International Journal of Science and Modern Engineering (IJISME)

Displaying 1-40 of 66 results

  • White Papers // Mar 2014

    Shortcut Tree Routing Algorithm for Efficient Data Delivery in ZigBee Wireless Networks

    The ZigBee tree routing is widely used in many resource-limited devices and applications, since it does not require any routing table and route discovery overhead to send a packet to the destination. However, the ZigBee tree routing has the fundamental limitation that a packet follows the tree topology; thus, it...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2014

    System Handling Using Email

    Handling a system or a network is a tedious job involving a series of tasks that need to be completed impeccably. Remote system access and handling in legacy system is done by an administrator who sits at computer directly connected to the network i.e. through LAN. So if the system...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jan 2014

    Defeating Attacks in Cloud Computing

    As vulnerabilities keep increasing exponentially every year, the need to efficiently classify, manage, and analyze them also increases. As more and more users, becomes very important to have proper vulnerability management in cloud. In this paper presentation of vulnerability management framework for cloud computing is represented. Cloud computing is a...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Dec 2013

    Algorithms and Techniques Used for 3D Face Recognition in the Presence of Expressions and Occlusion

    In this paper, the authors are enhance the algorithms towards the development of an efficient three dimensional face recognition system in the presence of expressions as well as for occluded face. The overall aim is to analyze patterns of expressions based on techniques relating to feature distances and also to...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Nov 2013

    Design And Implementation Of Automated Door Accessing System With Face Recognition

    In the last two decades face recognition has received significant attention and an important issue in many applications such as access control, security systems, credit card verification and criminal identification. This paper proposes three main sub systems namely face recognition, face detection and automatic door access control. The face recognition...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Nov 2013

    A Novel Algorithm for Automatically Detecting Number of Clusters for Mining Communities in Heterogeneous Social Networks

    Social media have attracted millions of user's attention in recent years. In a distributed social network a community mining is one of the major research areas. Mining of network communities is a major problem now a day. This problem should be avoided. Several methods were proposed, but most of the...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Sep 2013

    Visualization of Query Processing on Data Warehouse with UML

    Data transformations are the main subject of visual modeling concerning data warehousing dynamics. A data warehouse integrates several data sources and delivers the processed data to many analytical tools to be used by decision makers. Therefore, these data transformations are everywhere: from data sources to the corporate data warehouse by...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Sep 2013

    TCP/IP Attacks, Defenses and Security Tools

    The TCP/IP protocol suite is the foundation of Internet and is ubiquitous in almost all networks worldwide. It was written as a robust protocol, which is able to communicate despite node failures. The design parameters of TCP did not weigh security as important and placed an implicit trust on nodes....

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jul 2013

    Security in WSN using Polynomial Pool Based Mechanism

    For efficient data accumulation, localized sensor reprogramming, and for distinguishing and revoking compromised sensor Mobile Sinks (MSs) are necessary in many Wireless Sensor Network (WSN) applications, However, in sensor networks for pair wise key establishment and authentication between sensor nodes and mobile sinks exiting key predistribution schemes are used, the...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jul 2013

    Proposing a Model of Inter-University Collaboration System Using Cloud Computing Infrastructure

    The need for research collaborations in Higher Educational and Further Educational world-wide gave rise to National Research and Education Network (NREN). However, many attempts towards the creation of NREN have been made. Some aimed at Development of a platform on which contents can be applied later, such as NUNet. Others...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jul 2013

    Review of 3-D Secure Protocol

    Banks worldwide are starting to authenticate online card transactions using the `3-D Secure' protocol, which is branded as Verified by Visa and MasterCard Secure Code. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards (EMV comes from the initial...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jun 2013

    The Impact of Lossy Compression on Hyperspectral Data Adaptive Spectral Unmixing and PCA Classification

    In the past, scientific data have been almost exclusively compressed by means of lossless methods, in order to preserve their full quality. However, more recently, there has been an increasing interest in the lossy compression which has not yet globally accepted by the remote sensing community, mainly because it is...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jun 2013

    Analysis of Data Delivery Issues in MANET Using Implementation of MTOOR Algorithm

    In this paper, the authors address the issues of reliable data delivery in mobile ad-hoc network and implies a new (Moving Target Oriented Opportunistic Routing) Algorithm for which existing routing protocols are not suitable. This algorithm is implemented in Wireless Routing Protocol (WRP) which is good in delivering the data...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jun 2013

    Outlier Detection: A Clustering-Based Approach

    Outlier detection is a fundamental issue in data mining; specifically it has been used to detect and remove anomalous objects from data. It is an extremely important task in a wide variety of application domains. In this paper, a proposed method based on clustering approaches for outlier detection is presented....

