Dynamic Publishers

Displaying 1-40 of 72 results

  • White Papers // Aug 2013

    Development of an External Cluster Validity Index Using Probabilistic Approach and Min-Max Distance

    Validating a given clustering result is a very challenging task in real world. So for this purpose, several cluster validity indices have been developed in the literature. Cluster validity indices are divided into two main categories: external and internal. External cluster validity indices rely on some supervised information available and...

    Provided By Dynamic Publishers

  • White Papers // Jun 2013

    Finger Nail Plate: A New Biometric Identifier

    In this paper, the authors investigate a new biometric identifier for forensic and civilian applications. The authors propose a novel biometric authentication system based on low resolution finger nail plate images. Despite the uniqueness and high stability of the nail plate, its usage as a biometric identifier has not been...

    Provided By Dynamic Publishers

  • White Papers // Jun 2013

    Performance Analysis of Face Recognition Systems Based on False Rejection or False Acceptance of Probe Image

    Face recognition like other biometrics systems involves some basic processes, which includes biometric feature acquisition/enrollment which in this case would be faces of human to be recognized, normalization of these enrolled features in order to standardize the training set and lastly is the recognition which involves mapping the enrolled features...

    Provided By Dynamic Publishers

  • White Papers // May 2013

    A Global Virtual Machine Attribute Access Control Policy for Auditing Federated Digital Identities within a Compute Cloud

    An audit framework is necessary to enable policy makers across vertical markets (healthcare, mobile payment, digital content) to set the security and privacy bar for identity providers, identity brokers and relying parties. For sure, across all vertical markets, the sharing of identity requires a baseline of best practices for security,...

    Provided By Dynamic Publishers

  • White Papers // Aug 2012

    The Virtual Machine Log Auditor

    With the increased use of data computing clouds, forensic science requires tools that enable investigation and discovery. The Virtual Machine Log Auditor (VMLA) is one such tool. It is a graphical tool that allows the data cloud forensic investigator to create a timeline of Virtual Machine (VM) hypervisor log events...

    Provided By Dynamic Publishers

  • White Papers // Jul 2012

    Directed Proxy Signature Scheme

    A proxy signature enables an original signer to delegate his/her signing capability to a proxy signer and the proxy signer can sign a message on behalf of the original signer. Later, anyone can accessible the public key of the original signer and proxy signer and the corresponding delegation warrant is...

    Provided By Dynamic Publishers

  • White Papers // Jun 2012

    EMDAV: A Variable-Size Microaggregation Technique for Privacy Preservation

    Individual respondent's data (microdota record) collected in a database of records (microdata dataset) by different public and private organization for operational purpose may contain sensitive personal information. Releasing these datasets publicly may lead to breach of privacy of respondents. Valuable hidden knowledge can be extracted from the datasets by applying...

    Provided By Dynamic Publishers

  • White Papers // Feb 2012

    Building Distributed Soft Sensors

    Advances in digital electronics have enable the development of low-cost, low-power, multifunctional sensor nodes that are small in size and communicate in short distances. These tiny sensor nodes consist of sensing, data processing, and communication components, leverage the idea of Wireless Sensor Networks (WSN) based on collaborative effort of a...

    Provided By Dynamic Publishers

  • White Papers // Jan 2012

    A Continuous Learning for Solving a Face Recognition Problem

    The authors propose a hybrid system for dynamic environments, where a "Multiple neural networks" system works with Bayes Rule to solve the face recognition problem. One or more neural nets may no longer be able to properly operate, due to partial changes in some of the characteristics of the individuals....

    Provided By Dynamic Publishers

  • White Papers // Dec 2011

    Automated Fingerprint Recognition Using the DECOC Classifier

    Human fingerprints are rich in details, here called "Minutiae". In this paper, a fingerprint recognition system based on a novel application of the classifier DECOC to the minutiae extraction and on an optimised matching algorithm will be presented. To identify the different shapes and types of minutiae, a Data-driven Error...

