IDOSI

Displaying 1-40 of 89 results

  • White Papers // Mar 2015

    Implementation of Novel Ultra-Low Power and High-Speed 1-Bit Full Adder Cell

    In this paper, the authors present a novel ultra-low power and high speed 1-bit full-adder, which is designed only based on pass transistor logic. The main advantages of this design are very low propagation delay and ultra-low consumption power, which lead to achieve lower PDP and EDP than that of...

    Provided By IDOSI

  • White Papers // Mar 2015

    Design a Weight Based Sorting Distortion Algorithm for Privacy Preserving Data Mining

    The security of the large database that contains certain crucial information, it will become a serious issue when sharing data to the network against unauthorized access. Privacy preserving data mining is a new research trend in privacy data for data mining and statistical database. Association analysis is a powerful tool...

    Provided By IDOSI

  • White Papers // Mar 2015

    Efficient Floating Point Multiplier Implementation via Carry Save Multiplier

    The demand for floating point multiplication is increasing day-by-day since it supports wide range of multimedia applications. So floating point multiplication becomes essential in the domain of image processing, data extraction and digital signal processing. In this proposed paper, a single precision floating point multiplier is designed. The design of...

    Provided By IDOSI

  • White Papers // Dec 2014

    Design of Twin Precision Multiplier with Low Power and Area Using Clock Pipelining

    Design of a twin precision multiplier with less consumption of space for gates is this paper. The existing system uses the twin precision multiplier as one n bit multiplier based on the length of the inputs. The drawback of this system is that it occupies the largest area of hardware....

    Provided By IDOSI

  • White Papers // Dec 2014

    Low Power Distributed Arithmetic Based FIR Filter

    Datapath architectures are the critical components in computational intense applications and their architectural changes leads to changes in VLSI design constraints like area, performance and power. And in this modern automated world, the power constraint has been the major requirement; hence an effort has been applied regarding the necessary. This...

    Provided By IDOSI

  • White Papers // Oct 2014

    Performance Analysis of Combinatorial Digital Circuit Evolution with Cluster Growth Technique

    An interesting approach of using genetic programming is to synthesize circuit with least possible number of logic gates and the same is presented in this paper. The Genetic Algorithm (GA) is one of the optimization techniques of evolutionary algorithm used to design evolvable hardware. This paper proposes the applicability of...

    Provided By IDOSI

  • White Papers // Sep 2014

    Influence of Social Networking on E-Business: A Quantitative Study

    Purchasing decisions are often strongly influenced by people who the consumers know and trusts. Moreover, many online shoppers tend to wait for the opinions of early adopters before making a purchase decision to reduce the risk of buying a new product. Web-based social communities, actively fostered by E-business firms, allow...

    Provided By IDOSI

  • White Papers // Sep 2014

    New Noise Tolerant Domino Logic Circuits

    In this paper, the authors propose four wide domino circuits to improve the robustness and reduce the power consumption. All proposed circuits use small potential at the source of the pull down network in the standby mode. Simulation is done using 90nm HSPICE for 32 input OR gate. Their proposed...

    Provided By IDOSI

  • White Papers // Sep 2014

    Two New Topologies for Low-Power Half-Adder in 180nm CMOS Technology

    In this paper, the authors present the design of two half-adder with ultra-optima design parameters. In the first idea, half-adder has low power consumption, low propagation delay and as a result, it has low PDP and EDP. The second design is based on multiplexer circuit. This half-adder in addition to...

    Provided By IDOSI

  • White Papers // Sep 2014

    Binovel Low-Power and High Performance Full-Adder Cell in 180nm CMOS Technology

    A novel low-power and high speed 1-bit full-adder is described which is designed based on pass transistor and Transmission Gate (TG) logic. The main advantage of this design is its inherent very low propagation delay and low power consumption. The consequence of which leads to achieving lower Power Delay Product...

    Provided By IDOSI

  • White Papers // Sep 2014

    A Low-Power Reversible Full-Adder Using Novel 3x3 Reversible Gate

    Reversible computation has become an alluring concept in low power circuit design. The conventional computations generate more heat due to the effect of logic gates which are irreversible in nature. For low power consumption circuit must be designed with reversible logic gates that have both forward and backward deterministic. This...

