International Journal of Scientific & Technology Research

Displaying 1-40 of 98 results

  • White Papers // Apr 2015

    Big Data Clustering Using Genetic Algorithm on Hadoop Mapreduce

    Cluster analysis is used to classify similar objects under same group. It is one of the most important data mining methods. However, it fails to perform well for big data due to huge time complexity. For such scenarios parallelization is a better approach. Mapreduce is a popular programming model which...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Apr 2015

    Financial Risk and Share Price Behavior

    Financial risk fluctuations have a significant effect on overall economy. Macroeconomic variables and stock return are related to each other. Financial risk and share price behavior has been investigated in this dissertation. For this purpose, monthly data from 2003 to 2012 and annual data for period of 2003 to 2012...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Feb 2015

    The Effectiveness of the Intelligence E-CRM Application in Enhancing Positive Customer Relationships

    E-CRM (Electronic Customer Relationship Management) is a derivation from CRM techniques which influenced direct marketing technology and call center to promote massively created products and services to small sub-segments of market. When CRM techniques are incorporated in e-commerce environment it becomes E-CRM which involves building a strong and sustainable customer...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Feb 2015

    Framework for Secure Cloud Data Communication

    Cloud computing is an emerging technology where all the computing resources are shared on the cloud rather than having local servers or personal devices to handle applications. Encrypting data residing on the cloud database is required to prevent unauthorized access of confidential and critical information and the subsequent modification of...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jan 2015

    An Appraisal of Groupon E-Business Model

    A new kind of business, 'Digital age middleman', which ordinarily may not have been possible, has emerged. An instance is Groupon, an e-commerce platform which allows a small group of merchants to reach a large number of customers using internet and social media technologies to provide discounted deals. Therefore, the...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2014

    A Study On Virtualization Techniques and Challenges in Cloud Computing

    Cloud computing is a modern technology that increase application potentialities in terms of functioning, elastic resource management and collaborative execution approach. The central part of cloud computing is virtualization which enables industry or academic IT resources through on-demand allocation dynamically. The resources have different forms such as network, server, storage,...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2014

    A Survey of Various Load Balancing Algorithms in Cloud Computing

    Cloud computing is emerging as a new paradigm for manipulating, configuring and accessing large scale distributed computing applications over the network. Load balancing is one of the main challenges in cloud computing which is required to distribute the workload evenly across all the nodes. Load is a measure of the...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2014

    Security Challenges of Cloud Computing

    In today's ICT service industry; there are many changes that promote technology services in many markets. Cloud computing is a comprehensive solution that delivers IT as a service. Different cloud services enable an organization to operate its IT applications on an OPEX model rather than the traditional CAPEX model. The...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Oct 2014

    Big Data An Overview

    The data sets that are too large and complex to manipulate or interrogate with standard methods or tools so it cannot be processed using some conventional methods. Now-a-days, social networks, mobile phones, sensors and science contribute to pet bytes of data created daily. Creators of web search engines were among...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Oct 2014

    A Web Base Information System using Cloud Computing

    Cloud computing is the new field that was invented and developed during a period not so long ago. It has a lot of benefit such as decreasing the cost that the user needs, process the operation faster and keep the information secure. The security of cloud is the most important...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Oct 2014

    Implementation of ERP in Cloud Computing

    Everyone have been using ERP (Enterprise Resource Planning) since decade but it never got so much attention which it got with cloud computing. In this paper, the authors will be discussing and analyzing the issues concerning with the execution of enterprise resource planning in cloud computing. As a lot of...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Aug 2014

    Retail Shoppability: The Impact of Store Atmospherics & Store Layout on Consumer Buying Patterns

    Retail shoppability, defined as the ability of the retail environment to translate consumer demand into purchase. It is making consumers' needs salient in specific retail settings & turning shoppers into buyers. The primary motivation to study store image has been to investigate the store atmospherics & store layout as a...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Aug 2014

    Event Application for Artists Based on Android OS

    In this paper, the authors describe the design and working of an Android based application that is made for artists and their followers, it has three categories of the artist's names as musician, painter and writer. Another category is also there which is for the fans and followings of the...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jul 2014

    A Systematic Review On Mining Web Navigation Pattern Using Graph Based Techniques

    Today internet is widely used in every aspect of day-to-day life. People get more and more dependent on internet for getting any kind of information. Record of different web user's web using pattern are get stored in web log repository, which are great source of knowledge about user's navigation. With...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jul 2014