    Provided By Dynamic Publishers

  • White Papers // Dec 2011

    Horizontal Format Data Mining With Extended Bitmaps

    Analyzing the data warehouses to foresee the patterns of the transactions often needs high computational power and memory space due to the huge set of past history of the data transactions. With the fragmented data along with the current trend of distributed systems, most of the fundamental algorithms that are...

    Provided By Dynamic Publishers

  • White Papers // Dec 2011

    Designing Cellular Networks Using Particle Swarm Optimization and Genetic Algorithms

    The demand for cellular systems has increased drastically in recent years. To design such networks is not a simple task and computational tools to assist network designers can be very helpful. The design of a cellular network can be divided in two minor problems: the maximum coverage and channel assignment...

    Provided By Dynamic Publishers

  • White Papers // Dec 2011

    Background Subtraction for Object Detection Under Varying Environments

    Background subtraction is widely used for extracting unusual motion of object of interest in video sequences for various applications. In this paper, the authors propose a fast and flexible approach of object detection based on an adaptive background subtraction technique which also effectively eliminates shadows based on color constancy principle...

    Provided By Dynamic Publishers

  • White Papers // Dec 2011

    Energy Aware Hybrid PUSH-PULL With Fault Tolerant Approach in Sensor Networks

    Wireless Sensor Networks (WSNs) have wide variety of applications and provide limitless future potentials. Nodes in WSNs are prone to be failure due to energy depletion, hardware failure, communication link errors, malicious attack, and so on. Therefore, fault tolerance is one of the critical issues in WSNs. Directed diffusion is...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    RELIEF Algorithm and Similarity Learning for k-NN

    In this paper, the authors study the links between RELIEF, a well-known feature re-weighting algorithm and SiLA, a similarity learning algorithm. On one hand, SiLA is interested in directly reducing the leave-one-out error or 0-1 loss by reducing the number of mistakes on unseen examples. On the other hand, it...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    Low-And High-Level Image Annotation Using Fuzzy Petri Net Knowledge Representation Scheme

    In order to exploit the massive image information and to handle overload, techniques for analyzing image content to facilitate indexing and retrieval of images have emerged. In this paper, a low-level and high-level image semantic annotation based on Fuzzy Petri Net is presented. Knowledge scheme is used to define more...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    Speech Recognition by Indexing and Sequencing

    Recognition by Indexing and Sequencing (RISq) is a general-purpose example-based method for classification of temporal vector sequences. The authors developed an advanced version of RISq and applied it to speech recognition, a task most commonly performed with Hidden Markov Models (HMMs) or Dynamic Time Warping (DTW). RISq is substantially different...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    Graph Embedding Algorithms Based on Neighborhood Discriminant Embedding for Face Recognition

    This paper explores the use of a series of Graph Embedding (GE) algorithms based on Neighborhood Discriminant Embedding (NDE) as a means to improve the performance and robustness of face recognition. NDE combines GE framework and Fishers criterion and it takes into account the Individual Discriminative Factor (IDF) which is...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    Using Feed-Forward Neural Networks for Data Association on Multi-Object Tracking Tasks

    This paper presents an approach for data association in single camera, multi-object tracking scenarios using Feed-Forward Neural Networks (FFNN). The challenges of data association are object occlusions and changing features which are used to describe objects during the process. The presented algorithm within this article can be applied to any...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    Corporate Strategy Optimization for Dutch Notaries With the Use of IT

    This research provides new insight in the application of IT to optimize the corporate strategy of notaries in the Netherlands. Since the forced liberalization of prices and the freedom of establishment introduced by the 1999 Notary Act, notaries have become entrepreneurs. Notaries are forced to adopt a competitive corporate strategy....

    Provided By Dynamic Publishers

  • White Papers // Oct 2011

    Exploring Citations for Conflict of Interest Detection in Peer Review System

    Peer review in scientific communications plays an important role in the advancement of any given field of study. However, different sorts of Conflict Of Interest (COI) situations between authors and reviewers can compromise the review decision. Current COI detection systems primarily rely on co-authors networks, inferred from publicly available bibliographic...