    Provided By IDOSI

  • White Papers // Sep 2014

    Truncated Multipliers: A FPGA Realization

    In this paper, the author's present truncated multiplier hardware implementation in Xilinx Virtex-4 Field Programmable Gate Array (FPGA) devices includes XC4VLX60, XC4VLX80, XC4VLX100 and XC4VLX160 using very high speed integrated circuit Verilog Hardware Description Language (VHDL). The truncated multipliers are highly recommended for Digital Signal Processing (DSP) applications. A comparison...

    Provided By IDOSI

  • White Papers // Jul 2014

    Leakage Power Analysis of Dynamic Footed Circuits in 45nm CMOS Technologies

    Domino logic circuit has two sub categories, footed domino circuit and footless domino logic. Footed domino circuit consists of pre-charge transistor, footer transistor; Pull Down Network (PDN) and keeper transistor. In this paper, two new circuits are proposed and compared to the existing techniques for the leakage power reduction of...

    Provided By IDOSI

  • White Papers // Jul 2014

    Low Power Architecture for Reconfigurable FIR Filter for SDR

    PSM architecture synthesizes multiplier blocks with low hardware requirement suitable for implementation as part of full parallel Finite Impulse Response (FIR) filters is presented in this paper. FIR digital filters are widely used in DSP by the virtue of its stability, linear phase, fewer finite precision error and efficient implementation....

    Provided By IDOSI

  • White Papers // Jun 2014

    Direct Carry Array Multiplier: A New Approach to Lowpower and High Efficient Structure

    In this paper, the authors proposed a newly designed multiplier with low power consumption and high speed in processes based on a new structure. Due to increasing demand for integrated circuits with being higher in speed, lower in delays, higher in power efficiency as well as more compact in size,...

    Provided By IDOSI

  • White Papers // May 2014

    Factors of Customer Satisfaction and Loyalty in Industrial Marketing (B2B)

    In recent years, research on effective cognitive factors on customer satisfaction and loyalty has increased. In most cases, customer's loyalty is vital for the success of business organizations, usually because attracting new customers is more expensive than retaining existing ones and most of the researches performed by many authors are...

    Provided By IDOSI

  • White Papers // Mar 2014

    Remote Control System Using Embedded Linux and ARM 9

    Current wireless robot system is usually composed by a microcontroller system, bare microcontroller constrained by hardware characteristics; it is difficult to satisfy many complex controls while ensuring system real-time. View of this, the paper based ARM9-structured processor and embedded Linux system, optimized and improvement the versatility and real-time capacity of...

    Provided By IDOSI

  • White Papers // Feb 2014

    E Logistics for Warehouse Management

    To gain a competitive advantage over increasing competition, organizations must constantly adapt to customer demand, vendor compliance initiatives and multi-channel issues. A synchronized warehouse process can maximize the organization's facility while improving workforce performance and facility management. When was the last time there was an objective and a strategic approach/look...

    Provided By IDOSI

  • White Papers // Feb 2014

    Advanced Internet Access System Using Embedded Linux

    With the development of internet and the coming of the post-PC era, the embedded systems is becoming the center of interest in the current IT industry and exhibiting broad potential market. In the meantime, the access of embedded systems into the internet has become an important direction of the present...

    Provided By IDOSI

  • White Papers // Feb 2014

    Optimization Techniques for Low Power VLSI Circuits

    Sources of power dissipation in CMOS devices depend on the following terms. The first term represents the power required to charge and discharge circuit nodes. Power dissipation has emerged as an important design parameter in the design of microelectronic circuits, especially in portable computing and personal communication applications. In this...

    Provided By IDOSI

  • White Papers // Feb 2014

    An Evolution of Forensic Data Analysis and Methodologies

    Every day huge amount of data is generated from various sources. For the past few years, the amount of data that an organization uses and stores has been increasing rapidly. Big data is the mixture of any type of data. This paper seeks to provide basic information regarding the evolution...

    Provided By IDOSI

  • White Papers // Feb 2014

    Data-Acquisition System Using Embedded Linux

    In this paper, the authors present the principles of a low-operational-cost but flexible Internet-based data-acquisition system. The main core of the system is an embedded hardware running a scaled-down version of Linux: a popular choice of operating system for embedded applications. The embedded device communicates through General Packet Radio Service...

    Provided By IDOSI

  • White Papers // Feb 2014

    A New Method for Data Mining in Multimedia Environment

    Most of the existing frequent item sets mining techniques are based up on multimedia data mining. In this paper, the authors propose a novel approach for frequent item sets mining using color, texture and shape. Frequent item set is an item set that satisfies minimum support. The data bases tested...

