Engg Journals Publications

Displaying 1-40 of 604 results

  • White Papers // Oct 2014

    Iris Recognition Based on Subspace Analysis

    Biometrics deals with the uniqueness of an individual arising from their physiological or behavioral characteristics for the purpose of personal identification. Among many biometrics techniques, iris recognition is one of the most promising approached. This paper presents traditional subspace analysis method for iris recognition. Initially the eye images have been...

    Provided By Engg Journals Publications

  • White Papers // Oct 2014

    SEMU - An Adaptive Policy - Control Based Routing Approach to Provide Effective QoS Over Wireless Sensor Networks

    Error control mechanism carries vital importance in research aspects of Wireless Sensor Networks (WSNs) due to its limited energy constraints and minimal support for power communication. The survey and analysis provides a comprehensive comparison of FEC/ARQ and hybrid ARQ schemes in WSN. This paper proposes an adaptive QoS routing scheme...

    Provided By Engg Journals Publications

  • White Papers // Jul 2014

    Rebroadcasting for Routing Reduction Based Upon Neighbor Coverage in Ad Hoc Networks

    Cause of nodes high mobility in Mobile Ad-hoc NETworks (MANETs), there are frequent link breakages exist which escort to frequent route discoveries and path failures. The route discovery procedure cannot be ignored. In a route finding, broad casting is a primary and efficient data broadcasting methodology, where a cell phone...

    Provided By Engg Journals Publications

  • White Papers // Aug 2014

    An Extensive Study on the Future of Modeling in Software Development

    In recent years, software modeling realized much attention in the field of software research and development due to demonstrating the capability of decreases time and cost of software development and also improves overall quality of software development process in the form of understanding, communications, correctness, traceability, and developer productivity etc....

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Agent Based Simulation Model for Warning Messages Dissemination in a Vehicular Ad Hoc Network

    Since the safety on roads has become a main concern for both governments and car manufacturers in the last twenty years, number of applications into the domain of vehicular communication is proposed. Vehicular Ad hoc NETworks (VANETs) fall in this category. In this paper, the authors propose an agent based...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Multi-Constrained QoS Multicast Routing Based on the Genetic Algorithm for MANETs

    A wireless MANET is a collection of wireless mobile hosts that dynamically create a temporary network without a fixed infrastructure. The topology of the network may change unpredictably and frequently. Therefore, multicast routing in ad hoc networks is a very challenging problem. This paper proposes a multi-constrained QoS multicast routing...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Purchase Decision for ATUR Broadband Network

    Along with the booming of telecommunication, Internet web has become a vital media in the current global communication and the communication quality of Internet has been emphasized. To the client user, the Internet ATUR (ADSL Transceiver Unit Remote) is the equipment they usually have to the extent of reliable quality....

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Modeling Virtual Meetings within Software Engineering Environment

    As known, during software development there are many activities that need to be done by the project's stakeholders. These activities are typically carried out in a sequential or parallel form during the project's life time cycle. It is a common scenario to see project's stakeholders, such as managers, team leaders,...

    Provided By Engg Journals Publications

  • White Papers // May 2014

    A Novel Approach for Pattern Analysis From Huge Datawarehouse

    Due to the tremendous growth of data and large databases, efficient extraction of required data has become a challenging task. This paper proposes a novel approach for knowledge discovery from huge unlabeled temporal databases by employing a combination of HMM and K-means technique. The authors propose to recursively divide the...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    A Study of Clone Detecting Techniques in Stationary and Mobile Wireless Sensor Network

    Mobile Wireless Sensor Network (MWSN) is one of the recently emerging areas in which mobility of sensor nodes play a major role. Sensor nodes are allowed to move freely and are allowed to communicate with each other without a need for fixed infrastructure. Sensor nodes are not equipped with tamper...

    Provided By Engg Journals Publications

  • White Papers // Mar 2014

    Review Paper on Web Service Security

    A web service is a software system that is designed to support machine to machine interoperable interaction of systems over a network. Web services provide a framework for system integration without depending on programming language and operating system. It is widely deployed in current distributed systems and has become the...

    Provided By Engg Journals Publications

  • White Papers // Jul 2014

    A Comprehensive Review and Analysis on Object-Oriented Software Metrics in Software Measurement

    The software development is dynamic and is always undergoing major changes. Today a huge number of tools and methodologies are available for software development and software development refers to all activities that go into producing information system solution. System development activities consist of system analysis, modeling, design, implementation, testing and...

