International Journal of Scientific Engineering and Technology

Displaying 1-40 of 64 results

  • White Papers // May 2014

    Security Enhancement on Cloud using Multi Cloud Concepts

    Cloud computing provide dynamically usable and large resources provisioned as a service over the web. The third party, pay-per-use, and seamlessly large and usable computing resources and services offered by the cloud paradigm promise to reduce capital amount as well as operational cost for hardware and software. Security challenges are...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2014

    Securing Storage of Data in Cloud Computing

    In this paper, a new data encoding scheme is proposed called layered interleaving. It provides good security. Thus, this extensive security and analysis of the performance shows that the proposed scheme is highly effective and efficient against byzantine failure, the malicious data modification attacks, and server colluding attacks. The storage...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2014

    Comparative Study of Public Auditing and Replica for Secure Cloud Storage

    Using cloud computing user can store their data secure without load of local user computer. And this feature additionally should be cable enough to provide user to maintain the cloud storage, as it is if same is maintained in the local, where no consideration required verifying the data integrity. On...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2014

    TPA For Privacy-Preserving Using Safe Cloud Storage

    The data content stored on the cloud server during the efficient auditing process, it not only eliminates the burden of cloud user and possibly expensive auditing task. Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2014

    Privacy Preserving Public Auditing for Secure Cloud Storage-Replica

    Using cloud computing user will be able to store and secure their data without burden of local computer. Additionally, users should be able to just use the cloud storage as if it is local, without distressing about the need to verify its integrity. By enabling and using public audit for...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Application Of Clustering Data Mining Techniques In Temporal Data Sets Of Hydrology: A Review

    Hydrologic cycle are rather very complex and it is very difficult to predict the behavior of runoff based on temporal data sets of hydrological process, as these are often very large and difficult to analyze and display. Clustering can be done by the different number of algorithms such as hierarchical,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Cloud Computing Security Challenges and Their Compromised Attributes

    Cloud computing is a revolutionary modern computing platform in the field of information technology. It has promptly became famous and considered the emerging field of recent times due to its potential for better utilization of computer resources like flexible IT architecture, scalability, availability, fault tolerance, computational power, computational platforms, storage...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Comparison Between FPGA Logic Resources And Embedded Resources Used By Discrete Arithmetic (DA) Architecture To Design FIR Filter

    FIR filter is a fundamental function in many applications, mainly in the field of Digital Signal Processing (DSP). The main problem of this function is its computational complexity, needed to process a signal. Currently, FPGAs are widely used for a variety of computationally complex applications. New generation of FPGAs contain...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Feb 2014

    Sharing without Disclosing: Analysis on the Protocols

    In many of today's business and government identity programs, smart cards based application are becoming more prevalent .strong cryptographic algorithm are needed to protect the data stored on the card. Smart card with embedded microcontroller has outstanding property to securely store the data and to perform the on-card functions like...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Feb 2014

    Public Key Encryption Without Using Certificate Based on Identity Based Cryptography

    It has been proven for many years that security for digital information can be attained by the cryptography techniques. Identity Based Cryptography (IBC) is an emerging area in cryptography schema. Identity based cryptography is the new system which reduces the key management process in traditional Public Key Infrastructures (PKI). The...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    A Review on Comparative Analysis of Different Clustering and Decision Tree for Synthesized Data Mining Algorithm

    Web mining is the sub category or application of data mining techniques to extract knowledge from web data. With the advent of new advancements in technology the rapid use of new algorithms has been increased in the market. A data mining is one of the fast growing research field which...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    A Critical Review of Different Cryptographic Technique in Pretty Good Privacy

    E-mail service is one of the most essential Internet Services. E-mail security is composed of confidentiality, authentication and message integrity. Pretty Good Privacy (PGP) is an email security protocol. It helps in encryption of the plain text data giving them cryptographic privacy and authentication. Cryptographic technique is used to encrypt...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    Big Data Problems: Understanding Hadoop Framework

    The IT industry has seen revolution from migrating from standardization to integration to virtualization to automation to the cloud. Now the industry is all set to spin around the commercialization that is data analytics-business intelligence. From all fields data is generating is it any industry sector. Thus volume, variety and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2014

