International Association of Scientific Innovation and Research (IASIR)

Displaying 1-40 of 143 results

  • White Papers // Nov 2014

    WIMAX: An Overview, Security Issues and Security Threats

    WiMAX stands for Worldwide interoperability for Microwave Access which is also known as IEEE 802.16 wireless metropolitan area network. It basically an alternative to wired technologies such as cable modems, DSL (Digital Subscriber Line), T1/E1 lines and provides broadband access over long distances. It has many advantages like high data...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    An Efficient RSA Based Technique for the Encryption and Decryption

    RSA cryptosystem is the most commonly used public key cryptosystem. It is the first public key cryptosystem. The strength of this cryptosystem is based on the larger key size. There are many algorithms and variants of RSA. But, it is steal a burning topic of research. Because the thrust to...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Data Mining Classification Algorithms for Business Intelligence

    The most useful data mining techniques in business process is classification. Classification is a supervised machine learning procedure and an important issue in data mining. Decision trees are considered to be one of the most popular approaches for representing classifiers. In this paper, the classification task is used to predict...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Issues of Data Security and Privacy in Cloud Computing

    Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in the entire globe. Data security and privacy protection are the two main factors of user's concerns about the cloud technology....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Security in Mobile Ad-Hoc Network Using Novel Intrusion Detection System

    In this paper, the authors proposed on Security in mobile ad-hoc network using novel intrusion detection system mobile ad-hoc network is collection of temporary nodes, that are capable of dynamic forming temporary network, self organize, infrastructure less with nodes contains routing capability, In a Mobile Ad hoc NETwork (MANET) where...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Characterization of Vehicular Area Networks (VANETs) Routing

    Vehicular area network is having the criticality because of its public and dynamic nature. It combines the complexities of both the mobile network and sensor network. The associated challenges include the area limitation, scenario specification and routing constraints. In this paper, all the associated challenges to the vehicular ad hoc...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Comparison of Software Life Cycle Models

    Computer software continues to be the single most important technology on the world stage. Software engineering is the establishment and use of sound engineering principles in order to obtain economically software that is reliable and work efficiently on real machines. Software development organizations follow some process when developing a software...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    An Efficient AODV Routing Protocol Based on Dynamic Threshold Assignment for Local Repair in MANET

    Wireless communication between mobile users is becoming more popular than ever before. In this paper, the authors have implemented the process of error detection, repairing of errors and routing protocols implementation in MANET (Mobile Ad hoc NETwork) using dynamic threshold technique. MANET is very popular and efficient, easiest and secure...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    An Extensive Analysis on Task Scheduling Algorithms in Cloud Environments

    Task scheduling is one the most essential study in cloud environments. It is the responsibility of cloud scheduler to arrange jobs in such a way to improve the Quality of Service (QoS) offered with respect to Service Level Agreement (SLA). This paper presents a review of research literatures in the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Towards Probabilistic Ontology based on Bayesian Networks

    The increase and diversification of information has created new user requirements. The problems of representation, processing, analysis and reasoning on the information, especially the uncertain information, are still an important research topic. The authors try to show in this paper how this issue is crucial. It is essential to propose...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Power Consumption Analysis of Wireless Sensor Networks with Different Modulation and Routing Techniques

    The sensors are used to sense and convert the one physical quantity to another quantity and when these sensors are attached with processing devices and connecting through a network, it becomes as a wireless sensor network technology. The sensor network is the combination of sensor nodes and all the sensor...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Neural Networks Based Pattern Recognition Using Perceptron Model

    A neural network is a processing device, in which its design is inspired by the design and functioning of human brain and their components. There is no idle memory containing data and programmed, but each neuron is programmed and continuously active. This paper is to present identification and recognition of...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Topology Control and Multi-Hop Routing Technique In Wireless Sensor Networks [WSNs]

    A Wireless Sensor Networks [WSNs] composed of nodes, each node communicate through communication links, which can be wireless or cabled. The sensor node in Wireless Sensor Networks [WSNs] helps to detect the physical or environmental conditions of the surrounding. The data transmissions between two or more sensor networks are carried...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Routing Mechanism for a DTN using WSN Nodes

