Creative Commons

Displaying 1-40 of 4327 results

  • White Papers // Dec 2014

    A Review of Data Warehousing and Business Intelligence in Different Perspective

    According to Larson data warehouse is a system that retrieves and consolidates data periodically from the source systems into a dimensional or normalized data store. It usually keeps years of history and is queried for business intelligence or other analytical activities. Data warehouse is subject oriented, included, time-variant and nonvolatile...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Automatic Text Detection and Information Retrieval on Mobile

    The automatic text detection within a natural image is an important problem in many applications. Text detection in natural images has gained much attention in the last years as it is a primary step towards fully autonomous text reorganization. This paper tackles the problem of recognizing text in images captured...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Optimal Energy Efficient Multicast Algorithm for MANETs

    A Mobile Ad-hoc NETwork (MANET) is a self-organizing, dynamically reconfigurable wireless network that has no fixed infrastructure or central authority. Two nodes can communicate directly if they are within transmission range of each other. Due to their limited radio propagation range of wireless devices, routes are often \"Multi-hopped.\" Every node...

    Provided By Creative Commons

  • White Papers // Dec 2014

    A Survey Paper on Hop by Hop Message Authentication in Wireless Sensor Network

    Confidentiality and security to the data is actually provided by an authentication. Authentication involves the confident identification of one party by another party or a process of confirming an identity. But now-a-days there are various methods for authentication such as message authentication code, signcryption, and key aggregate system are emerged...

    Provided By Creative Commons

  • White Papers // Dec 2014

    High Security Provided Through a Secret Password Using Steganographic Technique

    The identification of objects in an image can be start with image processing techniques such as noise removal, followed by (low-level) feature extraction to locate lines, regions and possibly areas with certain textures. The clever bit is to interpret collections of these shapes as single objects, e.g. cars on a...

    Provided By Creative Commons

  • White Papers // Dec 2014

    A Study on 5th Generation Mobile Technology 5G - Future Network Service

    There are many changes in the world of communication. Landline phones are not much used today. All most all people throughout the world possess mobile phones. 5G (5th Generation mobile networks or 5th Generation wireless systems) designates the next major phase of mobile telecommunications standards superior to the current 4G...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Emperical Resource Allocation Using Dynamic Distributed Allocation Policy in Cloud Computing

    Now-a-days, cloud computing is a most attractive computing model of internet technology, which provides resources on-demand as per use and pay basics. Cloud services providers charge for the resource use. So it is important to distribute resources in an efficient way for on demand application of the clients. For resource...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Security in Multi-Cloud Storage with Cooperative Provable Data Possession

    Data integrity verification is one of the biggest security issue when storage of the data in necessary over cloud. Different methods are available for checking the integrity of data where Provable data possession is one of them. In this paper, the authors have concentrated on the creation of an efficient...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Privacy-Preserving Decentralized Key Policy Attribute-Based Encryption

    In Attribute-Based Encryption (ABE) scheme, attributes play a crucial role. Attributes have been utilized to generate a public key for encrypting data and have been used as an access policy to control users' access. The access policy can be divided as either key-policy or cipher text-policy. The key-policy is the...

    Provided By Creative Commons

  • White Papers // Dec 2014

    A Survey on Different Backup and Restore Techniques Used in Mobile Devices

    In recent years Smartphone user are increasing rapidly. As Smartphone are always connected with internet is playing a vital role in day-to-day life. All personal valuable data includes in Smartphone than PC or Laptop. All this valuable data, the authors need to protect from loss, failure and theft so backup...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Survey on Fast IP Network Recovery

    Internet is playing very important role nowadays for satisfying people with various services related to different areas. It is a very versatile facility which can help the user in completing many tasks easily and conveniently with few clicks, the slow convergence of routing protocols after a link or node fail...

