towards two dimensional dataset reductions that is efficient for the...

    Provided By Bioinfo Publications

  • White Papers // Jul 2012

    Application of Artificial Intelligence Based Techniques for Intrusion Detection Systems: A Review

    Network intrusion detection is an invaluable part of an information security system. The rapid increase in the number of different types of attacks has increased the complexity involved in designing an intrusion detection system. Different techniques from various disciplines have been utilized to develop efficient IDS. Artificial Intelligence based techniques...

    Provided By Bioinfo Publications

  • White Papers // May 2012

    Securing Black Hole Attack in Routing Protocol AODV in MANET with Watchdog Mechanisms

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. One of the principal routing protocols used in ad-hoc networks is AODV (Ad-hoc On demand Distance Vector) protocol. The security of the AODV protocol is compromised...

    Provided By Bioinfo Publications

  • White Papers // May 2012

    Cloud Computing Security with Steganography and Cryptoghrapy AES Algorthm Technology

    The growth of high speed computer networks and that of the internet, in particular, has increased the ease of information communication. Ironically, the cause for the development is also of the apprehension - use of digital formatted data. In comparison with analog media, digital media offers several distinct advantages such...

    Provided By Bioinfo Publications

  • White Papers // May 2012

    Application of NS2 to Overcome Computer Networks Attacks

    Experiment system for computer network is possible to construct using NS2. Security is an essential in order to solve the realistic problems in the experiments of computer networks. Demonstration and requirement in Mobile Ad hoc NETwork (MANETs). Compared to wired networks, MANETs are more vulnerable to security attacks due to...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Homomorphic Authentication with Random Masking Technique Ensuring Privacy & Security in Cloud Computing

    Cloud computing may be defined as delivery of product rather than service. Cloud computing is an internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Cybercrimes, Attacks, Vulnerabilities and Security

    Cybercrime is becoming ever more serious. In this paper, the authors define different types of cybercrime and they will also learn how security can be practiced thorough different very powerful new techniques. They will also see only some of the vulnerabilities which lead pranksters to attack on the system. They...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Wireless Mesh Network Securities

    Using Wireless Mesh Networks (WMNs) to offer internet connectivity is becoming a popular choice for wireless internet service providers as it allows a fast, easy and inexpensive network deployment. However, security in WMNs is still in its infancy as very little attention has been devoted so far to this topic...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Approach for Intrusion Detection System Using Data Mining

    The number of hacking and intrusion incidents is increasing alarmingly each year as new technology rolls out. In this paper, the authors designed Intrusion Detection System (IDS) that implements pre-defined algorithms for identifying the attacks over a network. In this paper they discuss the term intrusion detection system using data...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Parellel Processing Using Distributed Computing System for Data Conversion

    Distributed computing deals with hardware and software systems containing more than one processing element or storage element, concurrent processes, or multiple programs, running under a loosely or tightly controlled administration. In distributed computing a program is divide into parts that run simultaneously on multiple computers communicating over a network. Distributed...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Intelligent Quality Management Expert System Using PA-AKD in Large Databases

    Today's, Domain Driven Data Mining (D3M) generally targets Actionable Knowledge Detection (AKD) in complex domain problems of large databases with quality engineering research field. D3M generates the business impacts and solves business problems and the results brunt with the complex context in a kind of artwork. The application of Intelligent...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Deep Web Data Extraction Using Web-Programming-Language-Independent Approach

    The problem of web data extraction has received a lot of attention in recent years and most of the proposed solutions are based on analyzing the HTML source code or the tag trees of the web pages. These solutions have the following main limitations: first, they are web-page-programming-language-dependent, or more...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Using Joint Adaptation of Transmission Power and Contention Window Size in Improving VANET Performance

    In this paper, the authors present a novel format for vibrant adaptation of transmission power and Contention Window (CW) size for information propagation in Vehicular Ad-hoc NETworks (VANETs). The anticipated format uses a shared approach to adapt transmission power at the PHYsical (PHY) layer and Quality-of-Service (QoS) parameters at the...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Recognition of Misbehaviors in VANET with Incorporated Root-Cause Analysis

    In this paper, the authors have introduced a novel format for misbehavior detection schemes. Misbehavior detection schemes form a basic part of disobeying node ejection in Vehicular Ad hoc NETworks (VANETs). A misbehaving node can send messages correspondent to an incident that either has not occurred, or incorrect information corresponding...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    A DSRC Based SmartVANET Architecture

