International Journal of Scientific Engineering and Technology

Displaying 1-40 of 59 results

  • White Papers // Apr 2014

    Comparison Between FPGA Logic Resources And Embedded Resources Used By Discrete Arithmetic (DA) Architecture To Design FIR Filter

    FIR filter is a fundamental function in many applications, mainly in the field of Digital Signal Processing (DSP). The main problem of this function is its computational complexity, needed to process a signal. Currently, FPGAs are widely used for a variety of computationally complex applications. New generation of FPGAs contain...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Application Of Clustering Data Mining Techniques In Temporal Data Sets Of Hydrology: A Review

    Hydrologic cycle are rather very complex and it is very difficult to predict the behavior of runoff based on temporal data sets of hydrological process, as these are often very large and difficult to analyze and display. Clustering can be done by the different number of algorithms such as hierarchical,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Cloud Computing Security Challenges and Their Compromised Attributes

    Cloud computing is a revolutionary modern computing platform in the field of information technology. It has promptly became famous and considered the emerging field of recent times due to its potential for better utilization of computer resources like flexible IT architecture, scalability, availability, fault tolerance, computational power, computational platforms, storage...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Feb 2014

    Sharing without Disclosing: Analysis on the Protocols

    In many of today's business and government identity programs, smart cards based application are becoming more prevalent .strong cryptographic algorithm are needed to protect the data stored on the card. Smart card with embedded microcontroller has outstanding property to securely store the data and to perform the on-card functions like...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Feb 2014

    Public Key Encryption Without Using Certificate Based on Identity Based Cryptography

    It has been proven for many years that security for digital information can be attained by the cryptography techniques. Identity Based Cryptography (IBC) is an emerging area in cryptography schema. Identity based cryptography is the new system which reduces the key management process in traditional Public Key Infrastructures (PKI). The...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    A Critical Review of Different Cryptographic Technique in Pretty Good Privacy

    E-mail service is one of the most essential Internet Services. E-mail security is composed of confidentiality, authentication and message integrity. Pretty Good Privacy (PGP) is an email security protocol. It helps in encryption of the plain text data giving them cryptographic privacy and authentication. Cryptographic technique is used to encrypt...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    A Review on Comparative Analysis of Different Clustering and Decision Tree for Synthesized Data Mining Algorithm

    Web mining is the sub category or application of data mining techniques to extract knowledge from web data. With the advent of new advancements in technology the rapid use of new algorithms has been increased in the market. A data mining is one of the fast growing research field which...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    Engineering-Oriented Web Vision: Hosting the Present-Generation Enterprise Service Platform Based on Web Technologies Related Constructions

    In this paper, the authors present how methods of web technologies/cloud computing and models of web engineering can be used for hosting the platform with the implementation results and development experience. This paper also describes various web application frameworks and related emerging technologies pertinent to the platform from both a...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    Big Data Problems: Understanding Hadoop Framework

    The IT industry has seen revolution from migrating from standardization to integration to virtualization to automation to the cloud. Now the industry is all set to spin around the commercialization that is data analytics-business intelligence. From all fields data is generating is it any industry sector. Thus volume, variety and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2013

    Review of Anomaly Detection based on Classifying Frequent Traffic

    As internet grow rapidly and numerous applications use it as a larger communication media. Many organizations are Internet dependent for their working methodology. This paper will lead a larger amount of network traffic. Network traffic anomaly is kind of status that the traffic activities deviated from its normal condition behaviors....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2013

    Performance Analysis of Reliable VM Identification Using Resource Availability Method for Cloud Computing

    Cloud computing is one of the latest emerging trends in Information technology. Cloud computing shares the resources through the internet. Today there is a demand for cloud computing because of this resource sharing. This demand causes many challenges in cloud computing research areas. One of the major aspects of the...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2013

    A Critical Review of Security Mechanisms in Virtual Private Networks

    In this paper, the authors discuss about the security mechanisms employed by VPN for the purpose of authentication and confidentiality of the network data, with mainly focusing on how these technologies are used, how they provides the protection, and how the potential threats can be used against them. The security...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2013

