International Journal of Scientific & Engineering Research

Displaying 1-40 of 299 results

  • White Papers // Sep 2013

    The Secure Dynamic Source Routing Protocol in MANET to Authenticate the Node

    The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Sep 2013

    Cloud Computing : Service Level Agreements(SLA)

    Cloud computing is a very complex system. It involves integration of many information communication technologies, like internet, distributed computing, grids, client-server, etc. main issue with any cloud is user's trust. To achieve this user-trust many solutions are put forth by scientists one of which is service-usage agreement based cloud development....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Sep 2013

    General Purpose Six-Stage Pipelined Processor

    In this paper, the authors propose design of six stage pipelined processor. The architecture is modified to increase the speed of operation. The architecture of the processor includes the ALU, pipelined data-path, data forwarding unit, control logic, data and program memories and hazard control unit. Hazard detection unit and data...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2013

    Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing

    Cloud computing delivers the computing resources to the user as a service over an internet. It uses wireless services with a user's data, software and computation. So spreaded over almost all it sector and become a rich area of research. Cloud computing composes of virtualization, on demand deployment. Here, user...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2013

    Secured Broadband Data Access System In WiMAX

    Security mechanism is to meet the expectations from mobile users to provide seamless services in mobile WiMAX. Handover should take place in highly secured and in most improved means. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jun 2013

    Survey Paper of Fuzzy Data Mining Using Genetic Algorithm for Intrusion Detection

    In spite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. Intrusion detection is one of the important and essential area of research. This paper has...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Progressive Image Hotspot Navigation for Progressive Image Hotspot Navigation for successful Security Evaluation

    Storing the images in a secure database through file stream data type is one of the options used to secure the images instead of storing the images in the server. Users will be provided an option of selecting the images to create the authentication page which is not included in...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Controlling Database Access by Providing Access Permissions on Database Objects

    In this paper, the authors focus on securing a table in the database, to the row level, implying that not all the rows in a database can be accessed by the end user. A user can access and perform operations on only those rows which he has been assigned right...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Scheduling in Instance-Intensive Cost-Constrained Workflows in a Cloud

    Cloud computing has been growing tremendously, as it has been accepted recently. Cloud computing has many unique strengths which can be utilized to facilitate workflow execution. This paper investigates the issue of dynamic scheduling in cloud computing with a special attention to the case of instance-intensive cost-constrained workflows. This paper...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    A Review Model on Query Optimization Using Open Source Database

    Query optimization is used to optimize the efficient result with less time and minimum cost. The query formatted according to particular search engine and then the translated query is passed to the search engines. HTML screen scrapping is used to parse the data from each individual search engine. Then these...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    A Survey on RFID Authentication with Different Protocols

    Security is an important concept in the process of communicating data across network. Although there are many authentication protocols implemented for the security of message from the sender to the receiver. It is also necessary in various communication devices such as RFID where the data from the tag can be...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Context-Sensitive Modeling for Intrusions Detection in Multitier Web Applications

    This strategy is mainly focus on to detect intrusion in multitier web applications. Multitier web application include two ends that is front end as well as back end of the applications. Modern multi-tier application systems are generally based on high performance database systems in order to process and store business...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Wormhole Attack Prevention By Next Hop Analysis

    A Mobile Ad-hoc NETwork (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. It uses open medium, dynamic topology and distributed co-operation. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Email Spam Zombies Scrutinizer In Email Sending Network Infrastructures

    Email spammers are constantly pioneering the techniques to bypass anti-spam filters forcing many organizations to invest in spam email prevention mechanisms and solutions. Traditional email spam filters aims at analyzing the email content to characterize the best features that are commonly included in email spams. However, this is observed that...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    File and Database Integrated Databse Transformations: An Middleware

    Database transformation is the process of transferring a table or whole schema of a database, from one database to another. The database transformations have either been performed using 'Command line interface' or import tools. This traditional process is complex and becomes tedious when same set of transformation has to be...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Improving Security & QoS in IP-Based MANETs

    A Mobile Ad-hoc NETwork (MANET) is a temporary network formed by the collection of mobile nodes. The network formed doesn't require any physical infrastructure. There is no central authority to administer the services and configurations of the network. Securing MANETs is still an active area of research. In this paper,...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Cryptographic Provenance Verification for Secure Hosts

