Computer Science Journals

Displaying 1-23 of 23 results

  • White Papers // Oct 2013

    Face Images Database Indexing for Person Identification Problem

    Face biometric data are with high dimensional features and hence, traditional searching techniques are not applicable to retrieve them. As a consequence, it is an issue to identify a person with face data from a large pool of face database in real-time. This paper addresses this issue and proposes an...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Malicious Node Detection Mechanism for Wireless Ad Hoc Network

    With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Multimodal Biometrics at Feature Level Fusion Using Texture Features

    In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from curvelet transform. The curvelet feature dimension is selected based on...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

    Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources)...

    Provided By Computer Science Journals

  • White Papers // Apr 2013

    Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication

    Distributed Control Systems (DCSs) and Supervisory Control And Data Acquisition (SCADA) systems are widely used in real time industry infrastructures such as water pumping stations, gas, and oil and other real time deployments. SCADA implementation within a cloud computing environment is new and beneficial for real time infrastructures. Using cloud...

    Provided By Computer Science Journals

  • White Papers // Mar 2013

    Semantic Based Model for Text Document Clustering with Idioms

    In this paper, the authors address the task of developing an effective and efficient clustering methodology to take care of semantic structure of the text documents. A method has been developed that performs the following sequence of operations: tagging the documents for parsing, replacement of idioms with their original meaning,...

    Provided By Computer Science Journals

  • White Papers // Aug 2012

    New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment

    As a result of integration of many techniques such as grading, clustering, utilization computing and resource's sharing, cloud computing has been appeared as multi element's composition technology, it offers several computing services such as IaaS (Infrastructure as Service), PaaS (Platform as Service) and SaaS (Software as a Service) based on...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Rethinking Embedded System Design

    Embedded engineering is designed using objects of nature and it also interacts with nature. Therefore, it is forced to obey the laws of nature. Nature does not make any assumptions. But all their mathematical and scientific theories do. Therefore, these theories cannot be valid for embedded engineering applications. In this...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    High Availability Based Migration Analysis to Cloud Computing for High Growth Businesses

    High availability requirement of the network is becoming essential for high growth disruptive technology companies. For businesses which require migration to networks supporting scalability and high availability, it is important to analyze the various factors and the cost effectiveness for choosing the optimal solution for them. The current paper considers...

    Provided By Computer Science Journals

  • White Papers // Mar 2012

    Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey

    A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the...

    Provided By Computer Science Journals

  • White Papers // Feb 2012

    Defining Business Network

    The purpose of the present scientific contribution is to investigate from the business economics standpoing the emerging phenomenon of company networks. In particular, through the analysis of the theory of networks will be proposed the principal categories of business networks, and even before this the concept of the network will...

    Provided By Computer Science Journals

  • White Papers // Oct 2011

    A proposed Solution: Data Availability and Error Correction in Cloud Computing

    Cloud Computing is the hottest technology in the market these days, used to make storage of huge amounts of data and information easier for organizations. Maintaining servers to store all the information is quite expensive for individual and organizations. Cloud computing allows to store and maintain data on remote servers...

    Provided By Computer Science Journals

  • White Papers // Jan 2011

    Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network

    A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets are transferred from source to destination successfully, it is assumed that the routing...

    Provided By Computer Science Journals

  • White Papers // Oct 2010

    Deploying e-Mail as an Official Communication Tool: Technical Prospect

    Applications are spreading widely through their lives entering every field controlling some of it and enhancing other; electronic mail, or e-mail, is the best known and most popular application of the Internet. More and more people see e-mail as a way to communicate quickly and affordably. Electronic mail can also...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Implementation of Artificial Intelligence Techniques for Steady State Security Assessment in Pool Market

    Various techniques have been implemented to include steady state security assessment in the analysis of trading in deregulated power system, however most of these techniques lack requirements of fast computational time with acceptable accuracy. The problem is compounded further by the requirements to consider bus voltages and thermal line limits....

    Provided By Computer Science Journals

  • White Papers // Aug 2010

    New Trust Based Security Method for Mobile Ad-Hoc Networks

    Secure routing is the milestone in mobile ad hoc networks .Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also has...

    Provided By Computer Science Journals

  • White Papers // Jul 2010

    A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS

    A dynamic wireless network that is formed without any pre-existing infrastructure, in which every node can act as a router is called a Mobile Ad hoc NETwork (MANET). Since MANETS has not got clear cut security provisions, it is accessible to any of the authorized network users and malicious attackers....

    Provided By Computer Science Journals

  • White Papers // Mar 2010

    Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Network Processor

    An ideal Network Processor (NP), that is, a programmable multi-processor device must be capable of offering both the flexibility and speed required for packet processing. But current Network Processor systems generally fall short of the above benchmarks due to traffic fluctuations inherent in packet networks, and the resulting workload variation...