    Security Level Enhancement in Noisy Environment

    Speech scrambling techniques are used to scramble clear speech into unintelligible signal in order to avoid eavesdropping.. Analog scramblers are intended in applications where the degree of security is not too critical and hardware modifications are prohibitive due to its high cost .The residual intelligibility of the speech signal can...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2013

    Design Approach for Cooperative Security in Vehicular Communication Systems

    A Vehicular Ad-hoc NETwork (VANET) is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. The key operation in VANETs is the broadcast of messages. Its main goal is to improve safety and comfort for passengers, but it can...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2013

    A Dynamic Optimization Algorithm for Task Scheduling in Cloud Computing with Resource Utilization

    It is a style of computing where massively scalable resources are delivered as a service to external customers using Internet technologies. Scheduling in cloud is responsible for selection of best suitable resources for task execution, by taking some static and dynamic parameters and restrictions of tasks' into consideration. Cloud computing...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Record Matching in Web Databases Using Unsupervised Approach

    Record matching is the problem of combining information from multiple heterogeneous databases. One step of data integration is relating the records that appear in the different databases specifically, determining which sets of records refer to the same real-world entities. Performing record matching solves the duplication detection problems; hence the needs...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Biometric Security System Based on Fingerprint Recognition

    Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Malicious Attacks in Ad Hoc Networks - Detection & Protection

    Ad hoc networks provide a new wireless networking mechanism for mobile communication. Ad hoc networks do not have any fixed infrastructure as is the case for conventional mobile wireless networks. In ad hoc networks, various network nodes communicate with each other to keep the network connected. Ad hoc networks, being...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Ontology-Based Query Processing in a Dynamic Data Integration System

    Data integration systems attempt to provide users with seamless and flexible access to information from multiple autonomous, distributed and heterogeneous data sources through a unified query interface. Ideally, a data integration system should allow users to specify what information is needed without having to provide detailed instructions on how or...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Aug 2013

    Critical State Based Filtering System with Code Security for SCADA Network Protocols

    SCADA (Supervisory Control And Data Acquisition) is a type of Industrial Control System (ICS). It's a centralized system that monitors and control industrial processes that exist in the physical world. They work in Master - Slave basis. This system is widely used in Power plants, traffic light control, power plants,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jul 2013

    Localization of Wireless Sensor Networks Using Robust Estimated Trust Evaluation Model

    Wireless sensor network localization is an important area that attracts significant research interest. Current localization algorithms mainly focus to localize as many nodes as possible for a given static set of anchor nodes and distance measurement. In this paper, the authors discuss a new technique that aims to localize all...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jul 2013

    COSDES of Junk E-Mail with Junk Free System Scheme

    E-mail communication is indispensable now, but the email spam problem is continuously growing more. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been discussed widely. The idea of the similarity matching scheme for spam detection is, to maintain a database formed by user...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Capacitance Based Low Power ALU Design and Implementation on 28nm FPGA

    Arithmetic logic unit in extended form is taken as math coprocessor. It is used to solve arithmetical and logical functions. Technology scaling to 28nm is the default way to reduce dynamic power consumption of ALU. For more reduction in IOs power, the authors reduce capacitance because device capacitance requirements vary...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    A Novel Architecture for an Efficient Data Encryption System

    The RSA algorithm is the most popular and proven asymmetric key cryptographic algorithm. The researchers developed the first major asymmetric key cryptography system. The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Efficient Cross Layer Mitigation in SCADA Network

    Almost all the industrial data acquisition and control systems today use connection oriented concepts for interfaces. However, various shapes and functional commands that each cable or wire based system have also raises numerous problems: the difficulties in locating the particular area affected by the industrial parameter, the complexity in operation...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Face Recognition Using ANN with Reduce Feature by PCA in Wavelet Domain