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jun 2013

    An Assessment of Identity Security in Data Mining

    Privacy preserving becomes an important issue in the development progress of data mining techniques. Privacy preserving data mining has become increasingly popular because it allows sharing of privacy-sensitive data for analysis purposes. So people have become increasingly unwilling to share their data. This frequently results in individuals either refusing to...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jun 2013

    Fuzzy Forensic Analysis System for DDoS Attack in MANET Response Analysis

    Mobile Ad-hoc NETworks (MANET) is wireless communication network; in which self capable mobile nodes can dynamically self organize into ad hoc topologies. Seamless interconnection with each other without pre-existing infrastructure makes MANET scalable. In turn scalability also increases the scope of security threats. Dynamic nature of MANET calls for self...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // May 2013

    Review Paper on Calculation, Distribution of Trust & Reputation in MANET

    In an increasingly networked world, increased connectivity could lead to improved information sharing, facilitate collaboration, and enable distributed decision making, In Mobile Ad hoc NETworks (MANETs), the distributed decision making should take into account trust in the elements: the sources of information, the processors of information, the elements of the...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // May 2013

    Advanced Detecting and Defensive Coding Techniques to prevent SQLIAs in Web Applications: A Survey

    SQL injection attacks are more dangerous than other web attacks because these attacks can get sensitive data stored in the database by manipulating the original SQL queries. In spite of different tools and frameworks to detect and prevent SQL Injection, it is still a top most threat to web applications....

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // May 2013

    Developing an Algorithm to Implement Efficient Intrusion Detection System using Soft Computing

    During last decades information technologies based on the computer networks play an important role in various spheres of human activity. Information has become the organizations most precious asset. Organizations have become increasingly dependent on the information since more information is being stored and processed on network-based systems. The widespread use...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    A Taxonomy of Web Search Using Search History Clustering Mechanism

    The size and richness of information available on the web growing very rapidly. To this end the users are trying to accomplish more complex task through online. The users can break down the complex tasks into a few co-dependent tasks and issue as multiple queries around these tasks. Search engines...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    Biometric System using Iris Pattern Recognition

    Iris is unique body part which does not change with respect to time. Also every individual has unique and different pattern of the Iris for both the eyes. This helps in identifying a person, quite accurately. Initially, a filter must be employed to get rid of any kind of noises...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    RFID Based Security System

    Radio Frequency IDentification (RFID) is one member in the family of Automatic Identification and Data Capture (AIDC) technologies and is a fast and reliable means of identifying any material object. The significant advantage of all types of RFID systems is the non-contact, non-line-of-sight nature of the technology. Tags can be...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    R-WASP: Real Time-Web Application SQL Injection Detector and Preventer

    In the real time word, there are many online systems those are major part of software systems in order to make them publically available to perform the remote operations. These online systems are vulnerable to different types of web based attacks. Here in this paper, the authors are considering the...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    Web Usage Mining Based on Complex Structure of XML for Web IDS

    In current trend, most of the businesses are running through online web applications such as banking, shopping, and several other e-commerce applications. Hence, securing the web sites is becomes must do task in order to secure sensitive information of end users as well as organizations. Web log files are generated...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    Dynamic Business Solution for Production Management

    In present system, most of functions are performed physically which consist of quite a lot of risks as far as material handling and production system department is concern. In this issue, the authors are highlighting on providing automation to this field. With the help of integration of mechanical engineering and...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    Mining Association Rules between Sets of Items in Large Databases

    In data mining, the usefulness of association rules is strongly limited by the huge amount of delivered rules. To overcome this drawback, several methods were proposed in the literature such as item set concise representations, redundancy reduction, and post processing. However, being generally based on statistical information, most of these...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    An Ample-Range Survey on Recall-Based Graphical Password Authentication Based On Multi-Line Grid and Attack Patterns