    Provided By Dynamic Publishers

  • White Papers // Jul 2011

    A Framework for SPARQL Query Processing, Optimization and Execution With Illustrations

    The vision of Semantic web is to allow intelligent description and interchange of integrated data from various distributed web resources. A structure for this metadata on web is known as Resource Description Framework (RDF) where data is in the form of XML (EXtended Markup Language). A query language is used...

    Provided By Dynamic Publishers

  • White Papers // Jul 2011

    Design and Analysis of Finite Impulse Response Using G Ate Diffusion Input (GDI) Circuits

    Integrated Circuits technology advancements have consistently migrated to smaller feature sizes over the last four decades years, forcing more functional circuits to be placed on each chip. The increased density can be used to decrease cost and/or increase functionality as can be seen by Moore's law. Since higher performance and...

    Provided By Dynamic Publishers

  • White Papers // Jul 2011

    User Interface for a Search Engine: A Customized and Multi-Domain Approach

    The paper proposes a novel information retrieval framework by providing a customized, dynamic and multi-domain user interface for a search engine. This uses the idea of fragmentation of information into different domains before the actual search starts. This is realized by dividing the search criteria into different parameters or features...

    Provided By Dynamic Publishers

  • White Papers // Jul 2011

    MoonGate: RTS Engine With User-Oriented Architecture

    This paper introduces MoonGate - a real-time strategy engine based on replaceable components, thus serving as an easily customizable educational environment for studying a wide range of problems in several research areas. The implemented engine also supports, alongside the Windows platform, Microsoft's Xbox 360 gaming console, making it the first...

    Provided By Dynamic Publishers

  • White Papers // Jul 2011

    Self-Organizing Maps for Competitive Technical Intelligence Analysis

    This paper examines how the Self-Organizing Map (SOM) technique can be used to identify key competitors and determine key technical attributes of electronic products. A novel SOM display named Attribute Variance Matrix (AV-Matrix) was presented and applied to the background colors of the corresponding SOM nodes. The cell phone industry...

    Provided By Dynamic Publishers

  • White Papers // Jun 2011

    Domain Specific Service Oriented Reference Architecture Case: Distributed Disasters and Emergency Knowledge Management

    This paper introduces the design of a Domain-Specific Service-Oriented Reference Architecture (DS-SORA) for disasters and Emergencies Management (4EM). It also gives an overview of the features of the emergency management knowledge. Reference Architecture (RA) models and uses abstract elements in a domain and thus it is possible to have several...

    Provided By Dynamic Publishers

  • White Papers // Jun 2011

    Intelligent Agent Based University Search & Admission System-Android Environment

    While the Internet has already brought them humans together in new, exciting, and unexpected ways, the same is also happening to the people prevalent adoption of digital mobile devices that has paved the way for the development of many innovative applications in the commercial domain. The framework of M-commerce provides...

    Provided By Dynamic Publishers

  • White Papers // May 2011

    User Experience Evaluation of WhatsOnWeb: A Sonificated Visual Web Search Clustering Engine

    The aim of this paper was to present a usability evaluation conducted under the User EXperience (UX) perspective of a sonificated search engine called WhatsOnWeb, an accessible application based on sophisticated graph visualization algorithms which conveys datasets using graph-drawing methods based on semantically clustered data. Starting with evidence from an...

    Provided By Dynamic Publishers

  • White Papers // Apr 2011

    E-Learning Success in Action! From Case Study Research to the Creation of the Cybernetic e-Learning Management Model

    This paper reports the use of e-Learning in practice based on a structured and embedded participatory observation and the tracking of activities by conducting a case study including two cases in an international environment of BMW Group as an international acting organization. The observations aimed at two different research goals;...