    Face recognition is an active research area in various streams such as pattern recognition, image processing. The strong need of face recognition is personal identification and recognition without the cooperation of the participants. This paper presents face recognition using wavelet transform. A face recognition system follow these steps image decomposition,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Model-Based Collaborative Filtering Using Refined K-Means and Genetic Algorithm

    As cloud computing has emerged as new computing paradigm, more and more web services has been provided on the Internet, thereby how to select a qualified service is becoming a key issue. Several approaches based on clustering, e.g., KMeans (KMC) Clustering, fuzzy clustering, subtractive clustering has been proposed. KMC is...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Web Data Extraction and Alignment Tools: A Survey

    Search engine generates the dynamic result page when user submits a query. Result page consists of query relevant data along with some auxiliary information such as advertisement, navigation panels. Decision making regarding which part of this web page has main content is easy for human but tough for computer programs....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    A Domestic Robot for Security Systems by Video Surveillance Using Zigbee Technology

    In this implementation of defense security systems. When a person or motor vehicle enters a monitored area, PIR motion detectors are commonly used in conjunction with different parts of the war field. When someone enters secured places, immediately it will send an indication to the control room section through wireless...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    Network Data Security Using FPGA

    In this paper, the authors approach a new and simple technique to develop the RSA algorithm using FPGA that can be used as a standard device in the secured communication system. This RSA algorithm is implemented in the FPGA with the help of VHDL. A simple nested loop addition and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    A Fault-Tolerant Based Load Balancing Model in Distributed Web Environment

    Internet users are increasing exponentially since the last decade which drastically increases the internet traffic. This gives the user a challenge to manage the requests from the client on the web server. In the distributed environment the number of client requests web services are increasing, the quality of service in...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    An Innovative Approach to File Security Using Bluetooth

    In this paper, the authors present a system based on nontraditional idea that applies symmetric key encryption algorithm to keep user data secure against unauthorized reading and undetected mutilation. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2013

    Survey of Confidentiality and Integrity in Outsourced Databases

    Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client's database is stored at an external service provider. Outsourcing databases to external providers promises higher availability and more effective disaster protection than in-house operations. An increasing number of enterprises outsource their IT functions or business...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2013

    An Overview of Web Data Extraction Techniques

    Web pages are usually generated for visualization not for data exchange. Each page may contain several groups of structured data. Web pages are generated by plugging data values to predefined templates. Manual data extraction from semi supervised web pages is a difficult task. This paper focuses on study of various...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2013

    Making Data Breach Prevention a Matter of Policy in Corporate Governance

    A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. The most common concept of a data breach is an attacker hacking into a corporate network to steal sensitive data. It seems like...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Nov 2012

    Fast & Automatic Verification of Authentication & Key Exchange Protocol

    In this paper, the authors introduce the automatic verification of authentication & key exchange protocol its name suggest/show the paper summery now It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet these requirements, they proposed...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    Micro-strip Patch Antenna on Glass Proxy Substrate for Infinite and Finite Ground Plane

    In this paper the authors have analyzed and designed a rectangular microstrip antenna. They analyzed micro strip antenna in IE3D by finite moment of method. In this paper they have compare and analyzed the micro strip antenna in infinite ground plane having dimension length, L = 700mil & width, W=800mil...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    Pipelined FIR Filter Implementation using FPGA

    FIR filters are being designed using HDL languages to enhance the speed of the system. In the whole system if the speed of the individual block is enhanced, the overall speed of the system is enhanced. In order to attain effective utilization hardware is done by applying the pipelining technique....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    LLP in Chain Inverter by using CMOS Circuit

    In this paper the authors provide new low power solutions for Very Large Scale Integration (VLSI) designers. Especially, the authors focus on leakage power reduction. Although leakage power was negligible at 0.18μ technology and in nano scale technology, such as 0.07μ, leakage power is almost equal to dynamic power consumption....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    Dual Layer Data Hiding Using Cryptography and Steganography

    Digital communication has become an essential part of society. Now-a-days, a lot of applications are internet based and it is important that communication be made faithful and secret. Steganography and cryptography are two popular ways of information exchange in a secret way. Steganography hides the existence of the message and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Comparison Between FPGA Logic Resources And Embedded Resources Used By Discrete Arithmetic (DA) Architecture To Design FIR Filter