    Provided By IDOSI

  • White Papers // Feb 2014

    Mining the Financial Multi-Relationship with Accurate Models

    In order to overcome the difficulty in mining the large-scale multi-relationship system, a classification method or algorithm is proposed. The development of data mining applications such as classification or clustering has shown the need for machine learning algorithms to be applied to large scale data. In this paper, the authors...

    Provided By IDOSI

  • White Papers // Feb 2014

    Design of High Performance L1 Cache of 32-Bit RISC Processor

    In this paper, the authors describe the architecture and design of a 64KB L1 data cache and a 64KB L1 instruction cache of a 32-bit RISC processor for a direct mapped organization. Both caches are organized optimally so that words can be retrieved within the minimum number of clock cycles....

    Provided By IDOSI

  • White Papers // Feb 2014

    Hiding Sensitive Association Rules

    In data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions (for example, collections of items bought by customers). The store owner might want to discover which of these items customers are likely to buy together. This can be used...

    Provided By IDOSI

  • White Papers // Dec 2013

    Hardware Reusable FPGA Design

    The authors discuss a fault tolerant technique for Field Programmable Gate Arrays (FPGAs) called as hardware reusable when working in real time environment when the system is subjected to external attacks namely transient attacks. The proposed design, hardware reusable architecture makes its own components to overcome the faulty ones thus...

    Provided By IDOSI

  • White Papers // Dec 2013

    A Study on the Challenges and Prospects of PCM Based Main Memory Architectures

    For several decades, computer's memory has been volatile. High speed memories such as DRAM and SRAM have been used as main memory and cache memory respectively. Magnetic disks are used as the persistent secondary storage devices. The present DRAM based main memory has reached its energy limits. Due to the...

    Provided By IDOSI

  • White Papers // Dec 2013

    Impact of Customer Relationship Management on Customer Satisfaction

    Today one of the approaches which are creating drone in banking sector is customer relationship management. Relationships have different types and have different meanings. Among different relationships existing in this word, there is a very influencing relationship between customer relationship management and customer satisfaction. This paper is carried out on...

    Provided By IDOSI

  • White Papers // Nov 2013

    The Principle of Recovery Logic FPGA for Critical Applications by Adapting to Failures of Logic Elements

    In this paper, the authors propose the restoration of the logic of programmable logic integrated circuits such as FPGA (Field-Programmable Gate Array) for critical applications by adapting to failures of logic elements. The principle of adaptation FPGA is to switch to the residual functionality of the LUT (Look-Up Table), with...

    Provided By IDOSI

  • White Papers // Nov 2013

    Protecting from Zero-Day Malware Attacks

    The menace of malware is becoming more harmful and ominous for the enterprises as well as the home users. The malware attacks usually cause users to render their critical data in the hands of nefarious persons. Shielding against the malware attacks seems a challenging job for IT administrators. The common...

    Provided By IDOSI

  • White Papers // Nov 2013

    The Effect of Human Resource Management Practices on Organization's Performance

    In this paper, the authors check the effect of HRM practices (staffing practices, incentive practices and training programs) on the organization's performance. Quantitative study was conducted in banking sector of Pakistan. A sample of 150 bankers, from different banks of Sahiwal, was selected and surveyed through questionnaires with a response...

    Provided By IDOSI

  • White Papers // Oct 2013

    Customer Relationship Management by Semi-Supervised Learning

    With the increase of customer information and the rapid change of customer requirements, the need for automated intelligent systems is becoming more vital. An automated system reduces human intervention, improves the quality of information extracted and provides fast feedback for decision making purposes. This paper investigates the use of a...

    Provided By IDOSI

  • White Papers // Oct 2013

    The Relationship of E-CRM, Customer Satisfaction and Customer Loyalty. the Moderating Role of Anxiety

    The rationale behind conducting this study is to evaluate the impact of E-CRM (used by customer relationship officer and web portal) on customer satisfaction that further helps in building customer loyalty. Moreover anxiety is taken as a moderating variable that moderates the relationship between E-CRM and customer satisfaction. For this...

    Provided By IDOSI

  • White Papers // Oct 2013

    Ensuring the Security of Critically Important Objects and Trends in the Development of Information Technology

    In this paper, the authors examine specific vectors in the development of the IT sphere in the context of the security of the information-technological infrastructure of critically important objects. In the context of prospects for the development of the IT industry (inclusive of social networks and social development, staffing and...