    Provided By Dynamic Publishers

  • White Papers // Apr 2011

    Implementation and Comparison of Machine Learning Classifiers for Information Security Risk Analysis of a Human Resources Department

    The aim of this paper is threefold. First, a qualitative information security risk survey is implemented in human resources department of a logistics company. Second, a machine learning risk classification and prediction model with proper data set is established from the results obtained in this survey. Third, several classifier algorithms...

    Provided By Dynamic Publishers

  • White Papers // Apr 2011

    Usability Evaluation of SatNav Application on Mobile Phone Using MGQM

    SatNav systems are becoming increasingly popular, enabling drivers to locate and drive to their desired destination. With high demand for the features SatNav provides, these applications are now also available in mobile phones. This gives rise to the question of whether the app is usable when installed in a mobile...

    Provided By Dynamic Publishers

  • White Papers // Apr 2011

    Interactive Digital Television System Using Interactive Service Provider Based on Service-Oriented Architecture

    Interactive Digital TV systems allow a new range of services concerning broadcasted television content. Thus, interactive programs can be broadcasted allowing user interaction. The interaction implicates in a new way to produce and think about television content. This paper aims at presenting Interactive Service Provider architecture for Interactive Digital TV...

    Provided By Dynamic Publishers

  • White Papers // Apr 2011

    A New Credit Card Payment System Based on 3DSecure Using One-Time-Use Transaction Numbers

    Along with rapid growth in usage of credit card in ecommerce, rough and robust security measure and technologies should be developed. One old problem about the credit card transaction -that also exists in widely used payment system like 3D-Secure-is the possibility of disclosure of sensitive data which is being stored...

    Provided By Dynamic Publishers

  • White Papers // Mar 2011

    GPUMLib: An Efficient Open-Source GPU Machine Learning Library

    Graphics Processing Units (GPUs) placed at the authors' disposal an unprecedented computational-power, largely surpassing the performance of cutting-edge CPUs (Central Processing Units). The high-parallelism inherent to the GPU makes this device especially well-suited to address Machine Learning (ML) problems with prohibitively computational intensive tasks. Nevertheless, few ML algorithms have been...

    Provided By Dynamic Publishers

  • White Papers // Feb 2011

    A Study on Wormhole Attacks in MANET

    An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. In this paper, the authors have analyzed the performance of Mobile Ad-hoc NETworks (MANET) under wormhole attack. Multiple QoS parameters have been considered here such as throughput, delay, packet delivery ratio, node energy...

    Provided By Dynamic Publishers

  • White Papers // Feb 2011

    Context Protecting Privacy Preservation in Ubiquitous Computing

    Ubiquitous computing attempts to provide services in an invisible way with least user intervention. In ubiquitous computing domain context awareness is an important issue. So, mere protection of message confidentiality is not sufficient for most of the applications where context-awareness can lead to near deterministic ideas. An adversary might deduce...

    Provided By Dynamic Publishers

  • White Papers // Feb 2011

    Security of Biometric Authentication Systems

    This paper outlines the people views of actual security of biometric authentication and encryption systems. The attractiveness of some novel approaches like cryptographic key generation from biometric data is in some respect understandable, yet so far has lead to various shortcuts and compromises on security. This paper starts with an...

    Provided By Dynamic Publishers

  • White Papers // Feb 2011

    Implementation of Graph Semantic Based Multidimensional Data Model: An Object Relational Approach

    Data Warehouse (DW) design demands a methodical support for the designer of DW to specify the execution system efficiently from its conceptual level design. The authors have proposed a generic model for Data warehouse at conceptual level named Graph Object Oriented Multidimensional Data Model (GOOMD). This paper proposes a systematic...

    Provided By Dynamic Publishers

  • White Papers // Feb 2011

    A Hybrid Approach for IEEE 802.11 Intrusion Detection Based on AIS, MAS and Na?ve Bayes

    The advancement of network technology has been offering substantial improvements for users in general. Paradoxically, new technologies end up bringing also new types of problems. Not only one can find issues related to architecture failure, mis-configuration and bad adaptation, but also a growing number of problems related to user security....