    FIR filter is a fundamental function in many applications, mainly in the field of Digital Signal Processing (DSP). The main problem of this function is its computational complexity, needed to process a signal. Currently, FPGAs are widely used for a variety of computationally complex applications. New generation of FPGAs contain...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    Micro-strip Patch Antenna on Glass Proxy Substrate for Infinite and Finite Ground Plane

    In this paper the authors have analyzed and designed a rectangular microstrip antenna. They analyzed micro strip antenna in IE3D by finite moment of method. In this paper they have compare and analyzed the micro strip antenna in infinite ground plane having dimension length, L = 700mil & width, W=800mil...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    Pipelined FIR Filter Implementation using FPGA

    FIR filters are being designed using HDL languages to enhance the speed of the system. In the whole system if the speed of the individual block is enhanced, the overall speed of the system is enhanced. In order to attain effective utilization hardware is done by applying the pipelining technique....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    LLP in Chain Inverter by using CMOS Circuit

    In this paper the authors provide new low power solutions for Very Large Scale Integration (VLSI) designers. Especially, the authors focus on leakage power reduction. Although leakage power was negligible at 0.18μ technology and in nano scale technology, such as 0.07μ, leakage power is almost equal to dynamic power consumption....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Capacitance Based Low Power ALU Design and Implementation on 28nm FPGA

    Arithmetic logic unit in extended form is taken as math coprocessor. It is used to solve arithmetical and logical functions. Technology scaling to 28nm is the default way to reduce dynamic power consumption of ALU. For more reduction in IOs power, the authors reduce capacitance because device capacitance requirements vary...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Record Matching in Web Databases Using Unsupervised Approach

    Record matching is the problem of combining information from multiple heterogeneous databases. One step of data integration is relating the records that appear in the different databases specifically, determining which sets of records refer to the same real-world entities. Performing record matching solves the duplication detection problems; hence the needs...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Application Of Clustering Data Mining Techniques In Temporal Data Sets Of Hydrology: A Review

    Hydrologic cycle are rather very complex and it is very difficult to predict the behavior of runoff based on temporal data sets of hydrological process, as these are often very large and difficult to analyze and display. Clustering can be done by the different number of algorithms such as hierarchical,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Cloud Computing Security Challenges and Their Compromised Attributes

    Cloud computing is a revolutionary modern computing platform in the field of information technology. It has promptly became famous and considered the emerging field of recent times due to its potential for better utilization of computer resources like flexible IT architecture, scalability, availability, fault tolerance, computational power, computational platforms, storage...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    Dual Layer Data Hiding Using Cryptography and Steganography

    Digital communication has become an essential part of society. Now-a-days, a lot of applications are internet based and it is important that communication be made faithful and secret. Steganography and cryptography are two popular ways of information exchange in a secret way. Steganography hides the existence of the message and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2013

    Making Data Breach Prevention a Matter of Policy in Corporate Governance

    A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. The most common concept of a data breach is an attacker hacking into a corporate network to steal sensitive data. It seems like...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Feb 2014

    Sharing without Disclosing: Analysis on the Protocols

    In many of today's business and government identity programs, smart cards based application are becoming more prevalent .strong cryptographic algorithm are needed to protect the data stored on the card. Smart card with embedded microcontroller has outstanding property to securely store the data and to perform the on-card functions like...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    A Critical Review of Different Cryptographic Technique in Pretty Good Privacy

    E-mail service is one of the most essential Internet Services. E-mail security is composed of confidentiality, authentication and message integrity. Pretty Good Privacy (PGP) is an email security protocol. It helps in encryption of the plain text data giving them cryptographic privacy and authentication. Cryptographic technique is used to encrypt...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    A Review on Comparative Analysis of Different Clustering and Decision Tree for Synthesized Data Mining Algorithm