    Proposed Model for Virtual Labs Interaction with Openstack Integration using KVM Hypervisor

    Over the last few years, the use of the simulation technologies and the internet in education industry has become wide spread. A virtual lab is definitely a large-scale solution to a large-scale problem. Its implementation being very intense, but the benefits of virtualization technology greatly facilitates the provisioning of accessibility...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jun 2014

    Design of Area and Speed Efficient Square Root Carry Select Adder Using Fast Adders

    Area and speed are the most important design objectives in integrated circuits. As addition is the basic operation of all computer arithmetic, adders are one of the widely used components in digital integrated circuit design. Since propagation of carry is of major concern in designing efficient adders, this paper presents...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jun 2014

    Radiations on Static Random Access Memory Cell

    With increased memory capacity usually comes increased bit line parasitice capacitance. This increased bit line capacitance in turn slows down voltage sensing and makes bit line voltage swing energy expensive resulting in slower more energy hungry memories. A full description of the various methods is beyond the scope of this...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jun 2014

    A Survey Of K-Means And GA-KM The Hybrid Clustering Algorithm

    In this paper, the authors present application of hybrid clustering algorithm that combines partitioning clustering algorithm and heuristic search algorithm. Their method uses portioning method with genetic algorithm. First they cluster the data using K-means clustering algorithm with the value of K no. of clusters then they calculate the centroid...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jun 2014

    Hybrid Model Of E-Learning With Knowledge Management

    The world is moving towards digitalization of knowledge which makes E-learning an important issue and prime concern that can be enhanced by combining it with another separate world of knowledge called knowledge management. This paper introduces the complementary structure of E-learning and knowledge management and their relationship. E-learning is used...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // May 2014

    A Study On Data Security Issues In Public Cloud

    The cloud computing concept has been evolving for more than 40 years. Cloud computing is an on demand computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. The cloud computing services are delivered through Software as a Service (SaaS), Platform as a...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // May 2014

    An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

    The massive jumps in technology led to the expansion of cloud computing as the most accepted medium for communication but it has also increased the scope of attacks as well. So security has become a major issue for cloud computing. In this paper the authors proposed a single IDS controller...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Apr 2014

    A Review On Industrial Automation By Zigbee Based Wireless Remote Controller

    Proper use of Wireless Sensor Networks (WSNs) can lower the rate of catastrophic failures, and increase the efficiency and productivity of industrial operations. Diversification of remote control mode is the inevitable trend of development of smart appliances. This paper proposes a review on remote control system of smart appliances based...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Apr 2014

    Android Desktop Control (ADC)

    ADC is an application which enables the user to view and interact with remote PC by using an Android phone via internet. With this application the user can not only interact with the remote system of various operating systems(Linux, Unix, Windows, Macintosh, etc.) but can also perform several operations like...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Mar 2014

    Hardware Trojan Model for Attack and Detection Techniques

    Worldwide integration in the production of Integrated Circuit (IC) has exposed numerous vulnerabilities in chip design and fabrication. Today's Integrated Circuits (ICs) are vulnerable to hardware Trojans, which are malicious alterations to the circuit, either during design or fabrication. The interventions of human in production of hardware resources have given...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Feb 2014

    Automatic Test Generation for Digital Circuits

    Current VLSI manufacturing processes suffer from larger defective parts ratio, partly due to numerous emerging defect types. While traditional fault models, such as the stuck at and transition delay fault models are still widely used, they have been shown to be inadequate to handle these new defects. The main aim...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Feb 2014

    Soft Error Detection and Correction for Configurable Memory of Reconfigurable System

    The size of integrated circuits has developed rapidly and now their size has reached nano scale which makes the embedded memories more sensitive to Single Event Upsets (SEUs) or Double Event Upsets (DEUs). In particular the reconfigurable system which contains configured memories are more likely to suffer from soft error...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jan 2014

    Performance Evaluation of IEEE 802.11e MAC Layer using Cell Processor

    IEEE802.11e is a new 802.11 Wireless LAN (WLAN) standard, which supports applications with Quality of Service (QoS). It is widely considered to play a major role in multimedia wireless home networks. The cell broadband engine is new multicore microprocessor architecture for high performance computer applications. In this paper, the authors...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Dec 2013