    Provided By Engg Journals Publications

  • White Papers // Aug 2014

    A Secured and Improved Dynamic ID Based Remote User Authentication Scheme Using Smart Card and Hash Function for Distributed Systems

    Authentication is a major concern for accessing remote service residing over on server in distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws encountered in many remote user authentication schemes in multi-server environment, only authentic user login to the remote...

    Provided By Engg Journals Publications

  • White Papers // Jul 2014

    Justified Cross-Site Scripting Attacks Prevention from Client-Side

    Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at a frightening rate. Web apps frequently make JavaScript code utilization that is entrenched into web pages to defend client-side behavior which is dynamic. This...

    Provided By Engg Journals Publications

  • White Papers // Mar 2014

    An Ontology Framework For Context-Based Multilingual Document Retrieval

    In this paper the authors aim to present a multilingual ontology model for retrieving documents. This technique is based on context based multilingual translation. Though English is a common language in the world, at times there are situations where there is no chance in rural and remote places. For each...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Framework for User Authenticity and Access Control Security over a Cloud

    Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. Considering the user access control part, in recent years many...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Mining Recurrent Pattern Identification on Large Database

    Recurrent pattern mining is an important problem in the context of data mining. In this paper data mining algorithms have been discussed and compared. Recurrent pattern mining has been an important area in data mining research and it is the first step in the analysis of data rising in a...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    User Interest Level Based Preprocessing Algorithms Using Web Usage Mining

    Web logs take an important role to know about user behavior. Several pattern mining techniques were developed to understand the user behavior. A specific kind of preprocessing technique improves the quality and accuracy of the pattern mining algorithms. The existing algorithms have done the preprocessing activities for reducing the size...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Efficient Mining of Weighted Quantitative Association Rules and Characterization of Frequent Itemsets

    In recent years, a number of association rule mining algorithms were developed. In these algorithms, two important measures viz., support count and confidence were used to generate the frequent itemsets and the corresponding association rules in a market basket database. But in reality, these two measures are not sufficient for...

    Provided By Engg Journals Publications

  • White Papers // Jan 2013

    Iris Pattern Segmentation using Automatic Segmentation and Window Technique

    A biometric system is an automatic identification of an individual based on a unique feature or characteristic. Iris recognition has great advantage such as variability, stability and security. In this paper, use the two methods for iris segmentation -An automatic segmentation method and window method. Window method is a novel...

    Provided By Engg Journals Publications

  • White Papers // Apr 2013

    Log Mining Based on Hadoop's Map and Reduce Technique

    In the world of cloud and grid computing Virtual DataBase Technology (VDB) is one of the effective solutions for integration of data from heterogeneous sources. Hadoop is a large-scale distributed batch processing infrastructure and also designed to efficiently distribute large amounts of work across a set of machines. Hadoop is...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Cryptanalysis of Vigenere Cipher Using Particle Swarm Optimization With Markov Chain Random Walk

    Vigenere cipher is a polyalphabetic substitution cipher with a very large key space. In this paper, the authors have investigated the use of PSO for the cryptanalysis of vigenere cipher and proposed PSO with Markov chain random walk in which some of the worst particles are replaced with new better...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Hierarchical Classification of Web Content Using Naive Bayes Approach

    In this paper, the authors explore the use of hierarchical structure to classify a heterogeneous collection of web pages. In the hierarchical classification, a model learns to distinguish a second level category from all other categories that are within the same top level. In the flat non hierarchical classification, a...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Assessment of Fraud Pretentious Business Region Research Articles Using Data Mining Approaches

    In any organization, fraud detection and prevention is daunting task because millions of dollars lost with the different nature of fraudulent activities. Organizations got to engage intelligent and innovative techniques to detect fraud at the earliest opportunity to protect business and their shareholders, customers and employees. This paper surveyed different...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Web Page Segmentation for Small Screen Devices Using Tag Path Clustering Approach

    The web pages breathing these days are developed to be displayed on a desktop PCs and so viewing them on mobile web browsers is extremely tough. Since mobile devices have restricted resources, small screen device users need to scroll down and across the complicated sites persistently. To address the problem...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Mining Weighted Association Rule Using FP - Tree

    The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same significance without assigning their weight within a transaction or record. This paper proposed method gives importance for the...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    A Novel Biometric System for Person Recognition Using Palm Vein Images

    The palm vein is one of the most reliable physiological characteristics that can be used to distinguish between individuals. In recent years, it receives more attention from the researchers. In this paper, the authors present a new approach for the personal identification using palm vein images. This paper attempts to...