    A password is a secret word or combination of alphabets used for user authentication to establish self identity. This password should be kept secret from those not allowed to access. Now-a-days data security is the most describing problem. Token based authentication like Smart card, Biometric based authentication like iris, fingerprint,...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    Confidentiality and Privacy in Cloud Computing using Hybrid Execution Method

    Today cloud computing has become ubiquitous and the authors see everybody lot of data being transferred and being accessed from the cloud. At the same time this phenomenon presents them with a great risk of data theft and privacy issues. Among these privacy is the main reason that many companies...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Mar 2013

    Secure Transaction Using Dynamic Session Key

    Cryptography is a concept to protect data during transmission over wireless network. Cryptography is used in information security to protect information from unauthorized or accidental disclosure while the information is in transmitting (either electrically or physically) and while information is in storage. The information could be accessed by the unauthorized...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Mar 2013

    Design of Electricity & Energy Review Dashboard Using Business Intelligence and Data Warehouse

    The advances in the computer and electronics industry along with the widespread of on-the-move internet have leaded an enormous of data being generated on daily basis. Such large data stored in the datacenters is critical for businesses to analyze and plan future business strategies. Business intelligence is thus used to...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Mar 2013

    Implementing Cryptographic Techniques in Message Passing Interface Systems

    In the concept of Message Passing Interface (MPI) chatting and file transmission the decryption part will be done automatically. Here three types of keys are used; they are public, private and secret key. Keys are displayed to the destination only if they accept the request or else displaying of key...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Mar 2013

    Identification of People by Iris Recognition

    Biometrics is a best medium of identification .iris recognition used to recognize people by iris. The author present the new method of iris recognition \"Iris recognition by neural network\". In this method first the authors collect the iris images and using image processing after this calculate the length of iris...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    FPGA Implementation of Efficient Hardware for the Advanced Encryption Standard

    Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Cryptography is not the only means of providing information security, but rather one set of techniques. A fundamental goal of cryptography is to adequately address these...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    Hamming Distance Polygram Substitution Algorithm for Coding Optimization & Security

    The joint approach of integrating selective encryption & coding optimization is presented in this paper. Binary bit stream of the input is divided into the plaintext chunk of 64 bits. Random Key of 128 bits is generated. Key bits are then selected randomly. These randomly selected bits are change again...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    A Cost-Benefit Model for an Enterprise Information Security

    A cost-benefit model for an enterprise information security is presented in this paper. Economical analysis of information security investments that enterprises can use as guidance when applying the recommended risk mitigation plans are developed. An enterprises information security risk management associated with economical metrics. An economical analytical model is presented...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    Study on Cryptanalysis of the Tiny Encryption Algorithm

    In this paper, the authors present the Study on a Tiny Encryption Algorithm. There is a requirement to specify cryptographic strength in an objective manner rather than describing it using subjective descriptors such as weak, strong, acceptable etc. Such metrics are essential for describing the characteristics of cryptographic products and...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    The Online Home Security System: Ways to Protect Home from Intruders & Thefts

    Now-a-days security has been a major issue where crime is increasing and everyone wants to take proper measures to prevent intrusions. Existing security systems are more towards providing passive security system, but this project is aimed at developing the security of home against intruders, fire and smoke. The main concern...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    Security Enhancing of a LAN Network Using Hardening Technique

    Computer networks allows access to information and services in an organized as well as controlled manner. Security is needed to make the users' data immune to any kind of data breach or malicious virus attacks. Hardening is to make system hard to protect from unauthorized access and is an on-going...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    Perspective Study on Recoverable Concealed Data Aggregation in WSNs

    In wireless sensor networks, traditional aggregation schemes were used to aggregate the ciphertext without decryption. Since it causes problems such as aggregation constraint and failure of data integrity, a new technique called recoverable concealed data aggregation was introduced. Here in this scheme, the base station can recover all the sensing...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    Attack Graph Generation and Threat Evaluation in Network Situation Awareness (NSA)

    A network is a collection of many devices, where each node is said to be wired or wireless connection between them. And now a day's most of the threat comes to the network either from outside or from a sort of situation which occurs internally due to many reasons. So...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Mar 2014