    A Survey On Some Encryption Algorithms And Verification Of RSA Technique

    Information security becomes much important in data storage and transmission. The term information security refers to the processes and methodologies which are designed and implemented to protect data from unauthorized access, use, misuse, disclosure, modification or disruption. Encryption algorithm plays important roles in information security. This paper provides five encryption...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Dec 2013

    Web Site Visit Forecasting Using Data Mining Techniques

    Data mining is a technique which is used for identifying relationships between various large amounts of data in many areas including scientific research, business planning, traffic analysis, clinical trial data mining etc. This paper will be researching applicability of data mining techniques in web site visit prediction domain. Here the...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Dec 2013

    Fast Algorithms for Mining Association Rules in Datamining

    The authors consider the problem of discovering association rules between items in a large database of sales transactions. They present two new algorithms for solving this problem that are fundamentally different from the known algorithms. Empirical evaluation shows that these algorithms outperform the known algorithms by factors ranging from three...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    A Survey On Various Methods to Detect Forgery and Computer Crime in Transaction Database

    A computer forensic method can be used for detecting the different types of forgeries and computer crime. Forgeries and computer crime are the most major concern of the digital world. Lots of techniques and methods have been used to find a proper solution to these problems. Now-a-days, digital forensics is...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    Priority Based Job Scheduling Techniques in Cloud Computing: A Systematic Review

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the internet) to the customers. It intends to share large scale equipments and resources for computation, storage, information and knowledge for scientific researches. In cloud computing, there are many...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    A Survey of Various Load Balancing Techniques and Challenges in Cloud Computing

    Cloud computing is emerging technology which is a new standard of large scale distributed computing and parallel computing. It provides shared resources, information, software packages and other resources as per client requirements at specific time. As cloud computing is growing rapidly and more users are attracted towards utility computing, better...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    The Impact of Using Security Protocols in Dedicated Private Network and Virtual Private Network

    With the development of computer networks techniques and the increased use of private networks, the intrusion and attack on these networks also increased, so the use of the protection protocols became necessary, but using these protocols will reduce the quality of the performance of these networks. This paper highlights the...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    A Survey Of Various QoS-Based Task Scheduling Algorithm in Cloud Computing Environment

    Cloud computing is a new terminology which is achieved by distributed, parallel and grid computing. Cloud computing is a new design pattern for large, distributed data centers. Cloud computing offers end consumers an \"A pay as go\" model - a powerful shift for computing towards a utility model like the...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    On Chip Calibration for a 7 Bit Comparator Based Asyncronous Binary Search (CABS) A/D Converter

    An on-chip calibration technique has been proposed for a 7-bit Comparator based Asynchronous Binary Search (CABS) A/D converter. The proposed design is verified using an 8-bit, 3.3V, 10 MS/s asynchronous SAR A/D converter by integrating the calibration scheme into the A/D converter. The 8-bit asynchronous SAR A/D converter consists of...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    Serial Front Panel Data Port (SFPDP) Protocol Implementation in Xilinx FPGAs

    The Serial Front Panel Data Port (SFPDP) protocol for high speed data transfer presents in this paper. High-speed data transfer finds application in most modern day communication systems. This design has been mainly done for data transfer in radar systems but can be programmed and used for variety of applications...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Oct 2013

    Access Rates Analysis Of Routing Stack Transformation

    The security of data is a very important aspect of every institution. One of the methods of boosting data security is by use of routing stack transformation. This approach successfully hides router inter-networking operating system from potential hackers by giving wrong or inaccurate results about the target operating system (including...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Oct 2013

    Model Driven Approach for Developing Cloud Application

    In recent years, cloud computing has become increasingly popular. Many application developers are now switching to cloud platform. Thus there is a need to develop a framework that guides the software development process for cloud software. Model driven architecture is a software development process that models the system at different...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Sep 2013

    Providing An Efficient Way To Maintain Anonymity In Wireless Sensor Networks Based On Bogus Data

    Wireless sensor networks can be used to supervise sensitive data or to monitor moving objects in a military environment. Anonymity in wireless sensor networks has become one of the major problems in the network since node localization data sender is crucial in these environments. However, lack of resources in wireless...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Feb 2012

    Data Management and Deployment of Cloud Applications in Financial Institutions and Its Adoption Challenges