    To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user's to get the service from the server by using integrity verification and malicious traffic detection. But the main issue of this approach is keystroke hacking...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Structural VHDL Implementation of Wallace Multiplier

    Scheming multipliers that are of high-speed, low power, and standard in design are of substantial research interest. By reducing the generated partial products speed of the multiplier can be increased. Several attempts have been made to decrease the number of partial products generated in a multiplication process. One of the...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Enhancing the Security of Biometrics in ATM

    Biometrics based authentication provides various advantages over other authentication methods, it has replaced the password based authentication and token based authentication. Biometrics plays a major role in Automated Teller Machine (ATM) system, e-commerce, online banking and passports. The growth in electronic transactions has been increased tremendously; there is a greater...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Secure Data Storage in Mobile Cloud Computing

    In cloud computing highly scalable computing resources are supplied as an outer service through internet on pay-as-usability basis. Portio research estimates that mobile subscribers will reach 6.5 billion by the end of 2012, 6.9 billion by the end of 2013. Due to increasing use of mobile devices the requirement of...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Review and Evaluation of Performance Measures in the Mobile Operating Systems

    Now-a-days, in the world of technology and communication, with the technology development and mobile devices enter the public acceptability of users across the world are faced, lack of consideration of security, performance and speed of Mobile Operating Systems (MOSs), practically on operating system limits the influence. MOS is an operating...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    A Survey on Data Mining: Tools, Techniques, Applications, Trends and Issues

    Data mining is a process which finds useful patterns from large amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It uses machine learning, statistical and visualization techniques to discovery and present knowledge in...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    NIDS Using Attack Patterns

    Now-a-days intrusion detection system becomes important topic because of its capabilities. Intrusion detection becomes a vital part of a systems as it detects various network attacks. Various intrusion detection systems are developed up till now, depending upon their capabilities. This paper proposes the intrusion detection system based on pattern matching...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Effective Discovery Of E-mail Spam Using Spot Detection System

    Compromised machines on the Internet are generally referred to as bots, and the set of bots controlled by a single entity is called a botnet. Botnets have multiple nefarious uses: mounting Distributed denial of service attacks, stealing user passwords and identities, generating click fraud, and sending spam email. Compromised machines...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    A Survey on Mobile Databases and Query Processing in Mobile Databases

    Mobile computing is increasingly becoming more and more popular as people need information even on the move in this rapid changing information world. Mobile computing is an environment where user is mobile and can change its place while communicating. A mobile database is a database that can be connected to...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Mobile Cloud Computing: Security Challenges for Threats Reduction

    Now-a-days, with the remarkable advances in information technology, mobile cloud computing with the security challenges and with factors privacy and trust is faced. MCC, in cloud computing technology for mobile devices is important. In MCC technology considering the hardware limitations of the device such as mobile phones, tablets and smart...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Security from Threats on Vehicular Adhoc Network

    A Vehicular Ad-hoc NETwork (VANET) is a new type of ad hoc network that is becoming even more popular than the original ad hoc concept. A Vehicular Ad-hoc NETwork (VANET) is a technology that uses moving cars as nodes in a network to create a mobile network. VANET turns every...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Biometric Security Systems and Contemporary Affirmation of State of Art

    Biometrics is playing vital role in applications that are centric to tasks such as identification, verification and classification. One distinctive illustration is a biometric verification structure that concludes the user's authorization by validating the biometric traits submitted by the user. The human traits preferred for biometric systems are universally unique...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    FP Tree Algorithm using Hybrid Secure Sum Protocol in Distributed Database

    At the enhancement of new technology and growth of the network the new data is coming and being added to the database at every fraction of seconds. For accessing and storing data a specialized tool is required. An FP Tree mining algorithm increases the environmental growth for accessing the data...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Fuzzy-GA Optimized Multi-Cloud Multi-Task Scheduler for Cloud Storage and Service Applications

    Computing clusters have been one of the most popular platforms for solving Many Task Computing (MTC) problems, especially in the case of loosely coupled tasks. However, building and managing physical clusters exhibits several drawbacks: major investments in hardware, specialized installations, and qualified personal; long periods of cluster under-utilization; cluster overloading...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Cloud Storage Gateway for Industry Data Base