    Recently proposed Delay Tolerant Networking (DTN) architecture aims at supporting efficient message-based communication over intermittent networks. Delay Tolerant Networks (DTNs) are generally characterized by long and variable delays due to intermittent connectivity. This lack of connectivity makes most of the existing routing protocols in WSNs not applicable in DTNs (the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Mobility Based Energy Utilization in Wireless Sensor Network

    Energy efficient and mobility information is a key problem in wireless sensor networks. Save more energy in network processing such as mobility is a widely used technique. The large-scale deployment of wireless sensor networks and the need for mobility controlling and also necessitate to deploying the gateways among the network,...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Nov 2014

    Impact of Various Concatenated Channel Coding Scheme on Performance Assessment of a MIMO OFDM System

    In this paper, the authors made a comprehensive BER performance simulative study on synthetically generated data transmission in a MIMO-OFDM wireless communication system. The system under investigation implements various types of modern and classical channel coding schemes in serially concatenated form such as Repeat and Accumulate (RA), Single Parity Check...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    An Innovative Approach: Image Encryption with Chaotic Maps using DNA Addition Operation

    Encryption technology is an important measure to ensure the security of digital image; this paper's main purpose is to research how to encrypt images by chaos. In this paper, five chaotic maps are compared and noise effects are observed on image. Firstly, the authors use the image encryption algorithm to...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Test Pattern Generation Using LFSR with Reseeding Scheme for BIST Designs

    In this paper, the authors present LFSR reseeding scheme for BIST. A time-to-market efficient algorithm is introduced for selecting reseeding points in the test sequence. This algorithm targets complete fault coverage and minimization of the test length. Functional broadside tests that avoid over testing by ensuring that a circuit traverses...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Comparison of Various Biometric Methods

    Biometrics is the process of automated recognition of individuals based on their behavioral and physiological characteristics. Biometrical authentication is the process of making sure that the person is who the user claims to be. Physiological biometric traits include face and retina structures, fingerprint (whorls minutia), hand geometry, iris (pattern), ear...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Security Design Issues in Distributed Databases

    In the rapid growth of networking and information technology expands the business worldwide. As distributed database became more popular, the need for improvement in distributed database management system become even more important. Database provides inbuilt security to manage different levels of data but if the authors apply overall security from...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Role of CRM in Business Sector

    Every business organization needs customers for sustainable and to maintain customer satisfaction with technology rich and information based society. CRM plays a very big role to treat all of this information. It is a customer-focused business strategy designed to optimize revenue, profitability, and customer loyalty. By implementing a CRM strategy,...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Aug 2014

    Dual Mechanism to Detect DDOS Attack

    Cloud computing has emerged as computing paradigm which shares resources and services with its customers. In its early days the people does not heard of the denial of service attack. But since 2000, a series of DDOS attacks by multiple nodes is accomplished of blocking the services of cloud servers....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    An Empirical Study of Extracting information for Business Intelligence

    Sentimental/opinion analysis is an emerging area of research in text mining. Sentimental analysis or opinion mining refers to identify and extract subjective information in source materials. As a response to the growing availability of informal opinionated texts like blog posts and product reviews, comments, forums which is collectively called as...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Comparative Review of Scheduling and Migration Approaches in Cloud Computing Environment

    Cloud computing is one of most essential and popular distributed environment that resides all the services and product at some centralized location. The task management is the key role in cloud computing systems task scheduling problems are main which relate to the efficiency of the whole cloud computing facilities. Scheduling...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    A Policy Driven Architecture for Effective Service Allocation in Cloud Environment

    A cloud environment provides the integration of multiple clients and server in a distributed environment. But in this environment the cloud servers are limited and there are number of cloud clients. To perform the effective cloud service allocation, some rule oriented model is required that can perform the analysis on...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    An Improvement to the K-Means and K-MEDOID using D-M Clustering Approach

    Clustering is an effective data mining operation used to divide the available data set in small segments in which each segment contain similar data. The effectiveness of clustering algorithm can be measured in terms of similarity in the elements of same cluster and the difference with other cluster elements. Clustering...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Network Traffic Auditing and Assessment in Cloud Environment