    Provided By Creative Commons

  • White Papers // Dec 2014

    A Method for Privacy Preserving Data Mining in Secure Multiparty Computation Using Hadamard Matrix

    Secure multiparty computation allows multiple parties to participate in a computation. SMC (Secure Multiparty Computation) assumes n parties where n > 1. All the parties jointly compute a function. Privacy preserving data mining has become an emerging field in the secure multiparty computation. Privacy preserving data mining preserves the privacy...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Differential Privilege Based Secure Authorized Deduplication Using Public Private Cloud

    To reduce the amount of storage space and save bandwidth in cloud storage various data compression techniques are used, data deduplication is one of the important data compression technique. Data deduplication removes the duplicate copies of repeating data. To encrypt the sensitive data, the convergent encryption technique has been proposed....

    Provided By Creative Commons

  • White Papers // Dec 2014

    A Survey on Service Integrity in Software as a Service

    A cloud computing is the recently emerging technology which can provide many service based on \"Pay-as-you-go\" way that can be accessed through internet. The services provided by the cloud are Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS). Software as a service can provide their applications from the application service provide...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Security for Data Mining

    Ensuring the integrity of computer networks, both in relation to security and with regard to the institutional life of the nation in general, is a growing concern. In this paper, the authors discuss various data mining techniques that they have successfully applied for cyber security. These applications include but are...

    Provided By Creative Commons

  • White Papers // Dec 2014

    QRcode Based Navigation System on Cloud Computing Platforms

    Smartphone's are widely used as navigation aid now-a-days. Most of the smart phones provide a built-in navigator or map application with some sort of GPS capability. These navigation applications provide accurate navigation for outdoor location using GPS unit of the Smartphone. But providing accurate navigation inside a closed building is...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Review on Preserving Cloud Consistency Using CAAS Model

    Cloud storage services are commercially more popular due to their amount of advantages. Most of the cloud service provider provides services like infrastructure management, data storage services on 24/7 through any devices at anywhere. To provide this ubiquitous always on service most of the Cloud Service Provider (CSP) maintains each...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Integrity Verification and Availability Using PDP in Multi-Cloud

    Now-a-days in cloud environment a large data is produced. Many organizations are now migrating to cloud environment. Thus the providers are now delivering multi-cloud environment. But clients are worrying that their data should be correctly stored and maintained by providers without tampering it. As the providers provide enough security still...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Load Balancing in Cloud Environment Using Task Transfer: A Review

    Cloud computing allows the end users to access a set of distributed hosted resources like storage, CPU, applications (both software and hardware) and services over the internet in an on-demand basis. The interlinked servers of cloud network are responsible to deliver these services to the users. Load balancing is an...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Efficient Node Address Auto Configuration in MANET

    Mobile Ad-hoc NETwork (MANET) is used for many distributed network, the lack of a centralized administration makes these networks attractive for several distributed applications such as sensing, Internet access to deprived communities and disaster recovering. Mobility feature of the ad-hoc network produce many problems in the network, due to this...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Single-Sign On Using Social Networking Sites

    In this paper, the authors describe the best of using Single Sign On (SSO) using social networking sites. The practice of implementing traditional username/password authentication on the Internet suffers from a number of issues that reduce its efficacy, increase costs, and significantly increase risk for an organization. Fortunately by leveraging...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Optimal Dynamic Load Balance in Distributed Systems for Client Server Assignment

    Internet is a network of several distributed systems that consists of clients and servers communicating with each other directly or indirectly. In order to improve the performance of such a system, client-server assignment plays an important role. Achieving optimal client-server assignment in internet distributed systems is a great challenge. It...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Efficiently Detection of Intrusion in Multi-Tire Web Applications Using DoubleGuard: A Survey

    Now-a-day most of the work is done by internet. So web application have now become a essential part of daily life, such as online shopping, banking, social networking, enabling communication and management of personal information from anywhere. To acclimatize this increase in web application and data complexity, web services have...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Hash Based Approach for Providing Privacy and Integrity in Cloud Data Storage Using Digital Signatures

    Cloud computing offers a prominent service for data storage and it refers to a broad set of technologies, policies and controls deployed to provide security for data and applications. As more businesses move to the cloud, security is a leading concern in the cloud environment, it's essential that companies work...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Li-Fi Technology

    Now-a-days almost all the peoples are using internet to accomplish their task through wired or wireless network. As number of users are increases in using wireless network, speed decreases. Though Wi-Fi gives the user speed up to 150mbps as per IEEE 802.11n, which is not sufficient to accommodate number of...