    Provided By Dynamic Publishers

  • White Papers // Sep 2007

    Design and Implementation of a Portable ID Management Framework for a Secure Virtual Machine Monitor

    A commonly used Virtual Machine Monitor (VMM) allows multiple operating systems to share physical hardware resources as virtual resources in a safe manner. It provides a strong isolation mechanism between Virtual Machines (VMs). In this paper, the authors state the importance of ID management for a security-purpose VMM system to...

    Provided By Dynamic Publishers

  • White Papers // May 2013

    A Global Virtual Machine Attribute Access Control Policy for Auditing Federated Digital Identities within a Compute Cloud

    An audit framework is necessary to enable policy makers across vertical markets (healthcare, mobile payment, digital content) to set the security and privacy bar for identity providers, identity brokers and relying parties. For sure, across all vertical markets, the sharing of identity requires a baseline of best practices for security,...

    Provided By Dynamic Publishers

  • White Papers // Jan 2010

    Improvement of Two Lightweight RFID Authentication Protocols

    Recently, lightweight RFID authentication protocol has been investigated due to the awareness of practical requirements on individual privacy, system security and resource limitation of low cost tags. Research community demonstrates major advancements in this interesting research area of designing a robust access control and information retrieval mechanism for RFID system....

    Provided By Dynamic Publishers

  • White Papers // Jun 2012

    EMDAV: A Variable-Size Microaggregation Technique for Privacy Preservation

    Individual respondent's data (microdota record) collected in a database of records (microdata dataset) by different public and private organization for operational purpose may contain sensitive personal information. Releasing these datasets publicly may lead to breach of privacy of respondents. Valuable hidden knowledge can be extracted from the datasets by applying...

    Provided By Dynamic Publishers

  • White Papers // Jun 2010

    A Proposed Model for Vulnerability Analysis Using Critical Paths

    Determining the means by which an attacker may compromise a given system is the main purpose of vulnerability assessment. As such, there are several models currently in place to track vulnerabilities. Some models focus on the susceptibility of a computer system as a whole where other models track attack paths...

    Provided By Dynamic Publishers

  • White Papers // Jun 2010

    Statistical Analysis on KTANTAN Block Cipher

    The importance of cryptographic technologies is currently rising as most devices at present require good and reliable security features, and can be supported in many applications and environments. In order to cater the needs of implementing cryptographic technologies in many constrained environment without exploiting the security and efficiency level, the...

    Provided By Dynamic Publishers

  • White Papers // Aug 2012

    The Virtual Machine Log Auditor

    With the increased use of data computing clouds, forensic science requires tools that enable investigation and discovery. The Virtual Machine Log Auditor (VMLA) is one such tool. It is a graphical tool that allows the data cloud forensic investigator to create a timeline of Virtual Machine (VM) hypervisor log events...

    Provided By Dynamic Publishers

  • White Papers // Jun 2011

    Intelligent Agent Based University Search & Admission System-Android Environment

    While the Internet has already brought them humans together in new, exciting, and unexpected ways, the same is also happening to the people prevalent adoption of digital mobile devices that has paved the way for the development of many innovative applications in the commercial domain. The framework of M-commerce provides...

    Provided By Dynamic Publishers

  • White Papers // Jun 2011

    Domain Specific Service Oriented Reference Architecture Case: Distributed Disasters and Emergency Knowledge Management

    This paper introduces the design of a Domain-Specific Service-Oriented Reference Architecture (DS-SORA) for disasters and Emergencies Management (4EM). It also gives an overview of the features of the emergency management knowledge. Reference Architecture (RA) models and uses abstract elements in a domain and thus it is possible to have several...

    Provided By Dynamic Publishers

  • White Papers // Jul 2011

    Self-Organizing Maps for Competitive Technical Intelligence Analysis

    This paper examines how the Self-Organizing Map (SOM) technique can be used to identify key competitors and determine key technical attributes of electronic products. A novel SOM display named Attribute Variance Matrix (AV-Matrix) was presented and applied to the background colors of the corresponding SOM nodes. The cell phone industry...