    Provided By IDOSI

  • White Papers // Oct 2013

    Denial of Service in Components of Information Telecommunication Systems Through the Example of \"Network Storm\" Attacks

    The paper is dedicated to the study of \"Network storm\" attacks aimed at disrupting the availability of information and information resources. The author has examined scenarios and models for \"Network storm\" attacks, which exploit the vulnerability of the hardware and information technology of attacked components of Information Tele-Communication Systems (ITCS)....

    Provided By IDOSI

  • White Papers // Sep 2013

    Prognostic Load Balancing Strategy for Latency Reduction in Mobile Cloud Computing

    In Mobile Cloud Computing (MCC), load balancing is essential to distribute the local workload evenly across all the nodes either statically or dynamically. A high level of user satisfaction and resource utilization ratio can be achieved by ensuring an efficient and fair allocation of all computing resources. In the absence...

    Provided By IDOSI

  • White Papers // Aug 2013

    Inbound Logistics Data Transaction System Modeling in SME: Transition From BPM to Data Modeling

    In this paper, the authors focus on capturing all process-based data transaction system for the highest level of abstraction in inbound logistics activities in SME environment. As a business process modelling tool objective to provide better understanding and analytical view of the system, Data Flow Diagrams (DFD) are chosen due...

    Provided By IDOSI

  • White Papers // Aug 2013

    Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

    Mobile Ad-hoc NETwork (MANET) is a self organized and self configurable network where the mobile nodes move arbitrarily. For faster data transmission, the authors need a routing protocol that adapts to topology changes. Secure data transmission is the main issue in MANET. The enhancement in the secure data transmission in...

    Provided By IDOSI

  • White Papers // Aug 2013

    Customer Relationship Management Approach for MyFamily System: A Framework

    CRM is an approach that is widely utilized by companies to increase the customer values and normally, it is adopted by business-oriented companies. There are various studies on the CRM which focused on developing customer-centric systems and strategies. Besides the business-oriented system, there is a need to develop a social-oriented...

    Provided By IDOSI

  • White Papers // Dec 2009

    Multi-Dimensional Poisson Distribution Heuristic for Maximum Lifetime Routing in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) have gained a lot of attention in both public and research communities. One issue in wireless sensor networks is achieving efficient operation because of the limited available power. Many Heuristics were designed to enhance power reservoir of sensors and maximize their life time. Online Maximum Lifetime...

    Provided By IDOSI

  • White Papers // Oct 2009

    Proposing a Dynamic Routing Approach to Improve Performance of Iran Data Network

    In this paper, a logical three-layer design of Iran data network is presented using the hierarchical model. The results show that by applying the static routing approach to Iran data network, the topology of the network is changed when parameters of the initial configuration vary. In other words, using the...

    Provided By IDOSI

  • White Papers // Apr 2011

    A New Algorithm Fault Management by Clustered in Wireless Sensor Network

    Some WSN by a lot of immobile node and with the limited energy and without further charge of energy. Whereas extension of many sensor nodes and their operation. Hence, it is normal unactive nodes miss their communication in network, hence split the network. For avoidance split of network, the authors...

    Provided By IDOSI

  • White Papers // Apr 2013

    Multi-Path Routing Based on Network Coding in Wireless Sensor Networks

    Multi-path routing is an important technique for reliable data forwarding in prone to failure Wireless Sensor networks (WSNs), which it leads to consume more energy. In this paper, the authors propose a new routing mechanism that combines multi-path Routing with Network Coding (NCR). This combination decreases the number of required...

    Provided By IDOSI

  • White Papers // Apr 2013

    Enhancing Energy Efficiency in Wireless Sensor Networks Via Improving Elliptic Curve Digital Signature Algorithm

    The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It is used in wireless sensor networks in order to establish security and allow legitimate users to join in the network and disseminate messages into the networks. The ECDSA needs an addition...

    Provided By IDOSI

  • White Papers // Sep 2011

    Improving Performance of on Demand Multicast Routing Protocol by Fuzzy Logic

    A Mobile ad hoc network is a collection of wireless communication nodes that dynamically organize themselves to form a network without the need for any fixed infrastructure or centralized administration. Multicasting can be considered as an efficient way to deliver information from source nodes to several client nodes. Although multicast...