    Vehicular Ad hoc NETwork (VANET), which is based on Dedicated Short Range Communication (DSRC), provides an opportunity to enable communication-based cooperative safety systems in order to diminish road ills and improve traffic efficiency. VANET provides a wide range of profitable and documentary applications. VANET exposes unique characteristics that create new...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Embedded Extended Visual Cryptography Schemes for Different Patterns

    A Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    A Review Paper on Comparison and Analysis of Different Attack and Intrusion Detection System

    Wireless networks are gaining popularity to its peak today, as the user's wants wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc NETworks (MANET). Mobile Ad Hoc Network (MANET) has become an exciting and important technology in recent years, because of...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    A Review Paper on Black Hole Attack and Comparison of Different Black Hole Attack Techniques

    MANET is a multi-hop temporary communication network of mobile nodes equipped with wireless transmitters and receivers without the aid of any current network infrastructure. MANET is an emerging research area with practical applications. However, MANET is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Graphical Password Authentication System in an Implicit Manner

    Authentication is a process by which a system verifies the identity of a user. Authentication may also be generalized by saying that "To authenticate" means "To authorize". For example, users tend to pick passwords that can be easily guessed, on the other hand, if a password is hard to guess,...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Cryptography Using Aes Algorithm

    With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial-process, it is essential to protect the confidential image data from unauthorized access. In this paper, the authors analyze the Advanced Encryption Standard (AES),...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Digital Conontent Distribution System for Secure and Fast Multimedia Based on Partial Encryption and Group Key

    There are constantly mounting opportunities on the Internet and civilizing network capability so, Security and fast multimedia distribution has become an important research topic. It is easy to achieve the faster and more secure multimedia distribution through web caching and encryption. It is important to review encryption technique used for...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Network Intrusion Detection System & Fuzzy Logic

    Network intrusion detection systems have become a standard component in security infrastructures. The numbers of hacking and intrusion incidents are increasing alarmingly each year as new technology rolls out. Unfortunately in today's digitally connected world, there is no place to hide. Unfortunately, current systems are poor at detecting novel attacks...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    VANET Securities Against Attacks

    A Vehicular Ad-hoc NETwork or VANET is a form of Mobile Ad-hoc NETwork or MANET which provides communication between vehicles and between vehicles and road-side base stations. A vehicle in VANET is considered to be an intelligent mobile node capable of communicating with its neighbors and other vehicles in the...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Implementation of Security Protocol for Wireless Computer Network

    Implementing security protocol for wireless computer network the authors require effective wireless intranet setup, many protocols are working to function. This thing is focused at developing a security protocol to secure a wireless computer network of any institution. The protocol developed to secures a wireless computer classroom through an authentication...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Security Aware Routing Protocol for MANET Using Asymmetric Cryptograpy Using RSA Algorithm

    Mobile Ad-hoc NETworks (MANTEs) are temporary networks that are built up momentarily in order to satisfy a certain emergency. Ad-hoc networks are in a great demand now-a-days and have a lot of advantages like emergency control, short term connections for roaming subscribers, etc. In this paper, the authors have designed...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Providing Security Challenges in 4G Systems

    Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. A good way to achieve this is by investigating the possibility of extending current security mechanisms to 4G networks. Fourth generation wireless system is a packet switched wireless system with wide area...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Hand Gester Recognition System for Man Machine Interaction and Security Enhancement Using Fuzzy Clustering

    The core idea behind this system is derived from use of gesture recognition system in smart homes. Here in this paper the authors will try to generate the outputs for man-machine interaction system and analyze that output for security enhancement. Generally two types of user are interacting with the application...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Implementation of Hand Vein Structure Authentication Based System

    Biometric authentication provides a high security and reliable approach to be used in security access system. However, this authentication method has not been widely implemented in a resource-constrained embedded system. In this paper, the authors investigate a method of personal authentication based on infrared vein pattern in the back of...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Neural Network - Approach to Network Surveillance

    In today's world, information is one of the most valuable asset. Intrusion detection is a significant focus of research in the security of computer systems and networks. As the network of computers expands both in number of hosts connected and number of services provided, security has become a key issue...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Embedded Extended Visual Cryptography Schemes for Different Patterns

    A Visual Cryptography Scheme (VCS) is a kind of secret sharing scheme which allows the encoding of a secret image into shares distributed to participants. The beauty of such a scheme is that a set of qualified participants is able to recover the secret image without any cryptographic knowledge and...