    The Cloud has become a new vehicle for delivering resources such as computing and storage to customers on demand. Rather than being a new technology in itself, the cloud is a new business model wrapped around new technologies such as server Virtualization that take advantage of economies of scale and...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Mar 2012

    A DCT-Based Local Feature Extraction Algorithm for Palm-Print Recognition

    In this paper, a spectral feature extraction algorithm is proposed for palm-print recognition, which can efficiently capture the detail spatial variations in a palm-print image. The entire image is segmented into several spatial modules and the task of feature extraction is carried out using Two Dimensional Discrete Cosine Transform (2D-DCT)...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Mar 2012

    Optimized Query Processing for Wireless Sensor Networks

    In this paper, the authors propose an approach for query optimization in Sensor networks that cause increasing of network life time. The proposed approach reduce network consumption energy via executing operators with optimized order and optimized method for executing aggregation functions that sensor nodes do not sent unimportant data to...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Mar 2012

    Critical Assessment of Association Admission Manage Methods in ATM Networks

    CAC establishes, modifies and terminates virtual ath/channel connections. More specifically, it is responsible for high-layer signaling protocols, signaling ATM Adaptation Layer (AAL) functions to interpret or generate signaling cells, interface with a signaling network, negotiation of traffic contracts with users requesting new VPCs/VCCs, renegotiation with users to change established VPCs/VCCs,...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Mar 2012

    A Planar Monopole Antenna for Dual Band Application

    This paper describes the design of a small dual band planar antenna to operate in the ISM (2.4-2.48 GHz) and WLAN (5-6 GHz) band. Dual band operation is achieved by choosing proper microstrip radiator shape and reduced ground plane which becomes a monopole antenna. Simulation of the antenna is carried...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // May 2012

    A Survey of TCP Over Mobile ADHOC Networks

    TCP, Transmission control protocol which is mainly used in the wired network to provide process to process or end to end delivery of data. This protocol is mainly known because of its feature of providing a reliable delivery of packets from source to the destination due to this capability researchers...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jul 2012

    Development of Electronic Hospital Management System Utilizing Cloud Computing and Android OS Using VPN Connections

    Android is a software stack for mobile devices that includes an operating system, middleware and key applications. It allows developers to write managed code in the Java language, controlling the device via Google-developed Java libraries. Applications written in C and other languages can be compiled to ARM native code and...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jul 2012

    Security Challenges in Cloud Computing With More Emphasis on Trust and Privacy

    Cloud computing is known as the newest technologies in IT field which causes some worries for consumers and its producers due to its novelty. In this paper, the authors can see the privacy and security aspects and trust are the main concerns. It creates an important hindrance for using by...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jul 2012

    Location-Based Social Network

    Location-based mobile social networks are becoming increasingly popular as one can find almost each and every person on these Online Social Networks (OSNs), such as Facebook and recent emergence of smart-phones specially contributed for this popularity as they are well packaged with the features of internet & GPS, specially Google...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jul 2012

    An Approach to Perceive Tabnabbing Attack

    The growth of Internet has many pros and cons to mankind, which is easily visible in day to day activities. The growth of Internet has also manifested into the other domain of cyber crimes. Phishing, web defacement, money laundering, tax evasion, etc. are some of the examples of cyber crimes...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jul 2012

    A Review of Cloud Computing Open Architecture and Its Security Issues

    Cloud computing is beginning from the development of parallel computing, distributed computing, shared computing and grid computing. For the sharing resources that contains software, applications, infrastructures and business processes, cloud computing is the main key. Cloud computing has brought new tremendous changes and good opportunities to information technology industry. Cloud...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Feb 2013

    Review on Digital Library Application Services of Mobile Cloud Computing

    In the recent years growth of computer technology contribute to the progress towards the application of the cloud computing. Also the mobile related application, services and mobile device are growing day by day, the mobile devices can use clouds for data processing, storage and do some many thinks to any...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // May 2012

    Intrusion Detection System for Cloud Computing

    Providing security in a distributed system requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. Distributed model of cloud makes it vulnerable and prone to sophisticated distributed intrusion attacks like Distributed Denial of Service (DDOS) and Cross Site Scripting (XSS). To handle large scale...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jan 2013

    Delay-Efficient Approaches For Sleep Scheduling In Wireless Sensor Networks

    Wireless Sensor Networks (WSN) have recently used in many applications like surveillance, military applications, etc. In such applications, the sensor nodes are expected to be work long period of time without recharging their batteries. To extend the network lifetime, some sleep scheduling techniques always used, which may cause communication delay...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // May 2012