    Provided By IDOSI

  • White Papers // Sep 2011

    Location Based Dynamic Probabilistic Broadcasting for MANETs

    Broadcasting has a central importance to Mobile Ad hoc NETworks (MANETs) wherein it is frequently executed for the route discovery, address resolution, the application of paging a host and many other network services. Use of simple flooding, for broadcasts, causes redundant rebroadcasts and contention and collision issues that may lead...

    Provided By IDOSI

  • White Papers // Oct 2011

    Network Intrusion Detection With Wiener Filter-Based Agent

    Over the years, network attacks have evolved into more complex and sophisticated methods for network intrusion. As network domains become bigger in terms of size, the number of external users increases and thus the systems become more open and subject to security threats. Thus, the intrusion detection system was introduced...

    Provided By IDOSI

  • White Papers // Oct 2011

    Change Detection Methods for Computer Network Problems

    In previous research, the detection of network problems was performed using an appropriate subset of Management Information Base (MIB) variables. The changes in the behavior of the MIB variables were detected using different change detection algorithms; this change gives a clear image about any problem that might occur in the...

    Provided By IDOSI

  • White Papers // Oct 2011

    Discovery of Multiple Mobile Gateways in Wireless Mesh Networks

    In this paper, the authors propose an efficient discovery mechanism to select the best mobile gateway in Wireless Mesh Networks (WMN's). Their proposed scheme is based on mobile gateway learning mechanism, in which mobile gateways allow routers to discover them efficiently with minimal packet loss and packet delay. Simulation results...

    Provided By IDOSI

  • White Papers // Feb 2013

    An Efficient Hybrid Evolutionary Algorithm for Cluster Analysis

    Clustering problems appear in a wide range of unsupervised classification applications such as pattern recognition, vector quantization, data mining and knowledge discovery. The k-means algorithm is one of the most widely used clustering techniques. Unfortunately, k-means is extremely sensitive to the initial choice of centers and a poor choice of...

    Provided By IDOSI

  • White Papers // Jul 2013

    Enterprise Intellectual Capital Management by Social Learning Environment Implementation

    The developed method for the corporate intellectual capital management through the introduction of distributed learning environment differs from existing methods because it implements the integration processes of corporate intellectual capital accumulation and professional staff adaptation. For effective functioning of the company a huge amount of knowledge is needed, which is...

    Provided By IDOSI

  • White Papers // Jul 2013

    DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing

    DDoS attacks on the World Wide Web (WWW) in broad-spectrum and predominantly in modern cloud computing has become a noticeable issue for researchers in academia and industry related to the field of computer sciences. DDoS attacks are cool to provoke but their uncovering is a very challenging and dingy task...

    Provided By IDOSI

  • White Papers // Feb 2013

    Designing a Framework for Convergent Information Security Management among Federated Organizations

    According to the developments in the businesses, organizations are dependent to information technology more than ever. Such dependency is followed by its own information security risk. On the other hand, the dependency of such organizations with information is also followed with the increase in information exchanges and electronic interactions. Specialists...

    Provided By IDOSI

  • White Papers // Jun 2013

    RFID System: Design Parameters and Security Issues

    Radio Frequency IDentification (RFID) is a technology that automatically identifies the objects in its vicinity by incorporating readers, tags and backend servers all together, forming a system that has been proved to be a versatile system having applications in many areas, a lot has been revealed and rest is yet...

    Provided By IDOSI

  • White Papers // Oct 2013

    Ensuring the Security of Critically Important Objects and Trends in the Development of Information Technology

    In this paper, the authors examine specific vectors in the development of the IT sphere in the context of the security of the information-technological infrastructure of critically important objects. In the context of prospects for the development of the IT industry (inclusive of social networks and social development, staffing and...

    Provided By IDOSI

  • White Papers // Aug 2013

    Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

    Mobile Ad-hoc NETwork (MANET) is a self organized and self configurable network where the mobile nodes move arbitrarily. For faster data transmission, the authors need a routing protocol that adapts to topology changes. Secure data transmission is the main issue in MANET. The enhancement in the secure data transmission in...

    Provided By IDOSI

  • White Papers // Feb 2013

    Specification, Analysis and Resolution of Anomalies in Firewall Security Policies

    Firewalls are essential components in network security solutions. Managers have to specify their organizational security policies using low level and order-dependent rules in firewalls. Furthermore, dependency of firewalls to the network topology, frequent changes in network topology and lack of an automatic method for analysis and verification of anomalies in...