    Shortcut Tree Routing Algorithm for Efficient Data Delivery in ZigBee Wireless Networks

    The ZigBee tree routing is widely used in many resource-limited devices and applications, since it does not require any routing table and route discovery overhead to send a packet to the destination. However, the ZigBee tree routing has the fundamental limitation that a packet follows the tree topology; thus, it...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Nov 2013

    Design And Implementation Of Automated Door Accessing System With Face Recognition

    In the last two decades face recognition has received significant attention and an important issue in many applications such as access control, security systems, credit card verification and criminal identification. This paper proposes three main sub systems namely face recognition, face detection and automatic door access control. The face recognition...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Aug 2012

    Robust Energy-Based Target Localization in Wireless Sensor Networks in the Presence of Byzantine Attacks

    This paper presents a robust energy-based target localization method in Wireless Sensor Networks (WSNs) in the presence of Byzantine attacked sensors. Byzantine attacks will cause sensors to send false information to the fusion centre and disturb the target localization method. Therefore, a robust energy-based target localization method is needed to...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Aug 2012

    An Efficient Approach for Avoiding Down Time of Production Data Base Server in Active/Passive Windows Failover Clustering Environment

    Modern IT department facing immense challenge is to ensure the production Server availability at all times. To avoid downtime of Production Server, High availability Solution should be implemented like Microsoft Windows failover clustering. Microsoft failover Windows cluster provides the automatic failover to the standby node if a hardware (RAM, SMPS,...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Aug 2012

    Secure Data Transition Over Multicast Routing in Wireless Mesh Network

    Multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as well as during...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jul 2012

    Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

    Protecting data from the intruders on internet or on the host systems is a very tedious task. The Intrusion Detection System is a technology for detecting suspicious actions or malicious behavior in a system from the unauthorized users or so called intruders. Alerts are produced during the intrusion activity, but...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jul 2012

    Reputation-Based Security Protocol for MANETs

    Mobile ad-hoc network is huge area for research with practical applications. It is a infrastructureless and self-organized network, vulnerable because of its characteristics such as open medium, distributed cooperation and it is difficult to predict the topology. In general, Routing security in MANETs appears to be a challenging task. In...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jul 2012

    Concatenation of Spatial and Transformation Features for Off-Line signature Identification

    Off-Line signature is a behavioral biometric trait and is widely accepted for personal and document authentication. In this paper, the authors propose Concatenation of Spatial and Transformation Features for Off-Line signature Identification (CSTSI) method to distinguish genuine signature form skilled forgery signatures. The Discrete Wavelet Transform (DWT) is applied on...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jul 2012

    Non Minitia Fingerprint Recognition based on Segmentation

    The biometric identification of a person has an advantage over traditional technique. Widely used biometric is Fingerprint to identify and authenticate a person. In this paper, the authors propose Non Minutia Fingerprint Recognition based on Segmentation (NMFRS) algorithm. The variance of each block is determined by segmenting the finger print...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jul 2012

    Intra-Modal Score Level Fusion for Off-Line Signature Verification

    Signature is widely used as a means of personal verification which emphasizes the need for a signature verification system. Often the single signature feature may produce unacceptable error rates. In this paper, Intra-modal Score level Fusion for Off-line Signature Verification (ISFOSV) is proposed. The scanned signature image is skeletonized and...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jun 2012

    Comparative Study of Various Page Ranking Algorithms in Web Structure Mining (WSM)

    As the web is escalating day by day, so people rely on the search engines to investigate the web. In this situation, the challenge for website owner is to provide relevant information to the users as per their needs and fulfill their requirements. The famous search engine Google used Hyperlink...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Nov 2013

    A Novel Algorithm for Automatically Detecting Number of Clusters for Mining Communities in Heterogeneous Social Networks

    Social media have attracted millions of user's attention in recent years. In a distributed social network a community mining is one of the major research areas. Mining of network communities is a major problem now a day. This problem should be avoided. Several methods were proposed, but most of the...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2014

    System Handling Using Email

    Handling a system or a network is a tedious job involving a series of tasks that need to be completed impeccably. Remote system access and handling in legacy system is done by an administrator who sits at computer directly connected to the network i.e. through LAN. So if the system...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jan 2014