    In the present time cloud storage gateway are important to the Industry. These appliances are growing in popularity and with clear indicators that the cloud storage space is growing. Object base storage has lack of standardized cloud storage Application Programming Interfaces (APIs) means customers will have to deploy cloud storage...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Analysis of Adder Using BIST

    Embedded memories consume an increasing portion of the die area in deep sub-micron System-on-Chips (SOCs). Manufacturing test of embedded memories is an essential step in the SOC production that screens out the defective chips and accelerates the transition from the yield learning phase to the volume production phase of a...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Grid Computing-A Next Level Challenge with Big Data

    Grid computing provides high performance data processing service with the help of the integrated computers connected to each other through local area network or through internet. It uses parallel processing and distributed systems technology which are the backbone of high performance computing. It has extensive use in many fields of...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    Classification of Attacks in Network Intrusion Detection System

    The authors have designed a network intrusion detection system based on the artificial neural networks using Multi Layer Perception (MLP) and Modified signature Apriory algorithm; and the testing results of the prototype system proved the validity of the method and the advantages over other methods suggested. In the present study...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    The Secure Cluster and Energy Efficient in Geocast for Manets Using Selection Gateway Method

    The secure and energy efficient geocast method using for a mobile ad hoc network, it's based on a secure clustered agreement with data declaration release from the basis node of the system and all nodes located in one or more geocast regions on the network. To improving the energy efficient...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    Secure Routing Using Trust Based Mechaniam in Wireless Sensor Networks(WSNs)

    Wireless Sensor Networks (WSN) is a most challenging and emerging technology for the research. Today wireless sensor networks are broadly used in environmental control, surveillance tasks, maintaining tracking, controlling, etc. On the top of all this the wireless sensor networks need very secure communication. Ensuring confidence between every pair of...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Types of Malware and its Analysis

    Malware - the increasingly common vehicle by which criminal organizations facilitate online crime - has become an artifact whose use intersects multiple major security threats (e.g., botnets) faced by information security practitioners. The paper explores the still-growing threat of website malware, specifically how hackers compromise websites and how users become...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Impact of Database Security in Cloud Computing

    In this paper, the authors discuss about the database services available in cloud computing environment, analyses the security risks combination and propose the possible counter measures to minimize the risks. And also analyzes the cloud database service providers namely; Amazon and Xeround, RackSpace2. The reason behind choosing these are providers...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    A Highly Secure Integrated Biometrics Authentication Using Finger-Palmprint Fusion

    Biometric authentication is the verification and identification of a person uniquely based on physical characteristics such as finger print, palm print, retina, iris, face etcetera or behavioral characteristics such as signature, gait, typing patterns, voice etcetera. Existing single modal biometric system has more error rate and provides less security than...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Cloud Computing: The Base of Future Operating Systems

    Operating system, the soul of an electronic device, has been turned into a subject of great competition among the companies and of fascination among the techies. New operating systems are being developed by different companies while olds are getting updates. Now come to the word 'Cloud computing'. Though it has...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jun 2011

    Analysis of Optical Wireless Communication for Underwater Wireless Communication

    Recently, the importance of underwater wireless optical communication has been grown for applications of underwater observation and sea monitoring systems. This communication technology is expected to play a prominent role in investigating climate changes, prediction of natural disasters, discovery of natural resources, marine biology in lake, sea, and ocean environment....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    Performance Analysis of TCP in a Reliable Connections Environment With UDP Flows Using OPNET Simulator

    The widely use transport protocol on the Internet is TCP/IP and its usage is mainly based on its high dynamic nature of adaptability to any kind of network capacity. The Internet technology today runs over large different link technologies with vastly different characteristics. In spite of the recent sudden increase...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    ATSERO Method: A Guideline for Business Process and Workflow Modeling Within an Enterprise

    In the fields of business process and workflows modeling, a wide range of techniques have been defined and used. Despite the popularity of some of them, there is no consensus on the modeling standards and concepts. However, there are many perspectives that need to be taken into consideration for a...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    Developing Geo-Web Portals With Google Map API- A Case Study of the Fichtner Group