    Engineering-Oriented Web Vision: Hosting the Present-Generation Enterprise Service Platform Based on Web Technologies Related Constructions

    In this paper, the authors present how methods of web technologies/cloud computing and models of web engineering can be used for hosting the platform with the implementation results and development experience. This paper also describes various web application frameworks and related emerging technologies pertinent to the platform from both a...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2013

    Performance Analysis of Reliable VM Identification Using Resource Availability Method for Cloud Computing

    Cloud computing is one of the latest emerging trends in Information technology. Cloud computing shares the resources through the internet. Today there is a demand for cloud computing because of this resource sharing. This demand causes many challenges in cloud computing research areas. One of the major aspects of the...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2013

    Review of Anomaly Detection based on Classifying Frequent Traffic

    As internet grow rapidly and numerous applications use it as a larger communication media. Many organizations are Internet dependent for their working methodology. This paper will lead a larger amount of network traffic. Network traffic anomaly is kind of status that the traffic activities deviated from its normal condition behaviors....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2013

    A Critical Review of Security Mechanisms in Virtual Private Networks

    In this paper, the authors discuss about the security mechanisms employed by VPN for the purpose of authentication and confidentiality of the network data, with mainly focusing on how these technologies are used, how they provides the protection, and how the potential threats can be used against them. The security...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2013

    Security Level Enhancement in Noisy Environment

    Speech scrambling techniques are used to scramble clear speech into unintelligible signal in order to avoid eavesdropping.. Analog scramblers are intended in applications where the degree of security is not too critical and hardware modifications are prohibitive due to its high cost .The residual intelligibility of the speech signal can...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2013

    Design Approach for Cooperative Security in Vehicular Communication Systems

    A Vehicular Ad-hoc NETwork (VANET) is a form of Mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed roadside equipment. The key operation in VANETs is the broadcast of messages. Its main goal is to improve safety and comfort for passengers, but it can...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2013

    A Dynamic Optimization Algorithm for Task Scheduling in Cloud Computing with Resource Utilization

    It is a style of computing where massively scalable resources are delivered as a service to external customers using Internet technologies. Scheduling in cloud is responsible for selection of best suitable resources for task execution, by taking some static and dynamic parameters and restrictions of tasks' into consideration. Cloud computing...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Record Matching in Web Databases Using Unsupervised Approach

    Record matching is the problem of combining information from multiple heterogeneous databases. One step of data integration is relating the records that appear in the different databases specifically, determining which sets of records refer to the same real-world entities. Performing record matching solves the duplication detection problems; hence the needs...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Biometric Security System Based on Fingerprint Recognition

    Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Malicious Attacks in Ad Hoc Networks - Detection & Protection

    Ad hoc networks provide a new wireless networking mechanism for mobile communication. Ad hoc networks do not have any fixed infrastructure as is the case for conventional mobile wireless networks. In ad hoc networks, various network nodes communicate with each other to keep the network connected. Ad hoc networks, being...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Ontology-Based Query Processing in a Dynamic Data Integration System

    Data integration systems attempt to provide users with seamless and flexible access to information from multiple autonomous, distributed and heterogeneous data sources through a unified query interface. Ideally, a data integration system should allow users to specify what information is needed without having to provide detailed instructions on how or...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Aug 2013

    Critical State Based Filtering System with Code Security for SCADA Network Protocols

    SCADA (Supervisory Control And Data Acquisition) is a type of Industrial Control System (ICS). It's a centralized system that monitors and control industrial processes that exist in the physical world. They work in Master - Slave basis. This system is widely used in Power plants, traffic light control, power plants,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jul 2013

    Localization of Wireless Sensor Networks Using Robust Estimated Trust Evaluation Model

    Wireless sensor network localization is an important area that attracts significant research interest. Current localization algorithms mainly focus to localize as many nodes as possible for a given static set of anchor nodes and distance measurement. In this paper, the authors discuss a new technique that aims to localize all...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jul 2013