    Web mining is the sub category or application of data mining techniques to extract knowledge from web data. With the advent of new advancements in technology the rapid use of new algorithms has been increased in the market. A data mining is one of the fast growing research field which...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    Engineering-Oriented Web Vision: Hosting the Present-Generation Enterprise Service Platform Based on Web Technologies Related Constructions

    In this paper, the authors present how methods of web technologies/cloud computing and models of web engineering can be used for hosting the platform with the implementation results and development experience. This paper also describes various web application frameworks and related emerging technologies pertinent to the platform from both a...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    Big Data Problems: Understanding Hadoop Framework

    The IT industry has seen revolution from migrating from standardization to integration to virtualization to automation to the cloud. Now the industry is all set to spin around the commercialization that is data analytics-business intelligence. From all fields data is generating is it any industry sector. Thus volume, variety and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    A Domestic Robot for Security Systems by Video Surveillance Using Zigbee Technology

    In this implementation of defense security systems. When a person or motor vehicle enters a monitored area, PIR motion detectors are commonly used in conjunction with different parts of the war field. When someone enters secured places, immediately it will send an indication to the control room section through wireless...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    Network Data Security Using FPGA

    In this paper, the authors approach a new and simple technique to develop the RSA algorithm using FPGA that can be used as a standard device in the secured communication system. This RSA algorithm is implemented in the FPGA with the help of VHDL. A simple nested loop addition and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Biometric Security System Based on Fingerprint Recognition

    Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2013

    Security Level Enhancement in Noisy Environment

    Speech scrambling techniques are used to scramble clear speech into unintelligible signal in order to avoid eavesdropping.. Analog scramblers are intended in applications where the degree of security is not too critical and hardware modifications are prohibitive due to its high cost .The residual intelligibility of the speech signal can...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Aug 2013

    Critical State Based Filtering System with Code Security for SCADA Network Protocols

    SCADA (Supervisory Control And Data Acquisition) is a type of Industrial Control System (ICS). It's a centralized system that monitors and control industrial processes that exist in the physical world. They work in Master - Slave basis. This system is widely used in Power plants, traffic light control, power plants,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2013

    Design Approach for Cooperative Security in Vehicular Communication Systems

    A Vehicular Ad-hoc NETwork (VANET) is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. The key operation in VANETs is the broadcast of messages. Its main goal is to improve safety and comfort for passengers, but it can...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2013

    Review of Anomaly Detection based on Classifying Frequent Traffic

    As internet grow rapidly and numerous applications use it as a larger communication media. Many organizations are Internet dependent for their working methodology. This paper will lead a larger amount of network traffic. Network traffic anomaly is kind of status that the traffic activities deviated from its normal condition behaviors....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Malicious Attacks in Ad Hoc Networks - Detection & Protection

    Ad hoc networks provide a new wireless networking mechanism for mobile communication. Ad hoc networks do not have any fixed infrastructure as is the case for conventional mobile wireless networks. In ad hoc networks, various network nodes communicate with each other to keep the network connected. Ad hoc networks, being...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Nov 2012

    Fast & Automatic Verification of Authentication & Key Exchange Protocol

    In this paper, the authors introduce the automatic verification of authentication & key exchange protocol its name suggest/show the paper summery now It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance with security requirements. In order to meet these requirements, they proposed...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    A Conceptual Architecture for Securing Public Cloud: Moving From Trust Toward Security

    Cloud computing is next generation era of IT enterprise, which provide services like resource pooling, on demand and metered service. It provides the burden free environment for the consumer, to get rid of resource management. It also shifts all digital assets (data and application) to the centralized large data center....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2013

    Performance Analysis of Reliable VM Identification Using Resource Availability Method for Cloud Computing

    Cloud computing is one of the latest emerging trends in Information technology. Cloud computing shares the resources through the internet. Today there is a demand for cloud computing because of this resource sharing. This demand causes many challenges in cloud computing research areas. One of the major aspects of the...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jul 2013

    Localization of Wireless Sensor Networks Using Robust Estimated Trust Evaluation Model