    Provided By Bioinfo Publications

  • White Papers // Jul 2011

    Cryptography: A Technique to Maintain Network Security

    Cryptography is the science of writing in secret code. In data and telecommunications, cryptography is necessary when communicating over any entrusted medium, which includes just about any network, particularly the Internet. Cryptography, then, not only protects data from theft or alteration, but it can also be used for user authentication....

    Provided By Bioinfo Publications

  • White Papers // Jul 2011

    Computer Security for Code Regeneration Techniques in High Level Languages

    In this paper, the authors are going to explain the concept of computer security. And also the concept of code regeneration. Now a days heavy use of computer network (Internet) Due to heavy use of internet the problem arises for computer to maintaining security. The awareness of the need for...

    Provided By Bioinfo Publications

  • White Papers // Aug 2010

    Detection of Spatial Changes Using Spatial Data Mining

    This paper uses the techniques of Spatial Data Mining (SDM) and Change Detection (CD) in the field of geospatial information processing. Assuming the feasibility of discovering knowledge from spatial database and the demands of knowledge for change detection, the paper presents that change detection needs knowledge and technology of SDM...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    A Review Paper on Comparison and Analysis of Different Attack and Intrusion Detection System

    Wireless networks are gaining popularity to its peak today, as the user's wants wireless connectivity irrespective of their geographic position. There is an increasing threat of attacks on the Mobile Ad-hoc NETworks (MANET). Mobile Ad Hoc Network (MANET) has become an exciting and important technology in recent years, because of...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    A Review Paper on Black Hole Attack and Comparison of Different Black Hole Attack Techniques

    MANET is a multi-hop temporary communication network of mobile nodes equipped with wireless transmitters and receivers without the aid of any current network infrastructure. MANET is an emerging research area with practical applications. However, MANET is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Graphical Password Authentication System in an Implicit Manner

    Authentication is a process by which a system verifies the identity of a user. Authentication may also be generalized by saying that "To authenticate" means "To authorize". For example, users tend to pick passwords that can be easily guessed, on the other hand, if a password is hard to guess,...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Cryptography Using Aes Algorithm

    With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial-process, it is essential to protect the confidential image data from unauthorized access. In this paper, the authors analyze the Advanced Encryption Standard (AES),...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Digital Conontent Distribution System for Secure and Fast Multimedia Based on Partial Encryption and Group Key

    There are constantly mounting opportunities on the Internet and civilizing network capability so, Security and fast multimedia distribution has become an important research topic. It is easy to achieve the faster and more secure multimedia distribution through web caching and encryption. It is important to review encryption technique used for...

    Provided By Bioinfo Publications

  • White Papers // Jul 2011

    Cloud Computing Over Cluster, Grid Computing: a Comparative Analysis

    There are dozens of definitions for cloud computing and through each definition the authors can get the different idea about what a cloud computing exacting is? Cloud computing is not a very new concept because it is connected to grid computing paradigm whose concept came into existence thirteen years ago....

    Provided By Bioinfo Publications

  • White Papers // Jul 2011

    A Survey Instrument for Ranking of the Critical Success Factors for the Successful ERP Implementation at Indian SMEs

    Many quantitative and qualitative studies have been conducted in various countries for the Enterprise Resource Planning (ERP) implementation in the Large Enterprise (LEs) as well as for Small and Medium-size Enterprises (SMEs) to capture the full benefits of ERP systems; still there is a lack of survey instrument for Ranking...

    Provided By Bioinfo Publications

  • White Papers // Sep 2011

    Analysis of Factor Based Data Mining Techniques

    Factor analysis, which is a regression based data mining technique, used to represent a set of observed variables in terms of common factors. This paper explores the key properties of three factor based techniques viz. principal component regression, generalized least square regression, and maximum likelihood method and study their predictive...

    Provided By Bioinfo Publications

  • White Papers // Dec 2010

    Biometric Template Classification Using Selective Sub Bands of Wavelets: A Case Study in Iris Textures

    Considering multiple biometric templates per user account by biometric authentication systems for high acceptance rate leads to large storage space and computational overheads. Classification of these templates into significant sub groups will reduce the above overheads. Iris templates carry very distinctive texture information such as brightness, shape, size, uniformity, directionality,...

    Provided By Bioinfo Publications

  • White Papers // Mar 2010

    Data Mining-A Mathematical Realization and Cryptic Application Using Variable Key

    In this paper the authors have depicted the various mathematical models based on the themes on data mining. The numerical representations of regression and linear models have been explained. They have also shown the prediction of datum in the light of statistical approaches namely probabilistic approach, data estimation and dispersion...

