International Association of Scientific Innovation and Research (IASIR)

Displaying 1-40 of 158 results

  • White Papers // Nov 2014

    An Extensive Analysis on Task Scheduling Algorithms in Cloud Environments

    Task scheduling is one the most essential study in cloud environments. It is the responsibility of cloud scheduler to arrange jobs in such a way to improve the Quality of Service (QoS) offered with respect to Service Level Agreement (SLA). This paper presents a review of research literatures in the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Topology Control and Multi-Hop Routing Technique In Wireless Sensor Networks [WSNs]

    A Wireless Sensor Networks [WSNs] composed of nodes, each node communicate through communication links, which can be wireless or cabled. The sensor node in Wireless Sensor Networks [WSNs] helps to detect the physical or environmental conditions of the surrounding. The data transmissions between two or more sensor networks are carried...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Routing Mechanism for a DTN using WSN Nodes

    Recently proposed Delay Tolerant Networking (DTN) architecture aims at supporting efficient message-based communication over intermittent networks. Delay Tolerant Networks (DTNs) are generally characterized by long and variable delays due to intermittent connectivity. This lack of connectivity makes most of the existing routing protocols in WSNs not applicable in DTNs (the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Power Consumption Analysis of Wireless Sensor Networks with Different Modulation and Routing Techniques

    The sensors are used to sense and convert the one physical quantity to another quantity and when these sensors are attached with processing devices and connecting through a network, it becomes as a wireless sensor network technology. The sensor network is the combination of sensor nodes and all the sensor...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Neural Networks Based Pattern Recognition Using Perceptron Model

    A neural network is a processing device, in which its design is inspired by the design and functioning of human brain and their components. There is no idle memory containing data and programmed, but each neuron is programmed and continuously active. This paper is to present identification and recognition of...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Impact of Various Concatenated Channel Coding Scheme on Performance Assessment of a MIMO OFDM System

    In this paper, the authors made a comprehensive BER performance simulative study on synthetically generated data transmission in a MIMO-OFDM wireless communication system. The system under investigation implements various types of modern and classical channel coding schemes in serially concatenated form such as Repeat and Accumulate (RA), Single Parity Check...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Mobility Based Energy Utilization in Wireless Sensor Network

    Energy efficient and mobility information is a key problem in wireless sensor networks. Save more energy in network processing such as mobility is a widely used technique. The large-scale deployment of wireless sensor networks and the need for mobility controlling and also necessitate to deploying the gateways among the network,...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Data Mining Classification Algorithms for Business Intelligence

    The most useful data mining techniques in business process is classification. Classification is a supervised machine learning procedure and an important issue in data mining. Decision trees are considered to be one of the most popular approaches for representing classifiers. In this paper, the classification task is used to predict...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Issues of Data Security and Privacy in Cloud Computing

    Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in the entire globe. Data security and privacy protection are the two main factors of user's concerns about the cloud technology....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    WIMAX: An Overview, Security Issues and Security Threats

    WiMAX stands for Worldwide interoperability for Microwave Access which is also known as IEEE 802.16 wireless metropolitan area network. It basically an alternative to wired technologies such as cable modems, DSL (Digital Subscriber Line), T1/E1 lines and provides broadband access over long distances. It has many advantages like high data...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    An Efficient RSA Based Technique for the Encryption and Decryption

    RSA cryptosystem is the most commonly used public key cryptosystem. It is the first public key cryptosystem. The strength of this cryptosystem is based on the larger key size. There are many algorithms and variants of RSA. But, it is steal a burning topic of research. Because the thrust to...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Comparison of Software Life Cycle Models

    Computer software continues to be the single most important technology on the world stage. Software engineering is the establishment and use of sound engineering principles in order to obtain economically software that is reliable and work efficiently on real machines. Software development organizations follow some process when developing a software...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    An Efficient AODV Routing Protocol Based on Dynamic Threshold Assignment for Local Repair in MANET

    Wireless communication between mobile users is becoming more popular than ever before. In this paper, the authors have implemented the process of error detection, repairing of errors and routing protocols implementation in MANET (Mobile Ad hoc NETwork) using dynamic threshold technique. MANET is very popular and efficient, easiest and secure...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Security in Mobile Ad-Hoc Network Using Novel Intrusion Detection System