    Provided By IDOSI

  • White Papers // Feb 2013

    SHSDAP: Secure Hierarchical Service Discovery and Advertisement Protocol in Cluster Based Mobile Ad hoc Network

    Mobile Ad-hoc NETworks (MANETs) have many potential applications in various fields such as military services, collaborative and distributed computing, emergency operations, wireless sensor networks and hybrid wireless networks. Dynamic Service Discovery and Advertisement (SDA) have also brought significant issues to the networking technologies. Since most protocols in mobile ad-hoc network...

    Provided By IDOSI

  • White Papers // Feb 2013

    A New Secure Mutual User Identification Scheme Based on ID-Based Cryptosystem

    Most of identification schemes based on identity that discussed up to now are performed in one direction. In these schemes only one side of communicational parties can introduce itself to observe but other side could not be sure that other user is legitimate or not. Therefore, one of the authors'...

    Provided By IDOSI

  • White Papers // Feb 2013

    Crime of the Millennium: Cyber Crime

    The 21st century appeared to be a century of possibilities and opportunities with the introduction of the advanced information technologies for both legal and illegal activities. Credit card fraud, as the fastest growing crime of the new millennium, puts a great burden on the economy affecting both customers and financial...

    Provided By IDOSI

  • White Papers // Mar 2013

    Cryptanalysis of Transposition Ciphers with Long Key Lengths Using an Improved Genetic Algorithm

    In today's world, with increasing usage of computer networks and internet, the importance of network, computer and information security is obvious. One of the widely used approaches for information security is cryptography. Cryptanalysis is a way to break cryptography without having the encryption key. This paper presents an approach to...

    Provided By IDOSI

  • White Papers // Jun 2013

    An Artificial Intelligence Based X-AODV Routing Protocol for MANET

    In wireless network environment all nodes behave in multi-hope paradigm, in which every node contains information about the link and connectivity in infrastructure-less manner. If any node moves from its original place to another with or without prescribed manner it called mobile network MANET. To maintain the updated information about...

    Provided By IDOSI

  • White Papers // Feb 2013

    Modeling and Simulation Firewall Using Colored Petri Net

    Data communications networks have become an Furthermore, synchronous and asynchronous events infrastructure resource for businesses corporations, present their prioritized relations and structural government agencies and academic institutions. In this paper, the methodology of firewalled LAN models construction in the form of colored petri net is introduced and model the ACL...

    Provided By IDOSI

  • White Papers // Sep 2013

    Prognostic Load Balancing Strategy for Latency Reduction in Mobile Cloud Computing

    In Mobile Cloud Computing (MCC), load balancing is essential to distribute the local workload evenly across all the nodes either statically or dynamically. A high level of user satisfaction and resource utilization ratio can be achieved by ensuring an efficient and fair allocation of all computing resources. In the absence...

    Provided By IDOSI

  • White Papers // Jul 2013

    A Virtualized Information Indexing and Filtering Method for Web Contents Reside on Remotely Communicated Networks

    The utilization of clouds in accessing of remote resources has evolved tremendous advantages like parallel execution, virtualization and supremacy of processing. Rather to filter queried information through single remote server is many times better to process it from a centralized cloud. Present architecture of information indexing and filtering mechanism is...

    Provided By IDOSI

  • White Papers // Feb 2013

    Data Mining on Structure-Activity/Property Relationships Models

    Molecular descriptors family on structure-activity/property relationships studies were carried out in order to identify the link between compounds structure and their activity/property. A number of fifty-five classes of properties or activities of different compounds sets were investigated. Single and multi-varied linear regression models using molecular descriptors as variables were identified....

    Provided By IDOSI

  • White Papers // Oct 2013

    Denial of Service in Components of Information Telecommunication Systems Through the Example of \"Network Storm\" Attacks

    The paper is dedicated to the study of \"Network storm\" attacks aimed at disrupting the availability of information and information resources. The author has examined scenarios and models for \"Network storm\" attacks, which exploit the vulnerability of the hardware and information technology of attacked components of Information Tele-Communication Systems (ITCS)....

    Provided By IDOSI

  • White Papers // Aug 2013

    Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery

    Monitoring Internet topology was a tractable problem. Topology discovery systems are starting to be introduced in the form of easily and widely deployed software. Unfortunately, they have a problem of how to perform such measurements efficiently and in a network-friendly manner. When scaled up, such methods will generate so much...