    COSDES of Junk E-Mail with Junk Free System Scheme

    E-mail communication is indispensable now, but the email spam problem is continuously growing more. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been discussed widely. The idea of the similarity matching scheme for spam detection is, to maintain a database formed by user...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Capacitance Based Low Power ALU Design and Implementation on 28nm FPGA

    Arithmetic logic unit in extended form is taken as math coprocessor. It is used to solve arithmetical and logical functions. Technology scaling to 28nm is the default way to reduce dynamic power consumption of ALU. For more reduction in IOs power, the authors reduce capacitance because device capacitance requirements vary...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    A Novel Architecture for an Efficient Data Encryption System

    The RSA algorithm is the most popular and proven asymmetric key cryptographic algorithm. The researchers developed the first major asymmetric key cryptography system. The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Efficient Cross Layer Mitigation in SCADA Network

    Almost all the industrial data acquisition and control systems today use connection oriented concepts for interfaces. However, various shapes and functional commands that each cable or wire based system have also raises numerous problems: the difficulties in locating the particular area affected by the industrial parameter, the complexity in operation...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Face Recognition Using ANN with Reduce Feature by PCA in Wavelet Domain

    Face recognition is an active research area in various streams such as pattern recognition, image processing. The strong need of face recognition is personal identification and recognition without the cooperation of the participants. This paper presents face recognition using wavelet transform. A face recognition system follow these steps image decomposition,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Web Data Extraction and Alignment Tools: A Survey

    Search engine generates the dynamic result page when user submits a query. Result page consists of query relevant data along with some auxiliary information such as advertisement, navigation panels. Decision making regarding which part of this web page has main content is easy for human but tough for computer programs....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Model-Based Collaborative Filtering Using Refined K-Means and Genetic Algorithm

    As cloud computing has emerged as new computing paradigm, more and more web services has been provided on the Internet, thereby how to select a qualified service is becoming a key issue. Several approaches based on clustering, e.g., KMeans (KMC) Clustering, fuzzy clustering, subtractive clustering has been proposed. KMC is...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    An Innovative Approach to File Security Using Bluetooth

    In this paper, the authors present a system based on nontraditional idea that applies symmetric key encryption algorithm to keep user data secure against unauthorized reading and undetected mutilation. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    A Fault-Tolerant Based Load Balancing Model in Distributed Web Environment

    Internet users are increasing exponentially since the last decade which drastically increases the internet traffic. This gives the user a challenge to manage the requests from the client on the web server. In the distributed environment the number of client requests web services are increasing, the quality of service in...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    Network Data Security Using FPGA

    In this paper, the authors approach a new and simple technique to develop the RSA algorithm using FPGA that can be used as a standard device in the secured communication system. This RSA algorithm is implemented in the FPGA with the help of VHDL. A simple nested loop addition and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    A Domestic Robot for Security Systems by Video Surveillance Using Zigbee Technology

    In this implementation of defense security systems. When a person or motor vehicle enters a monitored area, PIR motion detectors are commonly used in conjunction with different parts of the war field. When someone enters secured places, immediately it will send an indication to the control room section through wireless...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2013

    An Overview of Web Data Extraction Techniques

    Web pages are usually generated for visualization not for data exchange. Each page may contain several groups of structured data. Web pages are generated by plugging data values to predefined templates. Manual data extraction from semi supervised web pages is a difficult task. This paper focuses on study of various...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2013

    Survey of Confidentiality and Integrity in Outsourced Databases

    Database outsourcing is becoming increasingly popular introducing a new paradigm, called database-as-a-service, where a client's database is stored at an external service provider. Outsourcing databases to external providers promises higher availability and more effective disaster protection than in-house operations. An increasing number of enterprises outsource their IT functions or business...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2013

    Making Data Breach Prevention a Matter of Policy in Corporate Governance

    A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. The most common concept of a data breach is an attacker hacking into a corporate network to steal sensitive data. It seems like...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    An Innovative Approach to File Security Using Bluetooth

    In this paper, the authors present a system based on nontraditional idea that applies symmetric key encryption algorithm to keep user data secure against unauthorized reading and undetected mutilation. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Security Challenges in Ad Hoc Networks