    Provided By Bioinfo Publications

  • White Papers // Mar 2010

    Ant Based Rule Mining with Parallel Fuzzy Cluster

    Ant-based techniques, in the computer sciences, are designed those who take biological inspirations on the behavior of these social insects. Data clustering techniques are classification algorithms that have a wide range of applications, from biology to image processing and data presentation. Since real life ants do perform clustering and sorting...

    Provided By Bioinfo Publications

  • White Papers // Jul 2011

    Extraction and Visualization of Geospatial Data from Spatial Database: A Case Study

    In this paper, the visualization of extracted information from spatial data base into geographical representation is demonstrated. The visualization techniques are essential for easy understanding of the information content of the data sets collected during the field survey for a particular study. The data mining techniques are used for extracting...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Homomorphic Authentication with Random Masking Technique Ensuring Privacy & Security in Cloud Computing

    Cloud computing may be defined as delivery of product rather than service. Cloud computing is an internet based computing which enables sharing of services. Many users place their data in the cloud. However, the fact that users no longer have physical possession of the possibly large size of outsourced data...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Cybercrimes, Attacks, Vulnerabilities and Security

    Cybercrime is becoming ever more serious. In this paper, the authors define different types of cybercrime and they will also learn how security can be practiced thorough different very powerful new techniques. They will also see only some of the vulnerabilities which lead pranksters to attack on the system. They...

    Provided By Bioinfo Publications

  • White Papers // Jul 2011

    Dynamic Security Skins-Mutual Authentication

    Phishing means, attack combines social engineering & technology; an attack that tricks users out of confidential information/ credentials such as; authentication, financial. In fact phishing is of spoofing personal credential. This paper presents a scheme, dynamic security skins, that allows a remote web server to prove its identity in a...

    Provided By Bioinfo Publications

  • White Papers // Jul 2011

    Biometrics Authentication Techniques in ATM

    Biometrics is the statistical analysis and measurement of human traits or characteristics. Once these measurements have been taken, they may then be used to authenticate an individual or user. It is also the measurement of life for statistical or actuarial purposes. In this paper the authors are just talking about...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Network Intrusion Detection System & Fuzzy Logic

    Network intrusion detection systems have become a standard component in security infrastructures. The numbers of hacking and intrusion incidents are increasing alarmingly each year as new technology rolls out. Unfortunately in today's digitally connected world, there is no place to hide. Unfortunately, current systems are poor at detecting novel attacks...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    VANET Securities Against Attacks

    A Vehicular Ad-hoc NETwork or VANET is a form of Mobile Ad-hoc NETwork or MANET which provides communication between vehicles and between vehicles and road-side base stations. A vehicle in VANET is considered to be an intelligent mobile node capable of communicating with its neighbors and other vehicles in the...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Implementation of Security Protocol for Wireless Computer Network

    Implementing security protocol for wireless computer network the authors require effective wireless intranet setup, many protocols are working to function. This thing is focused at developing a security protocol to secure a wireless computer network of any institution. The protocol developed to secures a wireless computer classroom through an authentication...

    Provided By Bioinfo Publications

  • White Papers // Apr 2012

    Wireless Mesh Network Securities

    Using Wireless Mesh Networks (WMNs) to offer internet connectivity is becoming a popular choice for wireless internet service providers as it allows a fast, easy and inexpensive network deployment. However, security in WMNs is still in its infancy as very little attention has been devoted so far to this topic...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Security Aware Routing Protocol for MANET Using Asymmetric Cryptograpy Using RSA Algorithm

    Mobile Ad-hoc NETworks (MANTEs) are temporary networks that are built up momentarily in order to satisfy a certain emergency. Ad-hoc networks are in a great demand now-a-days and have a lot of advantages like emergency control, short term connections for roaming subscribers, etc. In this paper, the authors have designed...

    Provided By Bioinfo Publications

  • White Papers // Jul 2011

    Comparative Study of IDS and IPS

    Intrusion detection is an important component of a modern computer network system's protection from unauthorized and hostile use. The main purpose of a typical intrusion detection system is to detect outside intruders as well as inside intruders that may break into the system. Network intrusion detection systems, which are part...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Providing Security Challenges in 4G Systems

    Several research groups are working on designing new security architectures for 4G networks such as Hokey and Y-Comm. A good way to achieve this is by investigating the possibility of extending current security mechanisms to 4G networks. Fourth generation wireless system is a packet switched wireless system with wide area...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Hand Gester Recognition System for Man Machine Interaction and Security Enhancement Using Fuzzy Clustering

    The core idea behind this system is derived from use of gesture recognition system in smart homes. Here in this paper the authors will try to generate the outputs for man-machine interaction system and analyze that output for security enhancement. Generally two types of user are interacting with the application...