    Cloud computing permits users to remotely store their information into the cloud and provides on-demand applications and services from a shared pool of configurable resources. The protection of the outsourced information within the cloud is dependent on the protection of the cloud computer system and network. Though, there are varied...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Study on Cluster Generation Process in Congested Sensor Network

    In case of sensor network the nodes loss some amount of energy after performing the communication. To improve the life of network an energy efficient communication approach is required. In case of multicast network an aggregative approach is used by LEACH protocol by creation of cluster of nodes. Now the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Integration of Big Data in Banking Sector to Speed up the Analytical

    In banking area, the authors find big data which is scattered in different places or sources in heterogeneous format using different databases or files. Hence, it is very difficult to analyze the data fastly for making Decision Support System (DSS). In this paper, they have developed a High Level Design...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    A Survey Report: Cloud Computing Establishment and Security Issues

    In this paper the authors propose the survey and concept of cloud computing establishment and security issues. Cloud computing is considered as one of the emerging arenas of computer science in recent times. It is providing excellent facilities to business entrepreneurs by flexible infrastructure. Although, cloud computing is facilitating the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Study and Challenges of Reckonable Offloading in Mobile Cloud Computing

    An alluring paradigm for mobile users to enjoy the computation power and service of a network is mobile cloud computing. A remote server is provided as cloud. As mobile resources have limited resources like memory, power, availability of network, so cloud concept is cooperative flair. The reckoning tasks that are...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Study of Indexing Techniques for Web Crawled Data

    Data collected from web are unclean, amorphous, formless and unstructured. In order to get the information from the collected data, it has to be cleaned, structured and indexed. There are different indexing techniques, each having its own advantages and disadvantages say for instance LSI is less complex but has scalability...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Data Security in Cloud Environment Using Cryptography Algorithm

    In recent years, cloud computing is the new technical era and next generation architecture for IT as well as business industries and in which providing strong security to client data is the biggest issue for cloud service provider. Several cloud service provider gives the some short of secure services to...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    Privacy Preservation Enriched MapReduce for Hadoop Based BigData Applications

    As per increase in the applications of various internet enabled services and cloud applications, the requirement of cloud infrastructure with enhanced facilities is increasing with very vast pace. Due to the increase in multiuser communication scenario on cloud infrastructure, the securities of datasets are also increasing drastically. Most of critical...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // May 2014

    A Data Centric Privacy Preserved Mining Model for Business Intelligence Applications

    In present day competitive scenario, the techniques such as data warehouse and On-Line Analytical Process (OLAP) have become a very significant approach for decision support in data centric applications and industries. In fact the decision support mechanism puts certain moderately varied needs on database technology as compared to OLAP based...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2014

    A Survey on FPGA implementation of 3D DWT using Lifting based Algorithm

    In this paper the authors review the recent developments in the algorithms for the efficient implementation of lifting based Discrete Wavelet Transform (DWT). The lifting based DWT architecture has the advantage of low power computational complexities transforming the signals with extension and regular data flow. They provide a survey on...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2014

    Implementation of Reverse Vending Machine Based on FPGA

    In these modern days, reverse vending machine is very popular to Korea, Japan, England, Britain, Greece and China. Reverse vending machine saves time, employee work and also save human's energy. This paper describes about the reverse vending machine which works after inserting the empty beverage container into it. The paper...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2014

    Sql Performance Tuning in Oracle 10g and 11g

    Oracle database 10g introduced SQL advisor to simplify application and provides for SQL tuning which was considered as an advantage over the already existing Oracle 9i. Oracle 10g had greater advantages when it came to performing the root-cause analysis of one or SQL statements. It also involved one of the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2014

    Big Data Approach to Analytical Chemistry

    The big data approach to the process analytical technology was proposed and discussed. The main stages of analytical big data processing have been described. The partial least squares regression and principal component analysis of huge data matrices were performed using fourier compression. Industrial processes represent analytical objects of continuously increasing...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2014

    SeDas: Self - Destruction Data System for Distributed Object Based Active Storage Framework

    Today's technical and legal landscape presents formidable challenges to personal data privacy. Personal data stored in the cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Sep 2013