    Provided By Computer Science Journals

  • White Papers // Feb 2010

    Hybrid Compression Encryption Technique for Securing SMS

    Mobile communication devices have become popular tools for gathering and disseminating information and data. When sensitive information is exchanged using SMS, it is crucial to protect the content from eavesdroppers as well as ensuring that the message is sent by a legitimate sender. Using an encryption technique to secure SMS...

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    Integrated DWDM and MIMO-OFDM System for 4G High Capacity Mobile Communication

    Dense Wavelength-Division Multiplexing (DWDM) technique is a very promising data transmission technology for utilizing the capacity of the fiber. By DWDM, multiple signals (video, audio, data etc) staggered in wavelength domain can be multiplexed and transmitted down the same fiber. The Multiple-Input Multiple-Output (MIMO) wireless technology in combination with Orthogonal...

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    A Wavelet - Based Object Watermarking System for MPEG4 Video

    Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, object based watermarking schemes are needed for copyright protection....

    Provided By Computer Science Journals

  • White Papers // Sep 2009

    Implementing a Functional ISO 9001 Quality Management System in Small and Medium-Sized Enterprises

    This paper provides guidance for the implementation of a functional ISO 9001 Quality Management System (QMS) in Small and Medium-sized Enterprises (SMEs). To help a SME understand its starting point, four initial states for QMS implementation are defined. Five paths for moving the QMS from the initial state to the...

    Provided By Computer Science Journals

  • White Papers // Feb 2009

    Identity-Based Key Management in MANETs Using Public Key Cryptography

    Wireless Mobile Ad Hoc NETworks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, deploying a robust and reliable security scheme such as Public Key Infrastructure (PKI)...

    Provided By Computer Science Journals

  • White Papers // Sep 2010

    Implementation of Artificial Intelligence Techniques for Steady State Security Assessment in Pool Market

    Various techniques have been implemented to include steady state security assessment in the analysis of trading in deregulated power system, however most of these techniques lack requirements of fast computational time with acceptable accuracy. The problem is compounded further by the requirements to consider bus voltages and thermal line limits....

    Provided By Computer Science Journals

  • White Papers // Aug 2010

    New Trust Based Security Method for Mobile Ad-Hoc Networks

    Secure routing is the milestone in mobile ad hoc networks .Ad hoc networks are widely used in military and other scientific areas with nodes which can move arbitrarily and connect to any nodes at will, it is impossible for Ad hoc network to own a fixed infrastructure. It also has...

    Provided By Computer Science Journals

  • White Papers // Jan 2011

    Implementation of New Routing Protocol for Node Security in a Mobile Ad Hoc Network

    A routing protocol plays important role to handle entire network for communication and determines the paths of packets. A node is a part of the defined network for transferring information in form of packets. If all packets are transferred from source to destination successfully, it is assumed that the routing...

    Provided By Computer Science Journals

  • White Papers // Oct 2010

    Deploying e-Mail as an Official Communication Tool: Technical Prospect

    Applications are spreading widely through their lives entering every field controlling some of it and enhancing other; electronic mail, or e-mail, is the best known and most popular application of the Internet. More and more people see e-mail as a way to communicate quickly and affordably. Electronic mail can also...

    Provided By Computer Science Journals

  • White Papers // Jul 2010

    A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS

    A dynamic wireless network that is formed without any pre-existing infrastructure, in which every node can act as a router is called a Mobile Ad hoc NETwork (MANET). Since MANETS has not got clear cut security provisions, it is accessible to any of the authorized network users and malicious attackers....

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    A Wavelet - Based Object Watermarking System for MPEG4 Video

    Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, object based watermarking schemes are needed for copyright protection....

    Provided By Computer Science Journals

  • White Papers // Mar 2012

    Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey

    A wireless sensor network is a network of tiny nodes with wireless sensing capacity for data collection processing and further communicating with the Base Station this paper discusses the overall mechanism of data dissemination right from data collection at the sensor nodes, clustering of sensor nodes, data aggregation at the...

    Provided By Computer Science Journals

  • White Papers // Jan 2010

    Integrated DWDM and MIMO-OFDM System for 4G High Capacity Mobile Communication

    Dense Wavelength-Division Multiplexing (DWDM) technique is a very promising data transmission technology for utilizing the capacity of the fiber. By DWDM, multiple signals (video, audio, data etc) staggered in wavelength domain can be multiplexed and transmitted down the same fiber. The Multiple-Input Multiple-Output (MIMO) wireless technology in combination with Orthogonal...

    Provided By Computer Science Journals

  • White Papers // Feb 2010

    Hybrid Compression Encryption Technique for Securing SMS

    Mobile communication devices have become popular tools for gathering and disseminating information and data. When sensitive information is exchanged using SMS, it is crucial to protect the content from eavesdroppers as well as ensuring that the message is sent by a legitimate sender. Using an encryption technique to secure SMS...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    Rethinking Embedded System Design

    Embedded engineering is designed using objects of nature and it also interacts with nature. Therefore, it is forced to obey the laws of nature. Nature does not make any assumptions. But all their mathematical and scientific theories do. Therefore, these theories cannot be valid for embedded engineering applications. In this...