    Provided By Bioinfo Publications

  • White Papers // May 2012

    Securing Black Hole Attack in Routing Protocol AODV in MANET with Watchdog Mechanisms

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. One of the principal routing protocols used in ad-hoc networks is AODV (Ad-hoc On demand Distance Vector) protocol. The security of the AODV protocol is compromised...

    Provided By Bioinfo Publications

  • White Papers // May 2012

    Cloud Computing Security with Steganography and Cryptoghrapy AES Algorthm Technology

    The growth of high speed computer networks and that of the internet, in particular, has increased the ease of information communication. Ironically, the cause for the development is also of the apprehension - use of digital formatted data. In comparison with analog media, digital media offers several distinct advantages such...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Implementation of Hand Vein Structure Authentication Based System

    Biometric authentication provides a high security and reliable approach to be used in security access system. However, this authentication method has not been widely implemented in a resource-constrained embedded system. In this paper, the authors investigate a method of personal authentication based on infrared vein pattern in the back of...

    Provided By Bioinfo Publications

  • White Papers // Jul 2011

    Soft Computing and its Applications

    Soft Computing (SC) is an emerging field that consists of complementary elements of fuzzy logic, neural computing, evolutionary computation, machine learning and probabilistic reasoning. Recently new technique is available for computation known as soft computing. Soft computing is based on natural as well as artificial ideas. Soft computing techniques are...

    Provided By Bioinfo Publications

  • White Papers // Feb 2012

    The Intelligent Intrusion Detection Tool for Biometric Template Storage

    While there are various advantages of biometric authentication process, it is vulnerable to attacks, which can decline its security. To enhance the security of biometric process, intrusion detection techniques are significantly useful. In this paper, the authors have designed intelligent agent as knowledge based biometric template storage intrusion detection tool....

    Provided By Bioinfo Publications

  • White Papers // Jan 2012

    VANET: Security Attacks and its Possible Solutions

    Vehicular Ad hoc NETwork (VANET) is an emerging paradigm in networking. It is a new form of Mobile Ad hoc NETwork (MANET). Its life saving characteristic has attracted the industry and researchers. In VANET vehicles are the nodes with mobility so does not have fixed infrastructure It serves safe and...

    Provided By Bioinfo Publications

  • White Papers // May 2012

    Application of NS2 to Overcome Computer Networks Attacks

    Experiment system for computer network is possible to construct using NS2. Security is an essential in order to solve the realistic problems in the experiments of computer networks. Demonstration and requirement in Mobile Ad hoc NETwork (MANETs). Compared to wired networks, MANETs are more vulnerable to security attacks due to...

    Provided By Bioinfo Publications

  • White Papers // Mar 2012

    Neural Network - Approach to Network Surveillance

    In today's world, information is one of the most valuable asset. Intrusion detection is a significant focus of research in the security of computer systems and networks. As the network of computers expands both in number of hosts connected and number of services provided, security has become a key issue...

    Provided By Bioinfo Publications

  • White Papers // Jan 2012

    Security for E-Governance

    Security is one of the most important issues in e-governance. All of the security approaches that are common in e-commerce are applicable to e-governance. But e-governance is a little different from e-commerce. Usually government networks can communicate to each other better than business networks, because, most of them are connected...

    Provided By Bioinfo Publications

  • White Papers // Jan 2012

    Popular Cloud Applications: A Case Study

    The role of cloud computing for business is more and more prominent. Indeed, cloud computing is probably the most buzzed tech today. The cloud has proven that it can help small businesses to cut costs, while improving productivity. New cloud applications are being introduced to small business on regular basis....

    Provided By Bioinfo Publications

  • White Papers // Jan 2012

    V.O.I.P Interface

    Voice over Internet Protocol (VOiP) is the technology used to transmit conversations digitally over the Internet. VOiP is being adopted globally and changing the landscape of telecommunications for businesses and consumers. This paper describes VOiP and how it compares to traditional phone systems, the standards organizations promoting the technology, and...

    Provided By Bioinfo Publications

  • White Papers // Jan 2012

    Technique for Quick Access from Data Warehouse

    Data warehousing is a buzzword in the database industry where data is stored for archival, analysis and security purposes. Database research community attention is on store house where large amount of data is stored which make easy to access data and use it in day to day operations. In this...

    Provided By Bioinfo Publications