    Behavior Based IDS for Cloud IaaS

    Cloud Computing provides many types of services mainly SaaS, PaaS, IaaS. Each of them have their own security challenges, but IaaS undertakes all types of challenges viz., network attack and request based attacks i.e. handling the requests from untrusted users, XSS (Cross Site Scripting attack), DDOS and many more. These...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Sep 2013

    Congestion Control by Multiagent in Wireless Sensor Network

    In wireless sensor network reliable data transport is one of the most important requirements where different applications have different reliability requirements. The characteristic of wireless sensor network, especially dense deployment, limited processing ability, memory and power supply, provide unique design challenges at transport protocol. A reliable protocol in wireless sensor...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Sep 2013

    Physical-Layer Attacks in SDH Optical Networks

    Network survivability is the ability to protect and restore the data in optical network after nodes and/or links fail. Till now, many kinds of protection/restoration mechanisms proposed, but their realizations depend in part on triggering of fault alarms and corresponding detection of fault location. If a failure occurs in the...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Sep 2013

    Simulation of Security Scheme for Wireless Network Based on Secret Sharing

    If a secret key or a password is to be used in an application, where multi users are involved, then it is better to share the key or the password to all the authorized users in such a way that a minimum or all the shares of the users put...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Sep 2013

    Detecting Blackhole Attack in WSN by Check Agent Using Multiple Base Stations

    Due to the wireless nature and infrastructure-less environment of WSN, they are more vulnerable to many types of security attacks. This paper proposes a technique to detect the black-hole attack using multiple base-stations and a check agent based technology. This technique is energy efficient, fast, lightweight and reduces message complexity....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Sep 2013

    Enhancing Database Access Control Policies

    Now-a-days public and private organizations increase their database system requirement for day-to-day business. Hence database security becomes more crucial as the scale of database is growing. A signified approach for protecting information which enforcing access control policies based on subject and object and their characteristics. There are many security models...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Sep 2013

    Web Log Mining Based on Improved FCM Algorithm Using Multi-Objective Genetic Algorithm

    Web log mining is important area of research in concern of user behavior, web cache improving and web security concern. For the purpose of mining various algorithms are used such as clustering, classification and rule mining technique in web log files. In this paper, the authors discuss they log mining...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Traffic Sensitive Active Queue Management for Improving QoS of the System

    Now-a-days, use of Internet is increasing tremendously. This results in the increase of use of multimedia applications such as IP telephony, video conferencing and online games. These new genres of applications have different requirements in terms of throughput and delay than traditional applications. Traditional applications such as FTP and email...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Pruning Large Data Sets for Finding Association Rule in Cloud: CBPA (Count Based Pruning Algorithm)

    Organizations are more interested in the interesting data rather than the bulk of data. So they need a systematic and scientific approach to extract meaningful data out of heaps of the data and to find out the relations among these patterns. To analyze \"Big data\" on clouds, it is very...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Secured Vertical Handoff between 802.16a and 802.16m for Fourth Generation (4G) Wireless Networks using PKM (Public Key Management)

    The modern communication system is aimed to reach the real world one environment from virtual world via connecting resources of one with another through social network system. In Fourth Generation wireless network (4g), increasing demand of wireless networks, to provide seamless and secure handoff has become an important factor in...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Interference Cancellation Scheme for Multiuser Detection

    In multiple access channels, when users know each other channels, pre-coders can be designed utilizing channel information to cancel the interference at the receiver without sacrificing the diversity or the complexity of the system. In a recent work, it was shown that when there are only two users, a receiver...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Mobile Cloud Computing: A Review of Its Applications and Challenges

    Mobile Cloud Computing combines the features of three systems which are mobile computing, cloud computing, and wireless networks. As the users know how much cloud computing and mobile computing individually has affected them. Both provides one with a great so, the idea of Mobile cloud computing is to use cloud...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Sep 2013

    A Survey on Data Extraction in Web Based Environment

    Web is a great source of information today. A lot of information is available over the internet and a lot of information is added and updated to it every day hence web data extraction systems are necessary to use. These systems are used to find useful, hidden or related information...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    An Analysis of Web Caching Strategies to Improve Web Performance