    The main objective of this paper was to research the use of Web 2.0 techniques and freely available geospatial tools as a base for information-focused applications. The investigation was conducted, based on a prototype development of a project portal for the Fichtner Group. The methods adopted include; developing both server...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    Energy-Efficient Routing Protocol in Wireless Sensor Network

    Routing in Wireless Sensor Network (WSN) is an important area of research due to its rapidly increasing application in monitoring various kinds of environment by sensing physical phenomenon. Energy consumption is one of the major criteria for most of the routing protocols because 70% of the total energy is consumed...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    Admission Control and Performance Evaluation for Distributed Door Entry Wireless Networks

    In this paper, the authors propose a novel smart access control system for large enterprises. The proposed system performs the following functions: limits access to secured areas in a given physical facility only to authorized users, provides authorized users with configurable and differentiated access rights to the same premises based...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    OSD: A Source Level Bug Localization Technique Incorporating Control Flow and State Information in Object Oriented Program

    Bug localization in object oriented program has always been an important issue in software engineering. In this paper, the author proposes a source level bug localization technique for object oriented embedded programs. The author proposed technique, presents the idea of debugging an object oriented program in class level, incorporating the...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    Artificial Neural Network Design and Parameter Optimization for Facial Expressions Recognition

    This paper presents an Artificial Neural Network design and Neural Network parameter optimization for emotional recognition of classified facial expressions. The main goal in this paper is to teach computers to recognize three distinct human emotions from static images. Training and Testing dataset will be collected and a multilayer perceptron...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    Implementation of MUSIC Algorithm for a Smart Antenna System for Mobile Communications

    This paper presents practical design of a smart antenna system based on direction-of-arrival estimation and adaptive beam forming. Direction-Of-Arrival (DOA) estimation is based on the MUSIC algorithm for identifying the directions of the source signals incident on the sensor array comprising the smart antenna system. Adaptive beam forming is achieved...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    CORDIC Algorithm Implementation in FPGA for Computation of Sine & Cosine Signals

    Many hardware algorithms exist to handle the hardware intensive signal processing problems. Among these algorithms is a set of shift-add algorithms collectively known as CORDIC for computing a wide range of functions including certain trigonometric, hyperbolic, linear and logarithmic functions. While there are numerous papers covering various aspects of CORDIC...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    A Survey of Cluster Based Multi-Processor System Design With IP-Cores

    This project aims to design a cluster-based MultiProcessor System-on-Chip (MPSoC) combines of hybrid interconnection composed of both bus based and Network on Chip (NOC) architecture. Two or more microprocessors working together to perform one or more related tasks using a shared memory is commonly referred to as a multiprocessor system....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    An Intelligent Approach for Dense Urban Area in Existing 2G / 2.5G

    In the prevailing scenario audio, video, data services (i.e. internet), multimedia and broadcasting etc. are being integrated. Decreasing cell size increases capacity but at the same time increases fluctuation and interference too. The intelligence approach is the only answer in developing countries where frequency and power are scarce resources. In...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    Frame Communication Module for Bin-Packing Algorithms for Distributed Embedded Systems

    Embedded real-time systems must satisfy not only logical functional requirements, but also para-functional properties such as timeliness, Quality of Service (QoS) and reliability. The proposed scheme describes an automated schedulability analysis, and generates glue code to integrate the final run-time executable for the system. Its extensive glue code generation capabilities...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    REEH: Residual Energy Efficient Heterogeneous Clustered Hierarchy Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSN) are spatially distributed micro sensor systems. WSN is a power constrained system, since nodes run on limited power batteries which shorten the life time of the system. Prolonging the life time depends on efficient communication protocol architecture. LEACH hierarchical homogeneous communication protocol which greatly minimizes the...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    Voice Recognition Browser for Reduced Vision and Vision Loss Learners

    Learning through the use of web technology or web based learning has become an important media in the education revolution of the 21st century. The Internet particularly, has become an important tool for learners to acquire information and knowledge that encompasses various elements such as text, graphic, numeric, and animation...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    Interacting With Dynamic Web Portals in Local Language