    Provided By Creative Commons

  • White Papers // Dec 2014

    QOS Oriented Vertical Handoff for WiMAX/WLAN in Overlay Network

    Vertical HandOff (VHO) scheme is designed based on the interworking architecture of WLAN/WIMAX which aims to provide always the best Quality of Service (QoS) for users. The performance of applications and network conditions are considered in the handoff process. The handoff procedures are normally initiated when the stations move across...

    Provided By Creative Commons

  • White Papers // Dec 2014

    An Exploratory Review of Face Recognition Techniques and Algorithms

    Face recognition is the most active and challenging research area in image analysis and computer vision. Human has efficient ability to recognize the faces, but has the limitation to recognize a very large number of faces. The computer has the ability to recognize a very large number of faces with...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Performance Analysis of Energy Dissipation in WSNs Using Multi-Chain PEGASIS

    In wireless sensor networks, sensor nodes have limitation of energy so the lifetime of the networks is very important design factor. There are proposed many routing protocols for the wireless sensor networks recently. One of these protocols, the PEGASIS (Power-Efficient GAthering in Sensor Information Systems) protocol is a chain-based routing...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Design of Ripple Carry Adder Using Quantum Cellular Automata

    Quantum Cellular Automata (QCA) is one of the emerging nanotechnologies in which it is possible to implement reversible logic gates. QCA makes it possible to achieve high performance beyond the limits of existing CMOS technology. QCA does not have to dissipate its signal energy during transition. Further, there is no...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Optimizing and Generating Dynamic Intricate Cluster Construction in MANETs Using Integer Linear Programming with Rough Set (ILPR) Model Technique

    MANETs are wireless, self-organizing networks consisting of nodes with limited resourceble residual energy levels. So one of the main Challenges in MANETs are saving the Outlay of energies with various features of nodes as much as possible. So one technique, the authors proposed that mobile ad-hoc networks uses clustering methods...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Survey on Sleep and Awake Method Using Geographic Opportunistic Routing in Wireless Sensor Networks

    IEQGOR integrates awake and sleep schedules, MAC, routing, traffic load balancing, and back-to-back packet transmissions. A promising routing scheme in Wireless Sensor Networks (WSNs) is shifting toward duty-cycled WSNs in which sensors are sleep scheduled to reduce energy consumption. Nodes alternate between awake/asleep modes according to independent wake-up schedules with...

    Provided By Creative Commons

  • White Papers // Dec 2014

    The Study of Various Server Architectures for Mobile Presence Services in Social Network Applications

    Now-a-days, social network applications are becoming increasingly popular on mobile devices. There are various mobile presence services for social network applications. Presence is a service that allows a user to be informed about the reachability, availability, and willingness to communicate of another user. This paper represents the comparative study of...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Gateway Load Balancing in Integrated Internet-MANET to Improve Network Performance

    The Mobile Ad-hoc NETworks (MANETs) have become a major component of the future network development due to their ease of deployment, self-configurability, flexibility and independence on any existing network infrastructure. There is a growing need to integrate these ad hoc networks to the Internet. For this purpose, the authors need...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Overview of Offloading in Smart Mobile Devices for Mobile Cloud Computing

    The recent advancement in cloud computing is leading to an excessive growth of mobile devices that can become powerful means for information access and mobile applications. Thus introducing a latent technology called Mobile Cloud Computing (MCC). Smartphone devices support wide range of mobile applications which require high computational power, memory,...