    In this paper, the authors proposed on Security in mobile ad-hoc network using novel intrusion detection system mobile ad-hoc network is collection of temporary nodes, that are capable of dynamic forming temporary network, self organize, infrastructure less with nodes contains routing capability, In a Mobile Ad hoc NETwork (MANET) where...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Characterization of Vehicular Area Networks (VANETs) Routing

    Vehicular area network is having the criticality because of its public and dynamic nature. It combines the complexities of both the mobile network and sensor network. The associated challenges include the area limitation, scenario specification and routing constraints. In this paper, all the associated challenges to the vehicular ad hoc...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Towards Probabilistic Ontology based on Bayesian Networks

    The increase and diversification of information has created new user requirements. The problems of representation, processing, analysis and reasoning on the information, especially the uncertain information, are still an important research topic. The authors try to show in this paper how this issue is crucial. It is essential to propose...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Power Dissipation Analysis of Conventional CMOS and Adiabatic CMOS Circuits

    In recent years, low power circuit design has been an important issue in VLSI design areas. If the power consumption is less, then the amount of power dissipation is also less. Energy recovery adiabatic logic circuit is a low power design solution. Adiabatic circuits are those circuits which work on...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Improving Online Retail Effectiveness Through Business Intelligence

    Information technology can be used as an effective tool in managing problems related to the online retail business. In this paper, some of the common challenges retailers' face as well as technology solutions for the same have been discussed. Many small online retailers and new entrants to the online retail...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    An Innovative Approach: Image Encryption with Chaotic Maps using DNA Addition Operation

    Encryption technology is an important measure to ensure the security of digital image; this paper's main purpose is to research how to encrypt images by chaos. In this paper, five chaotic maps are compared and noise effects are observed on image. Firstly, the authors use the image encryption algorithm to...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Security Design Issues in Distributed Databases

    In the rapid growth of networking and information technology expands the business worldwide. As distributed database became more popular, the need for improvement in distributed database management system become even more important. Database provides inbuilt security to manage different levels of data but if the authors apply overall security from...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Comparison of Various Biometric Methods

    Biometrics is the process of automated recognition of individuals based on their behavioral and physiological characteristics. Biometrical authentication is the process of making sure that the person is who the user claims to be. Physiological biometric traits include face and retina structures, fingerprint (whorls minutia), hand geometry, iris (pattern), ear...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Dual Mechanism to Detect DDOS Attack

    Cloud computing has emerged as computing paradigm which shares resources and services with its customers. In its early days the people does not heard of the denial of service attack. But since 2000, a series of DDOS attacks by multiple nodes is accomplished of blocking the services of cloud servers....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Role of CRM in Business Sector

    Every business organization needs customers for sustainable and to maintain customer satisfaction with technology rich and information based society. CRM plays a very big role to treat all of this information. It is a customer-focused business strategy designed to optimize revenue, profitability, and customer loyalty. By implementing a CRM strategy,...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Test Pattern Generation Using LFSR with Reseeding Scheme for BIST Designs

    In this paper, the authors present LFSR reseeding scheme for BIST. A time-to-market efficient algorithm is introduced for selecting reseeding points in the test sequence. This algorithm targets complete fault coverage and minimization of the test length. Functional broadside tests that avoid over testing by ensuring that a circuit traverses...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Design of Adder Logic Cell with XOR Gate

    Adder logic cell is basically an important part of adder sub-system and is well known by the designers so many researchers are still working in this field for speeding up the circuit process along with power consumption. These cells are used in various application as DSP, microprocessors etc. In today's...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    A Study on Data Storing Mechanism in Data Warehouse for e-Commerce

    The data, which is widely used for ecommerce applications, in decision-making processes is stored in the XML format. Thus, as more organizations view the web as an integral part of their communication and business, the importance of integrating XML data in data warehousing environments is becoming increasingly high. In this...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Study and Challenges of Reckonable Offloading in Mobile Cloud Computing