    Today and Tomorrow, the most advanced technology is Information Technology (IT). But, the applications of IT are being limited to only those who are familiar in English. It is not useful for those who are unknown in digital literacy. In an increasingly interconnected world, the interactions among devices, systems, and...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    A Case Study on Pervasive Computing in MANET

    In the near future, a pervasive computing environment can be expected based on the recent progresses and advances in computing and communication technologies. Next generation of mobile communications will include both prestigious infrastructure wireless networks and novel infrastructure less Mobile Ad hoc NETworks (MANETs). Mobile Adhoc Network is designed for...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2011

    An Effective Strategy for Identifying Phishing Websites Using Class-Based Approach

    This paper presents a novel approach to overcome the difficulty and complexity in detecting and predicting social networking phishing website. The authors proposed an intelligent resilient and effective model that is based on using A New Class Based Associative Classification Algorithm which is an advanced and efficient approach than all...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2012

    Efficient AODV Routing Protocol for MANET With Enhanced Packet Delivery Ratio and Minimized End to End Delay

    Communication takes place by routing protocols in effective and efficient manner in wireless network. Efficient protocols are used to forward data packets without much packet loss. Mobile Ad hoc NETwork (MANET) is a collection of mobile devices, a self configured, multi-hop network. Simulating Tool NS-2 is an outstanding network simulating...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Oct 2012

    Secure Wireless Network System Against Malicious Rogue Threats (System Attacks) within Cooperative Distributed Network and Wireless Network

    With the expanse of the Internet and the increased reliance on computer networking technology for everyday business, the need to protect electronic data and communication from malicious attack has become increasingly critical. This paper addresses the rogue system problem, a significant threat in modern networks. A rogue system is a...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // May 2012

    Usage & Issues of Cloud Computing Techniques in Small & Medium Business Organizations

    In cloud computing large accessible computing resources are provided \"Software-as-a-service\" to users on internet because it is \"It is internet based system development\". It includes SaaS, web infrastructure, web and other technologies. Industry and research community are attracting towards it. In this paper construction and the problems that arise during...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2012

    Exploring the Malware Analysis Landscape for Forensic Investigation

    The computer crime explosion in World Wide Web has increased in both commercial and personal areas. Study of poor users; provide valuable information in their system to their individual needs or for the efficient organization. Among the several attacking approaches like virus, worm, Trojan horse etc. to extract confidential data...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Enhancing the Security of Biometrics in ATM

    Biometrics based authentication provides various advantages over other authentication methods, it has replaced the password based authentication and token based authentication. Biometrics plays a major role in Automated Teller Machine (ATM) system, e-commerce, online banking and passports. The growth in electronic transactions has been increased tremendously; there is a greater...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2012

    High Security for Manet Using Authentication and Intrusion Detection with Data Fusion

    In Mobile Ad-hoc NETwork (MANET), Multimodal Biometric technology plays a vital role in giving security between user-to-device authentications. This paper concentrates on the Intrusion Detection and authentication with data fusion in MANET. To overcome the fault in unimodal biometric systems, Multimodal biometrics is set out to work with Intrusion Detection...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Oct 2012

    Improving Sound Quality by Bandwidth Extension

    In recent telecommunications system uses a limited audio signal bandwidth of 300 to 3400 Hz. In recent times it has been proposed that the mobile phone networks with increased audio signal bandwidth of 50Hz-7 KHz will increase the sound quality of the speech signal. In this paper, a method extending...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    A CRM Based Cryptography Service for Ensuring Security in Cloud Computing

    Cloud Computing is more than a technology. It is more than a platform. It is more than just a hosting provider. It is more than just an application hosted as a service. It is more than providing storage services on the Internet. It is a combination of all the above....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    Users' Perception Towards "Cloud Computing"

    In general, "Cloud Computing" is the provision of web-based services, located on remote computers, allowing individuals and businesses to use software and hardware managed by third parties. As nowadays more organizations consider moving their applications and data from dedicated hosting infrastructure that they own and operate to share-infrastructure leased from...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    A Survey of Project Scenario Impact in SDLC Models Selection Process

    In the software industry, a large number of projects fail and billions of dollars are spent on failed software projects. Lacks of poor selection process of Software Development Life Cycle (SDLC) models is some of the top reason of such failure. By selecting right software process model a better and...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    Impact of Mobility Models With Different Scalability of Networks on MANET Routing Protocols