    Defeating Attacks in Cloud Computing

    As vulnerabilities keep increasing exponentially every year, the need to efficiently classify, manage, and analyze them also increases. As more and more users, becomes very important to have proper vulnerability management in cloud. In this paper presentation of vulnerability management framework for cloud computing is represented. Cloud computing is a...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    FPGA Implementation of Efficient Hardware for the Advanced Encryption Standard

    Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Cryptography is not the only means of providing information security, but rather one set of techniques. A fundamental goal of cryptography is to adequately address these...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    Hamming Distance Polygram Substitution Algorithm for Coding Optimization & Security

    The joint approach of integrating selective encryption & coding optimization is presented in this paper. Binary bit stream of the input is divided into the plaintext chunk of 64 bits. Random Key of 128 bits is generated. Key bits are then selected randomly. These randomly selected bits are change again...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jan 2013

    Evaluation of Student Performance: An Outlier Detection Perspective

    Educational data mining is current growing research area and the main essence of data mining concepts are used in the educational field for extracting useful information of the students based on their behavior in the learning process. Prior approaches used decision tree classifications optimized with ID3 algorithms to obtain such...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jan 2013

    Discovering Frequent Patterns Mining Procedures

    Data mining also known as Knowledge Discovery and Database (KDD) has been perceived as a new research is for database research. The aim of data mining is to automate the process of finding interesting patterns and trends from a given data. Discovering of association rules is an important data mining...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jan 2013

    An Approach to Secure Authentication Protocol with Group Signature based Quantum Cryptography

    Group signature is an electronic signature used to authenticate the sender's identity of a message or signer of the document. It ensures the integrity of the message. Group signatures introduced by researchers in which a member anonymously signs a document on behalf of the group. Group signatures have abundant applications...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jan 2013

    Online Java Compiler Using Cloud Computing

    As it is a competitive world and very fast world, everything in the universes is to be internet. In this internet world all the things are on-line. So the authors created software called On-line java compiler. The main aim of this project they can easily to write a java program...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Nov 2012

    Signature Recognition & Verification Using ANN

    The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. There are various approaches to signature recognition with a lot of scope of research. In this paper, off-line signature recognition & verification using neural network is proposed, where...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Nov 2012

    Security Problems and Their Defenses in TCP/IP Protocol Suite

    The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers.TCP/IP is the basic communication language or protocol of the Internet and private networks either an intranet or an extranet. The TCP/IP suite has many design weaknesses so far as security and privacy are concerned. Some of...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Nov 2012

    IPV6 and Deep Packet Inspection

    The current version of the internet, IPV4 was depleted of addresses on february3, 2011. The storage of address has led to the introduction of IPV6 which has 128-bit (16-byte) source and destination IP addresses. Many organisations do not see a reason to convert to IPV6, and believe they are not...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Nov 2012

    VLSI Implementation of Data Encryption Standard Algorithm

    There are two main types of cryptography in use today - symmetric secret key cryptography and a symmetric or public key cryptography. Symmetric key cryptography is the oldest type whereas asymmetric cryptography is only being used publicly since the late 1970's 1. Asymmetric cryptography was a major milestone in the...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Sep 2012

    A New Binary Tree Approach of Huffman Code

    Lossless compression of a sequence of symbols is important in Information theory as well as today's IT field. Huffman coding is lossless and is most widely used. However, Huffman coding has some limitations depending on the stream of symbols appearing in a file. In fact, Huffman coding generates a code...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Aug 2012

    A Security Solution for the Transmission of Confidential Data and Efficient File Authentication Based on DES, AES, DSS and RSA

    Data security is an integral part of web based business applications like insurance, banking etc. These applications require a secure infrastructure to meet the security requirements of confidentiality, endpoint authentication, message integrity and no repudiation. Document encryption/decryption and signatures/validation are the data security standards that define XML vocabularies and processing...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    A Taxonomy of Web Search Using Search History Clustering Mechanism

    The size and richness of information available on the web growing very rapidly. To this end the users are trying to accomplish more complex task through online. The users can break down the complex tasks into a few co-dependent tasks and issue as multiple queries around these tasks. Search engines...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    Biometric System using Iris Pattern Recognition