    Provided By Dynamic Publishers

  • White Papers // Apr 2011

    Usability Evaluation of SatNav Application on Mobile Phone Using MGQM

    SatNav systems are becoming increasingly popular, enabling drivers to locate and drive to their desired destination. With high demand for the features SatNav provides, these applications are now also available in mobile phones. This gives rise to the question of whether the app is usable when installed in a mobile...

    Provided By Dynamic Publishers

  • White Papers // Jul 2011

    MoonGate: RTS Engine With User-Oriented Architecture

    This paper introduces MoonGate - a real-time strategy engine based on replaceable components, thus serving as an easily customizable educational environment for studying a wide range of problems in several research areas. The implemented engine also supports, alongside the Windows platform, Microsoft's Xbox 360 gaming console, making it the first...

    Provided By Dynamic Publishers

  • White Papers // Jul 2011

    User Interface for a Search Engine: A Customized and Multi-Domain Approach

    The paper proposes a novel information retrieval framework by providing a customized, dynamic and multi-domain user interface for a search engine. This uses the idea of fragmentation of information into different domains before the actual search starts. This is realized by dividing the search criteria into different parameters or features...

    Provided By Dynamic Publishers

  • White Papers // Jul 2011

    Design and Analysis of Finite Impulse Response Using G Ate Diffusion Input (GDI) Circuits

    Integrated Circuits technology advancements have consistently migrated to smaller feature sizes over the last four decades years, forcing more functional circuits to be placed on each chip. The increased density can be used to decrease cost and/or increase functionality as can be seen by Moore's law. Since higher performance and...

    Provided By Dynamic Publishers

  • White Papers // Jul 2011

    A Framework for SPARQL Query Processing, Optimization and Execution With Illustrations

    The vision of Semantic web is to allow intelligent description and interchange of integrated data from various distributed web resources. A structure for this metadata on web is known as Resource Description Framework (RDF) where data is in the form of XML (EXtended Markup Language). A query language is used...

    Provided By Dynamic Publishers

  • White Papers // Apr 2011

    Interactive Digital Television System Using Interactive Service Provider Based on Service-Oriented Architecture

    Interactive Digital TV systems allow a new range of services concerning broadcasted television content. Thus, interactive programs can be broadcasted allowing user interaction. The interaction implicates in a new way to produce and think about television content. This paper aims at presenting Interactive Service Provider architecture for Interactive Digital TV...

    Provided By Dynamic Publishers

  • White Papers // Oct 2011

    Exploring Citations for Conflict of Interest Detection in Peer Review System

    Peer review in scientific communications plays an important role in the advancement of any given field of study. However, different sorts of Conflict Of Interest (COI) situations between authors and reviewers can compromise the review decision. Current COI detection systems primarily rely on co-authors networks, inferred from publicly available bibliographic...

    Provided By Dynamic Publishers

  • White Papers // May 2011

    User Experience Evaluation of WhatsOnWeb: A Sonificated Visual Web Search Clustering Engine

    The aim of this paper was to present a usability evaluation conducted under the User EXperience (UX) perspective of a sonificated search engine called WhatsOnWeb, an accessible application based on sophisticated graph visualization algorithms which conveys datasets using graph-drawing methods based on semantically clustered data. Starting with evidence from an...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    Speech Recognition by Indexing and Sequencing

    Recognition by Indexing and Sequencing (RISq) is a general-purpose example-based method for classification of temporal vector sequences. The authors developed an advanced version of RISq and applied it to speech recognition, a task most commonly performed with Hidden Markov Models (HMMs) or Dynamic Time Warping (DTW). RISq is substantially different...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    Corporate Strategy Optimization for Dutch Notaries With the Use of IT

    This research provides new insight in the application of IT to optimize the corporate strategy of notaries in the Netherlands. Since the forced liberalization of prices and the freedom of establishment introduced by the 1999 Notary Act, notaries have become entrepreneurs. Notaries are forced to adopt a competitive corporate strategy....