    Ad hoc networks are special networks that do not require an infrastructure. Nodes of such networks are usually mobile and wireless. Wireless nodes use a shared medium for communication, so they are able to communicate with many nodes directly provided they are within communication range of those nodes. In this...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Space Frequency Coded OFDM

    The authors are going to implement and study a space frequency coded OFDM system which consists of two transmitters and a single receiver. Simple Alamouti spacetime code is used. An M-ary PSK modulation is used to modulate the symbols across an OFDM channel. They will also propose a variation of...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Reverse Engineering Approach to Instatement of Design Artifacts

    Software engineering concerned with improving the productivity of the software development process and the quality of the systems it produces. However, in current scenario, the most of the development effort is spent on maintaining existing systems rather than developing new ones. This paper describes wide research program which is present...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Simulation & Assessment of Network Security Based on System Dynamics

    Security is one of the most important aspects while designing a Computer Network, the issue is gaining more & more attention as the Network area is growing, the robust Security mechanism is required especially for the networks involving e-commerce & confidential data. Till now there are number of solutions are...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Image De-Noising by Common Vector Elimination in PCA (Principal Component Analysis)

    This paper presents the PCA (Principal Component Analysis) based algorithm for noise removal from noisy images, the concept is based on analysis which states that the noise components affects all parts of image uniformly, the noise can be from many independent components, in proposed algorithm the noisy vector is searched...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Real Time Implementation of Stereo Matching Algorithm Using Matlab

    To realize the accuracy and stability of the real time binocular image matching, this paper design a stereo matching algorithm based on window & horizontal line based method. Firstly, apply median and homomorphic filtering for real time stereo image preprocessing to minimize noise and enhance image contrast. Secondly, apply the...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    To Reduce SRAM Sub-Threshold Leakage Using Stack and Zig-Zag Techniques

    The growing market of portable electronics devices demands lesser power dissipation for longer battery life and compact system. Considerable attention has been given to the design of low-power and highperformance SRAMs since they are critical components in both high-performance processors and hand-held portable devices. The reduction of the threshold voltage...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Performance Analysis of Routing Protocols for Battlefield Monitoring System

    Many authors have compared various routing protocols such as AODV, DSR, DSDV, TORA, DYMO, OLSR, etc. In this paper, the authors have compare AODV, DYMO and OLSR routing protocols under Battlefield Monitoring System. In battlefield monitoring system, a sensor nodes act as a source which can vary and a single...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    RFID (Radio Frequency IDentification) Growth in Daily Life

    There are three general methods to identify and track assets: paper and pencil or similar manual record keeping techniques; bar code techniques using printed paper or plastic labels with laser readers. Barcode labels use light beams which cannot read through dirt, or around corners or through walls, or at distances...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Credit Card Transaction Fraud Detection by Using Hidden Markov Model

    This paper proposes a HMM (Hidden Markov Model) based fraud detection system for credit card fraud detection. The method works on the statistical behavior of user's transactions. Since the original transactions are not available due to privacy policies of bank they used here synthetically generated data for a credit card...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    A Neural Network Based Image Abstraction Technique

    Image abstraction is a method of enhancing or highlighting the visualization of main information contents of image and smoothing the other portion. It is quite important for many multimedia applications like cartooning and animation where symbolic presentation matters; hence it is an important part in the field of image processing....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Image Enhancement Based on Abstraction and Neural Network

    This paper presents a hybrid technique for image enhancement with ability of de-noising it integrates two different processing aspects into one. The proposed algorithm uses the image abstraction technique for detecting the information density in different parts of image then accordingly operates the smoothing filter and after filtering edges are...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2012

    Computer and Information Technology Assisted Applications

    This paper introduces the how the computer and information technology is used to help individuals with disabilities. Engineers at the Georgia Institute of Technology say that a new technology called Tongue Drive system will be helpful to individuals with serious disabilities, such as those with severe spinal cord injuries and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2011