    Wireless sensor network localization is an important area that attracts significant research interest. Current localization algorithms mainly focus to localize as many nodes as possible for a given static set of anchor nodes and distance measurement. In this paper, the authors discuss a new technique that aims to localize all...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    A Novel Architecture for an Efficient Data Encryption System

    The RSA algorithm is the most popular and proven asymmetric key cryptographic algorithm. The researchers developed the first major asymmetric key cryptography system. The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Efficient Cross Layer Mitigation in SCADA Network

    Almost all the industrial data acquisition and control systems today use connection oriented concepts for interfaces. However, various shapes and functional commands that each cable or wire based system have also raises numerous problems: the difficulties in locating the particular area affected by the industrial parameter, the complexity in operation...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    A Fault-Tolerant Based Load Balancing Model in Distributed Web Environment

    Internet users are increasing exponentially since the last decade which drastically increases the internet traffic. This gives the user a challenge to manage the requests from the client on the web server. In the distributed environment the number of client requests web services are increasing, the quality of service in...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    An Innovative Approach to File Security Using Bluetooth

    In this paper, the authors present a system based on nontraditional idea that applies symmetric key encryption algorithm to keep user data secure against unauthorized reading and undetected mutilation. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Feb 2014

    Public Key Encryption Without Using Certificate Based on Identity Based Cryptography

    It has been proven for many years that security for digital information can be attained by the cryptography techniques. Identity Based Cryptography (IBC) is an emerging area in cryptography schema. Identity based cryptography is the new system which reduces the key management process in traditional Public Key Infrastructures (PKI). The...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Credit Card Transaction Fraud Detection by Using Hidden Markov Model

    This paper proposes a HMM (Hidden Markov Model) based fraud detection system for credit card fraud detection. The method works on the statistical behavior of user's transactions. Since the original transactions are not available due to privacy policies of bank they used here synthetically generated data for a credit card...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    A Neural Network Based Image Abstraction Technique

    Image abstraction is a method of enhancing or highlighting the visualization of main information contents of image and smoothing the other portion. It is quite important for many multimedia applications like cartooning and animation where symbolic presentation matters; hence it is an important part in the field of image processing....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Image Enhancement Based on Abstraction and Neural Network

    This paper presents a hybrid technique for image enhancement with ability of de-noising it integrates two different processing aspects into one. The proposed algorithm uses the image abstraction technique for detecting the information density in different parts of image then accordingly operates the smoothing filter and after filtering edges are...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Computer and Information Technology Assisted Applications

    This paper introduces the how the computer and information technology is used to help individuals with disabilities. Engineers at the Georgia Institute of Technology say that a new technology called Tongue Drive system will be helpful to individuals with serious disabilities, such as those with severe spinal cord injuries and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2011

    Automatic Image Mosaicing: An Approach Based on FFT

    In this paper, correlation-based scheme is used which operates in the Fourier domain for finding the transformed coordinates (translational and rotational parameters) and use them for Image Mosaicing. In many clinical studies, it is highly desirable to acquire images as whole sections whilst retaining a microscopic resolution. A usual approach...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2011

    Wireless Energy Transfer

    Wireless energy transfer or wireless power transmission is the process that takes place in any system where electrical energy is transmitted from a power source to an electrical load, without interconnecting wires in an electrical grid. Wireless transmission is ideal in cases where instantaneous or continuous energy transfer is needed,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2011

    Key Frame Extraction Based on Block Based Histogram Difference and Edge Matching Rate

    This paper presents a new approach for key frame extraction based on the block based Histogram difference and edge matching rate. Firstly, the Histogram difference of every frame is calculated, and then the edges of the candidate key frames are extracted by Prewitt operator. At last, the paper makes the...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2013

    A Critical Review of Security Mechanisms in Virtual Private Networks

    In this paper, the authors discuss about the security mechanisms employed by VPN for the purpose of authentication and confidentiality of the network data, with mainly focusing on how these technologies are used, how they provides the protection, and how the potential threats can be used against them. The security...

    Provided By International Journal of Scientific Engineering and Technology