    An alluring paradigm for mobile users to enjoy the computation power and service of a network is mobile cloud computing. A remote server is provided as cloud. As mobile resources have limited resources like memory, power, availability of network, so cloud concept is cooperative flair. The reckoning tasks that are...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Study of Indexing Techniques for Web Crawled Data

    Data collected from web are unclean, amorphous, formless and unstructured. In order to get the information from the collected data, it has to be cleaned, structured and indexed. There are different indexing techniques, each having its own advantages and disadvantages say for instance LSI is less complex but has scalability...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    An Improvement to the K-Means and K-MEDOID using D-M Clustering Approach

    Clustering is an effective data mining operation used to divide the available data set in small segments in which each segment contain similar data. The effectiveness of clustering algorithm can be measured in terms of similarity in the elements of same cluster and the difference with other cluster elements. Clustering...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Network Traffic Auditing and Assessment in Cloud Environment

    Cloud computing permits users to remotely store their information into the cloud and provides on-demand applications and services from a shared pool of configurable resources. The protection of the outsourced information within the cloud is dependent on the protection of the cloud computer system and network. Though, there are varied...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Study on Cluster Generation Process in Congested Sensor Network

    In case of sensor network the nodes loss some amount of energy after performing the communication. To improve the life of network an energy efficient communication approach is required. In case of multicast network an aggregative approach is used by LEACH protocol by creation of cluster of nodes. Now the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Integration of Big Data in Banking Sector to Speed up the Analytical

    In banking area, the authors find big data which is scattered in different places or sources in heterogeneous format using different databases or files. Hence, it is very difficult to analyze the data fastly for making Decision Support System (DSS). In this paper, they have developed a High Level Design...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    An Empirical Study of Extracting information for Business Intelligence

    Sentimental/opinion analysis is an emerging area of research in text mining. Sentimental analysis or opinion mining refers to identify and extract subjective information in source materials. As a response to the growing availability of informal opinionated texts like blog posts and product reviews, comments, forums which is collectively called as...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Comparative Review of Scheduling and Migration Approaches in Cloud Computing Environment

    Cloud computing is one of most essential and popular distributed environment that resides all the services and product at some centralized location. The task management is the key role in cloud computing systems task scheduling problems are main which relate to the efficiency of the whole cloud computing facilities. Scheduling...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    A Policy Driven Architecture for Effective Service Allocation in Cloud Environment

    A cloud environment provides the integration of multiple clients and server in a distributed environment. But in this environment the cloud servers are limited and there are number of cloud clients. To perform the effective cloud service allocation, some rule oriented model is required that can perform the analysis on...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Data Security in Cloud Environment Using Cryptography Algorithm

    In recent years, cloud computing is the new technical era and next generation architecture for IT as well as business industries and in which providing strong security to client data is the biggest issue for cloud service provider. Several cloud service provider gives the some short of secure services to...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    A Survey Report: Cloud Computing Establishment and Security Issues

    In this paper the authors propose the survey and concept of cloud computing establishment and security issues. Cloud computing is considered as one of the emerging arenas of computer science in recent times. It is providing excellent facilities to business entrepreneurs by flexible infrastructure. Although, cloud computing is facilitating the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    A Data Centric Privacy Preserved Mining Model for Business Intelligence Applications

    In present day competitive scenario, the techniques such as data warehouse and On-Line Analytical Process (OLAP) have become a very significant approach for decision support in data centric applications and industries. In fact the decision support mechanism puts certain moderately varied needs on database technology as compared to OLAP based...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Privacy Preservation Enriched MapReduce for Hadoop Based BigData Applications

    As per increase in the applications of various internet enabled services and cloud applications, the requirement of cloud infrastructure with enhanced facilities is increasing with very vast pace. Due to the increase in multiuser communication scenario on cloud infrastructure, the securities of datasets are also increasing drastically. Most of critical...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Ultra Low Power High Speed MAC Unit Using LP-HS Logic in CMOS Technologies

    A modified approach for constant delay logic style is developed in this paper, to provide improved power and delay named LP-HS logic. Constant delay logic style is examined against the LP-HS logic, by analysis through simulation. It is shown that the proposed LP-HS logic has low power, delay and power...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Cooperative Response Strategies for Large Scale Attack Mitigation