    Provided By Creative Commons

  • White Papers // Dec 2014

    A Study of Similarity Functions Used in Textual Information Retrieval in Wide Area Networks

    World Wide Web (WWW) is a rich source of information. It continues to expand in size and complexity with the increasing use of the internet and social media but how to retrieve relevant documents on the Web is becoming a challenge. In this paper, there is discussion about the goals,...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Overview of Database Security

    Data security is one of the most crucial and a major challenge in the digital world. Security, privacy and integrity of data are demanded in every operation performed on internet. Whenever security of data is discussed, it is mostly in the context of secure transfer of data over the unreliable...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Detection of Node Replication Attacks in Mobile Sensor Networks Using Localized Algorithms

    Node replication detection is a challenging problem. Though the defending against node replication attacks demands immediate attention as compared to the extensive exploration on the defense against node replication attacks in static networks, only a few solutions in mobile networks have been presented. Additionally, whereas most of the presented schemes...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Intrusion Detection Through Session Hijacking

    The security of web applications has become increasingly important and a secure web environment has become a high priority for e-businesses communities. Online transaction of high sensitive corporate information and its security has becomes more difficult due to increase in online traffic. The latest technologies like AJax (Asynchronous JavaScript) and...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Content Leakage Detection by Using Traffic Pattern for Trusted Content Delivery Networks

    Multimedia streaming applications and services are becoming popular in recent a year, that's why issue of trusted video delivery to prevent the undesirable content leakage become critical. The conventional Systems addressed this issue by proposing methods based on observation of streamed traffic throughout the network. The job of maintaining high...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Enhancement of Security in Data Mining Using FEAL (Fast Encryption Algorithm)

    Fast Encryption ALgorithm (FEAL) is an encryption/decryption technique used for the encryption/decryption of the grey scale images only. In this paper, FEAL is used for the encryption/decryption of color images and text. In this, the key generation system for FEAL algorithm is updated using the XAND gate. By using the...

    Provided By Creative Commons

  • White Papers // Jun 2013

    Reliable Computing in Ad Hoc Networks

    Most of the existing techniques for network reliability evaluation are based on assumptions that all the nodes are perfect and the communication links are static and irreplaceable. However, these assumptions are not applicable for mobile ad hoc networks because of the rapid changes in connectivity and link characteristics due to...

    Provided By Creative Commons

  • White Papers // Jun 2013

    Congestion Avoidance by TCP

    Transport Control Protocol (TCP), the mostly used transport protocol, performs well over wired networks. TCP Congestion control plays the key role to ensure stability of the Internet along with fair and efficient allocation of the bandwidth. So, congestion control is currently a large area of research and concern in the...

    Provided By Creative Commons

  • White Papers // Jun 2013

    Comparison of Dynamic Routing Protocols: RIP and OSPF

    The two main classes of adaptive routing protocols in the internet: distance vector and link state. This paper presents the comparison between distance vector and link state. It also outlines the pros and cons of RIP and OSPF protocols and a performance analysis with some possible enhancement is presented. Network...

    Provided By Creative Commons

  • White Papers // Jun 2013

    Clone Attacks Detection in Wireless Sensor Networks

    The general problem in Wireless Sensor Network security (WSN) is the node Clone attack. This attack, is an adversary breaks into a sensor node. Once attacker captures sensor nodes, can compromise them and launch various types of attacks with those compromised nodes. Therefore, node capture attacks should be detected as...

    Provided By Creative Commons

  • White Papers // Jun 2013

    A Survey on Host to Host Congestion Control

    Congestion has been considered as one of the basic important issue in packet switched network. Congestion control refers to the mechanisms and techniques to control the congestion and keep the load below the capacity. In data networking and queuing theory, network congestion occurs when a link or node is carrying...

    Provided By Creative Commons

  • White Papers // Jun 2013

    Aligning IT With Business Objectives: A Critical Survival and Success Factor in Today's Business

    Alignment of IT with business objectives is a critically important topic in academic and industry. It is the key of success for modern organizations that is needed to survive and compete. It refers to the degree of congruence between business and IT strategies. This paper discusses the importance of aligning...