    Implementation of RSA Algorithm Using Elliptic Curve Algorithm for Security and Performance Enhancement

    In this paper, the authors introduce the concept and implementation of RSA algorithm for security purpose and to enhance the performance of software system using this algorithm. In this paper, they have done study about RSA algorithm. This paper includes what is RSA algorithm and why they are used in...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Aug 2012

    Data Mining for Security Purpose & Its Solitude Suggestions

    Data mining is the procedure of posing questions and taking out patterns, often in the past mysterious from huge capacities of data applying pattern matching or other way of thinking techniques. In this paper, the authors first look at data mining applications in safety measures and their suggestions for privacy....

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Dec 2012

    Managing Wireless Security in an Organization

    The adoption of wireless mobile computing solutions has been of benefit to government institutions, commerce and learning institutions among others. This is because of the higher customer satisfaction and higher productivity that have been made possible. A wireless network is a computer network, which is not connected by cables. This...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jun 2013

    Automated Windows 8 Security Console

    Automated windows 8 security console is software program which is aimed to help windows 8 user to protect their privacy and secure the system through the security policies. This automated windows 8 security console is graphical user interface software which guides an average user about the security issues and this...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Apr 2013

    A Survey on Securing Databases From Unauthorized Users

    Database and database technologies form a core component of many computing systems and applications which allow data to be stored, retained and shared electronically. As the use of database systems and the amount of data contained in these systems grows continuously and exponentially, database security has become an issue of...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jul 2012

    Measurements & Check the Performance of Secure RFC2961 Protocol

    RSVP (Resource reSerVation Protocol) is an Internet protocol which is allowing applications reserving network resources. RSVP is used as a general purpose signaling control in the MPLS and Traffic Engineering areas. This paper describes the authors' research on the extension of RSVP (RFC2961) protocol overhead and applied security authentication by...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Dec 2013

    A Survey On Some Encryption Algorithms And Verification Of RSA Technique

    Information security becomes much important in data storage and transmission. The term information security refers to the processes and methodologies which are designed and implemented to protect data from unauthorized access, use, misuse, disclosure, modification or disruption. Encryption algorithm plays important roles in information security. This paper provides five encryption...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Jun 2013

    Selective Bitplane Encryption for Secure Transmission of Image Data in Mobile Environment

    In this paper, the authors propose selective bitplane encryption to provide secure image transmission in low power mobile environment. They assume a 512 X 512 pixels image to be given in 8bit/pixel (bpp) precision. They consider the 8bpp data in the form of 8 bit planes, each bit plane associated...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Apr 2012

    Misuse Detection System Based- Snortrules-JESS Using Multiagents

    In this paper, the authors propose a novel Network Intrusion Detection Systems (NIDSs) architecture utilizing the misuse detection approach. This Network Intrusion Detection System architecture utilizes misuse detection agent. The proposed misuse detection agent adopts the novel framework by using Java Expert System Shell (JESS) and Snort rules along with...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2012

    Economical Benefits of Standardized Intrusion Detection Parametrization

    Intrusion Detection Systems (IDS) are very important to protect important services against malicious actions. Detailed knowledge of information processing and protocols are necessary to protect the services and systems sufficient against attacks. IDS are currently independent and coexisting solutions. Each single IDS requires its individual administration access, administration handling and...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Aug 2012

    Detection of Javascript Vulnerability At Client Agen

    These days, most of companies expanding their business horizon through dynamic web sites based on web 2.0 concept. The JavaScript is a key choice of web developers to build sophisticated dynamic web 2.0 application such social network site, blogs, e-commerce websites. On the other hand vulnerable JavaScript code is also...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Dec 2012

    Evaluation of Fuzzy K-Means and K-Means Clustering Algorithms in Intrusion Detection Systems

    According to the growth of the Internet technology, there is a need to develop strategies in order to maintain security of system. One of the most effective techniques is Intrusion Detection System (IDS). This paper is created to make a complete security in a computerized system, in order to pass...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // May 2013

    Multi Message Signcryption Based on Chaos with Public Verifiability

    Chaos is one type of complex dynamic behavior generated by determined nonlinear dynamic systems. Dependency on initial conditions and highly unpredictable nature of chaotic signals lead to novel cryptographic applications. Cryptography and chaos have some common features, the most prominent being sensitivity to parameters' and variables' changes. This paper focuses...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Aug 2013