    In this paper, the authors focus on peer-to-peer control structures and investigate their efficacy in stopping large scale Internet worms. Under this type of control, all policies are decided upon locally within a single organization; no directives from external central authorities are considered. In their model, direct cooperation occurs only...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Detection and Prevention of Black hole Attack in MANET: A Review

    Mobile Ad hoc NETwork (MANET) consists of wireless mobile nodes without any pre existing infrastructure or centralized access point such as base station. MANET has dynamic topology which allows nodes to join and leave the network at any point of time. MANET is more vulnerable due to its characteristics such...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Performance Comparison of Machine Learning Algorithms on Integration of Clustering and Classification Techniques

    The abundance of data in business, research, industry, science and in many fields makes it very difficult to handle them. It is complicated to explore any valuable information, needed to take any important decision, but problem is how to discover this precious information. The effective solution may be data mining,...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    A Study of Load Balancing Issue Among Multifarious Issues of Cloud Computing Environment

    The people are all moving, adamantly and incrementally, in the direction of cloud computing today. Due to its simplicity, its services are so popular that they take place in their daily life too. Cloud computing integrates a range of different technologies that have developed through various computing techniques. Among multifarious...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Differentiating Network Attacks using C4.5 Algorithm with Multiboosting

    In most of the security system intrusion detection system is deployed to detect and possibly prevent the attacks. Data mining methods can be used in intrusion detection system. There are several data mining methods like classification tree algorithms (C4.5), Support vector machine and so on. For a detection system to...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Robust Biometric (Offline Handwritten Signature) Watermarking and Authentication Algorithm

    In this paper a block based robust watermarking technique using wavelet transform has been presented which exploits human visual model for adapting the watermark data to local properties of the host image. The watermark (offline handwritten signature) is embedded to the most significant coefficients at the high frequency bands of...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    A Compressed Tree-based Approach for Frequent Item Sets Mining from Uncertain Data

    Over the past decade, there have been many studies on mining frequent item sets from precise data in which the presence and absence of items in transactions was certainly known. In some applications, the presence and absence of items in transactions are uncertain. The existential probabilities of these items are...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Design and Implementation of an Algorithm for PCA Based Factor Analysis and Clustering Applied to Dermatology Data Set

    Data mining has become a fundamental methodology for computing applications in medical informatics. Medical data mining has great potential for exploring the hidden patterns in the data sets of the medical domain and these patterns can be utilized for clinical diagnosis. However, the available raw medical data are widely distributed,...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Decision Tree Classifier for Privacy Preservation

    In recent year's privacy preservation in data mining has become an important issue. A new class of data mining method called privacy preserving data mining algorithm has been developed. The aim of these algorithms is to protect the sensitive information in data while extracting knowledge from large amount of data....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Hierarchical Localization Tracking Scheme for Wireless Sensor Networks

    Using Wireless Sensor Networks (WSNs) to track a moving object provided a practical solution to a wide variety of applications including, for example, wild life, military operations, intruder tracking and monitoring in indoor office buildings. While much work has been done in this area, failures are not considered in most...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    An Analytical Approach on the Consequence of Cloud Computing for Logistics Management

    In this paper, the authors explained the theoretical background of articulating effective logistics information system in any industrial outfit. This is predicated on the fact that logistics is \"The process of strategically managing the acquisition, movement and storage of materials, parts and finished inventory (and the related information flows) through...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Designing of Method for Improving Synchronization Accuracy in Packet Networks

    This paper deals with the possibilities of improving the synchronization accuracy over packet networks. The first part is focused on the analysis and measurements of synchronization accuracy in the real packet network. Measurements were performed using the precision time protocol. The transmission parameters of a network were changed using a...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Performance Analysis of Classification of Data Using Structured Induction Decision Tree Algorithms

    Decision trees are one of the most popular data mining models. Decision trees are able to provide a set of rules which improves the user's understanding. Decision trees represent variables and variable values as trees, branches and leaves from which decision rules must be transformed. A decision tree classifier builds...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Analysis and Comparison of Advanced Face Detection Using PSO and PCA