    Provided By Creative Commons

  • White Papers // Nov 2012

    Critical Success Tools for Research and Development Cycle at Indian SMEs-A Theoretical Framework

    This paper provides a review of literature for the identification of the Critical Success Tools (CSTs) for the development of R & D cycle at Indian SMEs. It proposed a theoretical framework in terms of R & D cycle for the instrument development and testing in future research. The findings...

    Provided By Creative Commons

  • White Papers // Oct 2012

    Strategic Technology Management: A Framework for Technology Analysis, Sustainable Innovation & Strategic Business Process Management at Indian SMEs

    This paper provides a review of literature for the understanding of the strategic technology management process with special reference to technology analysis, technology change management, strategy management, strategic Business Process Management (BPM) & sustainable innovation at Indian SMEs. It proposed a theoretical framework in terms of integrated strategic technology management...

    Provided By Creative Commons

  • White Papers // Jun 2012

    Database Services for Cloud Computing - An Overview

    Cloud computing has revolutionized the way computing infrastructure is abstracted and used. There is a proliferation of number of applications which leverage various cloud platforms, resulting in a tremendous increase in the scale of data generated as well as consumed by such applications. This paper reviews the features of Cloud...

    Provided By Creative Commons

  • White Papers // May 2013

    Cloud-Based Code Execution Framework for Scientific Problem Solving Environments

    In this paper, the authors present a novel Code Execution Framework that can execute code of different Problem Solving Environments (PSE), such as MATLAB, R and Octave, in parallel. In many e-Science domains different specialists are working together and need to share data or even execute calculations using programs created...

    Provided By Creative Commons

  • White Papers // Jul 2013

    Fair Benchmarking for Cloud Computing Systems

    The performance of Cloud systems is a key concern, but has typically been assessed by the comparison of relatively few Cloud systems, and often on the basis of just one or two features of performance. In this paper, the authors discuss the evaluation of four different Infrastructure as a Service...

    Provided By Creative Commons

  • White Papers // Mar 2013

    PEST- Benefit/Threat Analysis for Selection of ERP in Cloud for SMEs

    Enterprise Resource Planning (ERP) packages are used to integrate business processes of an organization through shared information flow. Majority of the large organizations within India have either implemented or are implementing ERP software. With the increasing market competition and globalization, Small and Medium sized Enterprise (SME) are keen to deploy...

    Provided By Creative Commons

  • White Papers // Aug 2012

    A Study on the Determinants of Growth for SMEs - With Reference to Servo Stabilizer Manufacturing Units

    Growth of small and medium enterprises is an essential element for any thriving economy. A study has been undertaken on typical business enterprises in India such as Servo Stabilizer manufacturing units to develop a better knowledge on the determinants of growth for small and medium enterprises. The main aim of...

    Provided By Creative Commons

  • White Papers // Apr 2013

    High Imperceptible Encoding for Computer Networks Security

    Today, computer and network technologies provide easy-to-use communication channels for steganography. In most algorithm used to secure information both steganography and cryptography are used together to secure a part of information. Steganography has many technical challenges such as high hiding capacity and imperceptibility. Digital Steganography exploits the use of a...

    Provided By Creative Commons

  • White Papers // Apr 2013

    Secured Searching of Valuable Data in a Metric Space Based on Similarity Measure

    The aim of the paper is collecting the similarity queries from various users and stored in the database. In this paper, the authors are mainly concentrating on privacy only. Here data owner, service provider, trusted clients are used. Here it is able to maintain data confidentiality with respect to untrusted...