    Provided By IDOSI

  • White Papers // Feb 2013

    Misuse Detection Using Hybrid of Association Rule Mining and Connectionist Modeling

    With the growing of computer networks, the number of attacks has grown extensively. Intrusion Detection System (IDS) is known as a critical technology to help protection. In this paper, a hybrid misuse-based IDS, using combined structure of an association rule mining algorithm and a connectionist model are presented. The key...

    Provided By IDOSI

  • White Papers // Feb 2013

    Fast Neural Intrusion Detection System Based on Hidden Weight Optimization Algorithm and Feature Selection

    Intrusion detection is known as an essential component to secure the systems in Information and Communication Technology (ICT). In this paper, two mechanisms are used to achieve a fast Intrusion Detection System (IDS): the training speed of neural attack classifier is improved by using Output Weight Optimization-Hidden Weight Optimization (OWO-HWO)...

    Provided By IDOSI

  • White Papers // Nov 2013

    Protecting from Zero-Day Malware Attacks

    The menace of malware is becoming more harmful and ominous for the enterprises as well as the home users. The malware attacks usually cause users to render their critical data in the hands of nefarious persons. Shielding against the malware attacks seems a challenging job for IT administrators. The common...

    Provided By IDOSI

  • White Papers // Feb 2013

    A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication

    Passwords play an important role in daily life in various computing applications like ATM machines, internet services, windows login, authentication in mobiles etc. The major aim for using passwords is to restrict unauthorized users to access the system. Passwords are necessary but, still they are not considered much safe to...

    Provided By IDOSI

  • White Papers // Feb 2013

    A New Symmetric-Key Block Ciphering Algorithm

    Strong cryptographic algorithms have been used for securing data communication. It is considered as one of the best tools to help people to protect their sensitive information from cryptanalysts when it is stored or transmitted via insecure communication channels. In this paper, the authors present a novel symmetric-key block ciphering...

    Provided By IDOSI

  • White Papers // Nov 2013

    The Principle of Recovery Logic FPGA for Critical Applications by Adapting to Failures of Logic Elements

    In this paper, the authors propose the restoration of the logic of programmable logic integrated circuits such as FPGA (Field-Programmable Gate Array) for critical applications by adapting to failures of logic elements. The principle of adaptation FPGA is to switch to the residual functionality of the LUT (Look-Up Table), with...

    Provided By IDOSI

  • White Papers // Dec 2013

    Hardware Reusable FPGA Design

    The authors discuss a fault tolerant technique for Field Programmable Gate Arrays (FPGAs) called as hardware reusable when working in real time environment when the system is subjected to external attacks namely transient attacks. The proposed design, hardware reusable architecture makes its own components to overcome the faulty ones thus...

    Provided By IDOSI

  • White Papers // Feb 2008

    Digital Rights Management Using RFID in an e-Commerce Environment

    In this paper, the authors introduce a framework of digital rights management based on RFID (Radio Frequency IDentification), which is an automatic identification technology that can be used to provide electronic identity to an item/object and fingerprinting to protect digital content that is integrated into IOTP (Internet Open Trading Protocol),...

    Provided By IDOSI

  • White Papers // Sep 2014

    Influence of Social Networking on E-Business: A Quantitative Study

    Purchasing decisions are often strongly influenced by people who the consumers know and trusts. Moreover, many online shoppers tend to wait for the opinions of early adopters before making a purchase decision to reduce the risk of buying a new product. Web-based social communities, actively fostered by E-business firms, allow...

    Provided By IDOSI

  • White Papers // Jul 2013

    A Hybrid Privacy Preserving Approach in Data Mining

    Data mining algorithms extracts the unknown interesting patterns from large collection of data set. Some clandestine or secret information may be exposed as part of the data mining process. In this paper, the authors put forward a hybrid approach for achieving privacy during the mining procedure. The first step is...

    Provided By IDOSI

  • White Papers // Feb 2014

    A New Method for Data Mining in Multimedia Environment

    Most of the existing frequent item sets mining techniques are based up on multimedia data mining. In this paper, the authors propose a novel approach for frequent item sets mining using color, texture and shape. Frequent item set is an item set that satisfies minimum support. The data bases tested...

    Provided By IDOSI