    The World Wide Web (WWW) has grown exponentially in the past few years. Consequently, there is an ever-increasing demand for network bandwidth. One way to optimize network bandwidth usage is to implement a caching system which stores previously fetched files at a location close to the Web user, thereby allowing...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    An Improved RSA Encryption Algorithm for Cloud Computing Environments: Two Key Generation Encryption (2KGEA)

    Cloud computing is an emerging technology that is still unclear to many security problems. Ensuring the security of stored data in cloud servers is one of the most challenging issues in such environments. The main aim of this project is to use the cryptography concepts in cloud computing communications and...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    A Tool for Mining Patterns based on Data Structure

    The primary goal of a software developer is to produce and deliver high quality software systems which are produced at low cost and high productivity. In order to produce such software systems, programmers generally reuse existing libraries rather than developing the source code from scratch. However, while reusing a library,...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    A Middle Layer Open Architecture to Search Query Based Web Services Over the Public Web

    Web services are the server side procedures provided to the web clients and web programmers to improve the application environment. When the service search is performed respective to particular keyword, there exists number of possible web service with almost same functionality. In such case, the comparative analysis is required in...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Overlapping Community Detection Algorithms in Dynamic Networks: An Overview

    Many real-world networks, especially social networks, exhibit an overlapping community structure. Identifying overlapping communities and overlapping nodes is a recent and increasingly active field of research. Dynamic complex networks model the evolving relationships between communities. Significant attention is attracted to the literature of community detection in complex network. Detecting and...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2013

    Encryption Using Dictionary and Locations

    In current communication system providing personal information becomes unavoidable. One is in need to provide personal information while banking, purchasing and so on in n number of situations. For any concern, it is important to maintain these kind of personal information confidential. In this paper, the authors propose a method...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    User Identification and Page Error Detection in Web Server Logs

    Web mining is the application of data mining techniques to data repositories. Web mining is divided into three parts: content mining, structure mining and log mining. Web log mining is used for extraction of interesting patterns in web access logs. Web log mining is generally divided into three phases: preprocessing,...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Cloud Computing Security Using Keys & Encryption

    The security in the cloud is a concern nowadays and security professionals are still finding same hardware means to make cloud computing more secure. The installation of the ESX5.0, Vsphere, vCenter Server, Porticor-VPD in server hardware is successful in building the platform & allows the creation and deployment of many...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Web Service Selection Through QoS Agent Web Service

    With the increasing use of web services in standardization of basic content integration, support of complex service-oriented architectures, provision of seamless integration of business processes and applications etc has lead to a boost in numbers of both web service consumers and providers. This means Quality of Service (QoS) becomes a...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Qualitative Knowledge Management and Reuse in Software Engineering Environment

    A proposal for the improvement in the quality of knowledge including software knowledge, its reuse and management has been analyzed in the context of quality knowledge management model by extending well known model of quality management in higher education so called ADRI model. In this paper, the authors suggest that...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Experimental Study on Meta Heuristic Optimization Algorithms for Fake Website Detection

    The convenience of online commerce has been embraced by consumers and criminals alike. Phishing, the act of stealing personal information via the internet for the purpose of committing financial fraud, has become a significant criminal activity on the internet. There has been good progress in identifying the threat, educating businesses...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Fault Detection and Deployment of Security Mechanisms in E-mail Systems

    In this paper, the authors present the realistic flaws and design implementation of security mechanisms in current e-mail services for unauthorized access. A thorough study is carried out to discuss the existing design of current e-mail systems, and furthermore, a virtually feasible design has been presented, which can completely vanish...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Mitigating Technique to Overcome DDOS Attack

    Distributed denial of service attack pose a major threat to the availability of internet services. DDOS attack can be organized from the following factors. Lack of security in the whole internet. Launching attack tools has more capability to launch sophisticated attack. Network bandwidth or resource attack can inevitably be avoided....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Off-Line Signature Verification System Using Fusion of Novel Diagonal and Statistical Zone Based Features

    The aim of off-line signature verification is to decide, whether a signature originates from a given signer based on the scanned image of the signature and a few images of the original signatures of the signer. Although the verification process can be thought to as a monolith component, it is...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    A Review of Clustering and Classification Techniques in Data Mining