    Provided By Creative Commons

  • White Papers // Apr 2013

    IP Trace Back Scheme for Packet Marking and Packet Logging Using RIHT

    Internet protocol trace back is the enabling technology to control the crime. Internet protocol packet is to find the real source of Internet attacks, the authors must possess the capability of discovering the origin of IP packets without relying on the source IP address field. This capability is called IP...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Various Approaches for Detecting Attacks in Intrusion Detection System

    The rapid development of computer networks and more importantly internet has created many security problems such as ever growing new intrusions on computer network systems. To secure this system strong intrusion detection system has to be build. An intrusion detection system monitors all inbound and outbound network activity and identifies...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Quality of Service Routing Protocol for Mobile Ad Hoc Network

    Ad-hoc wireless network is a part of wireless communication network. This network does not require any infrastructure. It is a distributed Routing network, and it supports for reusing of frequency dynamically. As ad-hoc network has different features, so it has to solve different issues as energy constraint, shared bandwidth and...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Iris Recognition Using Fuzzy System

    In today's world the identification of every human being is very important. Security is more important for all of the users'. Biometric Systems are automated methods of verifying or recognizing the identity of a living person on the basis of some physiological characteristics like a fingerprint or iris pattern This...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Signal Strength and System Operating Margin Estimation for Vehicular Ad-Hoc Networks in Rayleigh Fading Environment

    Vehicular Ad-hoc NETwork (VANET) is a subset of Mobile Ad-hoc NETwork (MANET). In VANET, vehicles act as transceiver and are able to send, receive and forward the information at the same time. In this paper, signal strength and System Operating Margin (SOM) are estimated for vehicular ad-hoc networks in absence...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Mesh Technique for Nymble Architecture Sustaining - Secrecy and Security in Anonymizing Networks

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this secrecy for abusive purposes such as defacing popular websites. Website...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Signature Free Virus Blocking Method to Detect Software Code Security

    The authors propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. Motivated by the observation that buffer overflow attacks typically contain executables whereas legitimate client requests never contain executables in most Internet services, SigFree blocks...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Federated Network Security Administration Framework

    In today's world, Internet is now ubiquitous. Most of Applications are based on Internet. Web and Internet technologies are becoming critical to many enterprises, and their huge potential in facilitating communication, decision making, and better business processes makes security a major concern. The factor that most affects network security solutions...

    Provided By Creative Commons

  • White Papers // Mar 2013

    A Survey on Knowledge Based Classification of Different Routing Protocols in Delay Tolerant Networks

    Now-a-days, current wireless networks have provided a wide range of applications making it possible to successfully interconnect devices and systems, such as a mobile phone to a powerful server all around the world. Modern Internet protocols exhibits inefficient performance in those networks where the connectivity between end nodes has intermittent...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Energy Conscious Dynamic Provisioning of Virtual Machines Using Adaptive Migration Thresholds in Cloud Data Center

    The fast growing demand for computational power utilized by modern applications with rapidly changing Cloud computing technology has directed to the foundation of large-scale virtualized data centers. Such data centers consume massive amounts of electrical energy resulting in high operating costs and carbon dioxide (CO2) emissions. Dynamic consolidation of Virtual...

    Provided By Creative Commons

  • White Papers // Mar 2013

    A Collaborative Selfish Replica With Watchdog and Pathrater in MANETS

    Mobile ad-hoc networks are autonomous and decentralized wireless systems. MANETs consist of mobile nodes that are free in moving in and out in the network. Nodes are the systems or devices i.e., mobile phone, laptop, personal digital assistance, MP3 player and personal computer that are participating in the network and...

    Provided By Creative Commons

  • White Papers // Mar 2013

    System Monitoring and Security Using Keylogger

    It is likely that about one out of many large companies systematically monitors the computer, internet, or email use of its users employees. There are over hundred's different products available today that will let organizations see what their users do at work on their "Personal" computers, in their email, and...

    Provided By Creative Commons

  • White Papers // Mar 2013

    Efficient Key Generation for Multimedia and Web Applications

    One of the main challenges for a secure multicast is access control, for making sure those only legitimate members of multicast group have access to the group communication. In the past two or three decades, cryptography has become the well-established means to solve the security problems in networking. However, there...