    Overview Of Face Recognition System Challenges

    In this paper, the likely challenges occur in finding the suspects face match with the database are discussed. Developing a computational model of face recognition is quite difficult, because faces are complex, multidimensional and meaningful visual stimuli. Different algorithms are developed to solve these challenges. The magic of matching suspects...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Sep 2013

    Providing An Efficient Way To Maintain Anonymity In Wireless Sensor Networks Based On Bogus Data

    Wireless sensor networks can be used to supervise sensitive data or to monitor moving objects in a military environment. Anonymity in wireless sensor networks has become one of the major problems in the network since node localization data sender is crucial in these environments. However, lack of resources in wireless...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Sep 2012

    The Analysis of Determinant Factors In Software Design For Computer Assisted Instruction

    In this paper, the authors identify the determinant factors in the formulation of human and computer interaction in software design for Computer Assisted Instruction (CAI). The methodology used is descriptive analysis toward determination of the determinant factors in the formulation of human and computer interaction in software design for CAI...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Aug 2013

    A Review Work On Task Scheduling In Cloud Computing Using Genetic Algorithm

    Cloud computing is one of the upcoming latest new computing paradigm where applications and data services are provided over the Internet. Today's most of the business organizations and educational institutions use cloud environment. The task management is the key role in cloud computing systems task scheduling problems are main which...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Apr 2014

    Android Desktop Control (ADC)

    ADC is an application which enables the user to view and interact with remote PC by using an Android phone via internet. With this application the user can not only interact with the remote system of various operating systems(Linux, Unix, Windows, Macintosh, etc.) but can also perform several operations like...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // May 2014

    A Study On Data Security Issues In Public Cloud

    The cloud computing concept has been evolving for more than 40 years. Cloud computing is an on demand computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. The cloud computing services are delivered through Software as a Service (SaaS), Platform as a...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // May 2014

    An Alternative Model Of Virtualization Based Intrusion Detection System In Cloud Computing

    The massive jumps in technology led to the expansion of cloud computing as the most accepted medium for communication but it has also increased the scope of attacks as well. So security has become a major issue for cloud computing. In this paper the authors proposed a single IDS controller...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Apr 2014

    A Review On Industrial Automation By Zigbee Based Wireless Remote Controller

    Proper use of Wireless Sensor Networks (WSNs) can lower the rate of catastrophic failures, and increase the efficiency and productivity of industrial operations. Diversification of remote control mode is the inevitable trend of development of smart appliances. This paper proposes a review on remote control system of smart appliances based...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Apr 2013

    Improved E-Cash Protocol

    Electronic cash (e-cash) has been more and more popular in the electronic commerce transaction protocol. Ronggong Song and Larry Korba present their views on e-cash to improve Abe and Fujisaki's protocol. Their protocol achieves non-repudiation and anonymity services between customer and merchant. However, there still has weak fairness in their...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    A Survey Of Various QoS-Based Task Scheduling Algorithm in Cloud Computing Environment

    Cloud computing is a new terminology which is achieved by distributed, parallel and grid computing. Cloud computing is a new design pattern for large, distributed data centers. Cloud computing offers end consumers an \"A pay as go\" model - a powerful shift for computing towards a utility model like the...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    A Survey On Various Methods to Detect Forgery and Computer Crime in Transaction Database

    A computer forensic method can be used for detecting the different types of forgeries and computer crime. Forgeries and computer crime are the most major concern of the digital world. Lots of techniques and methods have been used to find a proper solution to these problems. Now-a-days, digital forensics is...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    Priority Based Job Scheduling Techniques in Cloud Computing: A Systematic Review

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the internet) to the customers. It intends to share large scale equipments and resources for computation, storage, information and knowledge for scientific researches. In cloud computing, there are many...

    Provided By International Journal of Scientific & Technology Research

  • White Papers // Nov 2013

    A Survey of Various Load Balancing Techniques and Challenges in Cloud Computing

    Cloud computing is emerging technology which is a new standard of large scale distributed computing and parallel computing. It provides shared resources, information, software packages and other resources as per client requirements at specific time. As cloud computing is growing rapidly and more users are attracted towards utility computing, better...

    Provided By International Journal of Scientific & Technology Research