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    Graph Embedding Algorithms Based on Neighborhood Discriminant Embedding for Face Recognition

    This paper explores the use of a series of Graph Embedding (GE) algorithms based on Neighborhood Discriminant Embedding (NDE) as a means to improve the performance and robustness of face recognition. NDE combines GE framework and Fishers criterion and it takes into account the Individual Discriminative Factor (IDF) which is...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    Low-And High-Level Image Annotation Using Fuzzy Petri Net Knowledge Representation Scheme

    In order to exploit the massive image information and to handle overload, techniques for analyzing image content to facilitate indexing and retrieval of images have emerged. In this paper, a low-level and high-level image semantic annotation based on Fuzzy Petri Net is presented. Knowledge scheme is used to define more...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    Using Feed-Forward Neural Networks for Data Association on Multi-Object Tracking Tasks

    This paper presents an approach for data association in single camera, multi-object tracking scenarios using Feed-Forward Neural Networks (FFNN). The challenges of data association are object occlusions and changing features which are used to describe objects during the process. The presented algorithm within this article can be applied to any...

    Provided By Dynamic Publishers

  • White Papers // Dec 2011

    Designing Cellular Networks Using Particle Swarm Optimization and Genetic Algorithms

    The demand for cellular systems has increased drastically in recent years. To design such networks is not a simple task and computational tools to assist network designers can be very helpful. The design of a cellular network can be divided in two minor problems: the maximum coverage and channel assignment...

    Provided By Dynamic Publishers

  • White Papers // Dec 2011

    Background Subtraction for Object Detection Under Varying Environments

    Background subtraction is widely used for extracting unusual motion of object of interest in video sequences for various applications. In this paper, the authors propose a fast and flexible approach of object detection based on an adaptive background subtraction technique which also effectively eliminates shadows based on color constancy principle...

    Provided By Dynamic Publishers

  • White Papers // Dec 2011

    Horizontal Format Data Mining With Extended Bitmaps

    Analyzing the data warehouses to foresee the patterns of the transactions often needs high computational power and memory space due to the huge set of past history of the data transactions. With the fragmented data along with the current trend of distributed systems, most of the fundamental algorithms that are...

    Provided By Dynamic Publishers

  • White Papers // Dec 2011

    Energy Aware Hybrid PUSH-PULL With Fault Tolerant Approach in Sensor Networks

    Wireless Sensor Networks (WSNs) have wide variety of applications and provide limitless future potentials. Nodes in WSNs are prone to be failure due to energy depletion, hardware failure, communication link errors, malicious attack, and so on. Therefore, fault tolerance is one of the critical issues in WSNs. Directed diffusion is...

    Provided By Dynamic Publishers

  • White Papers // Aug 2013

    Development of an External Cluster Validity Index Using Probabilistic Approach and Min-Max Distance

    Validating a given clustering result is a very challenging task in real world. So for this purpose, several cluster validity indices have been developed in the literature. Cluster validity indices are divided into two main categories: external and internal. External cluster validity indices rely on some supervised information available and...

    Provided By Dynamic Publishers

  • White Papers // Nov 2011

    RELIEF Algorithm and Similarity Learning for k-NN

    In this paper, the authors study the links between RELIEF, a well-known feature re-weighting algorithm and SiLA, a similarity learning algorithm. On one hand, SiLA is interested in directly reducing the leave-one-out error or 0-1 loss by reducing the number of mistakes on unseen examples. On the other hand, it...

    Provided By Dynamic Publishers

  • White Papers // Aug 2008

    Web Spam Detection Using Machine Learning in Specific Domain Features

    In the last few years, as Internet usage becomes the main artery of the life's daily activities, the problem of spam becomes very serious for internet community. Spam pages form a real threat for all types of users. This threat proved to evolve continuously without any clue to abate. Different...