    Provided By Creative Commons

  • White Papers // May 2013

    An Efficient Approach to Improve Response Time in Multibiometric Patterns Retrieval From Large Database

    Biometric technologies are automated methods of verifying or recognizing the identity of a living person based on a physiological or behavioural characteristics. In a biometric identification system, the identity corresponding to the input data (probe/investigation) is typically determined by comparing it against the templates of all identities in a database...

    Provided By Creative Commons

  • White Papers // May 2013

    Safekeeping of Network Executive for a Domestic Internet Service Provider

    A net is one of the most important basic resources a large institution needs to have. Today, a network plays a very important role in every group. With extensive dispersed positioning, supervision the security of a network becomes very complex especially from the viewpoint of an ISP. ISP's are by...

    Provided By Creative Commons

  • White Papers // May 2013

    An Evaluation of Different Routing Schemes in DTN

    Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc NETworks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn't exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when...

    Provided By Creative Commons

  • White Papers // May 2013

    Cloud Computing: A Revolution in Communication

    Now-a-days cloud computing is an emerging area and it replace grid computing. Cloud computing elaborate that how to utilize computer resources on network. In fact it is the market model that describes services provided over the internet. In Future, not all but most of the resources are controlled by cloud...

    Provided By Creative Commons

  • White Papers // May 2013

    Review Paper on Detection and Prevention Techniques of Gray-Hole Attack in Manet

    MANET is a kind of wireless ad hoc network. It is a self-configuring network of mobile routers connected by wireless links with no access point. Every mobile device in a network is autonomous. The mobile devices are free to move haphazardly and organize themselves arbitrarily. In other words, ad hoc...

    Provided By Creative Commons

  • White Papers // May 2013

    Monitoring Local Area Network Using Remote Method Invocation

    The aim of this paper, is to secure the network or a LAN by implementing such a software which is enable to carry out operations which are capable to monitor whole of the network, sitting on one chair by viewing remote desktop, passing messages to remote system and is also...

    Provided By Creative Commons

  • White Papers // May 2013

    A Novel Approach of Energy Optimization in WSN

    The wireless link can be unreliable in realistic Wireless Sensor Networks (WSNs). Energy efficient and reliable data forwarding is important because each node has limited resources. Therefore, the authors must suggest an optimal solution that considers using the information of the node's characteristic A wireless sensor network is composed of...

    Provided By Creative Commons

  • White Papers // May 2013

    Effective Identification of the Intruders and Modifiers in Wireless Sensor Networks

    Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multi-hop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, the authors propose...

    Provided By Creative Commons

  • White Papers // May 2013

    Optimal Node Selection Using Broadcasting Algorithm in Mobile Adhoc Network

    In optimal node selection using broadcasting algorithm in mobile ad hoc network it finds the nearest optimal node for forwarding messages and the consequent optimal node for receiving and transferring messages and continues up to its destination node. Using 1-hop neighbour information, the sender-based broadcasting algorithm searches local optimal minimum...

    Provided By Creative Commons

  • White Papers // May 2013

    Detection of Malicious Url Redirection and Distribution

    Web-based malicious software (malware) has been increasing over the Internet. It poses threats to computer users through web sites. Computers are infected with Web-based malware by drive-by-download attacks. Drive-by-download attacks force users to download and install the Web-based malware without being aware of it. These attacks evade detection by using...

    Provided By Creative Commons

  • White Papers // May 2013

    Cloud on Linux Operating System

    The term "Cloud" is analyzed to "Internet". The term "Cloud computing" is based on cloud drawings used in the past to represent telephone networks and later to depict internet. Cloud computing is a internet based computing where virtual shared servers provide software, infrastructure, platform, devices and other resources and hosting...

    Provided By Creative Commons

  • White Papers // May 2013

    Hierarchical EAP Back-End Authenticator State Machine

    Authentication is a basic requirement for telecommunication network market for allowing resources to the legitimate users. Extended Authentication Protocol (EAP) is a widely used protocol for authentication. EAP is basically a framework which supports several authentication methods. The several authentication methods supported by a single protocol make this protocol a...

    Provided By Creative Commons