    Iris is unique body part which does not change with respect to time. Also every individual has unique and different pattern of the Iris for both the eyes. This helps in identifying a person, quite accurately. Initially, a filter must be employed to get rid of any kind of noises...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    RFID Based Security System

    Radio Frequency IDentification (RFID) is one member in the family of Automatic Identification and Data Capture (AIDC) technologies and is a fast and reliable means of identifying any material object. The significant advantage of all types of RFID systems is the non-contact, non-line-of-sight nature of the technology. Tags can be...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    R-WASP: Real Time-Web Application SQL Injection Detector and Preventer

    In the real time word, there are many online systems those are major part of software systems in order to make them publically available to perform the remote operations. These online systems are vulnerable to different types of web based attacks. Here in this paper, the authors are considering the...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    Web Usage Mining Based on Complex Structure of XML for Web IDS

    In current trend, most of the businesses are running through online web applications such as banking, shopping, and several other e-commerce applications. Hence, securing the web sites is becomes must do task in order to secure sensitive information of end users as well as organizations. Web log files are generated...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    A Cost-Benefit Model for an Enterprise Information Security

    A cost-benefit model for an enterprise information security is presented in this paper. Economical analysis of information security investments that enterprises can use as guidance when applying the recommended risk mitigation plans are developed. An enterprises information security risk management associated with economical metrics. An economical analytical model is presented...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    Study on Cryptanalysis of the Tiny Encryption Algorithm

    In this paper, the authors present the Study on a Tiny Encryption Algorithm. There is a requirement to specify cryptographic strength in an objective manner rather than describing it using subjective descriptors such as weak, strong, acceptable etc. Such metrics are essential for describing the characteristics of cryptographic products and...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    The Online Home Security System: Ways to Protect Home from Intruders & Thefts

    Now-a-days security has been a major issue where crime is increasing and everyone wants to take proper measures to prevent intrusions. Existing security systems are more towards providing passive security system, but this project is aimed at developing the security of home against intruders, fire and smoke. The main concern...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Feb 2013

    Security Enhancing of a LAN Network Using Hardening Technique

    Computer networks allows access to information and services in an organized as well as controlled manner. Security is needed to make the users' data immune to any kind of data breach or malicious virus attacks. Hardening is to make system hard to protect from unauthorized access and is an on-going...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Dec 2013

    Algorithms and Techniques Used for 3D Face Recognition in the Presence of Expressions and Occlusion

    In this paper, the authors are enhance the algorithms towards the development of an efficient three dimensional face recognition system in the presence of expressions as well as for occluded face. The overall aim is to analyze patterns of expressions based on techniques relating to feature distances and also to...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jun 2013

    The Impact of Lossy Compression on Hyperspectral Data Adaptive Spectral Unmixing and PCA Classification

    In the past, scientific data have been almost exclusively compressed by means of lossless methods, in order to preserve their full quality. However, more recently, there has been an increasing interest in the lossy compression which has not yet globally accepted by the remote sensing community, mainly because it is...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jun 2013

    Analysis of Data Delivery Issues in MANET Using Implementation of MTOOR Algorithm

    In this paper, the authors address the issues of reliable data delivery in mobile ad-hoc network and implies a new (Moving Target Oriented Opportunistic Routing) Algorithm for which existing routing protocols are not suitable. This algorithm is implemented in Wireless Routing Protocol (WRP) which is good in delivering the data...

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Jun 2013

    Outlier Detection: A Clustering-Based Approach

    Outlier detection is a fundamental issue in data mining; specifically it has been used to detect and remove anomalous objects from data. It is an extremely important task in a wide variety of application domains. In this paper, a proposed method based on clustering approaches for outlier detection is presented....

    Provided By International Journal of Science and Modern Engineering (IJISME)

  • White Papers // Apr 2013

    Dynamic Business Solution for Production Management

    In present system, most of functions are performed physically which consist of quite a lot of risks as far as material handling and production system department is concern. In this issue, the authors are highlighting on providing automation to this field. With the help of integration of mechanical engineering and...

    Provided By International Journal of Science and Modern Engineering (IJISME)