    Data mining is the process of extracting hidden analytical information from large databases using multiple algorithms and techniques. This technology allows companies to focus on the most important information in their data warehouses. Generally organizations collect and process huge amount of data. Data mining techniques can be applied rapidly on...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    NYMBLE: Protecting the Privacy of Users in Anonymous Networks and Blacklisting Misbehaving Users

    Anonymizing networks hide the client's IP address and allow the client to access the internet. It protects the privacy of users but unfortunately some users have misused such networks for abusive purposes. Website administrators block the IP addresses of misbehaving users and as a result they block all the known...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Feature Extraction Techniques for Face Recognition

    Face Recognition is non-intrusive method of identifying individual faces by the feature extraction and classification of faces. Facial feature extraction is one of the most important and attempted problems in computer vision. In this paper, the authors compares the different facial feature extraction techniques like geometry-based feature extraction (Gabor wavelet...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    MATLAB Based Face Recognition System Using PCA and Neural Network

    Artificially recognizing the human face is a challenging problem and is one of those challenging problems having no technique that provides a robust solution to all situations. This paper provides a new technique for human face recognition. Principal Component Analysis (PCA) is used for dimensionality reduction and for feature extraction....

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    An Analytical Approach on the Consequence of Cloud Computing for Logistics Management

    In this paper, the authors explained the theoretical background of articulating effective logistics information system in any industrial outfit. This is predicated on the fact that logistics is \"The process of strategically managing the acquisition, movement and storage of materials, parts and finished inventory (and the related information flows) through...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Designing of Method for Improving Synchronization Accuracy in Packet Networks

    This paper deals with the possibilities of improving the synchronization accuracy over packet networks. The first part is focused on the analysis and measurements of synchronization accuracy in the real packet network. Measurements were performed using the precision time protocol. The transmission parameters of a network were changed using a...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Elegant Job Scheduling Approach for Cloud Service Provider

    Cloud computing is one the upcoming latest technology which is developing drastically. Today lots of business organizations and educational institutions are using Cloud environment. But one of the most important things is to increase the Quality of Service (QoS) of the system. The cloud environment is divided into two parts...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Knowledge Acquisition Techniques and Tools: A Review

    In this paper, the authors analyzed the modern literature on knowledge acquisition techniques and tools based on certain industries progress practices. Knowledge management is rapidly becoming an integral business function for many organizations as that realize that competitiveness hinges on effective management of intellectual resources. To be empowered to face...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Kunal Secure Astro-Encryption- Data Encryption and Compression Using Planar Geometry

    In the present world scenario it is difficult to transmit data from one place to another with security. This is because hackers are becoming more powerful nowadays. To ensure secured data transmission there are several techniques being followed. One among them is cryptography which is the practice and study of...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Implicit Security Architecture Framework in Cloud Computing Based on Data Partitioning and Security Key Distribution

    Cloud computing technology has been visualized as the next-generation architecture of IT venture. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing shifts the application software and databases to the large data centers, where the management of the data and...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    A Secure Framework for User Data Storage in Public Cloud Systems using Symmetric Cryptography

    Cloud computing is a paradigm shift over the Internet which provides instant access to software, hardware and computing information resources for use when they needed. Cloud Computing is the access of data, software applications and computer processing power through a \"Cloud\" of online resources. Cloud computing involves storage of user...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Feb 2013

    Face Recognition using Eigenface

    To recognize an image from a database is typical task due to the image of a face changes with facial expression, age, viewpoint, illumination conditions, noise etc. With the help of Facial expression the authors can read the emotion, intention etc these are the most powerful, natural, and immediate means...

    Provided By International Association of Scientific Innovation and Research (IASIR)

  • White Papers // Dec 2006

    Performance Comparison of Machine Learning Algorithms on Integration of Clustering and Classification Techniques

    The abundance of data in business, research, industry, science and in many fields makes it very difficult to handle them. It is complicated to explore any valuable information, needed to take any important decision, but problem is how to discover this precious information. The effective solution may be data mining,...

    Provided By International Association of Scientific Innovation and Research (IASIR)