    Automatic Image Mosaicing: An Approach Based on FFT

    In this paper, correlation-based scheme is used which operates in the Fourier domain for finding the transformed coordinates (translational and rotational parameters) and use them for Image Mosaicing. In many clinical studies, it is highly desirable to acquire images as whole sections whilst retaining a microscopic resolution. A usual approach...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2011

    Wireless Energy Transfer

    Wireless energy transfer or wireless power transmission is the process that takes place in any system where electrical energy is transmitted from a power source to an electrical load, without interconnecting wires in an electrical grid. Wireless transmission is ideal in cases where instantaneous or continuous energy transfer is needed,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2011

    Key Frame Extraction Based on Block Based Histogram Difference and Edge Matching Rate

    This paper presents a new approach for key frame extraction based on the block based Histogram difference and edge matching rate. Firstly, the Histogram difference of every frame is calculated, and then the edges of the candidate key frames are extracted by Prewitt operator. At last, the paper makes the...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2014

    Security Enhancement on Cloud using Multi Cloud Concepts

    Cloud computing provide dynamically usable and large resources provisioned as a service over the web. The third party, pay-per-use, and seamlessly large and usable computing resources and services offered by the cloud paradigm promise to reduce capital amount as well as operational cost for hardware and software. Security challenges are...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2014

    Securing Storage of Data in Cloud Computing

    In this paper, a new data encoding scheme is proposed called layered interleaving. It provides good security. Thus, this extensive security and analysis of the performance shows that the proposed scheme is highly effective and efficient against byzantine failure, the malicious data modification attacks, and server colluding attacks. The storage...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2014

    Comparative Study of Public Auditing and Replica for Secure Cloud Storage

    Using cloud computing user can store their data secure without load of local user computer. And this feature additionally should be cable enough to provide user to maintain the cloud storage, as it is if same is maintained in the local, where no consideration required verifying the data integrity. On...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2014

    TPA For Privacy-Preserving Using Safe Cloud Storage

    The data content stored on the cloud server during the efficient auditing process, it not only eliminates the burden of cloud user and possibly expensive auditing task. Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2014

    Privacy Preserving Public Auditing for Secure Cloud Storage-Replica

    Using cloud computing user will be able to store and secure their data without burden of local computer. Additionally, users should be able to just use the cloud storage as if it is local, without distressing about the need to verify its integrity. By enabling and using public audit for...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Capacitance Based Low Power ALU Design and Implementation on 28nm FPGA

    Arithmetic logic unit in extended form is taken as math coprocessor. It is used to solve arithmetical and logical functions. Technology scaling to 28nm is the default way to reduce dynamic power consumption of ALU. For more reduction in IOs power, the authors reduce capacitance because device capacitance requirements vary...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Sep 2013

    Record Matching in Web Databases Using Unsupervised Approach

    Record matching is the problem of combining information from multiple heterogeneous databases. One step of data integration is relating the records that appear in the different databases specifically, determining which sets of records refer to the same real-world entities. Performing record matching solves the duplication detection problems; hence the needs...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Application Of Clustering Data Mining Techniques In Temporal Data Sets Of Hydrology: A Review

    Hydrologic cycle are rather very complex and it is very difficult to predict the behavior of runoff based on temporal data sets of hydrological process, as these are often very large and difficult to analyze and display. Clustering can be done by the different number of algorithms such as hierarchical,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Cloud Computing Security Challenges and Their Compromised Attributes

    Cloud computing is a revolutionary modern computing platform in the field of information technology. It has promptly became famous and considered the emerging field of recent times due to its potential for better utilization of computer resources like flexible IT architecture, scalability, availability, fault tolerance, computational power, computational platforms, storage...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Apr 2014

    Comparison Between FPGA Logic Resources And Embedded Resources Used By Discrete Arithmetic (DA) Architecture To Design FIR Filter

    FIR filter is a fundamental function in many applications, mainly in the field of Digital Signal Processing (DSP). The main problem of this function is its computational complexity, needed to process a signal. Currently, FPGAs are widely used for a variety of computationally complex applications. New generation of FPGAs contain...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    Micro-strip Patch Antenna on Glass Proxy Substrate for Infinite and Finite Ground Plane