    Provided By Dynamic Publishers

  • White Papers // Jul 2009

    Editorial Preface: Special Issue on Intrusion and Malware Detection

    Welcome to the special issue of Intrusion and Malware detection. Detection of Intrusions and Malware remains a serious problem in the realm of computer and communications security. These include viruses, spam, phishing, spyware, botnets, and other Web attacks. Such security attacks are no longer confined to traditional computer networks or...

    Provided By Dynamic Publishers

  • White Papers // Jun 2009

    A Novel Validation Method for Firewall Security Policy

    A Security Policy constitutes the core of network protection infrastructure. Thus, its development is a sensitive task because it can appears in opposition with some security requirements. A validation process for security policies becomes then necessary before their deployment. Nowadays, there is no automated tool in the network security world...

    Provided By Dynamic Publishers

  • White Papers // Jun 2009

    Automatic Verification of Firewall Configurations With Respect to Security Policy Requirements

    A firewall is a key security component in computer networks. It filters network traffic based on an ordered list of filtering rules. Firewall configurations must be correct and complete with respect to security policies. A security policy is a set of predicates, which is a high level description of traffic...

    Provided By Dynamic Publishers

  • White Papers // Sep 2008

    Cloned Access Point Detection and Prevention Mechanism in IEEE 802.11 Wireless Mesh Networks

    IEEE 802.11 Wireless Mesh Network (WMN) is an emerging low cost, decentralized community-based broadband technology, which is based on self-healing and multi-hop deployment of Access Points (APs), so that to increase the coverage area with maximum freedom to end-users to join or leave the network from anywhere anytime having low...

    Provided By Dynamic Publishers

  • White Papers // Jun 2009

    Invariant Evaluation Through Introspection for Proving Security Properties

    Semantics-driven monitoring discovers attacks against a process by evaluating invariants on the process state. To increase the robustness and the transparency of semantics-driven monitoring, it proposes an approach that introduces two Virtual Machines (VMs) running on the same platform. One VM runs the monitored process, i.e. the process to be...

    Provided By Dynamic Publishers

  • White Papers // Aug 2008

    The Impact of AJAX Vulnerability in Web 2.0 Applications

    The web has profound applications in the world and influenced the society than any other technology. The present decade is marked by the increased application of web servers and the use of web 2.0 for many utilities. As the access to the Web 2.0 by the global users is on...

    Provided By Dynamic Publishers

  • White Papers // Jun 2008

    An ISP Level Solution to Combat DDoS Attacks Using Combined Statistical Based Approach

    Disruption from service caused by DDoS attacks is an immense threat to Internet today. These attacks can disrupt the availability of Internet services completely, by eating either computational or communication resources through sheer volume of packets sent from distributed locations in a coordinated manner or graceful degradation of network performance...

    Provided By Dynamic Publishers

  • White Papers // Jun 2009

    A Compiler-Hardware Technique for Protecting Against Buffer Overflow Attacks

    Buffer overflow attacks are widely acknowledged by computer security professionals to be one of the greatest threats to the security of computer systems. It presents an integrated software hardware approach to protect against buffer overflow attacks while minimizing performance degradation, software development time, and deployment costs. Its technique does not...

    Provided By Dynamic Publishers

  • White Papers // Sep 2008

    Dimensions of Identity Federation: A Case Study in Financial Services

    In the networked economy, strategic partnerships and collaboration are an important way to develop and maintain competitive advantages. At the same time, enterprises also need to reduce costs, increase revenues and seize new business opportunities. This demands enterprises to enable convenient and secure business interactions with internal and external stakeholders,...

    Provided By Dynamic Publishers

  • White Papers // Aug 2008

    XML Security: Detecting and Preventing Disclosure in XML

    XML has become the prime standard for data exchange on the Web and a uniform data model for data integration. Since it solve the problem of different data representation the challenge to secure or making certain data invisible is as important as making the data available in an efficient manner....

    Provided By Dynamic Publishers