    MANET routing protocols performance is perceptive to mobility and scalability of network. The performance of any routing protocol depends on the duration of interconnection among the nodes in the networks. This interconnections results an average connected path for whole network. This paper evaluates, the impact of three mobility models i.e....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    Hardware and Software Requirements for Implementation of ERP in Technical Education Institutes in India

    ERP provides an integrated solution within which all facets of an organization and its data can interoperate. Most of the big ERP firms market products for higher technical education. For the most part, these vendors have taken a corporate solution and refashioned it to fit the specific needs of the...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    2D Image Compression Technique-A Survey

    Advanced imaging requires storage of large quantities of digitized data. Due to the constrained bandwidth and storage capacity, images must be compressed before transmission and storage. However the compression will reduce the image fidelity, especially when the images are compressed at lower bitrates. The reconstructed images suffer from blocking artifacts...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    Performance of Alamouti Space Time Coding in Fading Channels for IEEE 802.16e Protocol

    Among the emerging technologies for broadband wireless access, IEEE 802.16e is one of the most promising and attractive candidates. However, it also presents very challenging aspects in terms of radio resource management which intentionally left open to implementers. The IEEE 802.16e air interface standard is based on Orthogonal Frequency-Division Multiplexing...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    Buffer Scheduling Policy for Opportunitic Networks

    In Delay Tolerant Networks (DTNs), the optimal use of buffer management polices can improve the network throughput. In this paper, the authors propose a buffer management strategy called as Message Drop Control (MDC). This technique controls the message drop by using an upper bound which is the count of buffered...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    A Comparison of Data Dissemination Protocols for Wireless Sensor Networks

    Due to many constraints of nodes in wireless sensor networks, a variety of data dissemination protocols have been developed for data gathering in wireless sensor networks. Sensors extract useful information from environment; this information has to be routed through several intermediate nodes to reach the destination. Effective information dissemination is...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2011

    Wireless Sensor Network: A Review on Data Aggregation

    Data aggregation is very crucial techniques in wireless sensor network. Because with the help of data aggregation the authors reduce the energy consumption by eliminating redundancy. When wireless sensor network deployed in remote areas or hostile environment. In the wireless sensor network have the most challenging task is a life...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    Modified Compact High Gain Multiple Patch Slotted Microstrip Antenna for Multiband Wireless Applications

    A modified approach for the design of a compact multi-element patch antenna which operates in pentaband is proposed. The antenna comprises of a main patch with subpatches containing resonating slots. The main patch is fed with a 50? microstrip line. The antenna operates with multiple operational frequencies covering the bands...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    Design and Performance Analysis of a 3GPP LTE/LTE-Advance Turbo Decoder Using Software Reference Models

    This paper presents the design and development of an efficient VLSI architecture for 3GPP advanced Turbo decoder by utilizing the convolutional interleaver. The high-throughput 3GPP Advance Turbo code requires turbo decoder architecture. Interleaver is known to be the main obstacle to the decoder implementation and introduces latency, due to the...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jul 2011

    Intrusion Detection System (IDS) &Intrusion Prevention System (IPS): Case Study

    IPS and IDS both examine traffic looking for attacks but they are critically different. The differences between deployment of these system in networks in which IDS are out of band in system, means it cannot sit within the network path but IPS are in-line in the system, means it can...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2011

    Establishing Bridges Between UML, HAD and GRAFCET Metamodels for the Modelling of Dynamic Systems

    This paper shows the scope and limits of UML as a tool for modelling Automatic Control Systems. An alternative metamodel, Hybrid Activity Diagram (HAD), is proposed and applied to a concrete example, in order to illustrate its efficiency in comparison to the limits of UML diagrams. The paper also presents...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2011

    Parameter Ranking and Reduction in Communication Systems

    Parameter reduction from experimental data is an important issue arising in many frequently encountered problems with different types of applications in communications engineering. However, the computational effort grows drastically with the number of parameters in such types of applications. This paper proposes a technique that reduces the performance parameters of...

    Provided By International Journal of Scientific & Engineering Research