    This paper is to provide an efficient method to find out the best algorithm in between PCA and PSO using different parameters that are used for face reorganization. Assessment for image quality is a traditional need. The conventional method for measuring quality of image is MSE & PSNR. In this...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Network Analysis Using GIS

    Network analysis helps in identifying optimum locations for services to be provided. In the present study, hospitals and road in part of Varanasi city area have been selected for network Analysis. Complicated networks of roads require analysis to improve the movement of people, goods, services and the flow of resources....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    A New Approach for Collaborative Spam Filtering

    In response to the growing volume and variety of spam, spam filters have moved away from monolithic repositories situated on central servers towards dynamic knowledge bases located on local servers. The state of the art in spam filtering sees content-based filters tending towards collaborative filters, whereby email is filtered at...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Combining the Goodness of Euler Number and Cumulative Sum to Achieve Higher Accuracy for Iris Recognition Systems

    Biometrics has dominated the areas of security for its ability to provide uniqueness, higher accuracy and minimum invasion instances. Using iris and its texture as a means of verification and validation evolved three decades ago and since then it has been one of the most reliable security methods with work...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Iris Recognition using Fractional Coefficients of Cosine, Walsh, Haar, Slant, Kekre Transforms and Wavelet Transforms

    The goal of Iris recognition is to recognize human identity through the textural characteristics of one's Iris muscular patterns. Iris recognition has been acknowledged as one of the most accurate biometric modalities because of its high recognition rate. Here performance comparison among various proposed techniques of Iris Recognition using the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    An Effective Web User Analysis and Clustering using FPCM Algorithm

    Internet is one of the users friendly to the world and also gives lot of information for every activity. Based on this there is huge amount of development in World Wide Web. There are varieties of issues connected with the existing web usage mining approaches. Applying data mining techniques to...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    NNA Algorithm to Prevent Blackhole Attack

    Mobile ad hoc network is a collection of nodes which are self configuring and connected by wireless links automatically. One of the principle routing protocol used is AODV protocol. The security of AODV protocol is compromised by a particular type of attack called \"Black hole attack\". In this paper, the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Path Segment Protection P-Cycle for Span Failure in Optical Networks

    The path-segment-protecting p-cycles (\"Flow p-cycles\" for short) have capacity efficiency near that of the Shared Backup Path-Protection (SBPP) scheme currently favoured for optical networking. In this paper a significant extension to the method of p-cycle is introduced for network protection. The Flow p-cycle is uses to protect path segments of...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    A Short Survey of Key Distribution Techniques for Namespace Load Balancing

    With the enormous growth of volume of data, Namespace distribution and replication are becoming a major challenge as Name-node server needs to coordinate with data nodes for its status, job execution and data blocks operations. Usage of Namespace will resolve the issue of name-node single point of failure and namespace...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    A Review on Finger Print Recognition Systems

    Fingerprints have been used as a mean of personal identification over a century. Fingerprints have been an invaluable tool for law enforcement and forensics for over a century, motivating research into automated fingerprint-based identification in the early 1960s common and reliable biometric for automatic personal identification is fingerprint. Indeed, due...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    A File Authentication System Using Hand Gesture Passcodes

    Traditionally, sign language is commonly used as communication language for auditory handicapped people. In some cases, it is used to assist voice communication. There is also a trend towards using hand gestures as a perspective way of communication between humans and robots. Therefore, many hand gesture recognition researches are proposed....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Elegant Job Scheduling Approach for Cloud Service Provider

    Cloud computing is one the upcoming latest technology which is developing drastically. Today lots of business organizations and educational institutions are using Cloud environment. But one of the most important things is to increase the Quality of Service (QoS) of the system. The cloud environment is divided into two parts...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Knowledge Acquisition Techniques and Tools: A Review

    In this paper, the authors analyzed the modern literature on knowledge acquisition techniques and tools based on certain industries progress practices. Knowledge management is rapidly becoming an integral business function for many organizations as that realize that competitiveness hinges on effective management of intellectual resources. To be empowered to face...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Kunal Secure Astro-Encryption- Data Encryption and Compression Using Planar Geometry