    Provided By Engg Journals Publications

  • White Papers // Jun 2013

    Performance of Machine Learning Methods for Classification Tasks

    Machine learning is the subfield of artificial intelligence that is concerned with the design and development of algorithms that allow computers to improve their performance over time based on data, such as from sensor data or databases. In this paper, the performance of various machine learning methods on pattern classification...

    Provided By Engg Journals Publications

  • White Papers // Jun 2013

    Signature Verification

    In this paper, the authors present an off-line signature verification and recognition system based on a combination of features extracted such as blob features, average of radon transform, fusion of grid and global features using average and clustering technique. The system is trained using a database of signatures. For each...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Study and Constructing RDF Model for a Well Formatted Valid XML Document

    In recent years, semantic web is one of the technologies to make the WWW as machine understandable. The Resource Description Framework (RDF) proposed by W3C is used for describing metadata about (web) resources. The RDF data model can be represented as entity-relationship or class diagrams, as it are based upon...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Fingerprint Verification System Using Support Vector Machine

    Efficient fingerprint verification system is needed in many places for personal identification to access physical facilities, information etc. This paper proposes robust verification system based on features extracted from human fingerprints and a pattern classifier called Support Vector Machine (SVM). Three set of features are fused together and passed to...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Ternary Hierarchical Clustering with Data De-Duplication in Sensor Networks

    Wireless Sensor Network (WSN) is resource constrained application specific ad-hoc networks. All the previous works have concentrated on the power aware techniques such as data aggregation, coordination of node operations for effective routes and query processing etc. All these techniques have helped to collect and communicate the field data of...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Approaches for Managing and Analyzing Unstructured Data

    Large volumes of data that will be stored and accessed in future are unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value from this unstructured data which balances the budget is the most challenging task. Archives...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    An Analysis and Knowledge Representation System to Attain the Genuine Web User Usage Behavior

    With the explosive growth of WWW, the web mining techniques are densely concentrated to discover the relevant behaviors of the web user from the web log data. In fact the pattern discovery techniques generate many hundreds, often thousands, of patterns, that are unwanted, unexpected, disputable and unbelievable in nature. The...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Web Miner: A Tool for Discovery of Usage Patterns From Web Data

    As there is a huge amount of data available online, the World Wide Web (WWW) is a fertile area for data mining research. In recent years a various surveys have been performed on static data of web sites to perform web usage mining. This paper deals with the Web usage...

    Provided By Engg Journals Publications

  • White Papers // Jun 2013

    New Design of Crypto-Based Pseudo Random Number Generator (CBPRNG) Using BLOW FISH Cipher

    Random Number Generators (RNGs) are an important building block for algorithms and protocols in cryptography. Random number generation is used in a wide variety of cryptographic operations, such as key generation and challenge/response protocols. A random number generator outputs a sequence of 0s and 1s such that at any position,...

    Provided By Engg Journals Publications

  • White Papers // Jun 2013

    PDPKDES (Pre Distributed Powerful Key for Data Encryption Standard)

    Data Encryption Standard (DES) in spite of being a great algorithm in terms of a good combination of confusion and diffusion steps, doesn't largely used because of a weak key concept. The key used in DES is only 64 bits (or 56 bits) long. This paper introduces a concept of...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Private and Secure Hyperlink Navigability Assessment in Web Mining Information System

    Information explosion in World Wide Web (WWW) has increased the interest in web usage mining techniques in both commercial and academic areas. Study of interested web users; provide valuable information for web designers to quickly respond to their individual needs and for the efficient organization of the website. Among the...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Combining K-Harmonic Mean and Hierarchical Algorithms for Robust and Efficient Data Clustering With Cohesion Self-Merging

    A cluster is a collection of data objects that are similar to one another within the cluster and are dissimilar to the objects in the other cluster. Data clustering is studied in statistical, machine learning and data mining. The dissimilarity between two clusters is defined as the distance between their...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Improving the Performance of K-Means Clustering For High Dimensional Data Set

    Clustering high dimensional data is the cluster analysis of data with anywhere from a few dozen to many thousands of dimensions. Multiple dimensions are hard to think in, impossible to visualize, and, due to the exponential growth of the number of possible values with each dimension, impossible to enumerate. Hence...

    Provided By Engg Journals Publications