    Provided By Computer Science Journals

  • White Papers // May 2013

    Conceptual Model of Real Time Infrastructure Within Cloud Computing Environment

    Cloud computing is a new and most demandable technology in communication environment. Where computing resources such as hardware or/and software are processed as service over networks. SCADA implementation within cloud environment is relatively new and demandable over real time infrastructure (industrial infrastructure).The shifting (moving) of SCADA system (applications and resources)...

    Provided By Computer Science Journals

  • White Papers // Oct 2013

    Face Images Database Indexing for Person Identification Problem

    Face biometric data are with high dimensional features and hence, traditional searching techniques are not applicable to retrieve them. As a consequence, it is an issue to identify a person with face data from a large pool of face database in real-time. This paper addresses this issue and proposes an...

    Provided By Computer Science Journals

  • White Papers // Apr 2013

    Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication

    Distributed Control Systems (DCSs) and Supervisory Control And Data Acquisition (SCADA) systems are widely used in real time industry infrastructures such as water pumping stations, gas, and oil and other real time deployments. SCADA implementation within a cloud computing environment is new and beneficial for real time infrastructures. Using cloud...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Multimodal Biometrics at Feature Level Fusion Using Texture Features

    In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from curvelet transform. The curvelet feature dimension is selected based on...

    Provided By Computer Science Journals

  • White Papers // Mar 2010

    Run-Time Adaptive Processor Allocation of Self-Configurable Intel IXP2400 Network Processor

    An ideal Network Processor (NP), that is, a programmable multi-processor device must be capable of offering both the flexibility and speed required for packet processing. But current Network Processor systems generally fall short of the above benchmarks due to traffic fluctuations inherent in packet networks, and the resulting workload variation...

    Provided By Computer Science Journals

  • White Papers // Mar 2013

    Semantic Based Model for Text Document Clustering with Idioms

    In this paper, the authors address the task of developing an effective and efficient clustering methodology to take care of semantic structure of the text documents. A method has been developed that performs the following sequence of operations: tagging the documents for parsing, replacement of idioms with their original meaning,...

    Provided By Computer Science Journals

  • White Papers // Jun 2013

    Malicious Node Detection Mechanism for Wireless Ad Hoc Network

    With the popularity of intelligent electronics which rely on wireless communication in the post-PC era, computing devices have become cheaper, smaller, more mobile and more pervasive in daily lives. Construction of wireless ad hoc network becomes more and more convenient. However, the deployment of sensor nodes in an unattended environment...

    Provided By Computer Science Journals

  • White Papers // Sep 2009

    Implementing a Functional ISO 9001 Quality Management System in Small and Medium-Sized Enterprises

    This paper provides guidance for the implementation of a functional ISO 9001 Quality Management System (QMS) in Small and Medium-sized Enterprises (SMEs). To help a SME understand its starting point, four initial states for QMS implementation are defined. Five paths for moving the QMS from the initial state to the...

    Provided By Computer Science Journals

  • White Papers // Feb 2012

    Defining Business Network

    The purpose of the present scientific contribution is to investigate from the business economics standpoing the emerging phenomenon of company networks. In particular, through the analysis of the theory of networks will be proposed the principal categories of business networks, and even before this the concept of the network will...

    Provided By Computer Science Journals

  • White Papers // Apr 2012

    High Availability Based Migration Analysis to Cloud Computing for High Growth Businesses

    High availability requirement of the network is becoming essential for high growth disruptive technology companies. For businesses which require migration to networks supporting scalability and high availability, it is important to analyze the various factors and the cost effectiveness for choosing the optimal solution for them. The current paper considers...

    Provided By Computer Science Journals

  • White Papers // Aug 2012

    New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment

    As a result of integration of many techniques such as grading, clustering, utilization computing and resource's sharing, cloud computing has been appeared as multi element's composition technology, it offers several computing services such as IaaS (Infrastructure as Service), PaaS (Platform as Service) and SaaS (Software as a Service) based on...

    Provided By Computer Science Journals

  • White Papers // Oct 2011

    A proposed Solution: Data Availability and Error Correction in Cloud Computing

    Cloud Computing is the hottest technology in the market these days, used to make storage of huge amounts of data and information easier for organizations. Maintaining servers to store all the information is quite expensive for individual and organizations. Cloud computing allows to store and maintain data on remote servers...

    Provided By Computer Science Journals

  • White Papers // Feb 2009

    Identity-Based Key Management in MANETs Using Public Key Cryptography

    Wireless Mobile Ad Hoc NETworks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, deploying a robust and reliable security scheme such as Public Key Infrastructure (PKI)...

    Provided By Computer Science Journals