    In the present world scenario it is difficult to transmit data from one place to another with security. This is because hackers are becoming more powerful nowadays. To ensure secured data transmission there are several techniques being followed. One among them is cryptography which is the practice and study of...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Implicit Security Architecture Framework in Cloud Computing Based on Data Partitioning and Security Key Distribution

    Cloud computing technology has been visualized as the next-generation architecture of IT venture. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing shifts the application software and databases to the large data centers, where the management of the data and...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    A Secure Framework for User Data Storage in Public Cloud Systems using Symmetric Cryptography

    Cloud computing is a paradigm shift over the Internet which provides instant access to software, hardware and computing information resources for use when they needed. Cloud Computing is the access of data, software applications and computer processing power through a \"Cloud\" of online resources. Cloud computing involves storage of user...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Face Recognition using Eigenface

    To recognize an image from a database is typical task due to the image of a face changes with facial expression, age, viewpoint, illumination conditions, noise etc. With the help of Facial expression the authors can read the emotion, intention etc these are the most powerful, natural, and immediate means...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Off-Line Signature Verification System Using Fusion of Novel Diagonal and Statistical Zone Based Features

    The aim of off-line signature verification is to decide, whether a signature originates from a given signer based on the scanned image of the signature and a few images of the original signatures of the signer. Although the verification process can be thought to as a monolith component, it is...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Mitigating Technique to Overcome DDOS Attack

    Distributed denial of service attack pose a major threat to the availability of internet services. DDOS attack can be organized from the following factors. Lack of security in the whole internet. Launching attack tools has more capability to launch sophisticated attack. Network bandwidth or resource attack can inevitably be avoided....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Fault Detection and Deployment of Security Mechanisms in E-mail Systems

    In this paper, the authors present the realistic flaws and design implementation of security mechanisms in current e-mail services for unauthorized access. A thorough study is carried out to discuss the existing design of current e-mail systems, and furthermore, a virtually feasible design has been presented, which can completely vanish...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Experimental Study on Meta Heuristic Optimization Algorithms for Fake Website Detection

    The convenience of online commerce has been embraced by consumers and criminals alike. Phishing, the act of stealing personal information via the internet for the purpose of committing financial fraud, has become a significant criminal activity on the internet. There has been good progress in identifying the threat, educating businesses...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    MATLAB Based Face Recognition System Using PCA and Neural Network

    Artificially recognizing the human face is a challenging problem and is one of those challenging problems having no technique that provides a robust solution to all situations. This paper provides a new technique for human face recognition. Principal Component Analysis (PCA) is used for dimensionality reduction and for feature extraction....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Feature Extraction Techniques for Face Recognition

    Face Recognition is non-intrusive method of identifying individual faces by the feature extraction and classification of faces. Facial feature extraction is one of the most important and attempted problems in computer vision. In this paper, the authors compares the different facial feature extraction techniques like geometry-based feature extraction (Gabor wavelet...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    NYMBLE: Protecting the Privacy of Users in Anonymous Networks and Blacklisting Misbehaving Users

    Anonymizing networks hide the client's IP address and allow the client to access the internet. It protects the privacy of users but unfortunately some users have misused such networks for abusive purposes. Website administrators block the IP addresses of misbehaving users and as a result they block all the known...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    A Review of Clustering and Classification Techniques in Data Mining

    Data mining is the process of extracting hidden analytical information from large databases using multiple algorithms and techniques. This technology allows companies to focus on the most important information in their data warehouses. Generally organizations collect and process huge amount of data. Data mining techniques can be applied rapidly on...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2013

    Encryption Using Dictionary and Locations

    In current communication system providing personal information becomes unavoidable. One is in need to provide personal information while banking, purchasing and so on in n number of situations. For any concern, it is important to maintain these kind of personal information confidential. In this paper, the authors propose a method...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Overlapping Community Detection Algorithms in Dynamic Networks: An Overview

    Many real-world networks, especially social networks, exhibit an overlapping community structure. Identifying overlapping communities and overlapping nodes is a recent and increasingly active field of research. Dynamic complex networks model the evolving relationships between communities. Significant attention is attracted to the literature of community detection in complex network. Detecting and...

    Provided By International Association of Scientific Innovation and Research (IASIR)