    In this paper the authors have analyzed and designed a rectangular microstrip antenna. They analyzed micro strip antenna in IE3D by finite moment of method. In this paper they have compare and analyzed the micro strip antenna in infinite ground plane having dimension length, L = 700mil & width, W=800mil...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    Pipelined FIR Filter Implementation using FPGA

    FIR filters are being designed using HDL languages to enhance the speed of the system. In the whole system if the speed of the individual block is enhanced, the overall speed of the system is enhanced. In order to attain effective utilization hardware is done by applying the pipelining technique....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    LLP in Chain Inverter by using CMOS Circuit

    In this paper the authors provide new low power solutions for Very Large Scale Integration (VLSI) designers. Especially, the authors focus on leakage power reduction. Although leakage power was negligible at 0.18μ technology and in nano scale technology, such as 0.07μ, leakage power is almost equal to dynamic power consumption....

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    Dual Layer Data Hiding Using Cryptography and Steganography

    Digital communication has become an essential part of society. Now-a-days, a lot of applications are internet based and it is important that communication be made faithful and secret. Steganography and cryptography are two popular ways of information exchange in a secret way. Steganography hides the existence of the message and...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jan 2013

    Making Data Breach Prevention a Matter of Policy in Corporate Governance

    A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. The most common concept of a data breach is an attacker hacking into a corporate network to steal sensitive data. It seems like...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Dec 2013

    Performance Analysis of Reliable VM Identification Using Resource Availability Method for Cloud Computing

    Cloud computing is one of the latest emerging trends in Information technology. Cloud computing shares the resources through the internet. Today there is a demand for cloud computing because of this resource sharing. This demand causes many challenges in cloud computing research areas. One of the major aspects of the...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jul 2013

    Localization of Wireless Sensor Networks Using Robust Estimated Trust Evaluation Model

    Wireless sensor network localization is an important area that attracts significant research interest. Current localization algorithms mainly focus to localize as many nodes as possible for a given static set of anchor nodes and distance measurement. In this paper, the authors discuss a new technique that aims to localize all...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    A Novel Architecture for an Efficient Data Encryption System

    The RSA algorithm is the most popular and proven asymmetric key cryptographic algorithm. The researchers developed the first major asymmetric key cryptography system. The standard techniques for providing privacy and security in data networks include encryption/decryption algorithms such as Advanced Encryption System (AES) (private-key) and RSA (public-key). RSA is one...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Efficient Cross Layer Mitigation in SCADA Network

    Almost all the industrial data acquisition and control systems today use connection oriented concepts for interfaces. However, various shapes and functional commands that each cable or wire based system have also raises numerous problems: the difficulties in locating the particular area affected by the industrial parameter, the complexity in operation...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // May 2013

    A Fault-Tolerant Based Load Balancing Model in Distributed Web Environment

    Internet users are increasing exponentially since the last decade which drastically increases the internet traffic. This gives the user a challenge to manage the requests from the client on the web server. In the distributed environment the number of client requests web services are increasing, the quality of service in...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jun 2013

    Face Recognition Using ANN with Reduce Feature by PCA in Wavelet Domain

    Face recognition is an active research area in various streams such as pattern recognition, image processing. The strong need of face recognition is personal identification and recognition without the cooperation of the participants. This paper presents face recognition using wavelet transform. A face recognition system follow these steps image decomposition,...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Jul 2013

    COSDES of Junk E-Mail with Junk Free System Scheme

    E-mail communication is indispensable now, but the email spam problem is continuously growing more. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been discussed widely. The idea of the similarity matching scheme for spam detection is, to maintain a database formed by user...

    Provided By International Journal of Scientific Engineering and Technology

  • White Papers // Oct 2012

    A Review on Chaotic Map Based Cryptography

    In this paper, the authors present a review of Image cryptography techniques based on chaotic maps. The chaotic cryptography is gaining more attention than others because of its lower mathematical complexity & better security. It also avoids the data spreading hence reduces the transmission cost & delay. The digital image...

    Provided By International Journal of Scientific Engineering and Technology